- kernel-uek-5.15.0-2.52.3.el8uek (oel8-uek7)
- 5.15.0-312.187.5.el8uek
- 2025-09-16 10:00:41
- 2025-09-16 13:36:03
- K20250916_01
- CVE-2022-3028
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://access.redhat.com/security/cve/CVE-2022-3028
- Patch: oel9-uek7/5.15.0-3.60.5.1.el9uek/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: kernel-uek-5.15.0-3.60.5.1.el9uek
- CVE-2022-1184
- Description:
ext4: check if directory block is within i_size
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: oel9-uek7/5.15.0-5.76.5.1.el9uek/CVE-2022-1184-04-ext4-check-if-directory-block-is-within-i_size.patch
- From: kernel-uek-5.15.0-5.76.5.1.el9uek
- CVE-2022-1184
- Description:
ext4: make sure ext4_append() always allocates new block
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: oel9-uek7/5.15.0-5.76.5.1.el9uek/CVE-2022-1184-05-ext4-make-sure-ext4_append()-always-allocates-new-block.patch
- From: kernel-uek-5.15.0-5.76.5.1.el9uek
- CVE-2022-1184
- Description:
ext4: fix check for block being out of directory size
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: oel9-uek7/5.15.0-5.76.5.1.el9uek/CVE-2022-1184-06-ext4-fix-check-for-block-being-out-of-directory-size.patch
- From: kernel-uek-5.15.0-5.76.5.1.el9uek
- CVE-2022-4378
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: oel9-uek7/5.15.0-5.76.5.1.el9uek/CVE-2022-4378-01-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: kernel-uek-5.15.0-5.76.5.1.el9uek
- CVE-2022-4378
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: oel9-uek7/5.15.0-5.76.5.1.el9uek/CVE-2022-4378-02-proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-C-strings.patch
- From: kernel-uek-5.15.0-5.76.5.1.el9uek
- CVE-2022-42895
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: oel9-uek7/5.15.0-6.80.3.1.el9uek/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitialized-memory.patch
- From: kernel-uek-5.15.0-6.80.3.1.el9uek
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: oel9-uek7/5.15.0-6.80.3.1.el9uek/CVE-2022-42896-01-Bluetooth-L2CAP-Fix-accepting-connection-request-for-invalid-SPSM.patch
- From: kernel-uek-5.15.0-6.80.3.1.el9uek
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: oel9-uek7/5.15.0-6.80.3.1.el9uek/CVE-2022-42896-02-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: kernel-uek-5.15.0-6.80.3.1.el9uek
- CVE-2022-3545
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: oel9-uek7/5.15.0-7.86.6.1.el9uek/CVE-2022-3545-nfp-fix-use-after-free-in-area_cache_get.patch
- From: kernel-uek-5.15.0-7.86.6.1.el9uek
- CVE-2022-4139
- Description:
drm/i915/gt: Serialize TLB invalidates with GT resets
- CVE: https://access.redhat.com/security/cve/CVE-2022-4139
- Patch: oel9-uek7/5.15.0-7.86.6.1.el9uek/CVE-2022-4139-01-drm-i915-gt-Serialize-TLB-invalidates-with-GT-resets.patch
- From: kernel-uek-5.15.0-7.86.6.1.el9uek
- CVE-2022-4139
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://access.redhat.com/security/cve/CVE-2022-4139
- Patch: oel9-uek7/5.15.0-7.86.6.1.el9uek/CVE-2022-4139-02-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-compute-engines.patch
- From: kernel-uek-5.15.0-7.86.6.1.el9uek
- CVE-2022-45869
- Description:
KVM: x86/mmu: Fix race condition in direct_page_fault
- CVE: https://access.redhat.com/security/cve/CVE-2022-45869
- Patch: oel9-uek7/5.15.0-7.86.6.1.el9uek/CVE-2022-45869-KVM-x86-mmu-Fix-race-condition-in-direct_page_fault.patch
- From: kernel-uek-5.15.0-7.86.6.1.el9uek
- CVE-2023-0179
- Description:
netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
- CVE: https://access.redhat.com/security/cve/CVE-2023-0179
- Patch: oel9-uek7/5.15.0-7.86.6.1.el9uek/CVE-2023-0179-netfilter-nft_payload-incorrect-arithmetics-when-fetching-VLAN-header-bits.patch
- From: kernel-uek-5.15.0-7.86.6.1.el9uek
- CVE-2022-4129
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2022-4129-01-l2tp-Serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2022-4129
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2022-4129-02-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk_callback_lock.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2022-41218
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://access.redhat.com/security/cve/CVE-2022-41218
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-releasing.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2022-47929
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://access.redhat.com/security/cve/CVE-2022-47929
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2023-0266
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-0266
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2023-0266-ALSA-pcm-Move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-UAF.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2023-0394
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://access.redhat.com/security/cve/CVE-2023-0394
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2023-23454
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23454
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2023-23455
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2023-23559
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://access.redhat.com/security/cve/CVE-2023-23559
- Patch: oel9-uek7/5.15.0-8.91.4.1.el9uek/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_query_oid.patch
- From: kernel-uek-5.15.0-8.91.4.1.el9uek
- CVE-2022-2196
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2022-2196
- Patch: oel9-uek7/5.15.0-100.96.32.el9uek/CVE-2022-2196-KVM-VMX-Execute-IBPB-on-emulated-VM-exit-when-guest-has-IBRS.patch
- From: kernel-uek-5.15.0-100.96.32.el9uek
- CVE-2023-30456
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://linux.oracle.com/cve/CVE-2023-30456.html
- Patch: oel9-uek7/5.15.0-101.103.2.1.el9uek/CVE-2023-30456-KVM-nVMX-add-missing-consistency-checks-for-CR0-and-CR4.patch
- From: 5.15.0-101.103.2.1.el9uek
- CVE-2023-32233
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://linux.oracle.com/cve/CVE-2023-32233.html
- Patch: oel9-uek7/5.15.0-102.110.5.el9uek/CVE-2023-32233-patch-netfilter-nf-tables-deactivate-anonymous-set-from.patch
- From: 5.15.0-102.110.5.el9uek
- CVE-2023-3610
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://access.redhat.com/security/cve/cve-2023-3610
- Patch: oel8-uek7/5.15.0-103.114.4.el8uek/CVE-2023-3610-0001-netfilter-nf_tables-fix-chain-binding-transaction-lo-7.patch
- From: 5.15.0-103.114.4.el8uek
- CVE-2023-3610
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://access.redhat.com/security/cve/cve-2023-3610
- Patch: oel8-uek7/5.15.0-103.114.4.el8uek/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo-kpatch.patch
- From: 5.15.0-103.114.4.el8uek
- CVE-2023-22024
- Description:
rds: Fix lack of reentrancy for connection reset with dst addr zero
- CVE: https://linux.oracle.com/cve/CVE-2023-22024.html
- Patch: oel8-uek7/5.15.0-105.125.6.2.1.el8uek/CVE-2023-22024-rds-Fix-lack-of-reentrancy-for-connection-reset-with-dst-addr-zero.patch
- From: 5.15.0-105.125.6.2.1.el8uek
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://linux.oracle.com/cve/CVE-2023-42753.html
- Patch: oel8-uek7/5.15.0-106.131.4.el8uek/CVE-2023-42753-0001-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET.patch
- From: kernel-uek-5.15.0-105.125.6.2.2.el8uek
- CVE-2023-20588
