- kernel-5.14.0-503.31.1.el9_5 (oel9)
- 5.14.0-570.22.1.0.1.el9_6
- 2025-07-05 22:51:37
- 2025-07-08 09:13:09
- K20250706_05
- CVE-2025-21785, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-43855, CVSSv2 Score: 5.5
- Description:
md: fix deadlock between mddev_suspend and flush bio
- CVE: https://access.redhat.com/security/cve/CVE-2024-43855
- Patch: rhel9/5.14.0-503.35.1.el9_5/CVE-2024-43855-md-fix-deadlock-between-mddev-suspend-and-flush-bio.patch
- From: 5.14.0-503.35.1.el9_5
- CVE-2024-43855, CVSSv2 Score: 5.5
- Description:
md: change the return value type of md_write_start to void
- CVE: https://access.redhat.com/security/cve/CVE-2024-43855
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43855-md-change-the-return-value-type-of-md_write_start-to.patch
- From: 5.14.0-508.el9
- CVE-2024-53150, CVSSv2 Score: 7.8
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://access.redhat.com/security/cve/CVE-2024-53150
- Patch: rhel9/5.14.0-503.38.1.el9_5/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.14.0-503.38.1.el9_5
- CVE-2024-42292, CVSSv2 Score: 5.5
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42292
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-42322, CVSSv2 Score: 5.5
- Description:
ipvs: properly dereference pe in ip_vs_add_service
- CVE: https://access.redhat.com/security/cve/CVE-2024-42322
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-42322-ipvs-properly-dereference-pe-in-ip-vs-add-service.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-44990, CVSSv2 Score: 5.5
- Description:
bonding: fix null pointer deref in bond_ipsec_offload_ok
- CVE: https://access.redhat.com/security/cve/CVE-2024-44990
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-44990-bonding-fix-null-pointer-deref-in-bond_ipsec_offload.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-46826, CVSSv2 Score: 5.5
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://access.redhat.com/security/cve/CVE-2024-46826
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-38541, CVSSv2 Score: 9.8
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38541
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42302, CVSSv2 Score:
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-36012, CVSSv2 Score: 7.8
- Description:
Bluetooth: msft: fix slab-use-after-free in msft_do_close()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36012
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-36012-bluetooth-msft-fix-slab-use-after-free-in-msft-do-close.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47685
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-49006, CVSSv2 Score: 7.8
- Description:
tracing: Free buffers when a used dynamic event is removed
- CVE: https://access.redhat.com/security/cve/CVE-2022-49006
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-49006-tracing-free-buffers-when-a-used-dynamic-event-is-removed.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-49029, CVSSv2 Score: 7.8
- Description:
hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-49029
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-49029-hwmon-ibmpex-fix-possible-uaf-when-ibmpex-register-bmc-fails.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-49014, CVSSv2 Score: 7.8
- Description:
net: tun: Fix use-after-free in tun_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49014
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-49014-net-tun-fix-use-after-free-in-tun-detach.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43882, CVSSv2 Score: 8.4
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://access.redhat.com/security/cve/CVE-2024-43882
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43873, CVSSv2 Score: 7.8
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://access.redhat.com/security/cve/CVE-2024-43873
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43873, CVSSv2 Score: 7.8
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://www.cve.org/CVERecord?id=CVE-2024-43873
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43873-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44934, CVSSv2 Score: 7.8
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://access.redhat.com/security/cve/CVE-2024-44934
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-46756
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-46758
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-46759
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-44987
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-46673
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46725, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-46725
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44964, CVSSv2 Score: 7.8
- Description:
idpf: fix memory leaks and crashes while performing a soft reset
- CVE: https://access.redhat.com/security/cve/CVE-2024-44964
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44964-idpf-fix-memory-leaks-and-crashes-while-performing-a-soft-reset.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44932, CVSSv2 Score:
- Description:
Blamed commit 90912f9 ("idpf: convert header split mode to libeth + napi_build_skb()") is absent.
- CVE:
- Patch: skipped/CVE-2024-44932.patch
- From:
- CVE-2024-49882, CVSSv2 Score: 7.8
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://access.redhat.com/security/cve/CVE-2024-49882
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49883, CVSSv2 Score: 7.8
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49883
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49884, CVSSv2 Score: 7.8
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49884
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49889, CVSSv2 Score: 7.8
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49889
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49930, CVSSv2 Score: 7.8
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-49930
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49950, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-49950
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49950-bluetooth-l2cap-fix-uaf-in-l2cap-connect.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49950, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://access.redhat.com/security/cve/CVE-2024-49950
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49950-bluetooth-hci-core-fix-calling-mgmt-device-connected.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49960, CVSSv2 Score: 7.8
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://access.redhat.com/security/cve/CVE-2024-49960
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49967, CVSSv2 Score: 7.8
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://access.redhat.com/security/cve/CVE-2024-49967
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49983, CVSSv2 Score: 7.8
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-49983
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49991, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-49991
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49991-drm-amdkfd-amdkfd_free_gtt_mem-clear-the-correct-pointer.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://access.redhat.com/security/cve/cve-2024-46722
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://access.redhat.com/security/cve/cve-2024-46723
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46724, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://access.redhat.com/security/cve/cve-2024-46724
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://access.redhat.com/security/cve/CVE-2024-46743
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://access.redhat.com/security/cve/CVE-2024-46747
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49860, CVSSv2 Score: 7.1
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://access.redhat.com/security/cve/CVE-2024-49860
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49862, CVSSv2 Score: 7.1
- Description:
powercap: intel_rapl: Fix off by one in get_rpi()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49862
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49862-powercap-intel-rapl-fix-off-by-one-in-get-rpi.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49928, CVSSv2 Score: 7.1
- Description:
wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
- CVE: https://access.redhat.com/security/cve/cve-2024-49928
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49928-wifi-rtw89-avoid-reading-out-of-bounds-when-loading-tx-power-fw-elements.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50033, CVSSv2 Score: 7.1
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-50033
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50035, CVSSv2 Score: 7.1
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://access.redhat.com/security/cve/CVE-2024-50035
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46786, CVSSv2 Score: 7.8
- Description:
fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2024-46786
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46786-fscache-delete-fscache-cookie-lru-timer-when-fscache-exits-to-avoid-uaf.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://access.redhat.com/security/cve/CVE-2024-46800
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46853, CVSSv2 Score: 7.8
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-46853
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47748, CVSSv2 Score: 7.8
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://access.redhat.com/security/cve/CVE-2024-47748
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47745, CVSSv2 Score: 7.8
- Description:
mm: call the security_mmap_file() LSM hook in remap_file_pages()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47745
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47745-mm-call-the-security-mmap-file-lsm-hook-in-remap-file-pages.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47745, CVSSv2 Score: 7.8
- Description:
mm: split critical region in remap_file_pages() and invoke LSMs in between
- CVE: https://access.redhat.com/security/cve/CVE-2024-47745
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47745-mm-split-critical-region-in-remap_file_pages-and-invoke-LSMs-in-between.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47719, CVSSv2 Score: 7.8
- Description:
iommufd: Protect against overflow of ALIGN() during iova allocation
- CVE: https://access.redhat.com/security/cve/CVE-2024-47719
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47719-iommufd-protect-against-overflow-of-align-during-iova-allocation.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46828, CVSSv2 Score: 7.8
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://access.redhat.com/security/cve/CVE-2024-46828
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47718, CVSSv2 Score: 7.8
- Description:
wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://access.redhat.com/security/cve/CVE-2024-47718
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50261, CVSSv2 Score: 7.8
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://access.redhat.com/security/cve/CVE-2024-50261
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50127, CVSSv2 Score: 7.8
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50127
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50143, CVSSv2 Score: 7.8
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://access.redhat.com/security/cve/CVE-2024-50143
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50215, CVSSv2 Score: 7.8
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://access.redhat.com/security/cve/CVE-2024-50215
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50186, CVSSv2 Score: 7.8
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-50186
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://access.redhat.com/security/cve/CVE-2024-50151
