- kernel-5.14.0-70.26.1.el9_0 (rockylinux9)
- 5.14.0-570.22.1.el9_6
- 2025-07-05 22:56:09
- 2025-07-08 09:13:14
- K20250706_06
- CVE-2022-2585
- Description:
posix-cpu-timers: Cleanup CPU timers before freeing them
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2585
- Patch: 5.10.0/CVE-2022-2585-posix-cpu-timers-Cleanup-CPU-timers-before-freeing-them.patch
- From: 5.10.136-1
- CVE-2022-30594
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on
- CVE: https://ubuntu.com/security/CVE-2022-30594
- Patch: 5.4.0/CVE-2022-30594-ptrace-check-pt_suspend_seccomp-permission-on-pt_seized.patch
- From: 5.4.0-113.127
- CVE-2022-23816
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-23825
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23825.patch
- From:
- CVE-2022-26373
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-29900
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From:
- CVE-2022-1679
- Description:
UBUNTU: SAUCE: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1679
- Patch: 5.15.0/CVE-2022-1679-UBUNTU-SAUCE-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: kernel-5.15.0-43.46
- CVE-2022-1998
- Description:
fanotify: Fix stale file descriptor in copy_event_to_user()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1998
- Patch: 5.14.0/CVE-2022-1998-fanotify-Fix-stale-file-descriptor-in-copy_event_to_user.patch
- From: 5.14.0-162.6.1.el9_1
- CVE-2022-2639
- Description:
openvswitch: fix OOB access in reserve_sfa_size()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2639
- Patch: 4.18.0/CVE-2022-2639-openvswitch-fix-OOB-access-in-reserve_sfa_size.patch
- From: 4.18.0-372.26.1
- CVE-2022-20368
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2022-20368
- Patch: 5.14.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 5.14.0-162.6.1.el9_1
- CVE-2022-28390
- Description:
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28390
- Patch: 5.15.0/CVE-2022-28390-can-ems_usb-ems_usb_start_xmit-fix-double-dev_kfree_skb-in-error-path.patch
- From: 5.15.37-39
- CVE-2022-28893
- Description:
SUNRPC: Ensure we flush any closed sockets before
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-28893
- Patch: 5.15.0/CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-xs_xprt_free.patch
- From: kernel-5.15.0-43.46
- CVE-2022-28893
- Description:
SUNRPC: Don't leak sockets in xs_local_connect()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-28893
- Patch: 5.15.0/CVE-2022-28893-SUNRPC-Dont-leak-sockets-in-xs_local_connect.patch
- From: kernel-5.15.0-43.46
- CVE-2022-28893
- Description:
SUNRPC: Ensure we flush any closed sockets before (adaptation)
- CVE: n/1
- Patch: 5.10.0/CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-kpatch.patch
- From: 5.10.120-1
- CVE-2022-29581
- Description:
net/sched: cls_u32: fix netns refcount changes in
- CVE: https://ubuntu.com/security/CVE-2022-29581
- Patch: 5.4.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 5.4.0-113.127
- CVE-2022-36946
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 5.15.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 5.15.0-48.54
- CVE-2021-3640
- Description:
Bluetooth: fix repeated calls to sco_sock_kill
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 5.10.0/977100-Bluetooth-fix-repeated-calls-to-sco_sock_kill.patch
- From: v5.10.64
- CVE-2021-3640
- Description:
Bluetooth: avoid circular locks in sco_sock_connect
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 5.10.0/977408-Bluetooth-avoid-circular-locks-in-sco_sock_connect.patch
- From: v5.10.66
- CVE-2021-3640
- Description:
Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 5.10.0/978504-Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_fro.patch
- From: v5.10.79
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls.patch
- From: 5.15.37-39
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.15.37-39
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.15.37-39
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 5.15.37-39
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-kpatch.patch
- From: 5.15.37-39
- CVE-2022-1353
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.15.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.15.37-39
- CVE-2020-36516
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36516
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-0168
- Description:
cifs: prevent bad output lengths in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 5.15.0/CVE-2022-0168-cifs-prevent-bad-output-lengths-in-smb2_ioctl_query_info.patch
- From: 5.15.37-39
- CVE-2022-0168
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 5.15.0/CVE-2022-0168-cifs-fix-NULL-ptr-dereference-in-smb2_ioctl_query_info.patch
- From: 5.15.37-39
- CVE-2022-0617
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0617
- Patch: 5.10.0/980398-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: v5.10.96
- CVE-2022-0617
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0617
- Patch: 5.10.0/980399-udf-Fix-NULL-ptr-deref-when-converting-from-inline.patch
- From: v5.10.96
- CVE-2022-0854
- Description:
Reinstate some of "swiotlb: rework "fix info leak with
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0854
- Patch: 5.14.0/CVE-2022-0854-Reinstate-some-of-swiotlb-rework-fix-info-leak-with.patch
- From: 5.10.120-1
- CVE-2022-1016
- Description:
netfilter: nf_tables: initialize registers in nft_do_chain()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1016
- Patch: 5.15.0/CVE-2022-1016-netfilter-nf_tables-initialize-registers-in-nft_do_chain.patch
- From: kernel-5.15.0-27.28
- CVE-2022-1184
- Description:
ext4: verify dir block before splitting it
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1184
- Patch: 5.14.0/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 5.10.127-1
- CVE-2022-1184
- Description:
ext4: make variable "count" signed
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 5.10.0/CVE-2022-1184-ext4-make-variable-count-signed.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1852
- Description:
KVM: x86: avoid calling x86 emulator without a decoded
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1852
- Patch: 5.15.0/CVE-2022-1852-KVM-x86-avoid-calling-x86-emulator-without-a-decoded-instruction.patch
- From: 5.15.0-47.50
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-21499
- Description:
lockdown: also lock down previous kgdb use
- CVE: https://linux.oracle.com/cve/CVE-2022-21499.html
- Patch: 5.4.17/CVE-2022-21499-lockdown-also-lock-down-previous-kgdb-use.patch
- From: 5.4.17-2136.312.3.4.el8uek
- CVE-2022-39190
- Description:
netfilter: nf_tables: disallow binding to already bound chain
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21385
- Patch: 5.10.0/CVE-2022-39190-netfilter-nf_tables-disallow-binding-to-already-bound-chain.patch
- From: 5.10.140-1
- CVE-2022-24448
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-24448
- Patch: 5.10.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 5.10.92-2
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://access.redhat.com/security/cve/CVE-2022-2586
- Patch: 5.14.0/CVE-2022-2586-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-another.patch
- From: 5.14.0-162.6.1
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow CHAIN_ID to refer to
- CVE: https://access.redhat.com/security/cve/CVE-2022-2586
- Patch: 5.14.0/CVE-2022-2586-netfilter-nf_tables-do-not-allow-CHAIN_ID-to-refer-to.patch
- From: 5.14.0-162.6.1
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow RULE_ID to refer to
- CVE: https://access.redhat.com/security/cve/CVE-2022-2586
- Patch: 5.14.0/CVE-2022-2586-netfilter-nf_tables-do-not-allow-RULE_ID-to-refer-to.patch
- From: 5.14.0-162.6.1
- CVE-2022-1280
- Description:
drm: add a locked version of drm_is_current_master
- CVE: https://access.redhat.com/security/cve/CVE-2022-1280
- Patch: 5.14.0/CVE-2022-1280-0001-drm-add-a-locked-version-of-drm_is_current_master.patch
- From: 5.14.0-162.6.1.el9_1
- CVE-2022-1280
- Description:
drm: add a locked version of drm_is_current_master
- CVE: https://access.redhat.com/security/cve/CVE-2022-1280
- Patch: 5.14.0/CVE-2022-1280-0002-drm-serialize-drm_file.master-with-a-new-spinlock.patch
- From: 5.14.0-162.6.1.el9_1
- CVE-2022-1280
- Description:
drm: add a locked version of drm_is_current_master
- CVE: https://linux.oracle.com/cve/CVE-2022-1280.html
- Patch: 5.14.0/CVE-2022-1280-0003-drm-protect-drm_master-pointers-in-drm_lease.c.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-1280
- Description:
drm: add a locked version of drm_is_current_master (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-1280
- Patch: 5.14.0/CVE-2022-1280-kpatch.patch
- From: 5.14.0-162.6.1.el9_1
- CVE-2022-2964
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-R.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-43945
- Patch: 5.14.0/CVE-2022-43945-1-NFSD-Protect-against-send-buffer-overflow-in-NFSv2-R.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-43945
- Patch: 5.14.0/CVE-2022-43945-2-NFSD-Protect-against-send-buffer-overflow-in-NFSv2-R.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-43945
- Patch: 5.14.0/CVE-2022-43945-3-NFSD-Protect-against-send-buffer-overflow-in-NFSv3-R.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-43945
- Patch: 5.14.0/CVE-2022-43945-4-NFSD-Protect-against-send-buffer-overflow-in-NFSv3-R.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-43945
- Patch: 5.14.0/CVE-2022-43945-5-SUNRPC-Fix-svcxdr_init_decode-s-end-of-buffer-calcul.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-43945
- Patch: 5.14.0/CVE-2022-43945-6-SUNRPC-Fix-svcxdr_init_encode-s-buflen-calculation.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-2959
- Description:
pipe: Fix missing lock in pipe_resize_ring()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2959
- Patch: 5.15.0/CVE-2022-2959-pipe-Fix-missing-lock-in-pipe_resize_ring.patch
- From: 5.15.0-47.50
- CVE-2022-4139
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute
- CVE: https://access.redhat.com/security/cve/CVE-2022-4139
- Patch: 4.18.0/CVE-2022-4139-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-co-pre-425.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-3077
- Description:
i2c: ismt: prevent memory corruption in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3077
- Patch: 5.14.0/CVE-2022-3077-i2c-ismt-prevent-memory-corruption-in-ismt_access.patch
- From: 5.14.0-162.12.1.el9_1
- CVE-2022-4378
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-4378-proc-proc_skip_spaces-shouldn-t-think-it-is-working.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2022-4378
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-4378-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2023-0179
- Description:
netfilter: nft_payload: incorrect arithmetics when fetching
- CVE: https://ubuntu.com/security/CVE-2023-0179
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2023-0179-netfilter-nft_payload-incorrect-arithmetics-when-fetching-VLAN-header-bits.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2022-4379
- Description:
NFSD: fix use-after-free in __nfs42_ssc_open()
- CVE: https://access.redhat.com/security/cve/CVE-2022-4379
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-4379-NFSD-fix-use-after-free-in-__nfs42_ssc_open.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2022-3564
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2022-2873
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://ubuntu.com/security/CVE-2022-2873
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-2873-i2c-ismt-fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2023-0266
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-0266
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2023-0266.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2022-4269
- Description:
act_mirred: use the backlog for nested calls to mirred ingress
- CVE: https://access.redhat.com/security/cve/CVE-2022-4269
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-4269.patch
- From: 5.14.0-162.18.1.el9_1
- CVE-2022-4744
- Description:
tun: avoid double free in tun_free_netdev
- CVE: https://access.redhat.com/security/cve/CVE-2022-4744
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-4744.patch
- From: v5.16
- CVE-2022-4744 (adaptation)
- Description:
tun: avoid double free in tun_free_netdev
- CVE: https://access.redhat.com/security/cve/CVE-2022-4744
- Patch: rhel9/5.14.0-162.18.1.el9_1/CVE-2022-4744-kpatch.patch
- From: v5.16
- CVE-2023-0386
- Description:
ovl: fail on invalid uid/gid mapping at copy up
- CVE: https://access.redhat.com/security/cve/CVE-2023-0386
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2023-0386-ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-2196
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2022-2196
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-2196-KVM-VMX-Execute-IBPB-on-emulated-VM-exit-when-guest-has-IBRS.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3640
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3640
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3640-bluetooth-l2cap-fix-use-after-free-in-l2cap-conn-del.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-42896-0001-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-41674
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-41674
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-1882
- Description:
watchqueue: make sure to serialize 'wqueue->defunct' properly
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1882
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-1882-watchqueue-make-sure-to-serialize-wqueue-defunct-properly.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3625
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://access.redhat.com/security/cve/CVE-2022-3625
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-33743
- Description:
xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()
- CVE: https://access.redhat.com/security/cve/CVE-2022-33743
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-33743-xen-netfront-restore-__skb_queue_tail-positioning-in-xennet_get_responses.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-42720
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42720
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs-70.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2023-0461
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://access.redhat.com/security/cve/CVE-2023-0461
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-the-LISTEN-status.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3028
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3522
- Description:
mm/hugetlb: fix race condition of uffd missing/minor handling
- CVE: https://access.redhat.com/security/cve/CVE-2022-3522
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3522-mm-hugetlb-fix-race-condition-of-uffd-missing-minor-.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-20141
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-20141
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-1789
- Description:
KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1789
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-1789-KVM-x86-mmu-fix-NULL-pointer-dereference-on-guest-INVPCID-pre-162.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-21505
- Description:
Kernel lockdown bypass when UEFI secure boot is disabled / unavailable and IMA appraisal is enabled.
- CVE: https://linux.oracle.com/cve/CVE-2022-21505.html
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-21505-lockdown-Fix-kexec-lockdown-bypass-with-ima-policy.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-43750
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3628
- Description:
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3628
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-1462
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-1462-tty-use-new-tty_insert_flip_string_and_push_buffer-in-pty_write.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-1462
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-1462-tty-extract-tty_flip_buffer_commit-from-tty_flip_buffer_push.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3524
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options().