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: oel8-uek7/5.15.0-106.131.4.el8uek/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0-91.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-5178
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://linux.oracle.com/cve/CVE-2023-5178.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://linux.oracle.com/cve/CVE-2023-4921.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2023-4921.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://linux.oracle.com/cve/CVE-2023-45871.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2023-45871.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-42752
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://linux.oracle.com/cve/CVE-2023-42752.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-42752-patch-igmp-limit-igmpv3-newpack-packet-size-to-ip-max-mtu.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://linux.oracle.com/cve/CVE-2023-4623.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
- CVE: https://linux.oracle.com/cve/CVE-2023-4623.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-4623-0001-net-sched-sch_hfsc-upgrade-rt-to-sc-when-it-becomes-.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-4244
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-5197
- Description:
netfilter: nf_tables: skip bound chain in netns release path
- CVE: https://linux.oracle.com/cve/CVE-2023-5197.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-5197-0001-netfilter-nf_tables-skip-bound-chain-in-netns-releas.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-5197
- Description:
netfilter: nf_tables: skip bound chain on rule flush
- CVE: https://linux.oracle.com/cve/CVE-2023-5197.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-5197-0001-netfilter-nf_tables-skip-bound-chain-on-rule-flush.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-5197
- Description:
netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- CVE: https://linux.oracle.com/cve/CVE-2023-5197.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-5197-0001-netfilter-nf_tables-disallow-rule-addition-to-bound-.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2023-5197
- Description:
netfilter: nf_tables: disallow rule removal from chain binding
- CVE: https://linux.oracle.com/cve/CVE-2023-5197.html
- Patch: oel8-uek7/5.15.0-201.135.6.el8uek/CVE-2023-5197-0001-netfilter-nf_tables-disallow-rule-removal-from-chain-1.patch
- From: 5.15.0-201.135.6.el8uek
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://linux.oracle.com/cve/CVE-2020-26555.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2020-26555-Bluetooth-hci_event-Ignore-NULL-link-key.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2020-26555
- Description:
Bluetooth: Reject connection with the device which has same BD_ADDR
- CVE: https://linux.oracle.com/cve/CVE-2020-26555.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2020-26555-Bluetooth-Reject-connection-with-the-device-which-ha.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://linux.oracle.com/cve/CVE-2023-25775.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://linux.oracle.com/cve/CVE-2023-25775.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-35827
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://linux.oracle.com/cve/CVE-2023-35827.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-35827-ravb-Fix-use-after-free-issue-in-ravb_tx_timeout_wor.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-46813
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://linux.oracle.com/cve/CVE-2023-46813.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-46813-x86-sev-Disable-MMIO-emulation-from-user-mode.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-46813
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://linux.oracle.com/cve/CVE-2023-46813.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-46813-x86-sev-Check-IOBM-for-IOIO-exceptions-from-user-spa.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-46813
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://linux.oracle.com/cve/CVE-2023-46813.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-46813-x86-sev-Check-for-user-space-IOIO-pointing-to-kernel.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-6111
- Description:
Patch already exists in 5.15 kernels.
- CVE:
- Patch: skipped/CVE-2023-6111.patch
- From:
- CVE-2023-6622
- Description:
netfilter: nf_tables: bail out on mismatching dynset and set expressions
- CVE: https://linux.oracle.com/cve/CVE-2023-6622.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-6622-netfilter-nf_tables-bail-out-on-mismatching-dynset-a.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2024-1085
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://linux.oracle.com/cve/CVE-2024-1085.html
- Patch: oel9-uek7/5.15.0-204.147.6.2.el9uek/CVE-2024-1085-netfilter-nf_tables-check-if-catch-all-set-element-is-active-in-next-generation-pre201.patch
- From: 5.15.0-204.147.6.2
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel9-uek7/5.15.0-204.147.6.3.el9uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-105.patch
- From: 5.15.0-204.147.6.3
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file-2.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- CVE-2024-2201
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-uek-2.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- CVE-2024-41049
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://linux.oracle.com/cve/CVE-2024-41049.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode-200.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39495
- Description:
greybus: Fix use-after-free bug in gb_interface_release due
- CVE: https://linux.oracle.com/cve/CVE-2024-39495.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40994
- Description:
ptp: fix integer overflow in max_vclocks_store
- CVE: https://linux.oracle.com/cve/CVE-2024-40994.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40994-ptp-fix-integer-overflow-in-max-vclocks-store.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42093
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42093.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41087
- Description:
ata: libata-core: Fix double free on error
- CVE: https://linux.oracle.com/cve/CVE-2024-41087.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://linux.oracle.com/cve/CVE-2024-42224.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42161
- Description:
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
- CVE: https://linux.oracle.com/cve/CVE-2024-42161.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42161-bpf-avoid-uninitialized-value-in-bpf-core-read-bitfield.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41046
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://linux.oracle.com/cve/CVE-2024-41046.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2022-3567
- Description:
ipv6: annotate some data-races around sk->sk_prot
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2022-3567-ipv6-annotate-some-data-races-around-sk-sk_prot.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2022-3567
- Description:
ipv6: Fix data races around sk->sk_prot.
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2022-3567-ipv6-fix-data-races-around-sk-sk_prot.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2022-3566
- Description:
tcp: Fix data races around icsk->icsk_af_ops.
