- kernel-5.14.0-284.11.1.el9_2 (rhel9)
- 5.14.0-427.28.1.el9_4
- 2024-08-19 13:00:22
- 2024-08-27 06:42:29
- K20240819_11
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2002
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2002-bluetooth-Perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 5.14.0-284.18.1
- CVE-2023-2124, CVSSv2 Score: 7.0
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://access.redhat.com/security/cve/CVE-2023-2124
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.14.0-284.18.1
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2194
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_slimpro_i2c_xfer.patch
- From: 5.14.0-284.18.1
- CVE-2023-2235, CVSSv2 Score: 7.8
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2235
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_group_detach.patch
- From: 5.14.0-284.18.1
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28466
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf.patch
- From: 5.14.0-284.18.1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://linux.oracle.com/cve/CVE-2023-32233.html
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-32233-patch-netfilter-nf-tables-deactivate-anonymous-set-from.patch
- From: 5.14.0-284.18.1
- CVE-2022-45869, CVSSv2 Score: 5.5
- Description:
KVM: x86/mmu: Fix race condition in direct_page_fault
- CVE: https://access.redhat.com/security/cve/CVE-2022-45869
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2022-45869-KVM-x86-mmu-Fix-race-condition-in-direct_page_fault.patch
- From: 5.14.0-284.25.1
- CVE-2023-0458, CVSSv2 Score: 4.7
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://access.redhat.com/security/cve/CVE-2023-0458
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-chec.patch
- From: 5.14.0-284.25.1
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-3090
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-3090-ipvlan-Fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.14.0-284.25.1
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://access.redhat.com/security/cve/CVE-2023-35788
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-35788-net-sched-flower-fix-possible-OOB-write-in-fl_set_g.patch
- From: 5.14.0-284.25.1
- CVE-2023-1998, CVSSv2 Score: 5.6
- Description:
x86/speculation: Allow enabling STIBP with legacy IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2023-1998
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IB.patch
- From: 5.14.0-284.25.1
- CVE-2023-1998, CVSSv2 Score: 5.6
- Description:
x86/speculation: Allow enabling STIBP with legacy IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2023-1998
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IB-kpatch.patch
- From: 5.14.0-284.25.1
- CVE-2023-4147, CVSSv2 Score: 5.5
- Description:
nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- CVE: https://access.redhat.com/security/cve/CVE-2023-4147
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-4147-netfilter-nf-tables-disallow-rule-addition-to-bound-chain-via.patch
- From: 5.14.0-284.30.1
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.14.0-284.30.1
- CVE-2023-21102, CVSSv2 Score:
- Description:
out of scope, ARM EFI related
- CVE:
- Patch: skipped/CVE-2023-21102.patch
- From:
- CVE-2023-1637, CVSSv2 Score: 5.5
- Description:
x86/speculation: Restore speculation related MSRs during S3 resume
- CVE: https://access.redhat.com/security/cve/CVE-2023-1637
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-1637-x86-speculation-restore-speculation-related-msrs-during-s3-resume.patch
- From: 5.14.0-284.30.1
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-20593-x86-cpu-amd-add-a-zenbleed-fix.patch
- From: 5.14.0-284.30.1.el9_2
- CVE-2023-4004, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 5.14.0-284.30.1
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://access.redhat.com/security/cve/CVE-2023-3390
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with.patch
- From: 5.14.0-284.30.1
- CVE-2023-31248, CVSSv2 Score: 7.8
- Description:
nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- CVE: https://access.redhat.com/security/cve/CVE-2023-31248
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-31248-netfilter-nf_tables-do-not-ignore-genmask-when-looki.patch
- From: 5.14.0-284.30.1
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://access.redhat.com/security/cve/CVE-2023-35001
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteor.patch
- From: 5.14.0-284.30.1
- CVE-2023-3610, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://access.redhat.com/security/cve/cve-2023-3610
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo.patch
- From: 5.14.0-284.30.1.el9_2
- CVE-2023-3610, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://access.redhat.com/security/cve/cve-2023-3610
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo-kpatch.patch
- From: 5.14.0-284.30.1.el9_2
- CVE-2023-3609, CVSSv2 Score: 7.0
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-3609
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3609-net-sched-cls-u32-fix-reference-counter-leak-leading-to-overflow.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1652, CVSSv2 Score: 7.8