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-3707
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-4128
- Description:
mptcp: fix subflow traversal at disconnect time
- CVE: https://access.redhat.com/security/cve/CVE-2022-4128
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-4128-mptcp-fix-subflow-traversal-at-disconnect-time-1.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-4129
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-4129-l2tp-Serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-4129
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-4129-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk_callback_lock.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-28388
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28388
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfree_skb-in-error-path.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2022-42721
- Description:
wifi: cfg80211: avoid nontransmitted BSS list corruption
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42721
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2022-42721-wifi-cfg80211-avoid-nontransmitted-BSS-list-corruption.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2021-33631
- Description:
ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
- CVE: https://access.redhat.com/security/cve/CVE-2021-33631
- Patch: rhel9/5.14.0-284.11.1.el9_2/CVE-2021-33631-ext4-fix-kernel-BUG-in-ext4_write_inline_data_end.patch
- From: 5.14.0-284.11.1.el9_2
- CVE-2023-2002
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2002
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2002-bluetooth-Perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 5.14.0-284.18.1
- CVE-2023-2124
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://access.redhat.com/security/cve/CVE-2023-2124
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.14.0-284.18.1
- CVE-2023-2194
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2194
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_slimpro_i2c_xfer.patch
- From: 5.14.0-284.18.1
- CVE-2023-2235
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2235
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_group_detach.patch
- From: 5.14.0-284.18.1
- CVE-2023-28466
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28466
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf-162.patch
- From: 5.14.0-284.18.1
- CVE-2023-32233
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://linux.oracle.com/cve/CVE-2023-32233.html
- Patch: rhel9/5.14.0-284.18.1.el9_2/CVE-2023-32233-patch-netfilter-nf-tables-deactivate-anonymous-set-from.patch
- From: 5.14.0-284.18.1
- CVE-2022-45869
- Description:
KVM: x86/mmu: Fix race condition in direct_page_fault
- CVE: https://access.redhat.com/security/cve/CVE-2022-45869
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2022-45869-KVM-x86-mmu-Fix-race-condition-in-direct_page_fault-pre-162.patch
- From: 5.14.0-284.25.1
- CVE-2023-0458
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://access.redhat.com/security/cve/CVE-2023-0458
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-chec.patch
- From: 5.14.0-284.25.1
- CVE-2023-3090
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-3090
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-3090-ipvlan-Fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.14.0-284.25.1
- CVE-2023-35788
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://access.redhat.com/security/cve/CVE-2023-35788
- Patch: rhel9/5.14.0-284.25.1.el9_2/CVE-2023-35788-net-sched-flower-fix-possible-OOB-write-in-fl_set_g.patch
- From: 5.14.0-284.25.1
- CVE-2023-4147
- Description:
nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- CVE: https://access.redhat.com/security/cve/CVE-2023-4147
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-4147-netfilter-nf-tables-disallow-rule-addition-to-bound-chain-via.patch
- From: 5.14.0-284.30.1
- CVE-2023-3776
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.14.0-284.30.1
- CVE-2023-21102
- Description:
out of scope, ARM EFI related
- CVE:
- Patch: skipped/CVE-2023-21102.patch
- From:
- CVE-2023-1637
- Description:
x86/speculation: Restore speculation related MSRs during S3 resume
- CVE: https://access.redhat.com/security/cve/CVE-2023-1637
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-1637-x86-speculation-restore-speculation-related-msrs-during-s3-resume.patch
- From: 5.14.0-284.30.1
- CVE-2023-20593
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-20593-x86-cpu-amd-add-a-zenbleed-fix.patch
- From: 5.14.0-284.30.1.el9_2
- CVE-2023-4004
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 5.14.0-284.30.1
- CVE-2023-3390
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://access.redhat.com/security/cve/CVE-2023-3390
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with.patch
- From: 5.14.0-284.30.1
- CVE-2023-31248
- Description:
nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- CVE: https://access.redhat.com/security/cve/CVE-2023-31248
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-31248-netfilter-nf_tables-do-not-ignore-genmask-when-looki.patch
- From: 5.14.0-284.30.1
- CVE-2023-35001
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://access.redhat.com/security/cve/CVE-2023-35001
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteor.patch
- From: 5.14.0-284.30.1
- CVE-2023-3610
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://access.redhat.com/security/cve/cve-2023-3610
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo.patch
- From: 5.14.0-284.30.1.el9_2
- CVE-2023-3610
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://access.redhat.com/security/cve/cve-2023-3610
- Patch: rhel9/5.14.0-284.30.1.el9_2/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo-kpatch.patch
- From: 5.14.0-284.30.1.el9_2
- N/A
- Description:
seccomp: Move copy_seccomp() to no failure path.
- CVE: https://github.com/torvalds/linux/commit/a31a647a3d1073a642c5bbe3457731fb353cb980?diff=unified&w=0
- Patch: rhel9/5.14.0-362.8.1.el9_3/seccomp-Move-copy_seccomp-to-no-failure-path-2.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-3609
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-3609
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3609-net-sched-cls-u32-fix-reference-counter-leak-leading-to-overflow-1.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1652
- Description:
NFSD: fix use-after-free in nfsd4_ssc_setup_dul()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1652
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1652-nfsd-fix-use-after-free-in-nfsd4-ssc-setup-dul.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1989
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work
- CVE: https://access.redhat.com/security/cve/CVE-2023-1989
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1989-bluetooth-btsdio-fix-use-after-free-bug-in-btsdio-remove-due-to.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3141 CVE-2023-35825
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-35825
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3141-memstick-r592-fix-uaf-bug-in-r592-remove-due-to-race-condition.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3268
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3268
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay-file-read.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4207 CVE-2023-4128 CVE-2023-4208 CVE-2023-4206
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to-avoid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4207 CVE-2023-4128 CVE-2023-4208 CVE-2023-4206
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to-avoid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4207 CVE-2023-4128 CVE-2023-4208 CVE-2023-4206
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to-avoid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-44466
- Description:
libceph: harden msgr2.1 frame segment length checks
- CVE: https://access.redhat.com/security/cve/CVE-2023-44466
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-44466-libceph-harden-msgr2.1-frame-segment-length-checks.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1073
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1073
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1073-hid-check-empty-report-list-in-hid-validate-values.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1079
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1079-HID-asus-use-spinlock-to-protect-concurrent-accesses.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1079
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1079
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-30456
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://access.redhat.com/security/cve/CVE-2023-30456
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-30456-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-33203
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-33203
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-33203-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to-race.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-40982
- Description:
Fixes require microcode updates
- CVE:
- Patch: skipped/CVE-2023-40982.patch
- From:
- CVE-2023-1252
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-1.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1252
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-kpatch.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1074
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://access.redhat.com/security/cve/CVE-2023-1074
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-a-given-scope.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1076
- Description:
net: add sock_init_data_uid()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1076
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1076-net-add-sock_init_data_uid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1076
- Description:
tap: tap_open(): correctly initialize socket uid
- CVE: https://access.redhat.com/security/cve/CVE-2023-1076
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1076-tap-tap-open-correctly-initialize-socket-uid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1076
- Description:
tun: tun_chr_open(): correctly initialize socket uid
- CVE: https://access.redhat.com/security/cve/CVE-2023-1076
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1076-tun-tun-chr-open-correctly-initialize-socket-uid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-1206
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-1855
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-1855
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1855-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove-due-to.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3161
- Description:
fbcon: Check font dimension limits
- CVE: https://access.redhat.com/security/cve/CVE-2023-3161
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3161-fbcon-check-font-dimension-limits-1.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3358
- Description:
fbcon: HID: intel_ish-hid: Add check for ishtp_dma_tx_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-3358
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3358-hid-intel-ish-hid-add-check-for-ishtp-dma-tx-map.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3772
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://access.redhat.com/security/cve/CVE-2023-3772
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4273
- Description:
Smart Patch for fs/exfat/dir.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-4273
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4273-smart-patch-for-fs-exfat-dir-c.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2022-3594
- Description:
r8152: Rate limit overflow messages
- CVE: https://access.redhat.com/security/cve/CVE-2022-3594
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: v5.14.0-362.8.1.el9
- CVE-2022-42895
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-42895-bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
- From: v5.14.0-362.8.1.el9
- CVE-2022-3523
- Description:
mm/memory.c: fix race when faulting a device private page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3523
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3523-mm-memory.c-fix-race-when-faulting-a-device-private-page.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2022-3523
- Description:
nouveau: Fix migrate_to_ram() for faulting page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3523
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3523-7043-nouveau-Fix-migrate_to_ram-for-faulting-page.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2022-3523
- Description:
mm/memory: return vm_fault_t result from migrate_to_ram() callback
- CVE: https://access.redhat.com/security/cve/CVE-2022-3523
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2022-3523-7044-mm-memory-return-vm_fault_t-result-from-migrate_to_ram()-callback.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1075
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://access.redhat.com/security/cve/CVE-2023-1075
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1075-net-tls-tls-is-tx-ready-checked-list-entry-1.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-26545
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://access.redhat.com/security/cve/CVE-2023-26545
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-3212
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://access.redhat.com/security/cve/CVE-2023-3212
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-3212-gfs2-don-t-deref-jdesc-in-evict-1.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4194
- Description:
net: tap_open(): set sk_uid from current_fsuid()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4194
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4194-net-tap-open-set-sk-uid-from-current-fsuid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4194
- Description:
net: tun_chr_open(): set sk_uid from current_fsuid()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4194
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4194-net-tun-chr-open-set-sk-uid-from-current-fsuid.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-4155
- Description:
KVM: SEV: only access GHCB fields once
- CVE: https://access.redhat.com/security/cve/CVE-2023-4155
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-4155-kvm-sev-only-access-ghcb-fields-once-1.patch
- From: v5.14.0-362.8.1.el9
- CVE-2023-0597
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2022-3565
- Description:
In RHEL9 (and derivatives) isdn/mISDN driver is absent, not compiled.
- CVE:
- Patch: skipped/CVE-2022-3565.patch
- From:
- CVE-2023-1249
- Description:
coredump/elf: Pass coredump_params into fill_note_info
- CVE:
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-18879-coredump-elf-Pass-coredump_params-into-fill_note_info.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249
- Description:
coredump: fix memleak in dump_vma_snapshot()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-2270-coredump-fix-memleak-in-dump_vma_snapshot.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249
- Description:
coredump: Snapshot the vmas in do_coredump
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-2274-coredump-Snapshot-the-vmas-in-do_coredump-pre284.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249
- Description:
coredump: Remove the WARN_ON in dump_vma_snapshot
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-3426-coredump-Remove-the-WARN_ON-in-dump_vma_snapshot.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-1249
- Description:
coredump: Use the vma snapshot in fill_files_note
- CVE: https://access.redhat.com/security/cve/CVE-2023-1249
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-1249-3427-coredump-Use-the-vma-snapshot-in-fill_files_note.patch
- From: 5.14.0-362.8.1.el9_3
- N/A
- Description:
Dependency patch required to support nvme-pci-clamp-max_hw_sectors-based-on-DMA-optimized-limitation-dependency.patch
- CVE: https://git.kernel.org/linus/3710e2b056cb92ad816e4d79fa54a6a5b6ad8cbd
- Patch: rhel9/5.14.0-362.24.1.el9_3/nvme-pci-clamp-max_hw_sectors-based-on-DMA-optimized-limitation-dependency-2.patch
- From: 5.14.0-362.8.1.el9_3
- N/A
- Description:
nvme-pci: clamp max_hw_sectors based on DMA optimized limitation
- CVE: https://git.kernel.org/linus/3710e2b056cb92ad816e4d79fa54a6a5b6ad8cbd
- Patch: rhel9/5.14.0-362.24.1.el9_3/nvme-pci-clamp-max_hw_sectors-based-on-DMA-optimized-limitation.patch
- From: 5.14.0-362.8.1.el9_3
- N/A
- Description:
nvme-pci: clamp max_hw_sectors based on DMA optimized limitation(KernelCare adaptation)
- CVE: https://git.kernel.org/linus/3710e2b056cb92ad816e4d79fa54a6a5b6ad8cbd
- Patch: rhel9/5.14.0-362.24.1.el9_3/nvme-pci-clamp-max_hw_sectors-based-on-DMA-optimized-limitation-kpatch.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel9/5.14.0-362.13.1.el9_3/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel9/5.14.0-362.13.1.el9_3/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-1192
- Description:
cifs: Fix UAF in cifs_demultiplex_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1192
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-1192-cifs-Fix-UAF-in-cifs_demultiplex_thread-162.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-5178
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://access.redhat.com/security/cve/CVE-2023-5178
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2022-3545
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2022-3545-nfp-fix-use-after-free-in-area-cache-get.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-3777
- Description:
netfilter: nf_tables: skip bound chain on rule flush
- CVE: https://access.redhat.com/security/cve/CVE-2023-3777
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-3777-netfilter-nf-tables-skip-bound-chain-on-rule-flush.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-3812
- Description:
net: tun: fix bugs for oversize packet when napi frags enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-3812
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-4015
- Description:
kernel-5.14.0-284.11.1.el9_2 and earlier are not vulnerable because they don't have the commit 4bedf9eee016 (netfilter: nf_tables: fix chain binding transaction logic) that introduced the vulnerability
- CVE:
- Patch: skipped/CVE-2023-4015.patch
- From:
- CVE-2023-4622
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://access.redhat.com/security/cve/CVE-2023-4622
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-4622-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://access.redhat.com/security/cve/CVE-2023-4623
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-4623-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-40283
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-40283
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-40283-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2022-41858
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2022-41858-drivers-net-slip-fix-npd-bug-in-sl-tx-timeout.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-46813
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-46813-x86-sev-disable-mmio-emulation-from-user-mode-1.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-46813
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-46813-x86-sev-check-iobm-for-ioio-exceptions-from-user-space.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-46813
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-46813-x86-sev-check-for-user-space-ioio-pointing-to-kernel-space-1.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-42753
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2022-36402
- Description:
drm/vmwgfx: Fix shader stage validation
- CVE: https://access.redhat.com/security/cve/CVE-2022-36402
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2022-36402-drm-vmwgfx-Fix-shader-stage-validation-1.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-2166
- Description:
can: af_can: fix NULL pointer dereference in can_rcv_filter
- CVE: https://access.redhat.com/security/cve/CVE-2023-2166
- Patch: rhel9/5.14.0-362.18.1.el9_3/CVE-2023-2166-can-af_can-fix-NULL-pointer-dereference-in-can_rcv_f-1.patch
- From: 5.14.0-362.18.1.el9_3
- CVE-2023-6679
- Description:
Affected device driver does not exist in supported kernels.