- CVE: https://linux.oracle.com/cve/CVE-2022-3566.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2022-3566-tcp-fix-data-races-around-icsk-icsk_af_ops.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://linux.oracle.com/cve/CVE-2024-36978.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
- CVE: https://linux.oracle.com/cve/CVE-2024-39487.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://linux.oracle.com/cve/CVE-2024-40902.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40956
- Description:
dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list
- CVE: https://linux.oracle.com/cve/CVE-2024-40956.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40956-dmaengine-idxd-fix-possible-use-after-free-in.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40958
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://linux.oracle.com/cve/CVE-2024-40958.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41040
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://linux.oracle.com/cve/CVE-2024-41040.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41040-net-sched-fix-uaf-when-resolving-a-clash.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41092
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://linux.oracle.com/cve/CVE-2024-41092.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42094
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42094.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://linux.oracle.com/cve/CVE-2024-42104.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42225
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://linux.oracle.com/cve/CVE-2024-42225.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40911
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://linux.oracle.com/cve/CVE-2024-40911.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40911-wifi-cfg80211-lock-wiphy-in-cfg80211-get-station.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40947
- Description:
ima: Simplify ima_lsm_copy_rule
- CVE: https://linux.oracle.com/cve/CVE-2024-40947.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40947-ima-Simplify-ima_lsm_copy_rule.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40947
- Description:
ima: Handle -ESTALE returned by ima_filter_rule_match()
- CVE: https://linux.oracle.com/cve/CVE-2024-40947.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40947-ima-Handle-ESTALE-returned-by-ima_filter_rule_match.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40947
- Description:
ima: Avoid blocking in RCU read-side critical section
- CVE: https://linux.oracle.com/cve/CVE-2024-40947.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40947-ima-Avoid-blocking-in-RCU-read-side-critical-section.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40978
- Description:
scsi: qedi: Fix crash while reading debugfs
- CVE: https://linux.oracle.com/cve/CVE-2024-40978.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40981
- Description:
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
- CVE: https://linux.oracle.com/cve/CVE-2024-40981.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40981-batman-adv-bypass-empty-buckets-in-batadv-purge-orig-ref.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41027
- Description:
Vendor reverted due to missing fixes a591d35c4023 and a47a7af9b511
- CVE:
- Patch: skipped/CVE-2024-41027.patch
- From:
- CVE-2024-42070
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data transfers
- CVE: https://linux.oracle.com/cve/CVE-2024-42070.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42070-netfilter-nf_tables-fully-validate-NFT_DATA_VALUE-on-store-to-data-registers-201.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://linux.oracle.com/cve/CVE-2024-42090.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42090-pinctrl-fix-deadlock-in-create_pinctrl-when-handling-EPROBE_DEFER.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42105
- Description:
nilfs2: fix inode number range checks
- CVE: https://linux.oracle.com/cve/CVE-2024-42105.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42105-nilfs2-fix-inode-number-range-checks.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42143
- Description:
orangefs: fix out-of-bounds fsid access
- CVE: https://linux.oracle.com/cve/CVE-2024-42143.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42143-orangefs-fix-out-of-bounds-fsid-access.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42121
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://linux.oracle.com/cve/CVE-2024-42121.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42121-drm-amd-display-Check-index-msg_id-before-read-or-write.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39484
- Description:
mmc: davinci: Don't strip remove function when driver is builtin
- CVE: https://linux.oracle.com/cve/CVE-2024-39484.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39484-mmc-davinci-don-t-strip-remove-function-when-driver-is-builtin-kpatch.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40905
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://linux.oracle.com/cve/CVE-2024-40905.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40905-ipv6-fix-possible-race-in-fib6-drop-pcpu-from.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40957
- Description:
seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors
- CVE: https://linux.oracle.com/cve/CVE-2024-40957.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40957-seg6-fix-parameter-passing-when-calling-nf-hook-in-end-dx4-and-end-dx6-behaviors.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40971
- Description:
f2fs: remove clear SB_INLINECRYPT flag in default_options
- CVE: https://linux.oracle.com/cve/CVE-2024-40971.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40971-f2fs-remove-clear-sb-inlinecrypt-flag-in-default-options.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40993
- Description:
netfilter: ipset: Fix suspicious rcu_dereference_protected()
- CVE: https://linux.oracle.com/cve/CVE-2024-40993.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40993-netfilter-ipset-fix-suspicious-rcu-dereference-protected-202.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42092
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://linux.oracle.com/cve/CVE-2024-42092.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42095
- Description:
serial: 8250_omap: Implementation of Errata i2310
- CVE: https://linux.oracle.com/cve/CVE-2024-42095.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42095-serial-8250-omap-implementation-of-errata-i2310-76.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42095
- Description:
serial: 8250_omap: Fix Errata i2310 with RX FIFO level check
- CVE: https://linux.oracle.com/cve/CVE-2024-42095.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42095-serial-8250-omap-fix-errata-i2310-with-rx-fifo-level-check.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42153
- Description:
i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr
- CVE: https://linux.oracle.com/cve/CVE-2024-42153.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42153-i2c-pnx-fix-potential-deadlock-warning-from-del-timer-sync-call-in-isr.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42153
- Description:
i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr
- CVE: https://linux.oracle.com/cve/CVE-2024-42153.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42153-i2c-pnx-fix-potential-deadlock-warning-from-del-timer-sync-call-in-isr-kpatch.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42232
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://linux.oracle.com/cve/CVE-2024-42232.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42236
- Description:
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
- CVE: https://linux.oracle.com/cve/CVE-2024-42236.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in-usb-string-copy.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-36901
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://linux.oracle.com/cve/CVE-2024-36901.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output-106.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40942
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://linux.oracle.com/cve/CVE-2024-40942.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40908
- Description:
bpf: Set run context for rawtp test_run callback
- CVE: https://linux.oracle.com/cve/CVE-2024-40908.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40908-bpf-set-run-context-for-rawtp-test-run-callback.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39509
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://linux.oracle.com/cve/CVE-2024-39509.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-36889
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://linux.oracle.com/cve/CVE-2024-36889.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-36889-mptcp-ensure-snd_nxt-is-properly-initialized-on-connect.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40931
- Description:
mptcp: ensure snd_una is properly initialized on connect
- CVE: https://linux.oracle.com/cve/CVE-2024-40931.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40931-mptcp-ensure-snd-una-is-properly-initialized-on-connect.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40961
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-40961.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6-nh-init.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40959
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://linux.oracle.com/cve/CVE-2024-40959.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41089
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-41089.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-hd-modes.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41047
- Description:
i40e: Fix XDP program unloading while removing the driver
- CVE: https://linux.oracle.com/cve/CVE-2024-41047.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41047-i40e-fix-xdp-program-unloading-while-removing-the-driver-5.15.0-6.80.3.1.el9uek.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41041
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://linux.oracle.com/cve/CVE-2024-41041.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40927
- Description:
xhci: Handle TD clearing for multiple streams case
- CVE: https://linux.oracle.com/cve/CVE-2024-40927.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40927-xhci-handle-td-clearing-for-multiple-streams-case.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40974
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-41093
- Description:
drm/amdgpu: avoid using null object of framebuffer
- CVE: https://linux.oracle.com/cve/CVE-2024-41093.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41093-drm-amdgpu-avoid-using-null-object-of-framebuffer.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42087
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
- CVE: https://linux.oracle.com/cve/CVE-2024-42087.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers-that-sleep.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42101
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42101.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in-nouveau_connector_get_modes.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42106
- Description:
inet_diag: Initialize pad field in struct inet_diag_req_v2
- CVE: https://linux.oracle.com/cve/CVE-2024-42106.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42106-inet-diag-initialize-pad-field-in-struct-inet_diag_req_v2.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42119
- Description:
drm/amd/display: Skip finding free audio for unknown engine_id
- CVE: https://linux.oracle.com/cve/CVE-2024-42119.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42119-drm-amd-display-Skip-finding-free-audio-for-unknown-engine_id.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-42247
- Description:
Skipping since unaligned read doesn't fault on x86 and arm64.