- Description:
NFSD: fix use-after-free in nfsd4_ssc_setup_dul()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1652
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1652-nfsd-fix-use-after-free-in-nfsd4-ssc-setup-dul.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1989, CVSSv2 Score: 7.0
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work
- CVE: https://access.redhat.com/security/cve/CVE-2023-1989
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1989-bluetooth-btsdio-fix-use-after-free-bug-in-btsdio-remove-due-to.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3141 CVE-2023-35825, CVSSv2 Score: 6.4
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-35825
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3141-memstick-r592-fix-uaf-bug-in-r592-remove-due-to-race-condition.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3268, CVSSv2 Score: 6.0
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3268
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay-file-read.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4207 CVE-2023-4128 CVE-2023-4208 CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to-avoid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4207 CVE-2023-4128 CVE-2023-4208 CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to-avoid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4207 CVE-2023-4128 CVE-2023-4208 CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to-avoid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-44466, CVSSv2 Score: 8.8
- Description:
libceph: harden msgr2.1 frame segment length checks
- CVE: https://access.redhat.com/security/cve/CVE-2023-44466
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-44466-libceph-harden-msgr2.1-frame-segment-length-checks.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1073
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1073-hid-check-empty-report-list-in-hid-validate-values.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1079-HID-asus-use-spinlock-to-protect-concurrent-accesses.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-30456, CVSSv2 Score: 6.0
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://access.redhat.com/security/cve/CVE-2023-30456
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-30456-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-33203
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-33203-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to-race.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-33952 CVE-2023-33951, CVSSv2 Score: 6.7
- Description:
drm/vmwgfx: Do not drop the reference to the handle too soon
- CVE: https://access.redhat.com/security/cve/CVE-2023-33952
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-33951-CVE-2023-33952-drm-vmwgfx-do-not-drop-the-reference-to-the-handle-too-soon.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-40982, CVSSv2 Score:
- Description:
Fixes require microcode updates
- CVE:
- Patch: skipped/CVE-2023-40982.patch
- From:
- CVE-2023-1252, CVSSv2 Score: 7.0
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1252, CVSSv2 Score: 7.0
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-kpatch.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://access.redhat.com/security/cve/CVE-2023-1074
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-a-given-scope.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
net: add sock_init_data_uid()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1076
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1076-net-add-sock_init_data_uid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
tap: tap_open(): correctly initialize socket uid
- CVE: https://access.redhat.com/security/cve/CVE-2023-1076
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1076-tap-tap-open-correctly-initialize-socket-uid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
tun: tun_chr_open(): correctly initialize socket uid
- CVE: https://access.redhat.com/security/cve/CVE-2023-1076
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1076-tun-tun-chr-open-correctly-initialize-socket-uid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-1855, CVSSv2 Score: 6.4
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-1855
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1855-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove-due-to.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://access.redhat.com/security/cve/CVE-2023-3161
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3358, CVSSv2 Score: 4.7
- Description:
fbcon: HID: intel_ish-hid: Add check for ishtp_dma_tx_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-3358
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3358-hid-intel-ish-hid-add-check-for-ishtp-dma-tx-map.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3772, CVSSv2 Score: 5.5
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://access.redhat.com/security/cve/CVE-2023-3772
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4273, CVSSv2 Score: 6.0
- Description:
Smart Patch for fs/exfat/dir.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-4273