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50235, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: clear wdev->cqm_config pointer on free
- CVE: https://access.redhat.com/security/cve/CVE-2024-50235
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50235-wifi-cfg80211-clear-wdev-cqm-config-pointer-on-free.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50282, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50282
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu_debugfs_gprwave_read.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53213, CVSSv2 Score: 7.8
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://access.redhat.com/security/cve/CVE-2024-53213
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53194, CVSSv2 Score: 7.8
- Description:
PCI: Fix use-after-free of slot->bus on hot remove
- CVE: https://access.redhat.com/security/cve/CVE-2024-53194
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53194-pci-fix-use-after-free-of-slot-bus-on-hot-remove.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56558, CVSSv2 Score: 7.8
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://access.redhat.com/security/cve/CVE-2024-56558
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56601
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56600
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53208, CVSSv2 Score: 7.8
- Description:
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-53208
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53208-bluetooth-mgmt-fix-slab-use-after-free-read-in-set-powered-sync.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56551, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://access.redhat.com/security/cve/CVE-2024-56551
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56604, CVSSv2 Score: 7.8
- Description:
Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56604
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56604-bluetooth-rfcomm-avoid-leaving-dangling-sk-pointer-in-rfcomm-sock-alloc.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56614, CVSSv2 Score: 7.8
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://access.redhat.com/security/cve/CVE-2024-56614
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://access.redhat.com/security/cve/CVE-2024-56642
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56602
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56605
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56653, CVSSv2 Score: 7.8
- Description:
Bluetooth: btmtk: avoid UAF in btmtk_process_coredump
- CVE: https://access.redhat.com/security/cve/CVE-2024-56653
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56653-bluetooth-btmtk-avoid-uaf-in-btmtk-process-coredump.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56631, CVSSv2 Score: 7.8
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56631
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57798, CVSSv2 Score: 7.8
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57798
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49995, CVSSv2 Score: 7.8
- Description:
tipc: guard against string buffer overrun
- CVE: https://access.redhat.com/security/cve/CVE-2024-49995
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50029, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_conn: helper
- CVE: https://access.redhat.com/security/cve/CVE-2024-50029
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50029-bluetooth-hci-conn-helper.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50029, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-50029
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50029-bluetooth-hci-conn-fix-uaf-in-hci-enhanced-setup-sync.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50047, CVSSv2 Score: 7.8
- Description:
smb: client: fix UAF in async decryption
- CVE: https://access.redhat.com/security/cve/CVE-2024-50047
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50055, CVSSv2 Score: 7.8
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50055
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50067, CVSSv2 Score: 7.8
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://access.redhat.com/security/cve/CVE-2024-50067
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50073, CVSSv2 Score: 7.8
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2024-50073
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50074, CVSSv2 Score: 7.8
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://access.redhat.com/security/cve/CVE-2024-50074
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50121, CVSSv2 Score: 7.8
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://access.redhat.com/security/cve/CVE-2024-50121
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50126, CVSSv2 Score: 7.8
- Description:
net: sched: use RCU read-side critical section in taprio_dump()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50126
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50126-net-sched-use-rcu-read-side-critical-section-in-taprio-dump.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://access.redhat.com/security/cve/CVE-2024-53057
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53059, CVSSv2 Score: 7.8
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53059
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53095, CVSSv2 Score:
- Description:
low-scored CVE which inevitably will cause verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-53095.patch
- From:
- CVE-2024-53103, CVSSv2 Score: 7.8
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-53103
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53174, CVSSv2 Score: 7.8
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://access.redhat.com/security/cve/CVE-2024-53174
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53142, CVSSv2 Score:
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53166, CVSSv2 Score: 7.8
- Description:
block, bfq: fix bfqq uaf in bfq_limit_depth()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53166
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53166-block-bfq-fix-bfqq-uaf-in-bfq-limit-depth.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53173
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53156, CVSSv2 Score: 7.8
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53156
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42133, CVSSv2 Score: 5.5
- Description:
Bluetooth: Ignore too large handle values in BIG
- CVE: https://access.redhat.com/security/cve/CVE-2024-42133
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42133-bluetooth-ignore-too-large-handle-values-in-big.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42253, CVSSv2 Score: 5.5
- Description:
gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
- CVE: https://access.redhat.com/security/cve/CVE-2024-42253
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42253-gpio-pca953x-fix-pca953x-irq-bus-sync-unlock-race.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
fs: prevent out-of-bounds array speculation when closing a file descriptor
- CVE: https://access.redhat.com/security/cve/CVE-2024-42265
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42265-fs-prevent-out-of-bounds-array-speculation-when-closing-a-file-descriptor.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42278, CVSSv2 Score: 5.5
- Description:
ASoC: TAS2781: Fix tasdev_load_calibrated_data()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42278
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42278-asoc-tas2781-fix-tasdev-load-calibrated-data.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42291, CVSSv2 Score: 5.5
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://access.redhat.com/security/cve/CVE-2024-42291
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42291, CVSSv2 Score: 5.5
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://access.redhat.com/security/cve/CVE-2024-42291
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42294, CVSSv2 Score: 5.5
- Description:
block: fix deadlock between sd_remove & sd_release
- CVE: https://access.redhat.com/security/cve/CVE-2024-42294
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42294-block-fix-deadlock-between-sd-remove-sd-release.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42304, CVSSv2 Score: 5.5
- Description:
ext4: make sure the first directory block is not a hole
- CVE: https://access.redhat.com/security/cve/CVE-2024-42304
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42304-ext4-make-sure-the-first-directory-block-is-not-a-hole.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42305, CVSSv2 Score: 5.5
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://access.redhat.com/security/cve/CVE-2024-42305
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42312, CVSSv2 Score: 5.5
- Description:
sysctl: always initialize i_uid/i_gid
- CVE: https://access.redhat.com/security/cve/CVE-2024-42312
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42312-sysctl-always-initialize-i-uid-i-gid.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43871
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43884, CVSSv2 Score: 5.5
- Description:
Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43884
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43884-bluetooth-mgmt-add-error-handling-to-pair-device.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43898, CVSSv2 Score: 5.5
- Description:
ext4: sanity check for NULL pointer after ext4_force_shutdown
- CVE: https://access.redhat.com/security/cve/CVE-2024-43898
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43898-ext4-sanity-check-for-null-pointer-after-ext4-force-shutdown.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43910, CVSSv2 Score: 5.5
- Description:
bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses
- CVE: https://access.redhat.com/security/cve/CVE-2024-43910
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43910-bpf-add-missing-check-func-arg-reg-off-to-prevent-out-of-bounds-memory-accesses.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43914, CVSSv2 Score: 5.5
- Description:
md/raid5: avoid BUG_ON() while continue reshape after reassembling
- CVE: https://access.redhat.com/security/cve/CVE-2024-43914
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43914-md-raid5-avoid-bug-on-while-continue-reshape-after-reassembling.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44931, CVSSv2 Score: 5.5
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-44931
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44952, CVSSv2 Score: 5.5
- Description:
driver core: Fix uevent_show() vs driver detach race
- CVE: https://access.redhat.com/security/cve/CVE-2024-44952
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44952-driver-core-fix-uevent-show-vs-driver-detach-race.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44975, CVSSv2 Score: 5.5
- Description:
cgroup/cpuset: fix panic caused by partcmd_update
- CVE: https://access.redhat.com/security/cve/CVE-2024-44975
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44975-cgroup-cpuset-fix-panic-caused-by-partcmd-update.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46761, CVSSv2 Score: 5.5
- Description:
pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
- CVE: https://access.redhat.com/security/cve/CVE-2024-46761
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46761-pci-hotplug-pnv-php-fix-hotplug-driver-crash-on-powernv.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46822, CVSSv2 Score: 5.5
- Description:
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-46822
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46822-arm64-acpi-harden-get-cpu-for-acpi-id-against-missing-cpu-entry.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46787, CVSSv2 Score: 5.5
- Description:
userfaultfd: fix checks for huge PMDs