- CVE:
- Patch: skipped/CVE-2024-42247.patch
- From:
- CVE-2024-40901
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://linux.oracle.com/cve/CVE-2024-40901.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39507
- Description:
net: hns3: fix kernel crash problem in concurrent scenario
- CVE: https://linux.oracle.com/cve/CVE-2024-39507.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39507-net-hns3-fix-kernel-crash-problem-in-concurrent-scenario-5.15.0-202.135.2.el9uek.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39502
- Description:
ionic: clean interrupt before enabling queue to avoid credit race
- CVE: https://linux.oracle.com/cve/CVE-2024-39502.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39502-ionic-clean-interrupt-before-enabling-queue-to-avoid.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39502
- Description:
ionic: fix use after netif_napi_del()
- CVE: https://linux.oracle.com/cve/CVE-2024-39502.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39502-ionic-fix-use-after-netif-napi-del.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40943
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://linux.oracle.com/cve/CVE-2024-40943.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40914
- Description:
mm/huge_memory: don't unpoison huge_zero_folio
- CVE: https://linux.oracle.com/cve/CVE-2024-40914.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40914-mm-huge-memory-don-t-unpoison-huge-zero-folio-5.15.0-2.52.3.el9.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-41002
- Description:
crypto: hisilicon/sec - Fix memory leak for sec resource release
- CVE: https://linux.oracle.com/cve/CVE-2024-41002.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-41002-crypto-hisilicon-sec-fix-memory-leak-for-sec-resource-release.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-40968
- Description:
MIPS related CVE.
- CVE:
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40988
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40988.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39468
- Description:
smb: client: fix deadlock in smb2_find_smb_tcon()
- CVE: https://linux.oracle.com/cve/CVE-2024-39468.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-39468-smb-client-fix-deadlock-in-smb2-find-smb-tcon.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-21823
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist
- CVE: https://linux.oracle.com/cve/CVE-2024-21823.html
- Patch: oel9-uek7/5.15.0-300.163.18.el9uek/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-denylist.patch
- From: 5.15.0-300.163.18.el9uek
- N/A
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://linux.oracle.com/errata/ELSA-2024-12713.html
- Patch: oel9-uek7/5.15.0-300.163.18.1.el9uek/vhost-scsi-null-ptr-dereference-in-vhost_scsi_get_req-uek7.patch
- From: 5.15.0-300.163.18.1
- CVE-2024-42269
- Description:
netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().
- CVE: https://linux.oracle.com/cve/CVE-2024-42269.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-42269-netfilter-iptables-fix-potential-null-ptr-deref-in-ip6table-nat-table-init.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-42270
- Description:
netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init().
- CVE: https://linux.oracle.com/cve/CVE-2024-42270.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-42270-netfilter-iptables-fix-null-ptr-deref-in-iptable-nat-table-init.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-47674
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-26734
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26734.patch
- From:
- CVE-2024-27397
- Description:
netfilter: nft_set_rbtree: .deactivate fails if element has expired
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-27397-netfilter-nft_set_rbtree-.deactivate-fails-if-elemen.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-4.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch-4.patch
- From: 5.15.0-301.163.5.2.el9uek
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46814
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://linux.oracle.com/cve/CVE-2024-46814.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46814-drm-amd-display-Check-msg_id-before-processing-transcation.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41011
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://linux.oracle.com/cve/CVE-2024-41011.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://linux.oracle.com/cve/CVE-2024-42284.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-46844
- Description:
um: line: always fill *error_out in setup_one_line()
- CVE: https://linux.oracle.com/cve/CVE-2024-46844.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46844-um-line-always-fill-error-out-in-setup-one-line.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46674
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://linux.oracle.com/cve/CVE-2024-46674.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46725.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41070
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://linux.oracle.com/cve/CVE-2024-42301.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42313
- Description:
[PATCH 1/1] media: venus: fix use after free in vdec_close
- CVE: https://linux.oracle.com/cve/CVE-2024-42313.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec_close.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43858
- Description:
[PATCH 1/1] jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://linux.oracle.com/cve/CVE-2024-43858.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43858-jfs-Fix-array-index-out-of-bounds-in-diFree.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43873
- Description:
[PATCH 1/1] vhost/vsock: always initialize seqpacket_allow
- CVE: https://linux.oracle.com/cve/CVE-2024-43873.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket_allow.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43873
- Description:
[PATCH 1/1] vhost/vsock: always initialize seqpacket_allow
- CVE: https://linux.oracle.com/cve/CVE-2024-43873.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43873-kpatch.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44934
- Description:
[PATCH 1/1] net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://linux.oracle.com/cve/CVE-2024-44934.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44986
- Description:
[PATCH 1/1] ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://linux.oracle.com/cve/CVE-2024-44986.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44986-ipv6-fix-possible-UAF-in-ip6_finish_output2.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44987
- Description:
[PATCH 1/1] ipv6: prevent UAF in ip6_send_skb()
- CVE: https://linux.oracle.com/cve/CVE-2024-44987.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44987-ipv6-prevent-UAF-in-ip6_send_skb.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46740
- Description:
[PATCH 1/1] binder: fix UAF caused by offsets overwrite
- CVE: https://linux.oracle.com/cve/CVE-2024-46740.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46740-binder-fix-UAF-caused-by-offsets-overwrite.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46744
- Description:
[PATCH 1/1] Squashfs: sanity check symbolic link size
- CVE: https://linux.oracle.com/cve/CVE-2024-46744.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46744-Squashfs-sanity-check-symbolic-link-size.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46746
- Description:
[PATCH 1/1] HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://linux.oracle.com/cve/CVE-2024-46746.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46746-HID-amd_sfh-free-driver_data-after-destroying-hid-device.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46756
- Description:
[PATCH] hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46756.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46756-hwmon-w83627ehf-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42271
- Description:
[PATCH 1/1] net/iucv: fix use after free in iucv_sock_close()
- CVE: https://linux.oracle.com/cve/CVE-2024-42271.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv_sock_close.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42280
- Description:
[PATCH 1/1] mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://linux.oracle.com/cve/CVE-2024-42280.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42280-mISDN-Fix-a-use-after-free-in-hfcmulti_tx.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44998
- Description:
[PATCH 1/1] atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://linux.oracle.com/cve/CVE-2024-44998.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue_rx.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46757
- Description:
[PATCH] hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46757.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46757-hwmon-nct6775-core-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46758
- Description:
[PATCH] hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46758.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46758-hwmon-lm95234-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46759
- Description:
[PATCH 1/1] hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46759.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46759-hwmon-adc128d818-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46798
- Description:
[PATCH 1/1] ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://linux.oracle.com/cve/CVE-2024-46798.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46798-ASoC-dapm-Fix-UAF-for-snd_soc_pcm_runtime-object.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46800
- Description:
[PATCH] sch/netem: fix use after free in netem_dequeue
- CVE: https://linux.oracle.com/cve/CVE-2024-46800.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem_dequeue.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46818
- Description:
[PATCH 1/1] drm/amd/display: Check gpio_id before used as array index
- CVE: https://linux.oracle.com/cve/CVE-2024-46818.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46818-drm-amd-display-Check-gpio_id-before-used-as-array-index.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44946
- Description:
module is not included
- CVE:
- Patch: skipped/CVE-2024-44946.patch
- From:
- CVE-2024-44946
- Description:
kcm: Serialise kcm_sendmsg() for the same socket.