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4273-smart-patch-for-fs-exfat-dir-c.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2022-3594, CVSSv2 Score: 5.3
- Description:
r8152: Rate limit overflow messages
- CVE: https://access.redhat.com/security/cve/CVE-2022-3594
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: v5.14.0-362.8.1.el9
- CVE-2022-42895, CVSSv2 Score: 6.5
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-42895-bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
- From: v5.14.0-362.8.1.el9
- CVE-2022-3523, CVSSv2 Score: 4.7
- Description:
mm/memory.c: fix race when faulting a device private page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3523
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3523-mm-memory.c-fix-race-when-faulting-a-device-private-page-284.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2022-3523, CVSSv2 Score: 4.7
- Description:
nouveau: Fix migrate_to_ram() for faulting page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3523
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3523-7043-nouveau-Fix-migrate_to_ram-for-faulting-page.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2022-3523, CVSSv2 Score: 4.7
- Description:
mm/memory: return vm_fault_t result from migrate_to_ram() callback
- CVE: https://access.redhat.com/security/cve/CVE-2022-3523
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3523-7044-mm-memory-return-vm_fault_t-result-from-migrate_to_ram()-callback.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://access.redhat.com/security/cve/CVE-2023-1075
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1075-net-tls-tls-is-tx-ready-checked-list-entry.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://access.redhat.com/security/cve/CVE-2023-26545
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://access.redhat.com/security/cve/CVE-2023-3212
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3212-gfs2-don-t-deref-jdesc-in-evict.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tap_open(): set sk_uid from current_fsuid()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4194
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4194-net-tap-open-set-sk-uid-from-current-fsuid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tun_chr_open(): set sk_uid from current_fsuid()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4194
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4194-net-tun-chr-open-set-sk-uid-from-current-fsuid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4155, CVSSv2 Score: 5.3
- Description:
KVM: SEV: only access GHCB fields once
- CVE: https://access.redhat.com/security/cve/CVE-2023-4155
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4155-kvm-sev-only-access-ghcb-fields-once.patch
- From: v5.14.0-362.8.1.el9
- CVE-2022-38457 CVE-2022-40133, CVSSv2 Score: 6.3
- Description:
drm/vmwgfx: Remove rcu locks from user resources
- CVE: https://access.redhat.com/security/cve/CVE-2022-40133
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-38457-CVE-2022-40133-1-drm-vmwgfx-clean-up-some-error-pointer-checking.patch
- From: kernel-5.14.0-362.8.1.el9_3
- CVE-2022-38457 CVE-2022-40133, CVSSv2 Score: 6.3
- Description:
drm/vmwgfx: Remove rcu locks from user resources
- CVE: https://access.redhat.com/security/cve/CVE-2022-40133
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-38457-CVE-2022-40133-drm-vmwgfx-Remove-rcu-locks-from-user-resources.patch
- From: kernel-5.14.0-362.8.1.el9_3
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2022-3565, CVSSv2 Score:
- Description:
In RHEL9 (and derivatives) isdn/mISDN driver is absent, not compiled.
- CVE:
- Patch: skipped/CVE-2022-3565.patch
- From:
- CVE-2023-1249, CVSSv2 Score: 4.1
- Description:
coredump: fix memleak in dump_vma_snapshot()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-2270-coredump-fix-memleak-in-dump_vma_snapshot.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249, CVSSv2 Score: 4.1
- Description:
coredump: Snapshot the vmas in do_coredump
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-2274-coredump-Snapshot-the-vmas-in-do_coredump.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249, CVSSv2 Score: 4.1
- Description:
coredump: Remove the WARN_ON in dump_vma_snapshot
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-3426-coredump-Remove-the-WARN_ON-in-dump_vma_snapshot.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249, CVSSv2 Score: 4.1
- Description:
coredump: Use the vma snapshot in fill_files_note
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-3427-coredump-Use-the-vma-snapshot-in-fill_files_note.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-39191, CVSSv2 Score:
- Description:
The fix consists of several patch-series and mix refactoring/bug-fixes/security-fixes/features for bpf subsystem. Dedicated security-fixes introduce crashes within newer bpf kselftests and the whole patch-series is not suitable for live-patching. At the same time the scope is limited to el9_2 only and is mitigated by the default kernel configuration (CONFIG_BPF_UNPRIV_DEFAULT_OFF=y).