- CVE:
- Patch: skipped/CVE-2023-6679.patch
- From:
- CVE-2023-4244
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-51042
- Description:
drm/amdgpu: Fix potential fence use-after-free v2
- CVE: https://access.redhat.com/security/cve/CVE-2023-51042
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-51042-patch-drm-amdgpu-fix-potential-fence-use-after-free-v2.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-5717
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-162.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-5717
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch-162.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6606
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6606
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6606-smb-client-fix-oob-in-smbcalcsize.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6610
- Description:
smb: client: fix potential OOB in smb2_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6610-smb-client-fix-potential-oob-in-smb2-dump-detail-70.26.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6817
- Description:
netfilter: nft_set_pipapo: skip inactive elements during set walk
- CVE: https://access.redhat.com/security/cve/CVE-2023-6817
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6817-netfilter-nft-set-pipapo-skip-inactive-elements-during-set-walk.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2024-0193
- Description:
Vulnerable commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) was introduced later than kernel-5.14.0-362.18.1.el9_3. None of our kernels are vulnerable.
- CVE:
- Patch: skipped/CVE-2024-0193.patch
- From:
- CVE-2024-0646
- Description:
net: tls, update curr on splice as well
- CVE: https://access.redhat.com/security/cve/CVE-2024-0646
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2024-0646-net-tls-update-curr-on-splice-as-well.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inv-162.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535
- Description:
nvmet-tcp: remove boilerplate code
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-remove-boilerplate-code-162.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation-162.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2022-45934
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51780
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2023-51780
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-51780-atm-Fix-Use-After-Free-in-do_vcc_ioctl.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6931-perf-fix-perf-event-validate-size-162.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size() lockdep
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6931-perf-fix-perf-event-validate-size-lockdep-splat.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6040
- Description:
netfilter: nf_tables: Reject tables of
- CVE: https://access.redhat.com/security/cve/CVE-2023-6040
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6040-netfilter-nf-tables-reject-tables-of-unsupported-family.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6932
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://access.redhat.com/security/cve/CVE-2023-6932
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6546
- Description:
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2023-6546
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6546-tty-n-gsm-fix-the-uaf-caused-by-race-condition-in-gsm_cleanup_mux.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6176
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6176
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6176-net-tls-do-not-free-tls-rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration-70.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-0565
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0565
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-0565-smb-client-fix-OOB-in-receive_encrypted_standard-70.26.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52434
- Description:
smb: client: fix potential OOBs in smb2_parse_contexts()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52434-smb-client-fix-potential-OOBs-in-smb2_parse_context-162.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52434
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create context
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52434-smb-client-fix-parsing-of-SMB3.1.1-POSIX-create-context.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-1085
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://access.redhat.com/security/cve/CVE-2024-1085
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-1085-netfilter-nf-tables-check-if-catch-all-set-5.14.0-362.18.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51779
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-51779-bluetooth-af-bluetooth-fix-use-after-free-in-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-3567
- Description:
vc_screen: move load of struct vc_data pointer in
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-3567-vc-screen-move-load-of-struct-vc-data-pointer-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-3567
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-3567-vc-screen-don-t-clobber-return-value-in-vcs-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39198
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://access.redhat.com/security/cve/CVE-2023-39198
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26593
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://access.redhat.com/security/cve/CVE-2024-26593
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6915
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://access.redhat.com/security/cve/CVE-2023-6915
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-0841
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841}
- CVE: https://access.redhat.com/security/cve/CVE-2024-0841
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-28464
- Description:
Bluetooth: Fix double free in hci_conn_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2023-28464
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanu-pre5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52581
- Description:
The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
- CVE:
- Patch: skipped/CVE-2023-52581.patch
- From:
- CVE-2023-24023
- Description:
Bluetooth: Add more enc key size check
- CVE: https://access.redhat.com/security/cve/CVE-2023-24023
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-24023-Bluetooth-Add-more-enc-key-size-check.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39189
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39189
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39193
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://access.redhat.com/security/cve/CVE-2023-39193
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-45863
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-45863
- Description:
kobject: modify kobject_get_path() to take a const *
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const-70.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2022-0480
- Description:
Reapply "memcg: enable accounting for file lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-0480
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-0480-reapply-memcg-enable-accounting-for-file-lock-caches.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6622
- Description:
netfilter: nf_tables: bail out on mismatching
- CVE: https://access.redhat.com/security/cve/CVE-2023-6622
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52529
- Description:
HID: sony: Fix a potential memory leak in sony_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52529
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52529-hid-sony-fix-a-potential-memory-leak-in-sony_probe-70.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52610
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags-284.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2022-38096
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://access.redhat.com/security/cve/CVE-2022-38096
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts-70.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-4133
- Description:
Complex adaptation required to add timer_shutdown_sync() in timers subsystem.
- CVE:
- Patch: skipped/CVE-2023-4133.patch
- From:
- CVE-2024-26602
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26602
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-42754
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://access.redhat.com/security/cve/CVE-2023-42754
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52448
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52476
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2023-52476.patch
- From:
- CVE-2023-52522
- Description:
neigh: make sure used and confirmed times are valid
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52522-neigh-make-sure-used-and-confirmed-times-are-valid.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52522
- Description:
net: fix possible store tearing in neigh_periodic_work()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52522-net-fix-possible-store-tearing-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52580
- Description:
net/core: Fix ETH_P_1588 flow dissector
- CVE: https://access.redhat.com/security/cve/CVE-2023-52580
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52580-net-core-fix-eth-p-1588-flow-dissector.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52620
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://access.redhat.com/security/cve/CVE-2023-52620
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26633
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26633
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26633-ip6-tunnel-fix-nexthdr-fragment-handling-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26582
- Description:
net: tls: fix use-after-free with partial reads
- CVE: https://access.redhat.com/security/cve/CVE-2024-26582
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26582-net-tls-fix-use-after-free-with-partial-reads.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26583
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26583.patch
- From:
- CVE-2024-26584
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26584.patch
- From:
- CVE-2024-26585
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26585.patch
- From:
- CVE-2023-52489
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555
- Description:
Bluetooth: Reject connection with the device
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-reject-connection-with-the-device.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Fix using memcmp when
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Fix coding style
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555
- Description:
Bluetooth: avoid memcmp() out of bounds warning
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-31083
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY
- CVE: https://access.redhat.com/security/cve/CVE-2023-31083
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-31083-bluetooth-hci-ldisc-check-hci-uart-proto-ready.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-42756
- Description:
The given kernel version isn't vulnerable (Netfilter).
- CVE:
- Patch: skipped/CVE-2023-42756.patch
- From:
- CVE-2023-46862
- Description:
io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
- CVE: https://ubuntu.com/security/CVE-2023-46862
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-46862-patch-io-uring-fdinfo-lock-sq-thread-while-retrieving-thread.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-add-atomic_long_t-to-net_device_stats-fields.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-bridge-use-dev-stats-inc.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-bridge-use-dev-stats-inc-oldest-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453
- Description:
USB: core: Unite old scheme and new scheme
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0001-Unite-old-scheme-and-new-scheme-descriptor-reads.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453
- Description:
USB: core: Change usb_get_device_descriptor() API
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0002-Change-usb_get_device_descriptor-API.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453
- Description:
USB: core: Fix race by not overwriting
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0003-Fix-race-by-not-overwriting-udev-descriptor-in-hub_p.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0004-Fix-oversight-in-SuperSpeed-initialization-my-cherry.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39194
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39194
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39194-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52574
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52574
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6121
- Description:
nvmet: nul-terminate the NQNs passed in the
- CVE: https://access.redhat.com/security/cve/CVE-2023-6121
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6121-nvmet-nul-terminate-the-nqns-passed-in-the.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26609
- Description:
CVE has been marked as REJECTED on the NVD website.
- CVE:
- Patch: skipped/CVE-2024-26609.patch
- From:
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://access.redhat.com/security/cve/CVE-2024-1086
- Patch: rhel9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-362.18.patch
- From: v6.7
- CVE-2023-52832
- Description:
wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52832
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52832-wifi-mac80211-don-t-return-unset-power-in-ieee80211-get-tx-power.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51043
- Description:
drm/atomic: Fix potential use-after-free in nonblocking commits
- CVE: https://access.redhat.com/security/cve/CVE-2023-51043
- Patch: kc/CVE-2023-51043-drm-atomic-Fix-potential-use-after-free-in-nonblocking-commits-old.patch
- From: 4.18.0-372.95.1.el8_6
- CVE-2023-51043
- Description:
drm/atomic: Fix potential use-after-free in nonblocking commits
- CVE: https://access.redhat.com/security/cve/CVE-2023-51043
- Patch: kc/CVE-2023-51043-drm-atomic-Fix-potential-use-after-free-in-nonblocking-commits-old-kpatch.patch
- From: 4.18.0-372.95.1.el8_6
- CVE-2023-6240
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel9/5.14.0-427.16.1.el9_4/CVE-2023-6240-crypto-akcipher-Disable-signing-and-decryption.patch
- From: 5.14.0-427.16.1.el9_4
- CVE-2024-25742 CVE-2024-25743
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://access.redhat.com/security/cve/CVE-2024-25743
- Patch: rhel9/5.14.0-427.16.1.el9_4/CVE-2024-25742-CVE-2024-25743-x86-sev-harden-vc-instruction-emulation-70.patch
- From: 5.14.0-427.16.1.el9_4
- CVE-2024-26642
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag-162.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26673
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- CVE: https://access.redhat.com/security/cve/CVE-2024-26673
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26673-netfilter-nft_ct-sanitize-layer-3-and-4-protocol-number-in-custom-expectations.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26673
- Description:
netfilter: nft_ct: fix l3num expectations with inet pseudo family
- CVE: https://access.redhat.com/security/cve/CVE-2024-26673
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26673-netfilter-nft_ct-fix-l3num-expectations-with-inet-pseudo-family.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26804-net-ip_tunnel-prevent-perpetual-headroom-growth-284.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel9/5.14.0-427.20.1.el9_4/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 5.14.0-427.20.1.el9_4
- CVE-2024-26993
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel9/5.14.0-427.20.1.el9_4/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 5.14.0-427.20.1.el9_4
- CVE-2023-52667
- Description:
net/mlx5e: fix a potential double-free in fs_any_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2023-52667
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-35960
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2021-47400
- Description:
net: hns3: do not allow call hns3_nic_net_open repeatedly
- CVE: https://access.redhat.com/security/cve/CVE-2021-47400
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2021-47400-net-hns3-do-not-allow-call-hns3-nic-net-open.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-27393
- Description:
xen-netfront: Add missing skb_mark_for_recycle
- CVE: https://access.redhat.com/security/cve/CVE-2024-27393
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-27393-xen-netfront-add-missing-skb-mark-for-recycle-70.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-35870
- Description:
smb: client: fix UAF in smb2_reconnect_server()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35870
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-35870-smb-client-fix-uaf-in-smb2-reconnect-server-70.26.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26974
- Description:
crypto: qat - resolve race condition during AER recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-recovery-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26974
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-38580
- Description:
epoll: be better about file lifetimes
- CVE: https://access.redhat.com/security/cve/CVE-2024-38580
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-38580-epoll-be-better-about-file-lifetimes.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35885
- Description:
mlxbf_gige: stop interface during shutdown
- CVE: https://access.redhat.com/security/cve/CVE-2024-35885
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35885-mlxbf-gige-stop-interface-during-shutdown.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2022-48743
- Description:
net: amd-xgbe: Fix skb data length underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48743
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2022-48743-net-amd-xgbe-fix-skb-data-length-underflow.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26880
- Description:
dm: call the resume method on internal suspend
- CVE: https://access.redhat.com/security/cve/CVE-2024-26880
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-27046
- Description:
nfp: flower: handle acti_netdevs allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-27046
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-27046-nfp-flower-handle-acti-netdevs-allocation-failure.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26852
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26852
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6_route_mpath_notify.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35857
- Description:
icmp: prevent possible NULL dereferences from icmp_build_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35857
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35857-icmp-prevent-possible-null-dereferences-from-icmp_build_probe.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2021-47459
- Description:
can: j1939: j1939_netdev_start(): fix UAF for
- CVE: https://access.redhat.com/security/cve/CVE-2021-47459
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2021-47459-can-j1939-j1939-netdev-start-fix-uaf-for-rx_kref-of-j1939_priv.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2023-52809
- Description:
scsi: libfc: Fix potential NULL pointer
- CVE: https://access.redhat.com/security/cve/CVE-2023-52809
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2023-52809-scsi-libfc-fix-potential-null-pointer-dereference-in-fc_lport_ptp_setup.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-36952
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://access.redhat.com/security/cve/CVE-2024-36952
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-36952-scsi-lpfc-move-npivs-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2023-52458
- Description:
block: add check that partition length needs to be aligned with block size
- CVE: https://access.redhat.com/security/cve/CVE-2023-52458
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2023-52458-block-add-check-that-partition-length-needs-to-be-aligned-with-block-size.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35907
- Description:
mlxbf_gige: call request_irq() after NAPI initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-35907
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35907-mlxbf-gige-call-request-irq-after-napi-initialized-362.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-36924
- Description:
scsi: lpfc: Release hbalock before calling
- CVE: https://access.redhat.com/security/cve/CVE-2024-36924
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-36924-scsi-lpfc-release-hbalock-before-calling-lpfc_worker_wake_up-70.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26773
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26773
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in-ext4_mb_try_best_found-362.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-27030
- Description:
octeontx2: CVE patch is outside the scope.
- CVE:
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-26737
- Description:
eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.