- CVE: https://access.redhat.com/security/cve/CVE-2024-46787
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46787-userfaultfd-fix-checks-for-huge-pmds.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46783, CVSSv2 Score: 5.5
- Description:
tcp_bpf: fix return value of tcp_bpf_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2024-46783
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46783-tcp-bpf-fix-return-value-of-tcp-bpf-sendmsg.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46805, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: fix the waring dereferencing hive
- CVE: https://access.redhat.com/security/cve/CVE-2024-46805
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46805-drm-amdgpu-fix-the-waring-dereferencing-hive.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46806, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix the warning division or modulo by zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-46806
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46806-drm-amdgpu-Fix-the-warning-division-or-modulo-by-zero.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46807, CVSSv2 Score: 5.5
- Description:
drm/amd/amdgpu: Check tbo resource pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-46807
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46807-drm-amd-amdgpu-Check-tbo-resource-pointer.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46819, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: the warning dereferencing obj for nbio_v7_4
- CVE: https://access.redhat.com/security/cve/CVE-2024-46819
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46819-drm-amdgpu-the-warning-dereferencing-obj-for-nbio_v7.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46835, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix smatch static checker warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-46835
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46835-drm-amdgpu-Fix-smatch-static-checker-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49933, CVSSv2 Score: 5.5
- Description:
blk_iocost: fix more out of bound shifts
- CVE: https://access.redhat.com/security/cve/CVE-2024-49933
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49933-blk-iocost-fix-more-out-of-bound-shifts.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49934, CVSSv2 Score: 5.5
- Description:
fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name
- CVE: https://access.redhat.com/security/cve/CVE-2024-49934
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49934-fs-inode-prevent-dump-mapping-accessing-invalid-dentry-d-name-name.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49935, CVSSv2 Score: 5.5
- Description:
ACPI: PAD: fix crash in exit_round_robin()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49935
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49935-acpi-pad-fix-crash-in-exit-round-robin.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49937, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: Set correct chandef when starting CAC
- CVE: https://access.redhat.com/security/cve/CVE-2024-49937
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49937-wifi-cfg80211-set-correct-chandef-when-starting-cac.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49938, CVSSv2 Score: 5.5
- Description:
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
- CVE: https://access.redhat.com/security/cve/CVE-2024-49938
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49938-wifi-ath9k-htc-use-skb-set-length-for-resetting-urb-before-resubmit.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49939, CVSSv2 Score: 5.5
- Description:
wifi: rtw89: avoid to add interface to list twice when SER
- CVE: https://access.redhat.com/security/cve/CVE-2024-49939
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49939-wifi-rtw89-avoid-to-add-interface-to-list-twice-when-ser.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49946, CVSSv2 Score: 5.5
- Description:
ppp: do not assume bh is held in ppp_channel_bridge_input()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49946
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49946-ppp-do-not-assume-bh-is-held-in-ppp-channel-bridge-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49948, CVSSv2 Score: 5.5
- Description:
net: add more sanity checks to qdisc_pkt_len_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49948
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49948-net-add-more-sanity-checks-to-qdisc-pkt-len-init.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49951, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue
- CVE: https://access.redhat.com/security/cve/CVE-2024-49951
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49951-Bluetooth-hci_sync-Add-helper-functions-to-manipulat.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49951, CVSSv2 Score: 5.5
- Description:
Bluetooth: MGMT: Fix possible crash on mgmt_index_removed
- CVE: https://access.redhat.com/security/cve/CVE-2024-49951
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49951-bluetooth-mgmt-fix-possible-crash-on-mgmt-index-removed.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44958, CVSSv2 Score: 5.5
- Description:
sched/smt: Introduce sched_smt_present_inc/dec() helper
- CVE: https://access.redhat.com/security/cve/cve-2024-44958
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44958-sched-smt-introduce-sched-smt-present-inc-dec-helper.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44958, CVSSv2 Score: 5.5
- Description:
sched/smt: Fix unbalance sched_smt_present dec/inc
- CVE: https://access.redhat.com/security/cve/cve-2024-44958
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44958-sched-smt-fix-unbalance-sched-smt-present-dec-inc.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52672, CVSSv2 Score: 7.0
- Description:
pipe: wakeup wr_wait after setting max_usage
- CVE: https://access.redhat.com/security/cve/CVE-2023-52672
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2023-52672-pipe-wakeup-wr-wait-after-setting-max-usage.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52672, CVSSv2 Score: 7.0
- Description:
pipe: wakeup wr_wait after setting max_usage kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2023-52672
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2023-52672-pipe-wakeup-wr-wait-after-setting-max-usage-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-23138, CVSSv2 Score: 5.5
- Description:
watch_queue: fix pipe accounting mismatch
- CVE: https://access.redhat.com/security/cve/CVE-2025-23138
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-23138-watch_queue-fix-pipe-accounting-mismatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50128, CVSSv2 Score: 7.1
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://access.redhat.com/security/cve/CVE-2024-50128
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50128, CVSSv2 Score: 7.1
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://access.redhat.com/security/cve/CVE-2024-50128
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50228, CVSSv2 Score:
- Description:
Vendor reverted in d1aa0c04294 as it causes deadlocks
- CVE:
- Patch: skipped/CVE-2024-50228.patch
- From:
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-50278
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53082, CVSSv2 Score: 7.1
- Description:
virtio_net: Add hash_key_length check
- CVE: https://access.redhat.com/security/cve/CVE-2024-53082
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53082-virtio-net-add-hash-key-length-check.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56663, CVSSv2 Score: 7.1
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://access.redhat.com/security/cve/CVE-2024-56663
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56663, CVSSv2 Score: 7.1
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://access.redhat.com/security/cve/CVE-2024-56663
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-58099, CVSSv2 Score: 7.0
- Description:
vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-58099
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-58099-vmxnet3-fix-packet-corruption-in-vmxnet3-xdp-xmit-frame.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50058, CVSSv2 Score: 5.5
- Description:
serial: protect uart_port_dtr_rts() in uart_shutdown() too
- CVE: https://access.redhat.com/security/cve/CVE-2024-50058
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50058-serial-protect-uart-port-dtr-rts-in-uart-shutdown-too.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50082, CVSSv2 Score: 5.5
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://access.redhat.com/security/cve/CVE-2024-50082
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50081, CVSSv2 Score: 5.5
- Description:
blk-mq: setup queue ->tag_set before initializing hctx
- CVE: https://access.redhat.com/security/cve/CVE-2024-50081
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50081-blk-mq-setup-queue-tag-set-before-initializing-hctx.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50101, CVSSv2 Score: 5.5
- Description:
iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices
- CVE: https://access.redhat.com/security/cve/CVE-2024-50101
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50101-iommu-vt-d-fix-incorrect-pci-for-each-dma-alias-for-non-pci-devices.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50077, CVSSv2 Score: 5.5
- Description:
Bluetooth: ISO: Fix multiple init when debugfs is disabled
- CVE: https://access.redhat.com/security/cve/CVE-2024-50077
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50077-bluetooth-iso-fix-multiple-init-when-debugfs-is-disabled.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50078, CVSSv2 Score: 5.5
- Description:
Bluetooth: Call iso_exit() on module unload
- CVE: https://access.redhat.com/security/cve/CVE-2024-50078
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50078-bluetooth-call-iso-exit-on-module-unload.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50093, CVSSv2 Score: 5.5
- Description:
thermal: intel: int340x: processor: Fix warning during module unload
- CVE: https://access.redhat.com/security/cve/CVE-2024-50093
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50093-thermal-intel-int340x-processor-fix-warning-during-module-unload.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50064, CVSSv2 Score: 5.5
- Description:
zram: free secondary algorithms names
- CVE: https://access.redhat.com/security/cve/CVE-2024-50064
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50064-zram-free-secondary-algorithms-names.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50064, CVSSv2 Score: 5.5
- Description:
zram: don't free statically defined names
- CVE: https://access.redhat.com/security/cve/CVE-2024-50064
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50064-zram-don-t-free-statically-defined-names.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50075, CVSSv2 Score: 5.5
- Description:
xhci: tegra: fix checked USB2 port number
- CVE: https://access.redhat.com/security/cve/CVE-2024-50075
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50075-xhci-tegra-fix-checked-usb2-port-number.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53146, CVSSv2 Score: 5.5
- Description:
NFSD: Prevent a potential integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-53146
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53146-nfsd-prevent-a-potential-integer-overflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53160, CVSSv2 Score: 5.5
- Description:
rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu
- CVE: https://access.redhat.com/security/cve/CVE-2024-53160
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53160-rcu-kvfree-fix-data-race-in-mod-timer-kvfree-call-rcu.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53161, CVSSv2 Score: 5.5