- CVE:
- Patch: skipped/CVE-2023-39191.patch
- From:
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel9/5.14.0-362.13.1.el9_3/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel9/5.14.0-362.13.1.el9_3/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-1192, CVSSv2 Score: 6.5
- Description:
cifs: Fix UAF in cifs_demultiplex_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1192
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-1192-cifs-Fix-UAF-in-cifs_demultiplex_thread-284.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-5178, CVSSv2 Score: 9.8
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://access.redhat.com/security/cve/CVE-2023-5178
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2022-3545, CVSSv2 Score: 7.8
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2022-3545-nfp-fix-use-after-free-in-area-cache-get.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-2176, CVSSv2 Score: 7.8
- Description:
RDMA/core: Refactor rdma_bind_addr
- CVE: https://access.redhat.com/security/cve/CVE-2023-2176
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-2176-rdma-core-refactor-rdma-bind-addr.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-3777, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: skip bound chain on rule flush
- CVE: https://access.redhat.com/security/cve/CVE-2023-3777
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-3777-netfilter-nf-tables-skip-bound-chain-on-rule-flush.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-3812, CVSSv2 Score: 7.8
- Description:
net: tun: fix bugs for oversize packet when napi frags enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-3812
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-4015, CVSSv2 Score:
- Description:
kernel-5.14.0-284.11.1.el9_2 and earlier are not vulnerable because they don't have the commit 4bedf9eee016 (netfilter: nf_tables: fix chain binding transaction logic) that introduced the vulnerability
- CVE:
- Patch: skipped/CVE-2023-4015.patch
- From:
- CVE-2023-4622, CVSSv2 Score: 6.6
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://access.redhat.com/security/cve/CVE-2023-4622
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-4622-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://access.redhat.com/security/cve/CVE-2023-4623
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-4623-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-40283
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-40283-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2022-41858, CVSSv2 Score: 7.1
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2022-41858-drivers-net-slip-fix-npd-bug-in-sl-tx-timeout.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-46813-x86-sev-disable-mmio-emulation-from-user-mode.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-46813-x86-sev-check-iobm-for-ioio-exceptions-from-user-space.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-46813-x86-sev-check-for-user-space-ioio-pointing-to-kernel-space.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-5633, CVSSv2 Score: 7.8
- Description:
drm/vmwgfx: Fix possible invalid drm gem put calls
- CVE: https://access.redhat.com/security/cve/CVE-2023-5633
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-5633-drm-vmwgfx-Fix-possible-invalid-drm-gem-put-calls.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-5633, CVSSv2 Score: 7.8
- Description:
drm/vmwgfx: Keep a gem reference to user bos in surfaces
- CVE: https://access.redhat.com/security/cve/CVE-2023-5633
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-5633-drm-vmwgfx-Keep-a-gem-reference-to-user-bos-in-surfa-284.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-42753, CVSSv2 Score: 7.0
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-42753
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2022-36402, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix shader stage validation
- CVE: https://access.redhat.com/security/cve/CVE-2022-36402
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2022-36402-drm-vmwgfx-Fix-shader-stage-validation.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-2166, CVSSv2 Score: 5.5
- Description:
can: af_can: fix NULL pointer dereference in can_rcv_filter
- CVE: https://access.redhat.com/security/cve/CVE-2023-2166
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-2166-can-af_can-fix-NULL-pointer-dereference-in-can_rcv_f.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: Fix error paths in set_con2fb_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-38409-fbcon-Fix-error-paths-in-set_con2fb_map.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: set_con2fb_map needs to set con2fb_map!
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-38409-fbcon-set_con2fb_map-needs-to-set-con2fb_map.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-6679, CVSSv2 Score:
- Description:
Affected device driver does not exist in supported kernels.
- CVE:
- Patch: skipped/CVE-2023-6679.patch
- From:
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-51042, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix potential fence use-after-free v2
- CVE: https://access.redhat.com/security/cve/CVE-2023-51042
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-51042-patch-drm-amdgpu-fix-potential-fence-use-after-free-v2.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-284.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch-284.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6606
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6606-smb-client-fix-oob-in-smbcalcsize.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6610, CVSSv2 Score: 7.1
- Description:
smb: client: fix potential OOB in smb2_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6610-smb-client-fix-potential-oob-in-smb2-dump-detail.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6817, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: skip inactive elements during set walk
- CVE: https://access.redhat.com/security/cve/CVE-2023-6817
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6817-netfilter-nft-set-pipapo-skip-inactive-elements-during-set-walk.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2024-0193, CVSSv2 Score:
- Description:
Vulnerable commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) was introduced later than kernel-5.14.0-362.18.1.el9_3. None of our kernels are vulnerable.