- CVE:
- Patch: skipped/CVE-2024-26737.patch
- From:
- CVE-2024-21823
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the
- CVE: https://access.redhat.com/security/cve/CVE-2024-21823
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-70.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27052
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-27052
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35845
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-35845
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36971
- Description:
net: annotate data-races around
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36971
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36971-net-annotate-data-races-around.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36971
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36971-net-fix-dst-negative-advice-race.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-39487
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35937
- Description:
wifi: cfg80211: check A-MSDU format more
- CVE: https://access.redhat.com/security/cve/CVE-2024-35937
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35937-wifi-cfg80211-check-a-msdu-format-more-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2021-47606
- Description:
net: netlink: af_netlink: Prevent empty skb by
- CVE: https://access.redhat.com/security/cve/CVE-2021-47606
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2021-47606-net-netlink-af-netlink-prevent-empty-skb-by.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2023-52651
- Description:
wifi: ath10k: fix NULL pointer dereference in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52651
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2023-52651-wifi-ath10k-fix-null-pointer-dereference-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2023-52864
- Description:
platform/x86: wmi: remove unnecessary initializations
- CVE: https://access.redhat.com/security/cve/CVE-2023-52864
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2023-52864-platform-x86-wmi-remove-unnecessary.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2023-52864
- Description:
platform/x86: wmi: Fix opening of char device
- CVE: https://access.redhat.com/security/cve/CVE-2023-52864
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2023-52864-platform-x86-wmi-fix-opening-of-char-device.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26600
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26600
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26808
- Description:
netfilter: nft_chain_filter: handle
- CVE: https://access.redhat.com/security/cve/CVE-2024-26808
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26808-netfilter-nft-chain-filter-handle.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27065
- Description:
netfilter: nf_tables: do not compare internal
- CVE: https://access.redhat.com/security/cve/CVE-2024-27065
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27065-netfilter-nf-tables-do-not-compare-internal.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27417
- Description:
ipv6: fix potential "struct net" leak in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27417
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36922
- Description:
wifi: iwlwifi: read txq->read_ptr under lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-36922
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36922-wifi-iwlwifi-read-txq-read-ptr-under-lock-284.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-40954
- Description:
net: do not leave a dangling sk pointer, when socket creation fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-40954
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-40958
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://access.redhat.com/security/cve/CVE-2024-40958
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40958-netns-Make-get_net_ns-handle-zero-refcount-net.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-33621
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://access.redhat.com/security/cve/CVE-2024-33621
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-33621-ipvlan-dont-use-skb-sk-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35789
- Description:
wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
- CVE: https://access.redhat.com/security/cve/CVE-2024-35789
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35823
- Description:
vt: fix unicode buffer corruption when deleting characters
- CVE: https://access.redhat.com/security/cve/CVE-2024-35823
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35848
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://access.redhat.com/security/cve/CVE-2024-35848
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-5.14.0-427.28.1.el9_4.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35852
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35899
- Description:
netfilter: nf_tables: flush pending destroy work before exit_net release
- CVE: https://access.redhat.com/security/cve/CVE-2024-35899
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35899-netfilter-nf_tables-flush-pending-destroy-work-befo-5.14.0-362.18.1.el9_3.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35969
- Description:
ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr
- CVE: https://access.redhat.com/security/cve/CVE-2024-35969
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35969-ipv6-fix-race-condition-between-ipv6-get-ifaddr.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26897
- Description:
WiFi - Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-40961
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40961
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6_nh_init.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-37356
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-37356
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha-kpatch.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-38558
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://access.redhat.com/security/cve/CVE-2024-38558
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-ICMPv6.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26853
- Description:
igc: avoid returning frame twice in XDP_REDIRECT
- CVE: https://access.redhat.com/security/cve/CVE-2024-26853
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26853-igc-avoid-returning-frame-twice-in-xdp-redirect-284.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35800
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2024-35800.patch
- From:
- CVE-2024-36489
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36489
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-37353
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-37353
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36941
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://access.redhat.com/security/cve/CVE-2024-36941
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36929
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://access.redhat.com/security/cve/CVE-2024-36929
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36017
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- CVE: https://access.redhat.com/security/cve/CVE-2024-36017
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36005
- Description:
netfilter: nf_tables: honor table dormant flag from netdev release event path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36005
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35839
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-35839.patch
- From:
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26668
- Description:
netfilter: nft_limit: reject configurations that cause integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26668
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-26668-netfilter-nft-limit-reject-configurations-that.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth
- CVE: https://access.redhat.com/security/cve/CVE-2024-38538
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-362.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2023-52880
- Description:
tty: n_gsm: require CAP_NET_ADMIN to attach
- CVE: https://access.redhat.com/security/cve/CVE-2023-52880
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2023-52880-tty-n-gsm-require-cap-net-admin-to-attach-427.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26908
- Description:
CVE marked as rejected by vendor
- CVE:
- Patch: skipped/CVE-2024-26908.patch
- From:
- CVE-2024-27016
- Description:
netfilter: flowtable: Fix QinQ and pppoe support for inet table
- CVE: https://access.redhat.com/security/cve/CVE-2024-27016
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27016-netfilter-flowtable-Fix-QinQ-and-pppoe-support-for-inet-table.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27016
- Description:
netfilter: flowtable: validate pppoe header
- CVE: https://access.redhat.com/security/cve/CVE-2024-27016
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27016-netfilter-flowtable-validate-pppoe-header-284.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27019
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27019
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27019-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35896
- Description:
netfilter: validate user input for expected length
- CVE: https://access.redhat.com/security/cve/CVE-2024-35896
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35896-netfilter-validate-user-input-for-expected.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35962
- Description:
netfilter: complete validation of user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35962
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35962-netfilter-complete-validation-of-user-input.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35897
- Description:
nf_tables: disable toggling dormant table state more than once
- CVE: https://access.redhat.com/security/cve/CVE-2024-35897
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35897-netfilter-nf_tables-disable-toggling-dormant-table-state-more-than-once.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35897
- Description:
netfilter: nf_tables: discard table flag update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35897
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35897-netfilter-nf_tables-reject-table-flag-and-netdev-basechain-updates.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35897
- Description:
netfilter: nf_tables: discard table flag update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35897
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35897-netfilter-nf-tables-discard-table-flag-update.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26810
- Description:
vfio/pci: Lock external INTx masking ops
- CVE: https://access.redhat.com/security/cve/CVE-2024-26810
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-42152
- Description:
nvmet: fix a possible leak when destroy a ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2024-42152
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26855
- Description:
net: ice: Fix potential NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-26855
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-26855-net-ice-fix-potential-null-pointer-dereference.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41076
- Description:
NFSv4: Fix memory leak in nfs4_set_security_label
- CVE: https://access.redhat.com/security/cve/CVE-2024-41076
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41076-nfsv4-fix-memory-leak-in-nfs4-set-security-label.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41041
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://access.redhat.com/security/cve/CVE-2024-41041
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40978
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-40978
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40941
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://access.redhat.com/security/cve/CVE-2024-40941
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40929
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://access.redhat.com/security/cve/CVE-2024-40929
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40912
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40912
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40912-wifi-mac80211-fix-deadlock-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40911
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://access.redhat.com/security/cve/CVE-2024-40911
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40911-wifi-cfg80211-lock-wiphy-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40905
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40905
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40905-ipv6-fix-possible-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40983
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://access.redhat.com/security/cve/CVE-2024-40983
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40914
- Description:
mm/huge_memory: don't unpoison huge_zero_folio
- CVE: https://access.redhat.com/security/cve/CVE-2024-40914
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40914-mm-huge_memory-don-t-unpoison-huge_zero_folio-284.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38544
- Description:
RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt
- CVE: https://access.redhat.com/security/cve/CVE-2024-38544
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38544-rdma-rxe-fix-seg-fault-in-rxe-comp-queue-pkt-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38579
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://access.redhat.com/security/cve/CVE-2024-38579
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38540
- Description:
bnxt_re: avoid shift undefined behavior in
- CVE: https://access.redhat.com/security/cve/CVE-2024-38540
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38540-bnxt-re-avoid-shift-undefined-behavior-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35898
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-35898
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35898-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38608
- Description:
net/mlx5e: Add wrapping for auxiliary_driver ops and remove unused args
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38608-net-mlx5e-Add-wrapping-for-auxiliary_driver-ops-and-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38608
- Description:
net/mlx5e: Fix netif state handling
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38608-net-mlx5e-Fix-netif-state-handling-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27415
- Description:
netfilter: bridge: confirm multicast packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-27415
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27415-netfilter-bridge-confirm-multicast-packets-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27415
- Description:
netfilter: bridge: confirm multicast packets kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-27415
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27415-netfilter-bridge-confirm-multicast-packets-kpatch-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41096
- Description:
PCI/MSI: Fix UAF in msi_capability_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-41096
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41096-PCI-MSI-Fix-UAF-in-msi_capability_init-70.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41073
- Description:
nvme: avoid double free special payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-41073
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41073-vme-avoid-double-free-special-payload.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41040
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://access.redhat.com/security/cve/CVE-2024-41040
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41040-net-sched-Fix-UAF-when-resolving-a-clash.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36000
- Description:
mm/hugetlb: fix missing hugetlb_lock for resv
- CVE: https://access.redhat.com/security/cve/CVE-2024-36000
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36000-mm-hugetlb-fix-missing-hugetlb_lock-for-resv-unchar-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26720
- Description:
This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata
- CVE:
- Patch: skipped/CVE-2024-26720.patch
- From:
- CVE-2023-52463
- Description:
efivarfs: force RO when remounting if SetVariable
- CVE: https://access.redhat.com/security/cve/CVE-2023-52463
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52463-efivarfs-force-RO-when-remounting-if-SetVariable-is-not-supported.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52463
- Description:
efivarfs: force RO when remounting if SetVariable
- CVE: https://access.redhat.com/security/cve/CVE-2023-52463
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52463-efivarfs-force-RO-when-remounting-if-SetVariable-is-not-supported-kpatch.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35791
- Description:
KVM: SVM: Flush pages under kvm->lock to fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2024-35791
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35791-kvm-svm-flush-pages-under-kvm-lock-to-fix-uaf.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36883
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36883
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38559
- Description:
scsi: qedf: Ensure the copied buf is NUL
- CVE: https://access.redhat.com/security/cve/CVE-2024-38559
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-40927
- Description:
xhci: Fix failure to give back some cached cancelled URBs.
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-40927-xhci-Fix-failure-to-give-back-some-cached-cancelled-.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-40927
- Description:
xhci: Add additional dynamic debug to follow URBs in cancel and error cases.
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-40927-xhci-Add-additional-dynamic-debug-to-follow-URBs-in-.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-40927
- Description:
xhci: Handle TD clearing for multiple streams
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-40927-xhci-handle-td-clearing-for-multiple-streams.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41044
- Description:
ppp: reject claimed-as-LCP but actually malformed
- CVE: https://access.redhat.com/security/cve/CVE-2024-41044
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41055
- Description:
The patch affects too much kernel code. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-42096
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42096
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-42102
- Description:
Reverts CVE-2024-26720, which we don't use.
- CVE:
- Patch: skipped/CVE-2024-42102.patch
- From:
- CVE-2024-42131
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://access.redhat.com/security/cve/CVE-2024-42131
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619
- Description:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-Fix-uninit-value-in-alauda_check_media.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26886
- Description:
Bluetooth: af_bluetooth: Fix deadlock
- CVE: https://access.redhat.com/security/cve/CVE-2024-26886
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-26886-bluetooth-af-bluetooth-fix-deadlock-284.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-284.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch-284.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26929
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://access.redhat.com/security/cve/CVE-2024-26929
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26929-scsi-qla2xxx-fix-double-free-of-fcport-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38562
- Description:
wifi: nl80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-38562
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38562-wifi-nl80211-avoid-address-calculations-via-out-of-bounds-array-indexing-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36016
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38573
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-38573
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-42225
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-42225
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38615
- Description:
cpufreq: exit() callback is optional
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38615-cpufreq-exit-callback-is-optional-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://access.redhat.com/security/cve/CVE-2024-36899
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-35895
- Description:
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
- CVE: https://access.redhat.com/security/cve/CVE-2024-35895
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-35895-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26931
- Description:
scsi: qla2xxx: Fix command flush on cable pull
- CVE: https://access.redhat.com/security/cve/CVE-2024-26931
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26931-scsi-qla2xxx-fix-command-flush-on-cable-pull.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38601
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://access.redhat.com/security/cve/CVE-2024-38601
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2023-52884
- Description:
Input: cyapa - add missing input core locking to suspend/resume functions
- CVE: https://access.redhat.com/security/cve/CVE-2023-52884
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2023-52884-input-cyapa-add-missing-input-core-locking-to-suspend-resume-functions.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26947
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2024-26947.patch
- From:
- CVE-2024-40984
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
- CVE: https://access.redhat.com/security/cve/CVE-2024-40984
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-40984-acpica-revert-acpica-avoid-info-mapping-multiple-bars-your-kernel-is-fine.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-42246
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://access.redhat.com/security/cve/CVE-2024-42246
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26739
- Description:
net/sched: act_mirred: Create function tcf_mirred_to_dev and improve readability
- CVE: https://access.redhat.com/security/cve/CVE-2024-26739
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26739-net-sched-act_mirred-Create-function-tcf_mirred_to_-162.18.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://access.redhat.com/security/cve/CVE-2024-26739
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb-284.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36978
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in-multiq-tune.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-42284
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2021-47385
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2021-47385-hwmon-w83792d-fix-null-pointer-dereference-by-removing-unnecessary-structure-field-362.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2021-47385
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2021-47385-hwmon-w83792d-fix-null-pointer-dereference-by-removing-unnecessary-structure-field-kpatch-362.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-35989
- Description:
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
- CVE: https://access.redhat.com/security/cve/CVE-2024-35989
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-35989-dmaengine-idxd-fix-oops-during-rmmod-on-single-cpu-platforms.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-40959
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40959
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-42079
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://access.redhat.com/security/cve/CVE-2024-42079
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2023-28746
- Description:
RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.
- CVE:
- Patch: skipped/CVE-2023-28746.patch
- From:
- CVE-2024-27403
- Description:
netfilter: nft_flow_offload: reset dst in route object after setting up flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-27403
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-27403-netfilter-nft-flow-offload-reset-dst-in-route-object-after-setting-up-flow.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-36889
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-36889
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on-connect-284.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-39502
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-39502.patch
- From:
- CVE-2024-42272
- Description:
el9 kernels are not vulnerable: no versions with commit 88c67aeb1407 only.