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-53161
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53164, CVSSv2 Score: 5.5
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://access.redhat.com/security/cve/CVE-2024-53164
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53190, CVSSv2 Score: 5.5
- Description:
wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures
- CVE: https://access.redhat.com/security/cve/CVE-2024-53190
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53190-wifi-rtlwifi-drastically-reduce-the-attempts-to-read-efuse-in-case-of-failures.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53222, CVSSv2 Score: 5.5
- Description:
zram: fix NULL pointer in comp_algorithm_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53222
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53222-zram-fix-null-pointer-in-comp-algorithm-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43823, CVSSv2 Score: 5.5
- Description:
PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43823
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43823-pci-keystone-fix-null-pointer-dereference-in-case-of-dt-error-in-ks-pcie-setup-rc-app-regs.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42315, CVSSv2 Score: 5.5
- Description:
exfat: fix potential deadlock on __exfat_get_dentry_set
- CVE: https://access.redhat.com/security/cve/CVE-2024-42315
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42315-exfat-fix-potential-deadlock-on-exfat-get-dentry-set.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42321, CVSSv2 Score: 5.5
- Description:
net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE
- CVE: https://access.redhat.com/security/cve/CVE-2024-42321
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42321-net-flow-dissector-use-debug-net-warn-on-once.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42321, CVSSv2 Score: 5.5
- Description:
net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE
- CVE: https://access.redhat.com/security/cve/CVE-2024-42321
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42321-net-flow-dissector-use-debug-net-warn-on-once-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43820, CVSSv2 Score: 5.5
- Description:
dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-43820
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43820-dm-raid-fix-warn-on-once-check-for-sync-thread-in-raid-resume.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43828, CVSSv2 Score: 5.5
- Description:
ext4: fix infinite loop when replaying fast_commit
- CVE: https://access.redhat.com/security/cve/CVE-2024-43828
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43828-ext4-fix-infinite-loop-when-replaying-fast-commit.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43853, CVSSv2 Score: 5.5
- Description:
cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43853
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43853-cgroup-cpuset-prevent-uaf-in-proc-cpuset-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43846, CVSSv2 Score: 5.5
- Description:
lib: objagg: Fix general protection fault
- CVE: https://access.redhat.com/security/cve/CVE-2024-43846
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43846-lib-objagg-fix-general-protection-fault.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43821, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Fix a possible null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-43821
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43821-scsi-lpfc-fix-a-possible-null-pointer-dereference.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43834, CVSSv2 Score: 5.5
- Description:
xdp: fix invalid wait context of page_pool_destroy()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43834
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43834-xdp-fix-invalid-wait-context-of-page-pool-destroy.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46839, CVSSv2 Score: 5.5
- Description:
workqueue: wq_watchdog_touch is always called with valid CPU
- CVE: https://access.redhat.com/security/cve/CVE-2024-46839
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46839-workqueue-wq-watchdog-touch-is-always-called-with-valid-cpu.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47660, CVSSv2 Score: 5.5
- Description:
fsnotify: clear PARENT_WATCHED flags lazily
- CVE: https://access.redhat.com/security/cve/CVE-2024-47660
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47660-fsnotify-clear-parent-watched-flags-lazily.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47668, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47668
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47705, CVSSv2 Score: 5.5
- Description:
block: fix potential invalid pointer dereference in blk_add_partition
- CVE: https://access.redhat.com/security/cve/CVE-2024-47705
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47705-block-fix-potential-invalid-pointer-dereference-in-blk-add-partition.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47700, CVSSv2 Score: 5.5
- Description:
ext4: check stripe size compatibility on remount as well
- CVE: https://access.redhat.com/security/cve/CVE-2024-47700
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47700-ext4-check-stripe-size-compatibility-on-remount-as-well.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47678, CVSSv2 Score: 5.5
- Description:
icmp: change the order of rate limits
- CVE: https://access.redhat.com/security/cve/CVE-2024-47678
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47678-icmp-change-the-order-of-rate-limits.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47687, CVSSv2 Score: 5.5
- Description:
vdpa/mlx5: Fix invalid mr resource destroy
- CVE: https://access.redhat.com/security/cve/CVE-2024-47687
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47687-vdpa-mlx5-fix-invalid-mr-resource-destroy.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49856, CVSSv2 Score: 5.5
- Description:
x86/sgx: Fix deadlock in SGX NUMA node search
- CVE: https://access.redhat.com/security/cve/CVE-2024-49856
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49856-x86-sgx-fix-deadlock-in-sgx-numa-node-search.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49870, CVSSv2 Score: 5.5
- Description:
cachefiles: fix dentry leak in cachefiles_open_file()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49870
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49870-cachefiles-fix-dentry-leak-in-cachefiles-open-file.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49875, CVSSv2 Score: 5.5
- Description:
nfsd: map the EBADMSG to nfserr_io to avoid warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-49875
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49875-nfsd-map-the-ebadmsg-to-nfserr-io-to-avoid-warning-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49878, CVSSv2 Score: 5.5
- Description:
resource: fix region_intersects() vs add_memory_driver_managed()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49878
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49878-resource-fix-region-intersects-vs-add-memory-driver-managed.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49881, CVSSv2 Score: 5.5
- Description:
ext4: update orig_path in ext4_find_extent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49881
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49881-ext4-update-orig-path-in-ext4-find-extent.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49886, CVSSv2 Score: 5.5
- Description:
platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-49886
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49886-platform-x86-isst-fix-the-kasan-report-slab-out-of-bounds-bug.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49904, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: add list empty check to avoid null pointer issue
- CVE: https://access.redhat.com/security/cve/CVE-2024-49904
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49904-drm-amdgpu-add-list-empty-check-to-avoid-null-pointer-issue.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49927, CVSSv2 Score: 5.5
- Description:
x86/ioapic: Handle allocation failures gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2024-49927
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49927-x86-ioapic-handle-allocation-failures-gracefully.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49929, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: avoid NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-49929
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49929-wifi-iwlwifi-mvm-avoid-null-pointer-dereference.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36968, CVSSv2 Score:
- Description:
Complex adaptation required (too many dependency patches)
- CVE:
- Patch: skipped/CVE-2024-36968.patch
- From:
- CVE-2024-35963, CVSSv2 Score: 5.5
- Description:
net: Make copy_safe_from_sockptr() match documentation
- CVE: https://access.redhat.com/security/cve/CVE-2024-35963
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35963-35967-Add-a-helper-header-with-copy_safe_from_sockptr.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35963, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_sock: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35963
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35963-bluetooth-hci-sock-fix-not-validating-setsockopt-user-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35964, CVSSv2 Score: 5.5
- Description:
Bluetooth: ISO: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35964
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35964-bluetooth-iso-fix-not-validating-setsockopt-user-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35965, CVSSv2 Score: 5.5
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35965
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input-507.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35966, CVSSv2 Score: 5.5
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35966
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35967, CVSSv2 Score: 5.5
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35967
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35978, CVSSv2 Score: 5.5
- Description:
Bluetooth: Fix memory leak in hci_req_sync_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35978
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35978-bluetooth-fix-memory-leak-in-hci-req-sync-complete.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36011, CVSSv2 Score: 5.5
- Description:
Bluetooth: HCI: Fix potential null-ptr-deref
- CVE: https://access.redhat.com/security/cve/CVE-2024-36011
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-36011-bluetooth-hci-fix-potential-null-ptr-deref.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36880, CVSSv2 Score: 5.5
- Description:
Bluetooth: qca: add missing firmware sanity checks
- CVE: https://access.redhat.com/security/cve/CVE-2024-36880
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-36880-bluetooth-qca-add-missing-firmware-sanity-checks.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36880, CVSSv2 Score: 5.5
- Description:
Bluetooth: qca: fix firmware check error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36880
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-36880-bluetooth-qca-fix-firmware-check-error-path.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46754, CVSSv2 Score: 5.5
- Description:
bpf: Remove tst_run from lwt_seg6local_prog_ops.
- CVE: https://access.redhat.com/security/cve/CVE-2024-46754
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46754-bpf-remove-tst-run-from-lwt-seg6local-prog-ops.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46754, CVSSv2 Score: 5.5
- Description:
bpf: Remove tst_run from lwt_seg6local_prog_ops.