- CVE:
- Patch: skipped/CVE-2024-0193.patch
- From:
- CVE-2024-0646, CVSSv2 Score: 7.0
- Description:
net: tls, update curr on splice as well
- CVE: https://access.redhat.com/security/cve/CVE-2024-0646
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2024-0646-net-tls-update-curr-on-splice-as-well.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inv.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: remove boilerplate code
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-remove-boilerplate-code.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2023-51780
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-51780-atm-Fix-Use-After-Free-in-do_vcc_ioctl.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6931-perf-fix-perf-event-validate-size.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size() lockdep
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6931-perf-fix-perf-event-validate-size-lockdep-splat.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of
- CVE: https://access.redhat.com/security/cve/CVE-2023-6040
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6040-netfilter-nf-tables-reject-tables-of-unsupported-family.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://access.redhat.com/security/cve/CVE-2023-6932
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6546, CVSSv2 Score: 7.8
- Description:
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2023-6546
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6546-tty-n-gsm-fix-the-uaf-caused-by-race-condition-in-gsm_cleanup_mux.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6176
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6176-net-tls-do-not-free-tls-rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-0565, CVSSv2 Score: 8.8
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0565
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-0565-smb-client-fix-OOB-in-receive_encrypted_standard.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in smb2_parse_contexts()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52434-smb-client-fix-potential-OOBs-in-smb2_parse_context-284.18.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create context
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52434-smb-client-fix-parsing-of-SMB3.1.1-POSIX-create-context.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-1085, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://access.redhat.com/security/cve/CVE-2024-1085
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-1085-netfilter-nf-tables-check-if-catch-all-set-5.14.0-362.18.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-51779-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6531, CVSSv2 Score: 7.0
- Description:
io_uring/af_unix: disable sending io_uring over sockets
- CVE: https://access.redhat.com/security/cve/CVE-2023-6531
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6531-io-uring-af-unix-disable-sending-io-uring-over-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-3567-vc-screen-move-load-of-struct-vc-data-pointer-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-3567-vc-screen-don-t-clobber-return-value-in-vcs-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39198, CVSSv2 Score: 7.5
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://access.redhat.com/security/cve/CVE-2023-39198
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26593, CVSSv2 Score: 4.4
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://access.redhat.com/security/cve/CVE-2024-26593
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6915, CVSSv2 Score: 6.2
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://access.redhat.com/security/cve/CVE-2023-6915
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-0841, CVSSv2 Score: 6.6
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841}
- CVE: https://access.redhat.com/security/cve/CVE-2024-0841
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-28464, CVSSv2 Score: 7.8
- Description:
Bluetooth: Fix double free in hci_conn_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2023-28464
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanu-pre5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52581, CVSSv2 Score:
- Description:
The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
- CVE:
- Patch: skipped/CVE-2023-52581.patch
- From:
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://access.redhat.com/security/cve/CVE-2023-24023
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-24023-Bluetooth-Add-more-enc-key-size-check.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39189
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://access.redhat.com/security/cve/CVE-2023-39193
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: modify kobject_get_path() to take a const *
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2022-0480, CVSSv2 Score: 5.5
- Description:
Reapply "memcg: enable accounting for file lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-0480
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-0480-reapply-memcg-enable-accounting-for-file-lock-caches.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6622, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: bail out on mismatching
- CVE: https://access.redhat.com/security/cve/CVE-2023-6622
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52529, CVSSv2 Score: 6.0
- Description:
HID: sony: Fix a potential memory leak in sony_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52529
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52529-hid-sony-fix-a-potential-memory-leak-in-sony_probe.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52610, CVSSv2 Score: 6.4
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags-284.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2022-38096, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://access.redhat.com/security/cve/CVE-2022-38096
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-4133, CVSSv2 Score:
- Description:
Complex adaptation required to add timer_shutdown_sync() in timers subsystem.
- CVE:
- Patch: skipped/CVE-2023-4133.patch
- From:
- CVE-2024-26602, CVSSv2 Score: 4.7
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26602
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://access.redhat.com/security/cve/CVE-2023-42754
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52448, CVSSv2 Score: 4.7
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52476, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2023-52476.patch
- From:
- CVE-2023-52522, CVSSv2 Score: 5.5
- Description:
neigh: make sure used and confirmed times are valid
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52522-neigh-make-sure-used-and-confirmed-times-are-valid.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52522, CVSSv2 Score: 5.5
- Description:
net: fix possible store tearing in neigh_periodic_work()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52522-net-fix-possible-store-tearing-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52580, CVSSv2 Score: 5.5
- Description:
net/core: Fix ETH_P_1588 flow dissector
- CVE: https://access.redhat.com/security/cve/CVE-2023-52580
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52580-net-core-fix-eth-p-1588-flow-dissector.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52620, CVSSv2 Score: 2.5
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://access.redhat.com/security/cve/CVE-2023-52620
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26633, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26633
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26633-ip6-tunnel-fix-nexthdr-fragment-handling-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26582, CVSSv2 Score: 8.4
- Description:
net: tls: fix use-after-free with partial reads
- CVE: https://access.redhat.com/security/cve/CVE-2024-26582
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26582-net-tls-fix-use-after-free-with-partial-reads-beyond-162.23.1.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26583, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26583.patch
- From:
- CVE-2024-26584, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26584.patch
- From:
- CVE-2024-26585, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26585.patch
- From:
- CVE-2023-52489, CVSSv2 Score:
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: Reject connection with the device
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-reject-connection-with-the-device-162.6.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Fix using memcmp when
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Fix coding style
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: avoid memcmp() out of bounds warning
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-28866, CVSSv2 Score: 5.3
- Description:
Bluetooth: HCI: Fix global-out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-28866
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-28866-bluetooth-hci-fix-global-out-of-bounds-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY
- CVE: https://access.redhat.com/security/cve/CVE-2023-31083
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-31083-bluetooth-hci-ldisc-check-hci-uart-proto-ready.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-42756, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable (Netfilter).