- CVE: https://linux.oracle.com/cve/CVE-2024-44946.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44946-Add-BUILD_BUG_ON-for-kcm-module.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44971
- Description:
[PATCH 1/1] net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register()
- CVE: https://linux.oracle.com/cve/CVE-2024-44971.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44971-net-dsa-bcm_sf2-Fix-a-possible-memory-leak-in-bcm_sf2_mdio_register.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44982
- Description:
[PATCH 1/1] drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
- CVE: https://linux.oracle.com/cve/CVE-2024-44982.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44982-drm-msm-dpu-cleanup-FB-if-dpu_format_populate_layout-fails.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44995
- Description:
[PATCH 1/1] net: hns3: fix a deadlock problem when config TC during resetting
- CVE: https://linux.oracle.com/cve/CVE-2024-44995.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44995-net-hns3-fix-a-deadlock-problem-when-config-TC-during-resetting.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-45003
- Description:
vfs: Don't evict inode under the inode lru traversing context
- CVE: https://linux.oracle.com/cve/CVE-2024-45003.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-45003-vfs-don-t-evict-inode-under-the-inode-lru-traversing-context.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-45006
- Description:
[PATCH 1/1] xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
- CVE: https://linux.oracle.com/cve/CVE-2024-45006.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-45006-xhci-Fix-Panther-point-NULL-pointer-deref-at-full-speed-re-enumeration.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-45028
- Description:
[PATCH 1/1] mmc: mmc_test: Fix NULL dereference on allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-45028.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-45028-mmc-mmc_test-Fix-NULL-dereference-on-allocation-failure.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46677
- Description:
[PATCH 1/1] gtp: fix a potential NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46677.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46677-gtp-fix-a-potential-NULL-pointer-dereference.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46714
- Description:
[PATCH 1/1] drm/amd/display: Skip wbscl_set_scaler_filter if filter is null
- CVE: https://linux.oracle.com/cve/CVE-2024-46714.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46714-drm-amd-display-Skip-wbscl_set_scaler_filter-if-filter-is-null.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46739
- Description:
[PATCH 1/1] uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
- CVE: https://linux.oracle.com/cve/CVE-2024-46739.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46739-uio_hv_generic-Fix-kernel-NULL-pointer-dereference-in-hv_uio_rescind.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-38577
- Description:
[PATCH 1/1] rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-38577.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-38577-rcu-tasks-Fix-show_rcu_tasks_trace_gp_kthread-buffer-overflow.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42285
- Description:
[PATCH 1/1] RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://linux.oracle.com/cve/CVE-2024-42285.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42285-RDMA-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44985
- Description:
[PATCH 1/1] ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-44985.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44985-ipv6-prevent-possible-UAF-in-ip6_xmit.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46673
- Description:
[PATCH 1/1] scsi: aacraid: Fix double-free on probe failure
- CVE: https://linux.oracle.com/cve/CVE-2024-46673.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46673-scsi-aacraid-Fix-double-free-on-probe-failure.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46722
- Description:
[PATCH 1/1] drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46722.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46722-drm-amdgpu-fix-mc_data-out-of-bounds-read-warning.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46724
- Description:
[PATCH 1/1] drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://linux.oracle.com/cve/CVE-2024-46724.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46724-drm-amdgpu-Fix-out-of-bounds-read-of-df_v1_7_channel_number.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46782
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://linux.oracle.com/cve/CVE-2024-46782.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46782-ila-call-nf-unregister-net-hooks-sooner-kpatch.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43839
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://linux.oracle.com/cve/CVE-2024-43839.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43839-bna-adjust-name-buf-size-of-bna_tcb-and-bna_ccb-structures.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44983
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://linux.oracle.com/cve/CVE-2024-44983.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44983-CVE-2024-27016-netfilter-flowtable-validate-pppoe-header.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44983
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://linux.oracle.com/cve/CVE-2024-44983.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44983-netfilter-flowtable-validate-vlan-header.patch
- From: 5.15.0-302.167.6.1.el9uek
- CVE-2024-46804
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://linux.oracle.com/cve/CVE-2024-46804.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46804-drm-amd-display-Add-array-index-check-for-hdcp-ddc-access.patch
- From: 5.15.0-302.167.6.1.el9uek
- CVE-2024-44958
- Description:
[PATCH] sched/smt: Fix unbalance sched_smt_present dec/inc
- CVE: https://linux.oracle.com/cve/CVE-2024-44958.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44958-sched-smt-Fix-unbalance-sched_smt_present-dec-inc.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44958
- Description:
[PATCH] sched/core: Fix unbalance set_rq_online/offline() in sched_cpu_deactivate()
- CVE: https://linux.oracle.com/cve/CVE-2024-44958.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44958-sched-core-fix-unbalance-set_rq_online-offline-in-sched_cpu_deactivate.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41012
- Description:
Causes conflicts on fcntl_setlk when using with nfsv3 and nfsv4
- CVE:
- Patch: skipped/CVE-2024-41012.patch
- From:
- CVE-2024-41019
- Description:
fs/ntfs3: Validate ff offset
- CVE: https://linux.oracle.com/cve/CVE-2024-41019.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-41019-fs-ntfs3-validate-ff-offset.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43849
- Description:
soc: qcom: pdr: protect locator_addr with the main mutex
- CVE: https://linux.oracle.com/cve/CVE-2024-43849.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43849-soc-qcom-pdr-protect-locator-addr-with-the-main-mutex.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42305
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://linux.oracle.com/cve/CVE-2024-42305.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42295
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-42295.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43883
- Description:
usb: vhci-hcd: Do not drop references before new references are gained
- CVE: https://linux.oracle.com/cve/CVE-2024-43883.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43883-usb-vhci-hcd-do-not-drop-references-before-new-references-are-gained.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-39472
- Description:
xfs: fix log recovery buffer allocation for the legacy h_size fixup
- CVE: https://linux.oracle.com/cve/CVE-2024-39472.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-legacy-h-size-fixup.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46752
- Description:
btrfs: replace BUG_ON() with error handling at update_ref_for_cow()
- CVE: https://linux.oracle.com/cve/CVE-2024-46752.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46752-btrfs-replace-bug-on-with-error-handling-at-update-ref-for-cow.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://linux.oracle.com/cve/CVE-2024-41059.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: 5.15.0/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 5.15.0/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://linux.oracle.com/cve/CVE-2024-43882.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44999
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-44999.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://linux.oracle.com/cve/CVE-2024-42228.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46731
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46731.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46723.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://linux.oracle.com/cve/CVE-2024-46747.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://linux.oracle.com/cve/CVE-2024-46743.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43875
- Description:
CONFIG_PCI_ENDPOINT is not enabled.