- CVE:
- Patch: skipped/CVE-2024-42272.patch
- From:
- CVE-2024-45018
- Description:
netfilter: flowtable: initialise extack before use
- CVE: https://access.redhat.com/security/cve/CVE-2024-45018
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-45018-netfilter-flowtable-initialise-extack-before-use.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41005
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://access.redhat.com/security/cve/CVE-2024-41005
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26923
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26923-af_unix-Fix-garbage-collector-racing-against-connec.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41013
- Description:
xfs: don't walk off the end of a directory data block
- CVE: https://access.redhat.com/security/cve/CVE-2024-41013
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41013-xfs-don-t-walk-off-the-end-of-a-directory-data-block.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41014
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40995
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40995
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in-tcf-idr-check-alloc.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40960
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40960
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40972
- Description:
ext4: fold quota accounting into ext4_xattr_inode_lookup_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40972
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40972-ext4-fold-quota-accounting-into-ext4-xattr-inode-lookup-create-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40972
- Description:
ext4: do not create EA inode under buffer lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-40972
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40972-ext4-do-not-create-ea-inode-under-buffer-lock-162.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40998
- Description:
ext4: turn quotas off if mount failed after enabling quotas
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40998-ext4-turn-quotas-off-if-mount-failed-after-enabling-quotas-70.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40998
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super-70.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40977
- Description:
wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-40977
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40977-wifi-mt76-mt7921s-fix-potential-hung-tasks-during-chip-recovery-70.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2021-47383
- Description:
tty: Fix out-of-bound vmalloc access in imageblit
- CVE: https://access.redhat.com/security/cve/CVE-2021-47383
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2021-47383-tty-fix-out-of-bound-vmalloc-access-in-imageblit.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26640
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://www.cve.org/CVERecord?id=CVE-CVE-2024-26640
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26826
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26826
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935
- Description:
scsi: core: Remove the /proc/scsi/${proc_name} directory earlier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-Remove-the-proc-scsi-proc_name-directory-e-284.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935
- Description:
scsi: core: Fix a procfs host directory removal regression
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-Fix-a-procfs-host-directory-removal-regres.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935
- Description:
scsi: core: Fix unremoved procfs host directory regression
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-fix-unremoved-procfs-host-directory-regression.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26961
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26961
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new-kpatch.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-36244
- Description:
net/sched: taprio: extend minimum interval restriction to entire cycle too
- CVE: https://access.redhat.com/security/cve/CVE-2024-36244
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-36244-net-sched-taprio-extend-minimum-interval-restriction-to-entire-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39472
- Description:
xfs: fix log recovery buffer allocation for the
- CVE: https://access.redhat.com/security/cve/CVE-2024-39472
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-lega.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39504
- Description:
netfilter: nft_inner: validate mandatory meta and payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-39504
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39504-netfilter-nft_inner-validate-mandatory-meta.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40904
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://access.redhat.com/security/cve/CVE-2024-40904
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-36889 CVE-2024-40931
- Description:
mptcp: ensure snd_una is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-40931
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40931-mptcp-ensure-snd_una-is-properly-initialized-on-con-284.patch
- From: 5.14.0-427.42.1.el9_4
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: rhel9/5.14.0-427.42.1.el9_4/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file-70.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-2201
- Description:
x86/bugs: x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-70.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26631
- Description:
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
- CVE: https://access.redhat.com/security/cve/CVE-2024-26631
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26631-ipv6-mcast-fix-data-race-in-ipv6_mc_down-mld_ifc_work.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52758
- Description:
string.h: add array-wrappers for (v)memdup_user()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52758
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52758-string.h-add-array-wrappers-for-v-memdup_user-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52758
- Description:
i2c: dev: copy userspace array safely
- CVE: https://access.redhat.com/security/cve/CVE-2023-52758
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52758-i2c-dev-copy-userspace-array-safely.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35923
- Description:
io_uring: clear opcode specific data for an early failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-35923
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35923-io-uring-clear-opcode-specific-data-for-an-early-failure-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36930
- Description:
function can sleep with no time out
- CVE:
- Patch: skipped/CVE-2024-36930.patch
- From:
- CVE-2024-36901
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36901
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36917
- Description:
block: fix overflow in blk_ioctl_discard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36917
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36917-block-fix-overflow-in-blk_ioctl_discard-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36933
- Description:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- CVE: https://access.redhat.com/security/cve/CVE-2024-36933
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36933-nsh-restore-skb-protocol-data-mac-header-for-outer-header-in-nsh-gso-segment.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36902
- Description:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36902
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36902-ipv6-fib6_rules-avoid-possible-NULL-dereference-in-fib6_rule_action.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26601
- Description:
ext4: regenerate buddy after block freeing failed if under fc replay
- CVE: https://access.redhat.com/security/cve/CVE-2024-26601
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26601-ext4-regenerate-buddy-after-block-freeing-failed-if-under-fc-replay-070.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47384
- Description:
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47384
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47384-hwmon-w83793-Fix-NULL-pointer-dereference-by-removing-unnecessary-structure-field-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47384
- Description:
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47384
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47384-hwmon-w83793-Fix-NULL-pointer-dereference-by-removing-unnecessary-structure-field-kpatch-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-0340
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0340
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-memset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-1151
- Description:
net: openvswitch: limit the number of recursions from action sets
- CVE: https://access.redhat.com/security/cve/CVE-2024-1151
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-1151-net-openvswitch-limit-the-number-of-recursions-from-action-sets.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-25739
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://access.redhat.com/security/cve/CVE-2024-25739
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-25739-ubi-Check-for-too-small-LEB-size-in-VTBL-code.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26591
- Description:
bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- CVE: https://access.redhat.com/security/cve/CVE-2024-26591
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26591-bpf-fix-re-attachment-branch-in-bpf-tracing-prog-attach.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26603
- Description:
x86/fpu: Stop relying on userspace for info to fault in xsave buffer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26603
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26603-x86-fpu-stop-relying-on-userspace-for-info-to-fault-in-xsave-buffer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26614
- Description:
tcp: make sure init the accept_queue's spinlocks once
- CVE: https://access.redhat.com/security/cve/CVE-2024-26614
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26614-tcp-make-sure-init-the-accept-queue-s-spinlocks-once.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26614
- Description:
ipv6: init the accept_queue's spinlocks in inet6_create
- CVE: https://access.redhat.com/security/cve/CVE-2024-26614
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26614-ipv6-init-the-accept_queue-spinlocks-in-inet6_create.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-23848
- Description:
media: cec: core: avoid recursive cec_claim_log_addrs kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-23848-media-cec-core-avoid-recursive-cec_claim_log_addrs.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-23848
- Description:
media: cec: core: avoid recursive cec_claim_log_addrs kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-23848-media-cec-core-avoid-recursive-cec_claim_log_addrs-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2019-25162
- Description:
i2c: Fix a potential use after free
- CVE: https://access.redhat.com/security/cve/CVE-2019-25162
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2019-25162-i2c__Fix_a_potential_use_after_free.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48672
- Description:
of: fdt: fix off-by-one error in unflatten_dt_nodes()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48672
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48672-of-fdt-fix-off-by-one-error-in-unflatten-dt-nodes.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52445
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2023-52445
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconnection.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52451
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52451.patch
- From:
- CVE-2024-36932
- Description:
Kernel versions older than 5.14.0-503.11.1.el9_5 are not affected
- CVE:
- Patch: skipped/CVE-2024-36932.patch
- From:
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://access.redhat.com/security/cve/CVE-2023-52464
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52464-edac-thunderx-fix-possible-out-of-bounds-string-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26882
- Description:
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26882
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26882-net-ip-tunnel-make-sure-to-pull-inner-header-in-ip-tunnel-rcv.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-23307
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://access.redhat.com/security/cve/CVE-2024-23307
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5_cache_count.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26589
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://access.redhat.com/security/cve/CVE-2024-26589
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26589-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26907
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://access.redhat.com/security/cve/CVE-2024-26907
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26907-rdma-mlx5-fix-fortify-source-warning-while-accessing-eth-segment-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47386
- Description:
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47386
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47386-hwmon___w83791d__Fix_NULL_pointer_dereference_by_r.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35801
- Description:
x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
- CVE: https://access.redhat.com/security/cve/CVE-2024-35801
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35801-x86-fpu-keep-xfd-state-in-sync-with-msr-ia32-xfd.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35801
- Description:
x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
- CVE: https://access.redhat.com/security/cve/CVE-2024-35801
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35801-x86-fpu-keep-xfd-state-in-sync-with-msr-ia32-xfd-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38627
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38627
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38555
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://access.redhat.com/security/cve/CVE-2024-38555
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26934
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26934
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26934-usb-core-fix-deadlock-in-usb-deauthorize-interface-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39291
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-39291.patch
- From:
- CVE-2024-36477
- Description:
tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- CVE: https://access.redhat.com/security/cve/CVE-2024-36477
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36477-tpm-tis-spi-account-for-spi-header-when-allocating-tpm-spi-xfer-buffer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41039
- Description:
firmware: cs_dsp: Fix overflow checking of wmfw header
- CVE: https://access.redhat.com/security/cve/CVE-2024-41039
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41039-firmware-cs-dsp-fix-overflow-checking-of-wmfw-header.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41039
- Description:
firmware: cs_dsp: Fix overflow checking of wmfw header (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-41039
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41039-firmware-cs-dsp-fix-overflow-checking-of-wmfw-header-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41049
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://access.redhat.com/security/cve/CVE-2024-41049
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode-427.13.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41092
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-41092
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://access.redhat.com/security/cve/CVE-2024-42228
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc-427.13.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42271
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42271
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://access.redhat.com/security/cve/CVE-2024-42301
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43842
- Description:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43842
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43842-wifi-rtw89-fix-array-index-mistake-in-rtw89-sta-info-get-iter-284.30.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52606
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52606.patch
- From:
- CVE-2023-52696
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52696.patch
- From:
- CVE-2024-26672
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-26672.patch
- From:
- CVE-2024-36030
- Description:
octeontx2-af: fix the double free in rvu_npc_freemem()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36030
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36030-octeontx2-af-fix-the-double-free-in-rvu-npc-freemem.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36955
- Description:
ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36955
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36955-alsa-hda-intel-sdw-acpi-fix-usage-of-device-get-named-child-node.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39471
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39471
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39471-drm-amdgpu-fix-signedness-bug-in-sdma_v4_0_process_trap_irq.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43888
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-43888.patch
- From:
- CVE-2021-47428
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2021-47428.patch
- From:
- CVE-2021-47429
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2021-47429.patch
- From:
- CVE-2021-47454
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2021-47454.patch
- From:
- CVE-2022-48669
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2022-48669.patch
- From:
- CVE-2021-47432
- Description:
include/linux/generic-radix-tree.h: replace kernel.h with the necessary inclusions
- CVE: https://access.redhat.com/security/cve/CVE-2021-47432
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47432-include-linux-generic-radix-tree-h-replace-kernel-h-with-the-necessary-inclusions.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47432
- Description:
lib/generic-radix-tree.c: Don't overflow in peek()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47432
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47432-lib-generic-radix-tree-c-don-t-overflow-in-peek.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457
- Description:
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-can-isotp-isotp-sendmsg-add-result-check-for-wait-event-interruptible.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457
- Description:
can: isotp: isotp_sendmsg(): fix TX buffer concurrent access in isotp_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-can-isotp-isotp_sendmsg-fix-TX-buffer-concurrent-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457
- Description:
can: isotp: isotp_sendmsg(): fix TX buffer concurrent access in isotp_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457
- Description:
can: isotp: fix error path in isotp_sendmsg() to unlock wait queue
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-can-isotp-fix-error-path-in-isotp_sendmsg-to-unlock-wait-queue.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47495
- Description:
usbnet: sanity check for maxpacket
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47495-usbnet-sanity-check-for-maxpacket-284.11.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47497
- Description:
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
- CVE: https://access.redhat.com/security/cve/CVE-2021-47497
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47497-nvmem-Fix-shift-out-of-bound-UBSAN-with-byte-size-cells.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47098
- Description:
hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
- CVE: https://access.redhat.com/security/cve/CVE-2021-47098
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47098-hwmon-lm90-prevent-integer-overflow-underflow-in-hysteresis-calculations.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47101
- Description:
asix: fix uninit-value in asix_mdio_read()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47101
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47101-asix-fix-uninit-value-in-asix_mdio_read.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26924
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://access.redhat.com/security/cve/CVE-2024-26924
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element-362-18.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26894
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26894
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in-acpi-processor-power-exit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52834
- Description:
atl1c: Work around the DMA RX overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2023-52834
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52834-atl1c-Work-around-the-DMA-RX-overflow-issue.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52834
- Description:
atl1c: Work around the DMA RX overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2023-52834
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52834-atl1c-Work-around-the-DMA-RX-overflow-issue-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26890
- Description:
Bluetooth: btrtl: fix out of bounds memory access
- CVE: https://access.redhat.com/security/cve/CVE-2024-26890
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26890-bluetooth-btrtl-fix-out-of-bounds-memory-access-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26890
- Description:
Bluetooth: btrtl: fix out of bounds memory access
- CVE: https://access.redhat.com/security/cve/CVE-2024-26890
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26890-bluetooth-btrtl-fix-out-of-bounds-memory-access-kpatch-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52482
- Description:
CVE patch is for AMD Inception vulnerability related to Speculative Return Stack Overflow (SRSO)
- CVE:
- Patch: skipped/CVE-2023-52482.patch
- From:
- CVE-2023-52475
- Description:
Input: powermate - fix use-after-free in powermate_config_complete
- CVE: https://access.redhat.com/security/cve/CVE-2023-52475
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52475-Input-powermate-fix-use-after-free-in-powermate_conf.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-24857 CVE-2024-24858 CVE-2024-24859
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://access.redhat.com/security/cve/CVE-2024-24859
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-24857-bluetooth-fix-toctou-in-hci-debugfs-implementation.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35976
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://access.redhat.com/security/cve/CVE-2024-35976
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35853
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-35853
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during-rehash.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41012
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://access.redhat.com/security/cve/CVE-2024-41012
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-22099 CVE-2024-26903
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://access.redhat.com/security/cve/CVE-2024-22099
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-22099-bluetooth-rfcomm-fix-null-ptr-deref-in-rfcomm-check-security.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-22099 CVE-2024-26903
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://access.redhat.com/security/cve/CVE-2024-22099
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-22099-Bluetooth-rfcomm-Fix-null-ptr-deref-in-rfcomm_check_security-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26759