- CVE:
- Patch: skipped/CVE-2023-42756.patch
- From:
- CVE-2023-46862, CVSSv2 Score: 4.7
- Description:
io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
- CVE: https://ubuntu.com/security/CVE-2023-46862
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-46862-patch-io-uring-fdinfo-lock-sq-thread-while-retrieving-thread-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-add-atomic_long_t-to-net_device_stats-fields-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-bridge-use-dev-stats-inc.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-bridge-use-dev-stats-inc-newest-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Unite old scheme and new scheme
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0001-Unite-old-scheme-and-new-scheme-descriptor-reads-162.6.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Change usb_get_device_descriptor() API
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0002-Change-usb_get_device_descriptor-API.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0003-Fix-race-by-not-overwriting-udev-descriptor-in-hub_p-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0004-Fix-oversight-in-SuperSpeed-initialization-my-cherry.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39194
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39194-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the
- CVE: https://access.redhat.com/security/cve/CVE-2023-6121
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6121-nvmet-nul-terminate-the-nqns-passed-in-the.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26609, CVSSv2 Score:
- Description:
CVE has been marked as REJECTED on the NVD website.
- CVE:
- Patch: skipped/CVE-2024-26609.patch
- From:
- CVE-2023-51043, CVSSv2 Score: 7.0
- Description:
drm/atomic: Fix potential use-after-free in nonblocking commits
- CVE: https://access.redhat.com/security/cve/CVE-2023-51043
- Patch: kc/CVE-2023-51043-drm-atomic-Fix-potential-use-after-free-in-nonblocking-commits.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-51043, CVSSv2 Score: 7.0
- Description:
drm/atomic: Fix potential use-after-free in nonblocking commits
- CVE: https://access.redhat.com/security/cve/CVE-2023-51043
- Patch: kc/CVE-2023-51043-drm-atomic-Fix-potential-use-after-free-in-nonblocking-commits-kpatch.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel9/5.14.0-427.16.1.el9_4/CVE-2023-6240-crypto-akcipher-Disable-signing-and-decryption.patch
- From: 5.14.0-427.16.1.el9_4
- CVE-2024-25742 CVE-2024-25743, CVSSv2 Score: 7.1
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://access.redhat.com/security/cve/CVE-2024-25743
- Patch: rhel9/5.14.0-427.16.1.el9_4/CVE-2024-25742-CVE-2024-25743-x86-sev-harden-vc-instruction-emulation-284.patch
- From: 5.14.0-427.16.1.el9_4
- CVE-2024-26642, CVSSv2 Score: 4.7
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26673, CVSSv2 Score: 6.1
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- CVE: https://access.redhat.com/security/cve/CVE-2024-26673
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26673-netfilter-nft_ct-sanitize-layer-3-and-4-protocol-number-in-custom-expectations.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26673, CVSSv2 Score: 6.1
- Description:
netfilter: nft_ct: fix l3num expectations with inet pseudo family
- CVE: https://access.redhat.com/security/cve/CVE-2024-26673
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26673-netfilter-nft_ct-fix-l3num-expectations-with-inet-pseudo-family.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26804, CVSSv2 Score: 5.5
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26804-net-ip_tunnel-prevent-perpetual-headroom-growth-284.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26735, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel9/5.14.0-427.20.1.el9_4/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 5.14.0-427.20.1.el9_4
- CVE-2024-26993, CVSSv2 Score: 5.5
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel9/5.14.0-427.20.1.el9_4/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 5.14.0-427.20.1.el9_4
- CVE-2023-52667, CVSSv2 Score: 5.5
- Description:
net/mlx5e: fix a potential double-free in fs_any_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2023-52667
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26801, CVSSv2 Score: 5.5
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-35960, CVSSv2 Score: 5.5
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2021-47400, CVSSv2 Score: 4.7
- Description:
net: hns3: do not allow call hns3_nic_net_open repeatedly
- CVE: https://access.redhat.com/security/cve/CVE-2021-47400
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2021-47400-net-hns3-do-not-allow-call-hns3-nic-net-open.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-27393, CVSSv2 Score: 5.5
- Description:
xen-netfront: Add missing skb_mark_for_recycle
- CVE: https://access.redhat.com/security/cve/CVE-2024-27393