- CVE:
- Patch: skipped/CVE-2024-43875.patch
- From:
- CVE-2024-46791
- Description:
Attempting to fix the bug can potentially trigger safety check failures.
- CVE:
- Patch: skipped/CVE-2024-46791.patch
- From:
- CVE-2024-43846
- Description:
[PATCH 1/1] lib: objagg: Fix general protection fault
- CVE: https://linux.oracle.com/cve/CVE-2024-43846.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43846-lib-objagg-Fix-general-protection-fault.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43853
- Description:
[PATCH 1/1] cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-43853.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43853-cgroup-cpuset-Prevent-UAF-in-proc_cpuset_show.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43884
- Description:
[PATCH 1/1] Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-43884.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43884-Bluetooth-MGMT-Add-error-handling-to-pair_device.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46755
- Description:
[PATCH 1/1] wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
- CVE: https://linux.oracle.com/cve/CVE-2024-46755.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46755-wifi-mwifiex-Do-not-return-unused-priv-in-mwifiex_get_priv_by_id.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46763
- Description:
[PATCH 1/1] fou: Fix null-ptr-deref in GRO.
- CVE: https://linux.oracle.com/cve/CVE-2024-46763.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46763-fou-Fix-null-ptr-deref-in-GRO.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46807
- Description:
[PATCH 1/1] drm/amd/amdgpu: Check tbo resource pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-46807.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46807-drm-amd-amdgpu-Check-tbo-resource-pointer-102.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-47668
- Description:
[PATCH 1/1] lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-47668.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-47668-lib-generic-radix-tree.c-Fix-rare-race-in-__genradix_ptr_alloc.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-47669
- Description:
[PATCH 1/1] nilfs2: fix state management in error path of log writing function
- CVE: https://linux.oracle.com/cve/CVE-2024-47669.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-47669-nilfs2-fix-state-management-in-error-path-of-log-writing-function.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://linux.oracle.com/cve/CVE-2024-49966.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://linux.oracle.com/cve/CVE-2024-49930.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://linux.oracle.com/cve/CVE-2024-49995.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://linux.oracle.com/cve/CVE-2024-49924.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://linux.oracle.com/cve/CVE-2024-49983.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://linux.oracle.com/cve/CVE-2024-50151.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-53059.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50257
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://linux.oracle.com/cve/CVE-2024-50257.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://linux.oracle.com/cve/CVE-2024-50230.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-38384
- Description:
Issue was backported and fixed in the same 5.15.0-303.168.3.el9uek, previous kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-38384.patch
- From:
- CVE-2024-39463
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://linux.oracle.com/cve/CVE-2024-39463.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list-0.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46852
- Description:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
- CVE: https://linux.oracle.com/cve/CVE-2024-46852.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-46852-dma-buf-heaps-Fix-off-by-one-in-CMA-heap-fault-handler.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://linux.oracle.com/cve/CVE-2024-47685.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47685-netfilter-nf_reject_ipv6-fix-nf_reject_ip6_tcphdr_put.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://linux.oracle.com/cve/CVE-2024-47698.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://linux.oracle.com/cve/CVE-2024-49982.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://linux.oracle.com/cve/CVE-2024-50007.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50007-ALSA-asihpi-Fix-potential-OOB-array-access.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://linux.oracle.com/cve/CVE-2024-50143.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50143-udf-fix-uninit-value-use-in-udf_get_fileshortad-205.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-50262.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50262-bpf-Fix-out-of-bounds-write-in-trie_get_next_key.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://linux.oracle.com/cve/CVE-2024-53057.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-53057-net-sched-stop-qdisc_tree_reduce_backlog-on-TC_H_ROOT.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47695
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-47695.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds-60.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49969
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://linux.oracle.com/cve/CVE-2024-49969.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://linux.oracle.com/cve/CVE-2024-49967.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://linux.oracle.com/cve/CVE-2024-49884.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-50180.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50209
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://linux.oracle.com/cve/CVE-2024-50209.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://linux.oracle.com/cve/CVE-2024-50154.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink-106.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://linux.oracle.com/cve/CVE-2024-50127.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46859
- Description:
platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
- CVE: https://linux.oracle.com/cve/CVE-2024-46859.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-46859-platform-x86-panasonic-laptop-fix-sinf-array-out-of-bounds-accesses.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46859
- Description:
platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
- CVE: https://linux.oracle.com/cve/CVE-2024-46859.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-46859-platform-x86-panasonic-laptop-fix-sinf-array-out-of-bounds-accesses-kpatch.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency-kpatch.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-47670.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://linux.oracle.com/cve/CVE-2024-49889.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://linux.oracle.com/cve/CVE-2024-49883.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://linux.oracle.com/cve/CVE-2024-49882.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://linux.oracle.com/cve/CVE-2024-50074.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://linux.oracle.com/cve/CVE-2024-50131.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://linux.oracle.com/cve/CVE-2024-49894.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49895
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://linux.oracle.com/cve/CVE-2024-49895.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49852
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://linux.oracle.com/cve/CVE-2024-49852.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-47748.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly-103.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46770
- Description:
The patch doesn't fix the vunlnerability
- CVE:
- Patch: skipped/CVE-2024-46770.patch
- From:
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://linux.oracle.com/cve/CVE-2024-50301.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new-206.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new-kpatch-206.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations-101.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations-kpatch-91.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Initialize struct nfsd4_copy earlier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Initialize-struct-nfsd4_copy-earlier-206.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Never decrement pending_async_copies on error
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Never-decrement-pending_async_copies-on-error-206.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-53227
- Description:
Patch affects __init
- CVE:
- Patch: skipped/CVE-2024-53227.patch
- From:
- CVE-2024-49950
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-49950.patch
- From:
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://linux.oracle.com/cve/CVE-2024-53104.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53165
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://linux.oracle.com/cve/CVE-2024-56581.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56606.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56614.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56615.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://linux.oracle.com/cve/CVE-2024-50264.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://linux.oracle.com/cve/CVE-2024-53156.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44949
- Description:
Architecture PARISC is not supported
- CVE:
- Patch: skipped/CVE-2024-44949.patch
- From:
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://linux.oracle.com/cve/CVE-2024-56642.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56661
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://linux.oracle.com/cve/CVE-2024-56661.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56661-tipc-fix-null-deref-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://linux.oracle.com/cve/CVE-2024-53061.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://linux.oracle.com/cve/CVE-2024-50267.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://linux.oracle.com/cve/CVE-2024-53150.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50275