- Description:
mm/swap: fix race when skipping swapcache
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26759-mm-swap-fix-race-when-skipping-swapcache-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26772
- Description:
ext4: avoid allocating blocks from corrupted group
- CVE: https://access.redhat.com/security/cve/CVE-2024-26772
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26774
- Description:
ext4: avoid dividing by 0 in mb_update_avg_fragment_size()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26774
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26774-ext4-avoid-dividing-by-0-in-mb-update-avg-fragment-size-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26782
- Description:
mptcp: fix double-free on socket dismantle
- CVE: https://access.redhat.com/security/cve/CVE-2024-26782
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26782-mptcp-fix-double-free-on-socket-dismantle-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26803
- Description:
net: veth: clear GRO when clearing XDP even when down MIME-Version: 1.0
- CVE: https://access.redhat.com/security/cve/CVE-2024-26803
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26803-net-veth-clear-GRO-when-clearing-XDP-even-when-down.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52683
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2023-52683.patch
- From:
- CVE-2023-52676
- Description:
bpf: Guard stack limits against 32bit overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-52676
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52676-bpf-guard-stack-limits-against-32bit-overflow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52679
- Description:
of: Fix double free in of_parse_phandle_with_args_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-52679
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52679-of-fix-double-free-in-of_parse_phandle_with_args_map.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52674
- Description:
ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52674
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52674-ALSA-scarlett2-Add-clamp-in-scarlett2_mixer_ctl_put-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52680
- Description:
ALSA: scarlett2: Add missing error checks to *_ctl_get()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52680
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52680-ALSA-scarlett2-Add-missing-error-checks-to-_ctl_get-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52659
- Description:
x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
- CVE: https://access.redhat.com/security/cve/CVE-2023-52659
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52659-x86-mm-ensure-input-to-pfn-to-kaddr-is-treated-as-a-64-bit-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52664
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://access.redhat.com/security/cve/CVE-2023-52664
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26712
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2024-26743
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26743
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26717
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://access.redhat.com/security/cve/CVE-2024-26717
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26717
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://access.redhat.com/security/cve/CVE-2024-26717
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26744
- Description:
RDMA/srpt: Support specifying the srpt_service_guid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26744
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26733
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://access.redhat.com/security/cve/CVE-2024-26733
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26758
- Description:
md: Don't ignore suspended array in md_check_recovery()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26758
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26758-md-don-t-ignore-suspended-array-in-md-check-recovery-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26740
- Description:
net/sched: act_mirred: use the backlog for mirred ingress
- CVE: https://access.redhat.com/security/cve/CVE-2024-26740
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26740-net-sched-act-mirred-use-the-backlog-for-mirred-ingress-162.18.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26757
- Description:
md: Don't ignore read-only array in md_check_recovery()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26757
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26757-md-don-t-ignore-read-only-array-in-md-check-recovery-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48804
- Description:
vt_ioctl: fix array_index_nospec in vt_setactivate
- CVE: https://access.redhat.com/security/cve/CVE-2022-48804
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48804-vt-ioctl-fix-array-index-nospec-in-vt-setactivate.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52501
- Description:
ring-buffer: Do not attempt to read past "commit"
- CVE: https://access.redhat.com/security/cve/CVE-2023-52501
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52501-ring-buffer-do-not-attempt-to-read-past-commit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48703
- Description:
thermal: int340x: Consolidate freeing of acpi_buffer pointer
- CVE: https://access.redhat.com/security/cve/CVE-2022-48703
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48703-thermal-int340x-Check-for-NULL-after-calling-kmemdup.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48703
- Description:
thermal: int340x: Consolidate freeing of acpi_buffer pointer
- CVE: https://access.redhat.com/security/cve/CVE-2022-48703
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48703-thermal-int340x-Consolidate-freeing-of-acpi_buffer-p.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48703
- Description:
thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
- CVE: https://access.redhat.com/security/cve/CVE-2022-48703
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48703-thermal-int340x-thermal-handle-data-vault-when-the-value-is-zero-size-ptr-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52462
- Description:
bpf: Check the other end of slot_type for STACK_SPILL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52462
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52462-bpf-Check-the-other-end-of-slot_type-for-STACK_SPILL.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52462
- Description:
bpf: fix check for attempt to corrupt spilled pointer
- CVE: https://access.redhat.com/security/cve/CVE-2023-52462
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52462-bpf-fix-check-for-attempt-to-corrupt-spilled-pointer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52467
- Description:
mfd: syscon: Fix null pointer dereference in of_syscon_register()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52467
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52467-mfd-syscon-fix-null-pointer-dereference-in-of-syscon-register.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52490
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2023-52490.patch
- From:
- CVE-2023-52520
- Description:
platform/x86: think-lmi: Fix reference leak
- CVE: https://access.redhat.com/security/cve/CVE-2023-52520
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52520-platform-x86-think-lmi-fix-reference-leak.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52585
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52585
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52585-drm-amdgpu-fix-possible-null-dereference-in-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52762
- Description:
virtio-blk: fix implicit overflow on virtio_max_dma_size
- CVE: https://access.redhat.com/security/cve/CVE-2023-52762
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52762-virtio-blk-fix-implicit-overflow-on-virtio-max-dma-size-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52784
- Description:
bonding: stop the device in bond_setup_by_slave()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52784
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52784-bonding-stop-the-device-in-bond-setup-by-slave-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52791
- Description:
i2c: core: Run atomic i2c xfer when !preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2023-52791
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52791-i2c-core-run-atomic-i2c-xfer-when-preemptible.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52791
- Description:
i2c: core: Fix atomic xfer check for non-preempt config
- CVE: https://access.redhat.com/security/cve/CVE-2023-52791
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52791-i2c-core-fix-atomic-xfer-check-for-non-preempt-config.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52756
- Description:
Bug doesn't hit as enum values are just shifted numbers
- CVE:
- Patch: skipped/CVE-2023-52756.patch
- From:
- CVE-2023-52813
- Description:
crypto: pcrypt - Fix hungtask for PADATA_RESET
- CVE: https://access.redhat.com/security/cve/CVE-2023-52813
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52813-crypto-pcrypt-fix-hungtask-for-padata-reset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52811
- Description:
scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool
- CVE: https://access.redhat.com/security/cve/CVE-2023-52811
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52811-scsi-ibmvfc-remove-bug-on-in-the-case-of-an-empty-event-pool.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52775
- Description:
net/smc: avoid data corruption caused by decline
- CVE: https://access.redhat.com/security/cve/CVE-2023-52775
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52775-net-smc-avoid-data-corruption-caused-by-decline.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52831
- Description:
cpu/hotplug: Prevent self deadlock on CPU hot-unplug
- CVE: https://access.redhat.com/security/cve/CVE-2023-52831
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52831-cpu-hotplug-prevent-self-deadlock-on-cpu-hot-unplug-284.11.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52831
- Description:
cpu/hotplug: Don't offline the last non-isolated CPU
- CVE: https://access.redhat.com/security/cve/CVE-2023-52831
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52831-cpu-hotplug-don-t-offline-the-last-non-isolated-cpu-162.6.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52833
- Description:
Bluetooth: btusb: Add date->evt_skb is NULL check
- CVE: https://access.redhat.com/security/cve/CVE-2023-52833
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52833-bluetooth-btusb-add-date-evt-skb-is-null-check.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52840
- Description:
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52840
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52840-input-synaptics-rmi4-fix-use-after-free-in-rmi-unregister-function.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52859
- Description:
perf: hisi: Fix use-after-free when register pmu fails
- CVE: https://access.redhat.com/security/cve/CVE-2023-52859
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52859-perf-hisi-Fix-use-after-free-when-register-pmu-fails.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52867
- Description:
drm/radeon: possible buffer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-52867
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52867-drm-radeon-possible-buffer-overflow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52869
- Description:
pstore/platform: Add check for kstrdup
- CVE: https://access.redhat.com/security/cve/CVE-2023-52869
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52869-pstore-platform-add-check-for-kstrdup.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52878
- Description:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-52878
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52878-can-dev-can_put_echo_skb-don-t-crash-kernel-if-can_priv-echo_skb-is-accessed-out-of-bounds.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52902
- Description:
nommu: kernel is not vulnerable. Commit 8220543("nommu: remove uses of VMA linked list") is absent
- CVE:
- Patch: skipped/CVE-2023-52902.patch
- From:
- CVE-2024-26840
- Description:
cachefiles: fix memory leak in cachefiles_add_cache()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26840
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles_add_cache-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26857
- Description:
geneve: make sure to pull inner header in geneve_rx()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26857
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26857-geneve__make_sure_to_pull_inner_header_in_geneve_r.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26863
- Description:
hsr: Fix uninit-value access in hsr_get_node()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26863
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26863-hsr__Fix_uninit-value_access_in_hsr_get_node__.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26870
- Description:
NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
- CVE: https://access.redhat.com/security/cve/CVE-2024-26870
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26870-NFSv4_2__fix_nfs4_listxattr_kernel_BUG_at_mm_userc-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26878
- Description:
quota: Fix potential NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-26878
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26878-quota__Fix_potential_NULL_pointer_dereference.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26899
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-26899.patch
- From:
- CVE-2024-26901
- Description:
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26901
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26901-do_sys_name_to_handle____use_kzalloc___to_fix_kern.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26906
- Description:
x86/sev-es: Allow copy_from_kernel_nofault() in earlier boot
- CVE: https://access.redhat.com/security/cve/CVE-2024-26906
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26906-x86-sev-es-Allow-copy_from_kernel_nofault-in-earlier-boot-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26906
- Description:
x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26906
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26906-x86_mm__Disallow_vsyscall_page_read_for_copy_from-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26915
- Description:
drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
- CVE: https://access.redhat.com/security/cve/CVE-2024-26915
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26915-drm-amdgpu-Reset-IH-OVERFLOW_CLEAR-bit-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26920
- Description:
tracing/trigger: Fix to return error if failed to alloc snapshot
- CVE: https://access.redhat.com/security/cve/CVE-2024-26920
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26920-tracing_trigger__Fix_to_return_error_if_failed_to_.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26921
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2024-26937
- Description:
drm/i915/gt: Reset queue_priority_hint on parking
- CVE: https://access.redhat.com/security/cve/CVE-2024-26937
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26937-drm-i915-gt-Reset-queue_priority_hint-on-parking-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26950
- Description:
wireguard: netlink: access device through ctx instead of peer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26950
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26950-wireguard__netlink__access_device_through_ctx_inst.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26951
- Description:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
- CVE: https://access.redhat.com/security/cve/CVE-2024-26951
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26951-wireguard__netlink__check_for_dangling_peer_via_is.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26953
- Description:
net: esp: fix bad handling of pages from page_pool
- CVE: https://access.redhat.com/security/cve/CVE-2024-26953
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26953-net__esp__fix_bad_handling_of_pages_from_page_pool-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52837
- Description:
nbd: fix uaf in nbd_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52837
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52837-nbd-fix-uaf-in-nbd-open-284.11.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52837
- Description:
nbd: fix uaf in nbd_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52837
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52837-nbd-fix-uaf-in-nbd-open-kpatch-162.6.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35983
- Description:
Kernel is not vulnerable: commit f2d5dcb4 is absent.
- CVE:
- Patch: skipped/CVE-2024-35983.patch
- From:
- CVE-2024-35947
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://access.redhat.com/security/cve/CVE-2024-35947
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35947-dyndbg-fix-old-BUG_ON-in-control-parser.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35950
- Description:
drm/client: Fully protect modes[] with dev->mode_config.mutex
- CVE: https://access.redhat.com/security/cve/CVE-2024-35950
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35950-drm-client-Fully-protect-modes-with-dev-mode_config-mutex.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35973
- Description:
geneve: fix header validation in geneve[6]_xmit_skb
- CVE: https://access.redhat.com/security/cve/CVE-2024-35973
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-geneve-fix-header-validation-in-geneve-6-xmit-skb.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35954
- Description:
geneve: Fix incorrect inner network header offset when innerprotoinherit is set
- CVE: https://access.redhat.com/security/cve/CVE-2024-35954
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-geneve-Fix-incorrect-inner-network-header-offset-when-innerprotoinherit-is-set.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35954
- Description:
bareudp: Pull inner IP header on xmit
- CVE: https://access.redhat.com/security/cve/CVE-2024-35954
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-bareudp-Pull-inner-IP-header-on-xmit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35954
- Description:
vxlan: Pull inner IP header in vxlan_xmit_one()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35954
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-vxlan-Pull-inner-IP-header-in-vxlan_xmit_one-284.11.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-52814
- Description:
drm/amdgpu: Fix potential null pointer derefernce
- CVE: https://access.redhat.com/security/cve/CVE-2024-52814
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52814-drm-amdgpu-Fix-potential-null-pointer-derefernce.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35854
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-35854
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35854-mlxsw-spectrum_acl_tcam-Fix-possible-use-after-free.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38605
- Description:
Not a bug for a real-life RHEL9 setup
- CVE:
- Patch: skipped/CVE-2024-38605.patch
- From:
- CVE-2024-26843
- Description:
EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
- CVE:
- Patch: skipped/CVE-2024-26843.patch
- From:
- CVE-2024-35957
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-35957.patch
- From:
- CVE-2024-26900
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-26900.patch
- From:
- CVE-2024-36926
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-36926.patch
- From:
- CVE-2024-36905
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://access.redhat.com/security/cve/CVE-2024-36905
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv-sockets.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52817
- Description:
drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52817
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52817-0001-drm-amdgpu-fix-a-null-pointer-access-when-the-smc-rreg-pointer-is-null.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52817
- Description:
drm/amdgpu/debugfs: fix error code when smc register accessors are NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52817
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52817-0002-drm-amdgpu-debugfs-fix-error-code-when-smc-register-accessors-are-null.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26927
- Description:
ASoC: SOF: Add some bounds checking to firmware data
- CVE: https://access.redhat.com/security/cve/CVE-2024-26927
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26927-asoc-sof-add-some-bounds-checking-to-firmware-data-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://access.redhat.com/security/cve/CVE-2024-42154
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26707
- Description:
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26707
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26707-net-hsr-remove-warn-once-in-send-hsr-supervision-frame.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26679
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26679
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26678
- Description:
Boot time issue
- CVE:
- Patch: skipped/CVE-2024-26678.patch
- From:
- CVE-2024-26680
- Description:
net: atlantic: Fix DMA mapping for PTP hwts ring
- CVE: https://access.redhat.com/security/cve/CVE-2024-26680
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26680-net-atlantic-fix-dma-mapping-for-ptp-hwts-ring.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26686
- Description:
exit: Use the correct exit_code in /proc/<pid>/stat
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26686-exit-Use-the-correct-exit_code-in-proc-pid-stat.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: move thread_group_cputime_adjusted() outside of lock_task_sighand()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26686-fs-proc-do_task_stat-move-thread_group_cputime_adjus.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to-gather-the-threads-children-stats.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26704
- Description:
ext4: fix double-free of blocks due to wrong
- CVE: https://access.redhat.com/security/cve/CVE-2024-26704
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26700
- Description:
drm/amd/display: Fix MST Null Ptr for RV
- CVE: https://access.redhat.com/security/cve/CVE-2024-26700
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26700-drm-amd-display-Fix-MST-Null-Ptr-for-RV-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26675
- Description:
ppp_async: limit MRU to 64K
- CVE: https://access.redhat.com/security/cve/CVE-2024-26675
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36920
- Description:
Warning fix doesn't worth live-patching
- CVE:
- Patch: skipped/CVE-2024-36920.patch
- From:
- CVE-2024-36936
- Description:
Boot time fix cannot be fixed with live-patching
- CVE:
- Patch: skipped/CVE-2024-36936.patch
- From:
- CVE-2023-52634
- Description:
The patch for this CVE fixing vulnerability which was introduced in kernel v6.7
- CVE:
- Patch: skipped/CVE-2023-52634.patch
- From:
- CVE-2023-52635
- Description:
PM / devfreq: Synchronize devfreq_monitor_[start/stop]
- CVE: https://access.redhat.com/security/cve/CVE-2023-52635
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52635-pm-devfreq-synchronize-devfreq-monitor-start-stop.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52650
- Description:
drm/tegra: dsi: Add missing check for of_find_device_by_node
- CVE: https://access.redhat.com/security/cve/CVE-2023-52650
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52650-drm-tegra-dsi-add-missing-check-for-of-find-device-by-node-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52619
- Description:
Complex adaptation required. x86 and amd64 architectures are not affected. Issues triggers while dumping after another crash.