- CVE: https://access.redhat.com/security/cve/CVE-2024-46754
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46754-bpf-remove-tst-run-from-lwt-seg6local-prog-ops-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36013, CVSSv2 Score:
- Description:
Requires adaptation (missing commit e7b02296)
- CVE:
- Patch: skipped/CVE-2024-36013.patch
- From:
- CVE-2024-47692, CVSSv2 Score: 6.5
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://access.redhat.com/security/cve/CVE-2024-47692
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47692-nfsd-return-EINVAL-when-namelen-is-0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-48969, CVSSv2 Score: 5.5
- Description:
xen/netfront: stop tx queues during live migration
- CVE: https://access.redhat.com/security/cve/CVE-2024-48969
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-48969-xen-netfront-stop-tx-queues-during-live-migration.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-48969, CVSSv2 Score: 5.5
- Description:
xen-netfront: Fix NULL sring after live migration
- CVE: https://access.redhat.com/security/cve/CVE-2024-48969
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-48969-xen-netfront-fix-NULL-sring-after-live-migration.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-48989, CVSSv2 Score: 5.5
- Description:
fscache: Fix oops due to race with cookie_lru and use_cookie
- CVE: https://access.redhat.com/security/cve/CVE-2022-48989
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-48989-fscache-fix-oops-due-to-race-with-cookie_lru-and-use_cookie.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-48989, CVSSv2 Score: 5.5
- Description:
fscache: Fix oops due to race with cookie_lru and use_cookie
- CVE: https://access.redhat.com/security/cve/CVE-2022-48989
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-48989-fscache-fix-oops-due-to-race-with-cookie_lru-and-use_cookie-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52917, CVSSv2 Score: 5.5
- Description:
ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52917
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2023-52917-ntb-intel-fix-the-NULL-vs-IS_ERR-bug-for-debugfs_create_dir.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35891, CVSSv2 Score: 5.5
- Description:
net: phy: micrel: Fix potential null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-35891
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35891-net-phy-micrel-fix-potential-null-pointer-dereference.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35933, CVSSv2 Score: 5.5
- Description:
Bluetooth: btintel: Fix null ptr deref in btintel_read_version
- CVE: https://access.redhat.com/security/cve/CVE-2024-35933
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35933-bluetooth-btintel-fix-null-ptr-deref-in-btintel-read-version.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35934, CVSSv2 Score: 5.5
- Description:
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35934
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35934-net-smc-reduce-rtnl-pressure-in-smc-pnet-create-pnetids-list.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56729, CVSSv2 Score: 5.5
- Description:
smb: Initialize cfid->tcon before performing network ops
- CVE: https://access.redhat.com/security/cve/CVE-2024-56729
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56729-smb-initialize-cfid-tcon-before-performing-network-ops.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56688, CVSSv2 Score: 5.5
- Description:
sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
- CVE: https://access.redhat.com/security/cve/CVE-2024-56688
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56688-sunrpc-clear-xprt-sock-upd-timeout-when-reset-transport.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56760, CVSSv2 Score: 5.5
- Description:
PCI/MSI: Handle lack of irqdomain gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2024-56760
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56760-pci-msi-handle-lack-of-irqdomain-gracefully.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56654, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating
- CVE: https://access.redhat.com/security/cve/CVE-2024-56654
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56654-bluetooth-hci-event-fix-using-rcu-read-un-lock-while-iterating.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56667, CVSSv2 Score: 5.5
- Description:
drm/i915: Fix NULL pointer dereference in capture_engine
- CVE: https://access.redhat.com/security/cve/CVE-2024-56667
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56667-drm-i915-fix-null-pointer-dereference-in-capture-engine.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56779, CVSSv2 Score: 5.5
- Description:
nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur
- CVE: https://access.redhat.com/security/cve/CVE-2024-56779
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56779-nfsd-fix-nfs4-openowner-leak-when-concurrent-nfsd4-open-occur.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57809, CVSSv2 Score:
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57809.patch
- From:
- CVE-2024-49959, CVSSv2 Score: 5.5
- Description:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
- CVE: https://access.redhat.com/security/cve/CVE-2024-49959
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49959-jbd2-stop-waiting-for-space-when-jbd2-cleanup-journal-tail-returns-error.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49962, CVSSv2 Score: 5.5
- Description:
ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49962
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49962-acpica-check-null-return-of-acpi-allocate-zeroed-in-acpi-db-convert-to-package.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49968, CVSSv2 Score: 5.5
- Description:
ext4: filesystems without casefold feature cannot be mounted with siphash
- CVE: https://access.redhat.com/security/cve/CVE-2024-49968
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49968-ext4-filesystems-without-casefold-feature-cannot-be-mounted-with-siphash.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49971, CVSSv2 Score:
- Description:
Older kernels don't have the affected src code
- CVE:
- Patch: skipped/CVE-2024-49971.patch
- From:
- CVE-2024-49973, CVSSv2 Score: 5.5
- Description:
r8169: Fix spelling mistake: "tx_underun" -> "tx_underrun"
- CVE: https://access.redhat.com/security/cve/CVE-2024-49973
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49973-r8169-fix-spelling-mistake-tx-underun-tx-underrun.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49973, CVSSv2 Score: 5.5
- Description:
r8169: add tally counter fields added with RTL8125
- CVE: https://access.redhat.com/security/cve/CVE-2024-49973
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49973-r8169-add-tally-counter-fields-added-with-rtl8125.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49973, CVSSv2 Score: 5.5
- Description:
r8169: add tally counter fields added with RTL8125
- CVE: https://access.redhat.com/security/cve/CVE-2024-49973
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49973-r8169-add-tally-counter-fields-added-with-rtl8125-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Force all NFSv4.2 COPY requests to be synchronous
- CVE: https://access.redhat.com/security/cve/CVE-2024-49974
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49974-nfsd-force-all-nfsv4-2-copy-requests-to-be-synchronous.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49975, CVSSv2 Score: 5.5
- Description:
uprobes: fix kernel info leak via "[uprobes]" vma
- CVE: https://access.redhat.com/security/cve/CVE-2024-49975
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49975-uprobes-fix-kernel-info-leak-via-uprobes-vma.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49977, CVSSv2 Score: 5.5
- Description:
net: stmmac: Fix zero-division error when disabling tc cbs
- CVE: https://access.redhat.com/security/cve/CVE-2024-49977
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49977-net-stmmac-fix-zero-division-error-when-disabling-tc-cbs.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49993, CVSSv2 Score: 5.5
- Description:
iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count
- CVE: https://access.redhat.com/security/cve/CVE-2024-49993
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49993-iommu-vt-d-fix-potential-lockup-if-qi-submit-sync-called-with-0-count.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49994, CVSSv2 Score: 5.5
- Description:
block: fix integer overflow in BLKSECDISCARD
- CVE: https://access.redhat.com/security/cve/CVE-2024-49994
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49994-block-fix-integer-overflow-in-blksecdiscard.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46871, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://access.redhat.com/security/cve/cve-2024-46871
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2024-46871, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://access.redhat.com/security/cve/cve-2024-46871
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX-kpatch.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2024-50182, CVSSv2 Score: 5.5
- Description:
secretmem: disable memfd_secret() if arch cannot set direct map
- CVE: https://access.redhat.com/security/cve/CVE-2024-50182
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50182-secretmem-disable-memfd-secret-if-arch-cannot-set-direct-map.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50191, CVSSv2 Score: 5.5
- Description:
ext4: don't set SB_RDONLY after filesystem errors
- CVE: https://access.redhat.com/security/cve/CVE-2024-50191
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50191-ext4-don-t-set-sb-rdonly-after-filesystem-errors.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50197, CVSSv2 Score: 5.5
- Description:
device property: Introduce device_for_each_child_node_scoped()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50197
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50197-device-property-introduce-device-for-each-child-node-scoped.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50197, CVSSv2 Score: 5.5
- Description:
pinctrl: intel: platform: fix error path in device_for_each_child_node()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50197
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50197-pinctrl-intel-platform-fix-error-path-in-device-for-each-child-node.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50199, CVSSv2 Score: 5.5
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://access.redhat.com/security/cve/CVE-2024-50199
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50200, CVSSv2 Score: 5.5
- Description:
maple_tree: correct tree corruption on spanning store
- CVE: https://access.redhat.com/security/cve/CVE-2024-50200
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50200-maple-tree-correct-tree-corruption-on-spanning-store.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50201, CVSSv2 Score: 5.5
- Description:
drm/radeon: Fix encoder->possible_clones
- CVE: https://access.redhat.com/security/cve/CVE-2024-50201
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50201-drm-radeon-Fix-encoder-possible_clones.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50219, CVSSv2 Score: 5.5
- Description:
mm/page_alloc: let GFP_ATOMIC order-0 allocs access highatomic reserves
- CVE: https://access.redhat.com/security/cve/CVE-2024-50219
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50219-mm-page-alloc-let-gfp-atomic-order-0-allocs-access-highatomic-reserves.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50236, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://access.redhat.com/security/cve/CVE-2024-50236
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49999, CVSSv2 Score:
- Description:
bugfix for module from non-standard kernel-modules-partner package
- CVE:
- Patch: skipped/CVE-2024-49999.patch
- From:
- CVE-2024-50002, CVSSv2 Score: 5.5
- Description:
static_call: Handle module init failure correctly in static_call_del_module()
- CVE: https://access.redhat.com/security/cve/cve-2024-50002
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50002-static-call-handle-module-init-failure-correctly-in-static-call-del-module.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50006, CVSSv2 Score: 5.5
- Description:
ext4: fix i_data_sem unlock order in ext4_ind_migrate()
- CVE: https://access.redhat.com/security/cve/cve-2024-50006
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50006-ext4-fix-i-data-sem-unlock-order-in-ext4-ind-migrate.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50008, CVSSv2 Score:
- Description:
Patch not necessary, the size of the struct remains the same.