- Description:
Irrelevant for x64 kernels
- CVE:
- Patch: skipped/CVE-2024-50275.patch
- From:
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-50036.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://linux.oracle.com/cve/CVE-2024-56650.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://linux.oracle.com/cve/CVE-2024-56627.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://linux.oracle.com/cve/CVE-2024-56662.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://linux.oracle.com/cve/CVE-2024-53155.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53099
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://linux.oracle.com/cve/CVE-2024-53099.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-50268.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50279.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://linux.oracle.com/cve/CVE-2024-38538.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes-210.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://linux.oracle.com/cve/CVE-2024-53141.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53171
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://linux.oracle.com/cve/CVE-2024-53171.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://linux.oracle.com/cve/CVE-2024-56704.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56602.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://linux.oracle.com/cve/CVE-2024-56596.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://linux.oracle.com/cve/CVE-2024-47730.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://linux.oracle.com/cve/CVE-2024-39494.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name-5.15.0-201.135.6.el9uek.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://linux.oracle.com/cve/CVE-2024-56626.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write-5.15.0-201.135.6.el9uek.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759
- Description:
btrfs: rename and export __btrfs_cow_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-rename-and-export-__btrfs_cow_block.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled-52.patch
- From: 5.15.0-202.135.2.el9uek
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-50302.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56597
- Description:
jfs: fix shift-out-of-bounds in dbSplit
- CVE: https://linux.oracle.com/cve/CVE-2024-56597.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56597-jfs-fix-shift-out-of-bounds-in-dbsplit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-56532
- Description:
ALSA: us122l: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56532.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56532-alsa-us122l-use-snd-card-free-when-closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://linux.oracle.com/cve/CVE-2024-53112.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://linux.oracle.com/cve/CVE-2024-53173.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://linux.oracle.com/cve/CVE-2024-56640.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue-304.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create-continuation.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56601.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56600.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://linux.oracle.com/cve/CVE-2024-56595.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44940
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://linux.oracle.com/cve/CVE-2024-44940.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol-5.15.0-301.163.5.2.el9uek.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://linux.oracle.com/cve/CVE-2024-49996.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://linux.oracle.com/cve/CVE-2024-50055.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://linux.oracle.com/cve/CVE-2024-50269.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50282
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-53103.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-202.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237
- Description:
driver core: Introduce device_find_any_child() helper
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-driver-core-introduce-device_find_any_child-helper.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://linux.oracle.com/cve/CVE-2024-56598.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56603.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-56708.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-41080
- Description:
io_uring: fix possible deadlock in io_register_iowq_max_workers()
- CVE: https://linux.oracle.com/cve/CVE-2024-41080.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-41080-io-uring-fix-possible-deadlock-in-io-register-iowq-max-workers-6.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50299
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://linux.oracle.com/cve/CVE-2024-50299.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53172
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://linux.oracle.com/cve/CVE-2024-53172.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50292
- Description:
ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
- CVE: https://linux.oracle.com/cve/CVE-2024-50292.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50292-asoc-stm32-spdifrx-fix-dma-channel-release-in-stm32-spdifrx-remove.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56616
- Description:
drm/dp_mst: Fix MST sideband message body length check
- CVE: https://linux.oracle.com/cve/CVE-2024-56616.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56616-drm-dp-mst-fix-mst-sideband-message-body-length-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56623
- Description:
low-scored CVE which causes verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-56623.patch
- From:
- CVE-2024-56637
- Description:
netfilter: ipset: Hold module reference while requesting a module
- CVE: https://linux.oracle.com/cve/CVE-2024-56637.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56637-netfilter-ipset-hold-module-reference-while-requesting-a-module.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-53161.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56531
- Description:
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56531.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56531-ALSA-caiaq-Use-snd_card_free_when_closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56531
- Description:
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56531.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56531-ALSA-caiaq-Use-snd_card_free_when_closed-at-disconnection-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56548
- Description:
oel9-uek7 kernels are compiled without CONFIG_HFSPLUS_FS
- CVE:
- Patch: skipped/CVE-2024-56548.patch
- From:
- CVE-2024-56633
- Description:
tcp_bpf: bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56633-bpf-sockmap-Fix-the-sk-sk_forward_alloc-warning-of-sk_stream_kill_queues.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56633
- Description:
tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56633-tcp-bpf-fix-the-sk-mem-uncharge-logic-in-tcp-bpf-sendmsg.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-56619.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56747
- Description:
scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56747.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56747-scsi-qedi-fix-a-possible-memory-leak-in-qedi-alloc-and-init-sb.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56622
- Description:
scsi: ufs: core: sysfs: Prevent div by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-56622.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56622-scsi-ufs-core-sysfs-prevent-div-by-zero.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53145
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53217
- Description:
NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53217-nfsd-prevent-null-dereference-in-nfsd4-process-cb-update.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50287
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-50287.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53131
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53131.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56634
- Description:
gpio: grgpio: Add NULL check in grgpio_probe
- CVE: https://linux.oracle.com/cve/CVE-2024-56634.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56634-gpio-grgpio-add-NULL-check-in-grgpio_probe-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56571
- Description:
Rejected and is no longer a valid CVE
- CVE:
- Patch: skipped/CVE-2024-56571.patch
- From:
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://linux.oracle.com/cve/CVE-2024-53052.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53052-io-uring-rw-fix-missing-nowait-check-for-o-direct-start-write-80.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56705
- Description:
media: atomisp: Add check for rgby_data memory allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-56705.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56705-media-atomisp-add-check-for-rgby-data-memory-allocation-failure.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56728
- Description:
octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c
- CVE: https://linux.oracle.com/cve/CVE-2024-56728.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56728-octeontx2-pf-handle-otx2-mbox-get-rsp-errors-in-otx2-ethtool-c.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56694
- Description:
bpf: fix recursive lock when verdict program return SK_PASS
- CVE: https://linux.oracle.com/cve/CVE-2024-56694.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56694-bpf-fix-recursive-lock-when-verdict-program-return-sk-pass.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56746
- Description:
fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()