- CVE:
- Patch: skipped/CVE-2023-52619.patch
- From:
- CVE-2023-52731
- Description:
fbdev: Fix invalid page access after closing deferred I/O devices
- CVE: https://access.redhat.com/security/cve/CVE-2023-52731
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52731-fbdev-fix-invalid-page-access-after-closing-deferred-i-o-devices-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52686
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52686.patch
- From:
- CVE-2023-52740
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52740.patch
- From:
- CVE-2023-52690
- Description:
Out of scope as the patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52690.patch
- From:
- CVE-2023-52730
- Description:
mmc: sdio: fix possible resource leaks in some error paths
- CVE: https://access.redhat.com/security/cve/CVE-2023-52730
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52730-mmc-sdio-fix-possible-resource-leaks-in-some-error-paths.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52703
- Description:
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
- CVE: https://access.redhat.com/security/cve/CVE-2023-52703
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52703-net-usb-kalmia-don-t-pass-act-len-in-usb-bulk-msg-error-path.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52697
- Description:
ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52697
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52697-ASoC-Intel-sof_sdw_rt_sdca_jack_common-ctx-headset_codec_dev-NULL-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52698
- Description:
calipso: fix memory leak in netlbl_calipso_add_pass()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52698
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52698-calipso-fix-memory-leak-in-netlbl_calipso_add_pass.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26958
- Description:
nfs: fix UAF in direct writes
- CVE: https://access.redhat.com/security/cve/CVE-2024-26958
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26958-nfs-fix-UAF-in-direct-writes-162.23.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26958
- Description:
nfs: fix UAF in direct writes
- CVE: https://access.redhat.com/security/cve/CVE-2024-26958
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26958-nfs-fix-UAF-in-direct-writes-kpatch-162.23.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26960
- Description:
mm: swap: fix race between free_swap_and_cache() and swapoff()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26960
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26960-mm-swap-fix-race-between-free_swap_and_cache-and-swa.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26964
- Description:
usb: xhci: Add error handling in xhci_map_urb_for_dma
- CVE: https://access.redhat.com/security/cve/CVE-2024-26964
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26964-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26973
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://access.redhat.com/security/cve/CVE-2024-26973
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26984
- Description:
nouveau: fix instmem race condition around ptr stores
- CVE: https://access.redhat.com/security/cve/CVE-2024-26984
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26984-nouveau-fix-instmem-race-condition-around-ptr-stores.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26987
- Description:
mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2024-26987
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26987-mm-memory-failure-fix-deadlock-when-hugetlb_optimize_vmemmap-is-enabled-284.30.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26988
- Description:
Out of scope as the patch is for vmlinux init sections which are discarded after the boot
- CVE:
- Patch: skipped/CVE-2024-26988.patch
- From:
- CVE-2024-26989
- Description:
arm64: hibernate: Fix level3 translation fault in swsusp_save()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26989
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26989-arm64-hibernate-Fix-level3-translation-fault-in-swsusp_save.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27025
- Description:
nbd: null check for nla_nest_start
- CVE: https://access.redhat.com/security/cve/CVE-2024-27025
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27025-nbd-null-check-for-nla-nest-start.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27023
- Description:
Fix commit isn't present
- CVE:
- Patch: skipped/CVE-2024-27023.patch
- From:
- CVE-2024-27389
- Description:
pstore: inode: Only d_invalidate() is needed
- CVE: https://access.redhat.com/security/cve/CVE-2024-27389
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27389-pstore-inode-only-d-invalidate-is-needed.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27038
- Description:
clk: Fix clk_core_get NULL dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-27038
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27038-clk-Fix-clk_core_get-NULL-dereference.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27395
- Description:
net: openvswitch: Fix Use-After-Free in ovs_ct_exit
- CVE: https://access.redhat.com/security/cve/CVE-2024-27395
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27395-net-openvswitch-fix-use-after-free-in-ovs-ct-exit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27404
- Description:
Complex adaptation required. Network services prevents update because they can sleep in subflow_finish_connect() function.
- CVE:
- Patch: skipped/CVE-2024-27404.patch
- From:
- CVE-2024-27410
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://access.redhat.com/security/cve/CVE-2024-27410
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-chang.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27431
- Description:
cpumap: Zero-initialise xdp_rxq_info struct before running
- CVE: https://access.redhat.com/security/cve/CVE-2024-27431
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27431-cpumap-Zero-initialise-xdp_rxq_info-struct-before-running-xdp-program.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27436
- Description:
ALSA: usb-audio: Stop parsing channels bits when all channels
- CVE: https://access.redhat.com/security/cve/CVE-2024-27436
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27436-ALSA-usb-audio-Stop-parsing-channels-bits-when-all-channels.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-31076
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
- CVE: https://access.redhat.com/security/cve/CVE-2024-31076
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-31076-genirq-cpuhotplug-x86-vector-Prevent-vector-leak-during-CPU-offline.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26976
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://access.redhat.com/security/cve/CVE-2024-26976
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed-70.patch
- From: kernel-5.14.0-503.11.1.el9_5
- CVE-2024-26976
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://access.redhat.com/security/cve/CVE-2024-26976
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed-kpatch.patch
- From: kernel-5.14.0-503.11.1.el9_5
- CVE-2024-35794
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-35794.patch
- From:
- CVE-2024-27079
- Description:
Bug triggers in kdump kernel which we don't patch
- CVE:
- Patch: skipped/CVE-2024-27079.patch
- From:
- CVE-2024-26660
- Description:
drm/amd/display: Implement bounds check for stream encoder creation in DCN301
- CVE: https://access.redhat.com/security/cve/CVE-2024-26660
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream-encoder-creation-in-DCN301-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26663
- Description:
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26663
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26663-tipc-check-the-bearer-type-before-calling-tipc_udp_nl_bearer_add.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-26669
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26669-net-sched-flower-fix-chain-template-offload-kpatch-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26674
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-26674.patch
- From:
- CVE-2024-27013
- Description:
tun: limit printing rate when illegal packet received by tun dev
- CVE: https://access.redhat.com/security/cve/CVE-2024-27013
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27013-tun-limit-printing-rate-when-illegal-packet-received-by-tun-dev.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27015
- Description:
netfilter: flowtable: incorrect pppoe tuple
- CVE: https://access.redhat.com/security/cve/CVE-2024-27015
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27015-netfilter-flowtable-incorrect-pppoe-tuple.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35877
- Description:
x86/mm/pat: fix VM_PAT handling in COW mappings
- CVE: https://access.redhat.com/security/cve/CVE-2024-35877
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35877-x86-mm-pat-fix-vm-pat-handling-in-cow-mappings-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35864
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35864
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35864-smb__client__fix_potential_UAF_in_smb2_is_valid_le-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35866
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35865
- Description:
smb: client: fix potential UAF in smb2_is_valid_oplock_break()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35865
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35865-smb-client-fix-potential-uaf-in-smb2-is-valid-oplock-break-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35867
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35867-smb__client__fix_potential_UAF_in_cifs_stats_proc_-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35878
- Description:
of: module: prevent NULL pointer dereference in vsnprintf()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35878
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35878-of-module-prevent-null-pointer-dereference-in-vsnprintf-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35872
- Description:
mm/secretmem: fix GUP-fast succeeding on secretmem folios
- CVE: https://access.redhat.com/security/cve/CVE-2024-35872
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35872-mm-secretmem-fix-gup-fast-succeeding-on-secretmem-folios.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35876
- Description:
x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35876
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35876-x86-mce-make-sure-to-grab-mce-sysfs-mutex-in-set-bank.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35886
- Description:
ipv6: Fix infinite recursion in fib6_dump_done().
- CVE: https://access.redhat.com/security/cve/CVE-2024-35886
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35886-ipv6-fix-infinite-recursion-in-fib6-dump-done.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35888
- Description:
erspan: make sure erspan_base_hdr is present in skb->head
- CVE: https://access.redhat.com/security/cve/CVE-2024-35888
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35888-erspan-make-sure-erspan_base_hdr-is-present-in-skb-h.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35892
- Description:
net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35892-net-sched-fix-lockdep-splat-in-qdisc-tree-reduce-backlog.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35900
- Description:
netfilter: nf_tables: reject new basechain after table flag update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35900
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35900-netfilter-nf-tables-reject-new-basechain-after-table-flag-update-162.23.1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35905
- Description:
bpf: Fix verification of indirect var-off stack access
- CVE: https://access.redhat.com/security/cve/CVE-2024-35905
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35905-bpf-Fix-verification-of-indirect-var-off-stack-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35905
- Description:
bpf: Protect against int overflow for stack access size
- CVE: https://access.redhat.com/security/cve/CVE-2024-35905
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35905-bpf-protect-against-int-overflow-for-stack-access-size.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35912
- Description:
iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy
- CVE: https://access.redhat.com/security/cve/CVE-2024-35912
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35912-iwlwifi-mvm-rfi-use-kmemdup-to-replace-kzalloc-memcp.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35912
- Description:
wifi: iwlwifi: mvm: rfi: fix potential response leaks
- CVE: https://access.redhat.com/security/cve/CVE-2024-35912
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35912-wifi-iwlwifi-mvm-rfi-fix-potential-response-leaks-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35918
- Description:
It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.
- CVE:
- Patch: skipped/CVE-2024-35918.patch
- From:
- CVE-2024-38604
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-38604.patch
- From:
- CVE-2024-38632
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-38632.patch
- From:
- CVE-2024-38635
- Description:
soundwire: cadence: fix invalid PDI offset
- CVE: https://access.redhat.com/security/cve/CVE-2024-38635
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38635-soundwire-cadence-fix-invalid-PDI-offset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38618
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://access.redhat.com/security/cve/CVE-2024-38618
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38596
- Description:
af_unix: Fix data races around sk->sk_shutdown.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38596-01-af_unix-Fix-data-races-around-sk-sk_shutdown.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38596
- Description:
af_unix: Fix data races around sk->sk_shutdown.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38596-02-af_unix-Fix-data-races-around-sk-sk_shutdown.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38596
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38596-03-af_unix-Fix-data-races-in-unix_stream_sendmsg.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39276
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39276
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in-ext4-xattr-block-cache-find.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38600
- Description:
ALSA: Fix deadlocks with kctl removals at disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2024-38600
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38600-alsa-fix-deadlocks-with-kctl-removals-at-disconnection-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42124
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2024-42124
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42101
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42101.html
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in-nouveau-connector-get-modes.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42084
- Description:
ftruncate: pass a signed offset
- CVE: https://access.redhat.com/security/cve/CVE-2024-42084
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://access.redhat.com/security/cve/CVE-2024-42090
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42114
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42114
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42125
- Description:
kernel version 5.14 not affected
- CVE:
- Patch: skipped/CVE-2024-42125.patch
- From:
- CVE-2024-42123
- Description:
kernel version 5.14 not affected
- CVE:
- Patch: skipped/CVE-2024-42123.patch
- From:
- CVE-2024-42078
- Description:
kernel version 5.14 not affected
- CVE:
- Patch: skipped/CVE-2024-42078.patch
- From:
- CVE-2024-42070
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-42070
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42070-netfilter-nf-tables-fully-validate-nft-data-value-on-store-to-data-registers-5.14.0-362.18.1.el9_3.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27004
- Description:
clk: Get runtime PM before walking tree during disable_unused
- CVE: https://access.redhat.com/security/cve/cve-2024-27004
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27004-clk-Get-runtime-PM-before-walking-tree-during-disable_unused.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27004
- Description:
clk: Get runtime PM before walking tree during disable_unused
- CVE: https://access.redhat.com/security/cve/cve-2024-27004
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27004-clk-Get-runtime-PM-before-walking-tree-during-disable_unused-adapt.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27003
- Description:
Get runtime PM before walking tree for clk_summaryatch-description:
- CVE: https://access.redhat.com/security/cve/cve-2024-27003
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27003-clk-Get-runtime-PM-before-walking-tree-for-clk_summary.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27062
- Description:
nouveau: lock the client object tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-27062
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27062-nouveau-lock-the-client-object-tree-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27062
- Description:
nouveau: lock the client object tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-27062
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27062-nouveau-lock-the-client-object-tree-kpatch-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35904
- Description:
Affects only __init function for a built-in component, so patching will have no effect
- CVE:
- Patch: skipped/CVE-2024-35904.patch
- From:
- CVE-2024-35859
- Description:
None of the kernels is affected
- CVE:
- Patch: skipped/CVE-2024-35859.patch
- From:
- CVE-2024-35835
- Description:
net/mlx5e: fix a double-free in arfs_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2024-35835
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35835-net-mlx5e-fix-a-double-free-in-arfs-create-groups.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35840
- Description:
mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35840
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35840-mptcp-use-option-mptcp-mpj-synack-in-subflow-finish-connect.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35855
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35855
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35855-mlxsw-spectrum-acl-tcam-fix-possible-use-after-free-during-activity-update.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35847
- Description:
irqchip/gic-v3-its: Prevent double free on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-35847
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35847-irqchip-gic-v3-its-prevent-double-free-on-error-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26928
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26928-smb-client-fix-potential-UAF-in-cifs_debug_files_proc_show-70.26.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35862
- Description:
smb: client: fix potential UAF in smb2_is_network_name_deleted()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35862
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35862-smb-client-fix-potential-uaf-in-smb2-is-network-name-deleted-70.26.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35863
- Description:
smb: client: fix potential UAF in is_valid_oplock_break()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35863
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35863-smb-client-fix-potential-uaf-in-is-valid-oplock-break-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26837
- Description:
CVE requires complex backporting due to many missing patches
- CVE:
- Patch: skipped/CVE-2024-26837.patch
- From:
- CVE-2024-35942
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2024-35942.patch
- From:
- CVE-2024-26892
- Description:
wifi: mt76: mt7921e: fix use-after-free in free_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26892-wifi-mt76-mt7921e-fix-use-after-free-in-free-irq-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39488
- Description:
Out of scope: ARM64 architecture issue
- CVE:
- Patch: skipped/CVE-2024-39488.patch
- From:
- CVE-2024-39497
- Description:
drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
- CVE: https://access.redhat.com/security/cve/CVE-2024-39497
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39497-drm-shmem-helper-fix-bug-on-on-mmap-prot-write-map-private-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39498
- Description:
Kernel is not affected.