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-27393-xen-netfront-add-missing-skb-mark-for-recycle.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-35870, CVSSv2 Score: 5.5
- Description:
smb: client: fix UAF in smb2_reconnect_server()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35870
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-35870-smb-client-fix-uaf-in-smb2-reconnect-server-284.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26974, CVSSv2 Score: 5.5
- Description:
crypto: qat - resolve race condition during AER recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-recovery-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26974, CVSSv2 Score: 5.5
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-38580, CVSSv2 Score: 5.5
- Description:
epoll: be better about file lifetimes
- CVE: https://access.redhat.com/security/cve/CVE-2024-38580
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-38580-epoll-be-better-about-file-lifetimes.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35885, CVSSv2 Score: 5.5
- Description:
mlxbf_gige: stop interface during shutdown
- CVE: https://access.redhat.com/security/cve/CVE-2024-35885
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35885-mlxbf-gige-stop-interface-during-shutdown.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2022-48743, CVSSv2 Score: 5.5
- Description:
net: amd-xgbe: Fix skb data length underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48743
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2022-48743-net-amd-xgbe-fix-skb-data-length-underflow.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26880, CVSSv2 Score: 4.4
- Description:
dm: call the resume method on internal suspend
- CVE: https://access.redhat.com/security/cve/CVE-2024-26880
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-27046, CVSSv2 Score: 5.5
- Description:
nfp: flower: handle acti_netdevs allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-27046
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-27046-nfp-flower-handle-acti-netdevs-allocation-failure.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26852, CVSSv2 Score: 7.0
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26852
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6_route_mpath_notify.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35857, CVSSv2 Score: 5.5
- Description:
icmp: prevent possible NULL dereferences from icmp_build_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35857
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35857-icmp-prevent-possible-null-dereferences-from-icmp_build_probe.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2021-47459, CVSSv2 Score: 5.5
- Description:
can: j1939: j1939_netdev_start(): fix UAF for
- CVE: https://access.redhat.com/security/cve/CVE-2021-47459
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2021-47459-can-j1939-j1939-netdev-start-fix-uaf-for-rx_kref-of-j1939_priv.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26982, CVSSv2 Score: 5.5
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2023-52809, CVSSv2 Score: 5.5
- Description:
scsi: libfc: Fix potential NULL pointer
- CVE: https://access.redhat.com/security/cve/CVE-2023-52809
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2023-52809-scsi-libfc-fix-potential-null-pointer-dereference-in-fc_lport_ptp_setup.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-36952, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://access.redhat.com/security/cve/CVE-2024-36952
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-36952-scsi-lpfc-move-npivs-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2023-52458, CVSSv2 Score: 5.5
- Description:
block: add check that partition length needs to be aligned with block size
- CVE: https://access.redhat.com/security/cve/CVE-2023-52458
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2023-52458-block-add-check-that-partition-length-needs-to-be-aligned-with-block-size.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35907, CVSSv2 Score: 5.5
- Description:
mlxbf_gige: call request_irq() after NAPI initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-35907
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35907-mlxbf-gige-call-request-irq-after-napi-initialized-362.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-36924, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Release hbalock before calling
- CVE: https://access.redhat.com/security/cve/CVE-2024-36924
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-36924-scsi-lpfc-release-hbalock-before-calling-lpfc_worker_wake_up.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26773, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26773
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in-ext4_mb_try_best_found-362.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26737, CVSSv2 Score:
- Description:
bpf: Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26737.patch
- From:
- CVE-2024-27030, CVSSv2 Score:
- Description:
octeontx2: CVE patch is outside the scope.