- CVE: https://linux.oracle.com/cve/CVE-2024-56746.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56746-fbdev-sh7760fb-fix-a-possible-memory-leak-in-sh7760fb-alloc-mem.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53180
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://linux.oracle.com/cve/CVE-2024-53180.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56739
- Description:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-56739.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56739-rtc-check-if-rtc-read-time-was-successful-in-rtc-timer-do-work.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56715
- Description:
ionic: Fix netdev notifier unregister on failure
- CVE: https://linux.oracle.com/cve/CVE-2024-56715.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56715-ionic-fix-netdev-notifier-unregister-on-failure.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56754
- Description:
crypto: caam - Fix the pointer passed to caam_qi_shutdown()
- CVE: https://linux.oracle.com/cve/CVE-2024-56754.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56754-crypto-caam-fix-the-pointer-passed-to-caam-qi-shutdown-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://linux.oracle.com/cve/CVE-2024-56672.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-56631.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://linux.oracle.com/cve/CVE-2024-36899.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-47707.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://linux.oracle.com/cve/CVE-2024-53124.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc-5.15.0-8.91.4.1.el9uek.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56583
- Description:
sched/deadline: Fix warning in migrate_enable for boosted tasks
- CVE: https://linux.oracle.com/cve/CVE-2024-56583.html
- Patch: oel9-uek7/5.15.0-308.179.6.el9uek/CVE-2024-56583-sched-deadline-fix-warning-in-migrate-enable-for-boosted-tasks.patch
- From: 5.15.0-308.179.6.el9uek
- CVE-2024-28956
- Description:
Patch meant for use with microcode update
- CVE:
- Patch: skipped/CVE-2024-28956.patch
- From:
- CVE-2024-8805
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://linux.oracle.com/cve/CVE-2024-8805.html
- Patch: oel9-uek7/5.15.0-309.180.4.el9uek/CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-309.180.4.el9uek
- CVE-2025-37758
- Description:
ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()
- CVE: https://linux.oracle.com/cve/CVE-2025-37758.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37758-ata-pata-pxa-fix-potential-null-pointer-dereference-in-pxa-ata-probe.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37757
- Description:
tipc: fix memory leak in tipc_link_xmit
- CVE: https://linux.oracle.com/cve/CVE-2025-37757.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37757-tipc-fix-memory-leak-in-tipc-link-xmit.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37756
- Description:
net: tls: explicitly disallow disconnect
- CVE: https://linux.oracle.com/cve/CVE-2025-37756.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37756-net-tls-explicitly-disallow-disconnect.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://linux.oracle.com/cve/CVE-2025-37749.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://linux.oracle.com/cve/CVE-2025-37892.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://linux.oracle.com/cve/CVE-2025-37838.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://linux.oracle.com/cve/CVE-2025-37982.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-27402
- Description:
phonet/pep: fix racy skb_queue_empty() use
- CVE: https://linux.oracle.com/cve/CVE-2024-27402.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-27402-phonet-pep-fix-racy-skb-queue-empty-use.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://linux.oracle.com/cve/CVE-2024-56551.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-35866.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26952
- Description:
CONFIG_SMB_SERVER is not enabled.
- CVE:
- Patch: skipped/CVE-2024-26952.patch
- From:
- CVE-2024-46742
- Description:
smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()
- CVE: https://linux.oracle.com/cve/CVE-2024-46742.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-46742-smb-server-fix-potential-null-ptr-deref-of-lease-ctx-info-in-smb2-open-5.15.0-202.135.2.el9uek.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-26928.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-26928-smb-client-fix-potential-UAF-in-cifs_debug_files_proc_show-6.80.3.1.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-35867.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2023-52621
- Description:
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- CVE: https://linux.oracle.com/cve/CVE-2023-52621.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2023-52621-bpf-check-rcu-read-lock-trace-held-before-calling-bpf-map-helpers.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-36908
- Description:
blk-iocost: do not WARN if iocg was already offlined
- CVE: https://linux.oracle.com/cve/CVE-2024-36908.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-36908-blk-iocost-do-not-warn-if-iocg-was-already-offlined.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://linux.oracle.com/cve/CVE-2024-49960.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://linux.oracle.com/cve/CVE-2024-54458.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://linux.oracle.com/cve/CVE-2024-56658.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://linux.oracle.com/cve/CVE-2024-56658.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-50280
- Description:
dm cache: Fix UAF in destroy()
- CVE: https://linux.oracle.com/cve/CVE-2024-50280.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50280-dm-cache-Fix-UAF-in-destroy.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://linux.oracle.com/cve/CVE-2024-50280.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://linux.oracle.com/cve/CVE-2025-37844.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://linux.oracle.com/cve/CVE-2025-37985.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37983
- Description:
qibfs: fix _another_ leak
- CVE: https://linux.oracle.com/cve/CVE-2025-37983.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37983-qibfs-fix-another-leak.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://linux.oracle.com/cve/CVE-2025-37803.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-49989.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://linux.oracle.com/cve/CVE-2025-37930.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://linux.oracle.com/cve/CVE-2025-37990.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://linux.oracle.com/cve/CVE-2025-37923.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37915.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37914.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37913.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://linux.oracle.com/cve/CVE-2024-38541.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://linux.oracle.com/cve/CVE-2025-37905.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://linux.oracle.com/cve/CVE-2025-37997.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://linux.oracle.com/cve/CVE-2025-37970.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://linux.oracle.com/cve/CVE-2025-37969.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://linux.oracle.com/cve/CVE-2025-37995.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://linux.oracle.com/cve/CVE-2025-37994.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://linux.oracle.com/cve/CVE-2025-38024.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://linux.oracle.com/cve/CVE-2025-38009.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://linux.oracle.com/cve/CVE-2025-38005.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://linux.oracle.com/cve/CVE-2025-37967.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://linux.oracle.com/cve/CVE-2024-53203.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://linux.oracle.com/cve/CVE-2024-53203.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-57996
- Description:
net_sched: sch_sfq: don't allow 1 packet limit
- CVE: https://linux.oracle.com/cve/CVE-2024-57996.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2024-57996-net-sched-sch-sfq-don-t-allow-1-packet-limit.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2025-37752
- Description:
net_sched: sch_sfq: move the limit validation
- CVE: https://linux.oracle.com/cve/CVE-2025-37752.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2025-37752-net-sched-sch-sfq-move-the-limit-validation.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://linux.oracle.com/cve/CVE-2023-6931.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2023-6931-perf-fix-perf-event-validate-size.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://linux.oracle.com/cve/CVE-2023-6931.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2023-6931-perf-fix-perf-event-validate-size-lockdep-splat.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://linux.oracle.com/cve/CVE-2025-38061.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://linux.oracle.com/cve/CVE-2025-38051.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://linux.oracle.com/cve/CVE-2025-38066.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://linux.oracle.com/cve/CVE-2025-38065.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38065-orangefs-do-not-truncate-file-size-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://linux.oracle.com/cve/CVE-2025-38044.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38044-media-cx231xx-set-device-caps-for-417-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://linux.oracle.com/cve/CVE-2025-38159.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://linux.oracle.com/cve/CVE-2025-38352.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://linux.oracle.com/cve/CVE-2025-38211.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.15.0-312.187.5.el9uek
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A