- CVE:
- Patch: skipped/CVE-2024-50008.patch
- From:
- CVE-2024-50009, CVSSv2 Score:
- Description:
Kernels not vulnerable
- CVE:
- Patch: skipped/CVE-2024-50009.patch
- From:
- CVE-2024-50013, CVSSv2 Score: 5.5
- Description:
exfat: fix memory leak in exfat_load_bitmap()
- CVE: https://access.redhat.com/security/cve/cve-2024-50013
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50013-exfat-fix-memory-leak-in-exfat-load-bitmap.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50014, CVSSv2 Score: 5.5
- Description:
ext4: fix access to uninitialised lock in fc replay path
- CVE: https://access.redhat.com/security/cve/cve-2024-50014
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50014-ext4-fix-access-to-uninitialised-lock-in-fc-replay-path.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50019, CVSSv2 Score: 5.5
- Description:
kthread: unpark only parked kthread
- CVE: https://access.redhat.com/security/cve/cve-2024-50019
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50019-kthread-unpark-only-parked-kthread.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56664, CVSSv2 Score: 7.8
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56664
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56664-bpf-sockmap-Fix-race-between-element-replace-and-close.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-39500, CVSSv2 Score: 5.5
- Description:
sock_map: avoid race between sock_map_close and sk_psock_put
- CVE: https://access.redhat.com/security/cve/CVE-2024-39500
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-39500-sock_map-avoid-race-between-sock_map_close-and-sk_psock_put.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-39500, CVSSv2 Score: 5.5
- Description:
bpf, sockmap: Avoid using sk_socket after free when sending
- CVE: https://access.redhat.com/security/cve/CVE-2024-39500
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-39500-bpf-sockmap-Avoid-using-sk_socket-after-free-when-sending.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50163, CVSSv2 Score: 5.5
- Description:
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://access.redhat.com/security/cve/CVE-2024-50163
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50163-bpf-make-sure-internal-and-uapi-bpf-redirect-flags-don-t-overlap.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50163, CVSSv2 Score: 5.5
- Description:
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://access.redhat.com/security/cve/CVE-2024-50163
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50163-bpf-make-sure-internal-and-uapi-bpf_redirect-flags-don-t-overlap-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43889, CVSSv2 Score:
- Description:
Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.
- CVE:
- Patch: skipped/CVE-2024-43889.patch
- From:
- CVE-2024-56562, CVSSv2 Score: 5.5
- Description:
i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56562
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56562-i3c-master-fix-miss-free-init-dyn-addr-at-i3c-master-put-i3c-addrs.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56590, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet
- CVE: https://access.redhat.com/security/cve/CVE-2024-56590
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56590-bluetooth-hci-core-fix-not-checking-skb-length-on-hci-acldata-packet.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56647, CVSSv2 Score: 5.5
- Description:
net: Fix icmp host relookup triggering ip_rt_bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-56647
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56647-net-fix-icmp-host-relookup-triggering-ip-rt-bug.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56591, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-56591.patch
- From:
- CVE-2024-56570, CVSSv2 Score: 5.5
- Description:
ovl: Filter invalid inodes with missing lookup function
- CVE: https://access.redhat.com/security/cve/CVE-2024-56570
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56570-ovl-filter-invalid-inodes-with-missing-lookup-function.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56616, CVSSv2 Score: 5.5
- Description:
drm/dp_mst: Fix MST sideband message body length check
- CVE: https://access.redhat.com/security/cve/CVE-2024-56616
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56616-drm-dp-mst-fix-mst-sideband-message-body-length-check.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56611, CVSSv2 Score: 5.5
- Description:
mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM
- CVE: https://access.redhat.com/security/cve/CVE-2024-56611
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56611-mm-mempolicy-fix-migrate-to-node-assuming-there-is-at-least-one-vma-in-a-mm.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56535, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-56535.patch
- From:
- CVE-2024-44989, CVSSv2 Score: 5.5
- Description:
bonding: fix xfrm real_dev null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-44989
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44989-bonding-fix-xfrm-real-dev-null-pointer-dereference.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45000, CVSSv2 Score: 5.5
- Description:
fs/netfs/fscache_cookie: add missing "n_accesses" check
- CVE: https://access.redhat.com/security/cve/CVE-2024-45000
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45000-fs-netfs-fscache-cookie-add-missing-n-accesses-check.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45016, CVSSv2 Score: 5.5
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-45016
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45022, CVSSv2 Score: 5.5
- Description:
mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0
- CVE: https://access.redhat.com/security/cve/CVE-2024-45022
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45022-mm-vmalloc-fix-page-mapping-if-vm-area-alloc-pages-with-high-order-fallback-to-order-0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46675, CVSSv2 Score: 5.5
- Description:
usb: dwc3: core: Prevent USB core invalid event buffer address access
- CVE: https://access.redhat.com/security/cve/CVE-2024-46675
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46675-usb-dwc3-core-prevent-usb-core-invalid-event-buffer-address-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46745, CVSSv2 Score: 5.5
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://access.redhat.com/security/cve/CVE-2024-46745
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46750, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-46750.patch
- From:
- CVE-2024-47706, CVSSv2 Score: 5.5
- Description:
block, bfq: fix possible UAF for bfqq->bic with merge chain
- CVE: https://access.redhat.com/security/cve/CVE-2024-47706
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47706-block-bfq-fix-possible-uaf-for-bfqq-bic-with-merge-chain.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47737, CVSSv2 Score: 5.5
- Description:
nfsd: call cache_put if xdr_reserve_space returns NULL
- CVE: https://access.redhat.com/security/cve/CVE-2024-47737
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47737-nfsd-call-cache-put-if-xdr-reserve-space-returns-null.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47710, CVSSv2 Score: 5.5
- Description:
sock_map: Add a cond_resched() in sock_hash_free()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47710
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47710-sock-map-add-a-cond-resched-in-sock-hash-free.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49851, CVSSv2 Score: 5.5
- Description:
tpm: Clean up TPM space after command failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-49851
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49851-tpm-clean-up-tpm-space-after-command-failure.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47739, CVSSv2 Score: 5.5
- Description:
padata: use integer wrap around to prevent deadlock on seq_nr overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-47739
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47739-padata-use-integer-wrap-around-to-prevent-deadlock-on-seq-nr-overflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47738, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: don't use rate mask for offchannel TX either
- CVE: https://access.redhat.com/security/cve/CVE-2024-47738
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47738-wifi-mac80211-don-t-use-rate-mask-for-offchannel-tx-either.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47715, CVSSv2 Score: 5.5
- Description:
wifi: mt76: mt7915: fix oops on non-dbdc mt7986
- CVE: https://access.redhat.com/security/cve/CVE-2024-47715
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47715-wifi-mt76-mt7915-fix-oops-on-non-dbdc-mt7986.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47713, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47713
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47713-wifi-mac80211-use-two-phase-skb-reclamation-in-ieee80211-do-stop.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49569, CVSSv2 Score: 5.5
- Description:
nvme-rdma: unquiesce admin_q before destroy it
- CVE: https://access.redhat.com/security/cve/CVE-2024-49569
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49569-nvme-rdma-unquiesce-admin-q-before-destroy-it.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-48873, CVSSv2 Score: 5.5
- Description:
wifi: rtw89: check return value of ieee80211_probereq_get() for RNR
- CVE: https://access.redhat.com/security/cve/CVE-2024-48873
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-48873-wifi-rtw89-check-return-value-of-ieee80211-probereq-get-for-rnr.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50107, CVSSv2 Score: 5.5
- Description:
platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses
- CVE: https://access.redhat.com/security/cve/CVE-2024-50107
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50107-platform-x86-intel-pmc-fix-pmc-core-iounmap-to-call-iounmap-for-valid-addresses.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50109, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-50109.patch
- From:
- CVE-2024-50117, CVSSv2 Score: 5.5
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://access.redhat.com/security/cve/CVE-2024-50117
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53060, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://access.redhat.com/security/cve/CVE-2024-53060
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53060-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50153, CVSSv2 Score: 5.5
- Description:
scsi: target: core: Fix null-ptr-deref in target_alloc_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50153
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50153-scsi-target-core-fix-null-ptr-deref-in-target-alloc-device.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50162, CVSSv2 Score: 5.5