- CVE:
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-1086, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://access.redhat.com/security/cve/CVE-2024-1086
- Patch: rhel9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-362.18.patch
- From: v6.7
- CVE-2024-38663, CVSSv2 Score: 5.5
- Description:
blk-cgroup: fix list corruption from resetting io
- CVE: https://access.redhat.com/security/cve/CVE-2024-38663
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-38663-blk-cgroup-fix-list-corruption-from-resetting-io-upto-362.24.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-26858, CVSSv2 Score:
- Description:
Not vulnerable: mapping mechanism that the bug applies to was introduced in v6.6 upstream (3178308ad4c) and appeared in RHEL9's since -427
- CVE:
- Patch: skipped/CVE-2024-26858.patch
- From:
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for
- CVE: https://access.redhat.com/security/cve/CVE-2024-27397
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-upto-284.30.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for
- CVE: https://access.redhat.com/security/cve/CVE-2024-27397
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-kpatch-upto-284.30.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-27435, CVSSv2 Score: 5.5
- Description:
nvme: fix reconnection fail due to reserved tag
- CVE: https://access.redhat.com/security/cve/CVE-2024-27435
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27435-nvme-fix-reconnection-fail-due-to-reserved-tag-upto-284.30.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38543, CVSSv2 Score:
- Description:
Not vulnerable: function with the buggy code `dmirror_device_evict_chunk()` exists since 362.8.1
- CVE:
- Patch: skipped/CVE-2024-38543.patch
- From:
- CVE-2024-38593, CVSSv2 Score:
- Description:
Not vulnerable: buggy function was introduced in v6.5 upsteam (or RHEL9's 427.13.1), and no similar code patterns existed before for this module
- CVE:
- Patch: skipped/CVE-2024-38593.patch
- From:
- CVE-2024-26783, CVSSv2 Score: 5.5
- Description:
mm/vmscan: make sure wakeup_kswapd with managed zone
- CVE: https://access.redhat.com/security/cve/CVE-2024-26783
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-26783-0001-mm-vmscan-make-sure-wakeup_kswapd-with-managed-zone.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-26783, CVSSv2 Score: 5.5
- Description:
mm/vmscan: fix a bug calling wakeup_kswapd() with
- CVE: https://access.redhat.com/security/cve/CVE-2024-26783
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-26783-0002-mm-vmscan-fix-a-bug-calling-wakeup-kswapd-with.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36886, CVSSv2 Score: 5.5
- Description:
tipc: fix UAF in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36886
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2021-47548, CVSSv2 Score: 5.5
- Description:
ethernet: hisilicon: hns: hns_dsaf_misc: fix a
- CVE: https://access.redhat.com/security/cve/CVE-2021-47548
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2021-47548-ethernet-hisilicon-hns-hns-dsaf-misc-fix-a.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36957, CVSSv2 Score: 5.5
- Description:
octeontx2-af: avoid off-by-one read from
- CVE: https://access.redhat.com/security/cve/CVE-2024-36957
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36957-octeontx2-af-avoid-off-by-one-read-from.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-35958, CVSSv2 Score: 5.5
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2022-48627, CVSSv2 Score: 4.4
- Description:
vt: fix memory overlapping when deleting chars in
- CVE: https://access.redhat.com/security/cve/CVE-2022-48627
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36904, CVSSv2 Score: 5.5
- Description:
tcp: Use refcount_inc_not_zero() in
- CVE: https://access.redhat.com/security/cve/CVE-2024-36904
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2023-52638, CVSSv2 Score: 5.5
- Description:
can: j1939: prevent deadlock by changing
- CVE: https://access.redhat.com/security/cve/CVE-2023-52638
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2023-52638, CVSSv2 Score: 5.5
- Description:
can: j1939: prevent deadlock by changing
- CVE: https://access.redhat.com/security/cve/CVE-2023-52638
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-kpatch.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38586, CVSSv2 Score: 5.5
- Description:
r8169: Fix possible ring buffer corruption on
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2021-47596, CVSSv2 Score: 5.5
- Description:
net: hns3: fix use-after-free bug in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47596
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2021-47596-net-hns3-fix-use-after-free-bug-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been
- CVE: https://access.redhat.com/security/cve/CVE-2024-36270
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been.patch
- From: 5.14.0-427.26.1.el9_4