- Description:
bpf: devmap: provide rxq after redirect
- CVE: https://access.redhat.com/security/cve/CVE-2024-50162
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50162-bpf-devmap-provide-rxq-after-redirect.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50152, CVSSv2 Score: 5.5
- Description:
smb: client: fix possible double free in smb2_set_ea()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50152
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50152-smb-client-fix-possible-double-free-in-smb2-set-ea.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50169, CVSSv2 Score: 5.5
- Description:
vsock: Update rx_bytes on read_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50169
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50169-vsock-update-rx-bytes-on-read-skb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21668, CVSSv2 Score:
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2025-21668.patch
- From:
- CVE-2025-21669, CVSSv2 Score: 5.5
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://access.redhat.com/security/cve/CVE-2025-21669
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21666, CVSSv2 Score: 5.5
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://access.redhat.com/security/cve/CVE-2025-21666
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21689, CVSSv2 Score: 5.5
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21689
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21663, CVSSv2 Score:
- Description:
Out of scope as the patch is for NVIDIA Tegra SoCs targeting mobile devices
- CVE:
- Patch: skipped/CVE-2025-21663.patch
- From:
- CVE-2025-21694, CVSSv2 Score: 5.5
- Description:
fs/proc: fix softlockup in __read_vmcore
- CVE: https://access.redhat.com/security/cve/CVE-2025-21694
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21694, CVSSv2 Score: 5.5
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://access.redhat.com/security/cve/CVE-2025-21694
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45010, CVSSv2 Score: 5.5
- Description:
mptcp: pm: re-using ID of unused removed subflows
- CVE: https://access.redhat.com/security/cve/CVE-2024-45010
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45010-01-mptcp-pm-re-using-id-of-unused-removed-subflows.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45010, CVSSv2 Score: 5.5
- Description:
mptcp: pm: remove mptcp_pm_remove_subflow()
- CVE: https://access.redhat.com/security/cve/CVE-2024-45010
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45010-02-mptcp-pm-remove-mptcp_pm_remove_subflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45010, CVSSv2 Score: 5.5
- Description:
mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID
- CVE: https://access.redhat.com/security/cve/CVE-2024-45010
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45010-03-mptcp-pm-inc-rmaddr-mib-counter-once-per-rm_addr-id.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45010, CVSSv2 Score: 5.5
- Description:
mptcp: pm: only mark 'subflow' endp as available
- CVE: https://access.redhat.com/security/cve/CVE-2024-45010
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45010-mptcp-pm-only-mark-subflow-endp-as-available.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45009, CVSSv2 Score: 5.5
- Description:
mptcp: pm: only decrement add_addr_accepted for MPJ req
- CVE: https://access.redhat.com/security/cve/CVE-2024-45009
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45009-mptcp-pm-only-decrement-add-addr-accepted-for-mpj-req.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45009, CVSSv2 Score: 5.5
- Description:
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-45009
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45009-mptcp-pm-fix-uaf-read-in-mptcp-pm-nl-rm-addr-or-subflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46711, CVSSv2 Score: 5.5
- Description:
mptcp: pm: update add_addr counters after connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-46711
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46711-01-mptcp-pm-update-add_addr-counters-after-connect.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46711, CVSSv2 Score: 5.5
- Description:
mptcp: pm: reduce indentation blocks
- CVE: https://access.redhat.com/security/cve/CVE-2024-46711
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46711-02-mptcp-pm-reduce-indentation-blocks.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46711, CVSSv2 Score: 5.5
- Description:
mptcp: pm: reuse ID 0 after delete and re-add
- CVE: https://access.redhat.com/security/cve/CVE-2024-46711
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46711-03-mptcp-pm-reuse-id-0-after-delete-and-re-add.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46711, CVSSv2 Score: 5.5
- Description:
mptcp: pm: fix ID 0 endp usage after multiple re-creations
- CVE: https://access.redhat.com/security/cve/CVE-2024-46711
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46711-mptcp-pm-fix-id-0-endp-usage-after-multiple-re-creations.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50024, CVSSv2 Score: 5.5
- Description:
net: Fix an unsafe loop on the list
- CVE: https://access.redhat.com/security/cve/CVE-2024-50024
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50024, CVSSv2 Score: 5.5
- Description:
net: Fix an unsafe loop on the list
- CVE: https://access.redhat.com/security/cve/CVE-2024-50024
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50022, CVSSv2 Score: 5.5
- Description:
device-dax: correct pgoff align in dax_set_mapping()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50022
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50022-device-dax-correct-pgoff-align-in-dax-set-mapping.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50039, CVSSv2 Score: 5.5
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2024-50039
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50039-net-sched-accept-tca-stab-only-for-root-qdisc.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50044, CVSSv2 Score: 5.5
- Description:
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
- CVE: https://access.redhat.com/security/cve/CVE-2024-50044
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50044-bluetooth-rfcomm-fix-possible-deadlock-in-rfcomm-sk-state-change.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50023, CVSSv2 Score: 5.5
- Description:
net: phy: Remove LED entry from LEDs list on unregister
- CVE: https://access.redhat.com/security/cve/CVE-2024-50023
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50023-net-phy-remove-led-entry-from-leds-list-on-unregister.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50057, CVSSv2 Score: 5.5
- Description:
usb: typec: tipd: Free IRQ only if it was requested before
- CVE: https://access.redhat.com/security/cve/CVE-2024-50057
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50057-usb-typec-tipd-free-irq-only-if-it-was-requested-before.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50150, CVSSv2 Score: 7.8
- Description:
usb: typec: altmode should keep reference to parent
- CVE: https://access.redhat.com/security/cve/CVE-2024-50150
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50150-usb-typec-altmode-should-keep-reference-to-parent.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50150, CVSSv2 Score: 7.8
- Description:
usb: typec: altmode should keep reference to parent
- CVE: https://access.redhat.com/security/cve/CVE-2024-50150
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50150-usb-typec-altmode-should-keep-reference-to-parent-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-1272, CVSSv2 Score:
- Description:
The vulnerable commit isn't present in the kernel
- CVE:
- Patch: skipped/CVE-2025-1272.patch
- From:
- CVE-2024-53152, CVSSv2 Score:
- Description:
The vulnerable commit isn't present in the kernel
- CVE:
- Patch: skipped/CVE-2024-53152.patch
- From:
- CVE-2024-57884, CVSSv2 Score: 5.5
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57884
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57888, CVSSv2 Score: 5.5
- Description:
workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker
- CVE: https://access.redhat.com/security/cve/CVE-2024-57888
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57888-workqueue-do-not-warn-when-cancelling-wq-mem-reclaim-work-from-wq-mem-reclaim-worker.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57890, CVSSv2 Score: 5.5
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2024-57890
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57898, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: clear link ID from bitmap during link delete after clean up
- CVE: https://access.redhat.com/security/cve/CVE-2024-57898
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57898-wifi-cfg80211-clear-link-id-from-bitmap-during-link-delete-after-clean-up.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57929, CVSSv2 Score: 5.5
- Description:
dm array: fix releasing a faulty array block twice in dm_array_cursor_end
- CVE: https://access.redhat.com/security/cve/CVE-2024-57929
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57929-dm-array-fix-releasing-a-faulty-array-block-twice-in-dm-array-cursor-end.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57931, CVSSv2 Score: 5.5
- Description:
selinux: ignore unknown extended permissions
- CVE: https://access.redhat.com/security/cve/CVE-2024-57931
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57931-selinux-ignore-unknown-extended-permissions.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57940, CVSSv2 Score: 5.5
- Description:
exfat: fix the infinite loop in exfat_readdir()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57940
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57940-exfat-fix-the-infinite-loop-in-exfat-readdir.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21646, CVSSv2 Score:
- Description:
bugfix for module from non-standard kernel-modules-partner package
- CVE:
- Patch: skipped/CVE-2025-21646.patch
- From:
- CVE-2024-50299, CVSSv2 Score: 5.5
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50299
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50304, CVSSv2 Score: 5.5
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50304
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53047, CVSSv2 Score: 5.5
- Description:
mptcp: init: protect sched with rcu_read_lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-53047
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53047-mptcp-init-protect-sched-with-rcu-read-lock.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53044, CVSSv2 Score: 5.5
- Description:
net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53044
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53044-net-sched-sch-api-fix-xa-insert-error-path-in-tcf-block-get-ext.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50237, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://access.redhat.com/security/cve/CVE-2024-50237
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-get-txpower.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53042, CVSSv2 Score: 5.5
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53042
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53042-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-init-flow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50256, CVSSv2 Score: 5.5
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50256
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50272, CVSSv2 Score: 5.5
- Description:
filemap: Fix bounds checking in filemap_read()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50272
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50272-filemap-fix-bounds-checking-in-filemap-read.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50018, CVSSv2 Score: 5.5
- Description:
net: napi: Prevent overflow of napi_defer_hard_irqs
- CVE: https://access.redhat.com/security/cve/cve-2024-50018
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50018-net-napi-prevent-overflow-of-napi-defer-hard-irqs.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: refactor map_deny_write_exec()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53096
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53096-mm-refactor-map_deny_write_exec.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://access.redhat.com/security/cve/CVE-2024-53096
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53096-mm-resolve-faulty-mmap_region-error-path-behaviour.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53105, CVSSv2 Score: 5.5
- Description:
mm: page_alloc: move mlocked flag clearance into free_pages_prepare()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53105
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53105-mm-page-alloc-move-mlocked-flag-clearance-into-free-pages-prepare.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53110, CVSSv2 Score: 5.5
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://access.redhat.com/security/cve/CVE-2024-53110
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53110, CVSSv2 Score: 5.5
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53117, CVSSv2 Score: 5.5
- Description:
virtio/vsock: Improve MSG_ZEROCOPY error handling
- CVE: https://access.redhat.com/security/cve/CVE-2024-53117
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53117-virtio-vsock-improve-msg-zerocopy-error-handling.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53118, CVSSv2 Score: 5.5
- Description:
vsock: Fix sk_error_queue memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-53118
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53118-vsock-fix-sk-error-queue-memory-leak.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53120, CVSSv2 Score: 5.5
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-53120
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53121, CVSSv2 Score: 5.5
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://access.redhat.com/security/cve/CVE-2024-53121
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53123, CVSSv2 Score: 5.5
- Description:
mptcp: error out earlier on disconnect
- CVE: https://access.redhat.com/security/cve/CVE-2024-53123
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53123-mptcp-error-out-earlier-on-disconnect.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53134, CVSSv2 Score: 5.5
- Description:
pmdomain: imx93-blk-ctrl: correct remove path
- CVE: https://access.redhat.com/security/cve/CVE-2024-53134
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53134-pmdomain-imx93-blk-ctrl-correct-remove-path.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21927, CVSSv2 Score: 7.8
- Description:
nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
- CVE: http://access.redhat.com/security/cve/cve-2025-21927
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2025-21927-nvme-tcp-fix-potential-memory-corruption-in-nvme_tcp.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58069, CVSSv2 Score: 7.8
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://access.redhat.com/security/cve/CVE-2024-58069
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58005, CVSSv2 Score:
- Description:
low score CVE with complex adaptation
- CVE:
- Patch: skipped/CVE-2024-58005.patch
- From:
- CVE-2025-21993, CVSSv2 Score: 7.1
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21993
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58007, CVSSv2 Score: 7.1
- Description:
soc: qcom: Add check devm_kasprintf() returned value
- CVE: https://access.redhat.com/security/cve/CVE-2024-58007
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58007-soc-qcom-add-check-devm-kasprintf-returned-value.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58007, CVSSv2 Score: 7.1
- Description:
soc: qcom: socinfo: fix revision check in qcom_socinfo_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-58007
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58007-soc-qcom-socinfo-fix-revision-check-in-qcom-socinfo-probe.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58007, CVSSv2 Score: 7.1
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://access.redhat.com/security/cve/CVE-2024-58007
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2025-21756, CVSSv2 Score: 7.8
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-21756
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-21756, CVSSv2 Score: 7.8
- Description:
vsock: Orphan socket after transport release
- CVE: https://access.redhat.com/security/cve/CVE-2025-21756
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-37749, CVSSv2 Score: 7.0
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://access.redhat.com/security/cve/CVE-2025-37749
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-21966, CVSSv2 Score: 7.8
- Description:
dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature
- CVE: https://access.redhat.com/security/cve/CVE-2025-21966
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-21966-dm-flakey-fix-memory-corruption-in-optional-corrupt-bio-byte-feature.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-21647, CVSSv2 Score: 7.1
- Description:
sched: sch_cake: add bounds checks to host bulk flow fairness counts
- CVE: https://access.redhat.com/security/cve/CVE-2025-21647
- Patch: rhel9/CVE-2025-21647-sched-sch_cake-add-bounds-checks-to-host-bulk-flow-fairness-counts.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21964, CVSSv2 Score: 5.5
- Description:
cifs: Fix integer overflow while processing acregmax mount option
- CVE: https://access.redhat.com/security/cve/CVE-2025-21964
- Patch: rhel9/5.14.0-570.18.1.el9_6/CVE-2025-21964-cifs-fix-integer-overflow-while-processing-acregmax-mount-option.patch
- From: 5.14.0-570.18.1.el9_6
- CVE-2022-3424, CVSSv2 Score: 7.8
- Description:
misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os
- CVE: https://access.redhat.com/security/cve/CVE-2022-3424
- Patch: rhel9/5.14.0-570.19.1.el9_6/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_con.patch
- From: 5.14.0-570.19.1.el9_6
- CVE-2025-21764, CVSSv2 Score: 7.8
- Description:
ndisc: use rcu protection in ndisc_alloc_skb()
- CVE: https://access.redhat.com/security/cve/cve-2025-21764
- Patch: rhel9/5.14.0-570.19.1.el9_6/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 5.14.0-570.19.1.el9_6
- CVE-2025-21920, CVSSv2 Score: 7.1
- Description:
vlan: enforce underlying device type
- CVE: https://access.redhat.com/security/cve/CVE-2025-21920
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-21926, CVSSv2 Score: 5.5
- Description:
net: gso: fix ownership in __udp_gso_segment
- CVE: https://access.redhat.com/security/cve/CVE-2025-21926
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-21926-net-gso-fix-ownership-in-udp-gso-segment.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-21997, CVSSv2 Score: 5.5
- Description:
xsk: fix an integer overflow in xp_create_and_assign_umem()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21997
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-21997-xsk-fix-an-integer-overflow-in-xp_create_and_assign_umem.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-22055, CVSSv2 Score: 5.5
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2025-22055
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-22055, CVSSv2 Score: 5.5
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2025-22055
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-37943, CVSSv2 Score: 7.0
- Description:
wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi
- CVE: https://access.redhat.com/security/cve/CVE-2025-37943
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-37943-wifi-ath12k-fix-invalid-data-access-in-ath12k-dp-rx-h-undecap-nwifi.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-37785, CVSSv2 Score: 7.1
- Description:
ext4: fix OOB read when checking dotdot dir
- CVE: https://access.redhat.com/security/cve/CVE-2025-37785
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-37785-ext4-fix-OOB-read-when-checking-dotdot-dir.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-21961, CVSSv2 Score: 5.5
- Description:
eth: bnxt: fix truesize for mb-xdp-pass case
- CVE: https://access.redhat.com/security/cve/CVE-2025-21961
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21961-eth-bnxt-fix-truesize-for-mb-xdp-pass-case.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-21963, CVSSv2 Score: 5.5
- Description:
cifs: Fix integer overflow while processing acdirmax mount option
- CVE: https://access.redhat.com/security/cve/CVE-2025-21963
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21963-cifs-fix-integer-overflow-while-processing-acdirmax-mount-option.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-21979, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: cancel wiphy_work before freeing wiphy
- CVE: https://access.redhat.com/security/cve/CVE-2025-21979
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21979-wifi-cfg80211-cancel-wiphy-work-before-freeing-wiphy.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-21999, CVSSv2 Score: 7.8
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21999
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-21999, CVSSv2 Score: 7.8
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21999
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-22126, CVSSv2 Score: 5.5
- Description:
md: fix mddev uaf while iterating all_mddevs list
- CVE: https://access.redhat.com/security/cve/CVE-2025-22126
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-22126-md-fix-mddev-uaf-while-iterating-all-mddevs-list.patch
- From: 5.14.0-570.22.1.el9_6