- CVE:
- Patch: skipped/CVE-2024-39498.patch
- From:
- CVE-2024-39499
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39499
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40930
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-40930.patch
- From:
- CVE-2024-40967
- Description:
serial: imx: Introduce timeout when waiting on transmitter empty
- CVE: https://access.redhat.com/security/cve/CVE-2024-40967
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40967-serial-imx-Introduce-timeout-when-waiting-on-transmitter-empty.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40945
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40945
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40945-iommu-Return-right-value-in-iommu_sva_bind_device-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36939
- Description:
nfs: handle error of rpc_proc_register() in init_nfs_fs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36939
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36939-nfs-handle-error-of-rpc-proc-register-in-init-nfs-fs.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36940
- Description:
[PATCH] pinctrl: core: fix possible memory leak in pinctrl_enable()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36940
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36940-pinctrl-core-fix-possible-memory-leak-in-pinctrl_enable.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36940
- Description:
[PATCH] pinctrl: core: delete incorrect free in pinctrl_enable()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36940
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36940-pinctrl-core-delete-incorrect-free-in-pinctrl_enable.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36944
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-36944.patch
- From:
- CVE-2024-36956
- Description:
Thermal debugfs isn't present on redhat kernels.
- CVE:
- Patch: skipped/CVE-2024-36956.patch
- From:
- CVE-2024-36960
- Description:
[PATCH 1/1] drm/vmwgfx: Fix invalid reads in fence signaled events
- CVE: https://access.redhat.com/security/cve/CVE-2024-36960
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36960-drm-vmwgfx-Fix-invalid-reads-in-fence-signaled-events.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36961
- Description:
Thermal debugfs isn't present on redhat kernels.
- CVE:
- Patch: skipped/CVE-2024-36961.patch
- From:
- CVE-2024-36967
- Description:
[PATCH] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36967
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36967-KEYS-trusted-Fix-memory-leak-in-tpm2_key_encode.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36974
- Description:
[PATCH] net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://access.redhat.com/security/cve/CVE-2024-36974
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36974-net-sched-taprio-always-validate-TCA_TAPRIO_ATTR_PRIOMAP-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36977
- Description:
usb: dwc3: Wait unconditionally after issuing EndXfer command
- CVE: https://access.redhat.com/security/cve/CVE-2024-36977
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36977-usb-dwc3-wait-unconditionally-after-issuing-endxfer-command-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40907
- Description:
Intoduced in the same kernel version with the fix
- CVE:
- Patch: skipped/CVE-2024-40907.patch
- From:
- CVE-2024-40913
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-40913.patch
- From:
- CVE-2024-40925
- Description:
Intoduced in the same kernel version with the fix
- CVE:
- Patch: skipped/CVE-2024-40925.patch
- From:
- CVE-2024-39507
- Description:
net: hns3: fix kernel crash problem in concurrent scenario
- CVE: https://access.redhat.com/security/cve/CVE-2024-39507
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39507-net__hns3__fix_kernel_crash_problem_in_concurrent_.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40901
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://access.redhat.com/security/cve/CVE-2024-40901
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40901-scsi__mpt3sas__Avoid_test_set_bit___operating_in_n.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40923
- Description:
vmxnet3: disable rx data ring on dma allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-40923
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40923-vmxnet3__disable_rx_data_ring_on_dma_allocation_fa.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41008
- Description:
Complex adaptation required, low score patch for non critical subsystem amdgpu
- CVE:
- Patch: skipped/CVE-2024-41008.patch
- From:
- CVE-2024-41020
- Description:
filelock: Fix fcntl/close race recovery compat path
- CVE: https://access.redhat.com/security/cve/CVE-2024-41020
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41020-filelock-fix-fcntl-close-race-recovery-compat-path.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41032
- Description:
Kernel not vulnerable: blamed commit is absent
- CVE:
- Patch: skipped/CVE-2024-41032.patch
- From:
- CVE-2024-41038
- Description:
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
- CVE: https://access.redhat.com/security/cve/CVE-2024-41038
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41038-firmware-cs-dsp-prevent-buffer-overrun-when-processing-v2-alg-headers.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41042
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://access.redhat.com/security/cve/CVE-2024-41042
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41056
- Description:
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
- CVE: https://access.redhat.com/security/cve/CVE-2024-41056
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41056-firmware-cs-dsp-use-strnlen-on-name-fields-in-v1-wmfw-files.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41060
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://access.redhat.com/security/cve/CVE-2024-41060
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41063
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41063
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26838
- Description:
RDMA/irdma: Fix KASAN issue with tasklet
- CVE: https://access.redhat.com/security/cve/CVE-2024-26838
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26838-rdma-irdma-fix-kasan-issue-with-tasklet-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26846
- Description:
nvme-fc: do not wait in vain when unloading module
- CVE: https://access.redhat.com/security/cve/CVE-2024-26846
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26846-nvme-fc-do-not-wait-in-vain-when-unloading-module-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26846
- Description:
nvme-fc: do not wait in vain when unloading module
- CVE: https://access.redhat.com/security/cve/CVE-2024-26846
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26846-nvme-fc-do-not-wait-in-vain-when-unloading-module-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26872
- Description:
RDMA/srpt: Do not register event handler until srpt device is fully setup
- CVE: https://access.redhat.com/security/cve/CVE-2024-26872
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26872-rdma-srpt-do-not-register-event-handler-until-srpt-device-is-fully-setup.patch
- From: kernel-5.14.0-503.11.1.el9_5
- CVE-2024-26922
- Description:
amdgpu: validate offset_in_bo of drm_amdgpu_gem_va
- CVE: https://access.redhat.com/security/cve/CVE-2024-26922
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26922-amdgpu-validate-offset_in_bo-of-drm_amdgpu_gem_va.patch
- From: kernel-5.14.0-503.11.1.el9_5
- CVE-2024-26922
- Description:
drm/amdgpu: validate the parameters of bo mapping operations more clearly
- CVE: https://access.redhat.com/security/cve/CVE-2024-26922
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26922-drm-amdgpu-validate-the-parameters-of-bo-mapping-operations-more-clearly.patch
- From: kernel-5.14.0-503.11.1.el9_5
- CVE-2024-27437
- Description:
vfio/pci: Disable auto-enable of exclusive INTx IRQ
- CVE: https://access.redhat.com/security/cve/CVE-2024-27437
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27437-vfio-pci-disable-auto-enable-of-exclusive-intx-irq-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26861
- Description:
wireguard: receive: annotate data-race around receiving_counter.counter
- CVE: https://access.redhat.com/security/cve/CVE-2024-26861
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26861-wireguard-receive-annotate-data-race-around-receiving-counter-counter.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39501
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39501
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent-70.patch
- From: kernel-5.14.0-503.11.1.el9_5
- CVE-2024-43830
- Description:
[PATCH 1/1] leds: trigger: Unregister sysfs attributes before calling
- CVE: https://access.redhat.com/security/cve/CVE-2024-43830
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43830-leds-trigger-Unregister-sysfs-attributes-before-calling-deactivate-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43856
- Description:
dma: fix call order in dmam_free_coherent
- CVE: https://access.redhat.com/security/cve/CVE-2024-43856
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43856-dma-fix-call-order-in-dmam-free-coherent.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43865
- Description:
Affects only the s390 architecture.
- CVE:
- Patch: skipped/CVE-2024-43865.patch
- From:
- CVE-2024-43866
- Description:
net/mlx5: Always drain health in shutdown callback
- CVE: https://access.redhat.com/security/cve/CVE-2024-43866
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43866-net-mlx5-always-drain-health-in-shutdown-callback-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43879
- Description:
wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43879
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43879-wifi-cfg80211-handle-2x996-ru-allocation-in-cfg80211-calculate-bitrate-he.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43892
- Description:
[PATCH 5063/5129] mm/memcg: minor cleanup for MEM_CGROUP_ID_MAX
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43892-mm-memcg-minor-cleanup-for-MEM_CGROUP_ID_MAX.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43892
- Description:
[PATCH 01288/16137] mm: memcontrol: fix cannot alloc the maximum
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43892-mm-memcontrol-fix-cannot-alloc-the-maximum-memcg-ID.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43892
- Description:
[PATCH 05019/17954] memcontrol: ensure memcg acquired by id is
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43892-memcontrol-ensure-memcg-acquired-by-id-is-properly-s-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43892
- Description:
[PATCH] memcg: protect concurrent access to mem_cgroup_idr
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43892-memcg__protect_concurrent_access_to_mem_cgroup_idr-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43911
- Description:
wifi: mac80211: fix NULL dereference at band check in starting tx ba session
- CVE: https://access.redhat.com/security/cve/CVE-2024-43911
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43911-wifi-mac80211-fix-null-dereference-at-band-check-in-starting-tx-ba-session-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-44947
- Description:
fuse: Initialize beyond-EOF page contents before setting uptodate
- CVE: https://access.redhat.com/security/cve/CVE-2024-44947
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-44947-fuse-initialize-beyond-eof-page-contents-before-setting-uptodate.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40965
- Description:
complex adaptation required for el9-arm64, el9-x86 not affected
- CVE:
- Patch: skipped/CVE-2024-40965.patch
- From:
- CVE-2023-52749
- Description:
spi: Fix null dereference on suspend
- CVE: https://access.redhat.com/security/cve/CVE-2023-52749
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52749-spi-Fix-null-dereference-on-suspend-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52749
- Description:
spi: Fix null dereference on suspend
- CVE: https://access.redhat.com/security/cve/CVE-2023-52749
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52749-spi-Fix-null-dereference-on-suspend-adapt.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40966
- Description:
tty: add the option to have a tty reject a new ldisc
- CVE: https://access.redhat.com/security/cve/CVE-2024-40966
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40966-tty-add-the-option-to-have-a-tty-reject-a-new-ldisc.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40966
- Description:
tty: add the option to have a tty reject a new ldisc
- CVE: https://access.redhat.com/security/cve/CVE-2024-40966
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40966-tty-add-the-option-to-have-a-tty-reject-a-new-ldisc-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26650
- Description:
Affected p2sb driver is not present in kernel v5.14.0
- CVE:
- Patch: skipped/CVE-2024-26650.patch
- From:
- CVE-2024-42238
- Description:
firmware: cs_dsp: Return error if block header overflows file
- CVE: https://access.redhat.com/security/cve/CVE-2024-42238
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42238-firmware-cs-dsp-return-error-if-block-header-overflows-file.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42237
- Description:
firmware: cs_dsp: Validate payload length before processing block
- CVE: https://access.redhat.com/security/cve/CVE-2024-42237
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42237-firmware-cs-dsp-validate-payload-length-before-processing-block-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42258
- Description:
Out of scope: 64-bit systems not affected.
- CVE:
- Patch: skipped/CVE-2024-42258.patch
- From:
- CVE-2024-36006
- Description:
mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
- CVE: https://access.redhat.com/security/cve/CVE-2024-36006
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36006-mlxsw-spectrum-acl-tcam-fix-incorrect-list-api-usage.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36015
- Description:
ppdev: Add an error check in register_device
- CVE: https://ubuntu.com/security/CVE-2024-36015
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36015-ppdev-add-an-error-check-in-register-device.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36884
- Description:
iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36884
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36884-Use-the-correct-type-in-nvidia_smmu_context_fault.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35995
- Description:
ACPI: CPPC: Use access_width over bit_width for system memory accesses
- CVE: https://access.redhat.com/security/cve/CVE-2024-35995
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35995-Use-access_width-over-bit_width-for-system-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35805
- Description:
dm snapshot: fix lockup in dm_exception_table_exit
- CVE: https://access.redhat.com/security/cve/CVE-2024-35805
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35805-dm-snapshot-fix-lockup-in-dm-exception-table-exit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35807
- Description:
ext4: fix corruption during on-line resize
- CVE: https://access.redhat.com/security/cve/CVE-2024-35807
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35807-ext4-fix-corruption-during-on-line-resize-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35808
- Description:
md: refactor action_store() for 'idle' and 'frozen'
- CVE: https://access.redhat.com/security/cve/CVE-2024-35808
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35808-md-refactor-action_store-for-idle-and-frozen.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35808
- Description:
md: export helpers to stop sync_thread
- CVE: https://access.redhat.com/security/cve/CVE-2024-35808
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35808-md-export-helpers-to-stop-sync_thread-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35808
- Description:
md/dm-raid: don't call md_reap_sync_thread() directly
- CVE: https://access.redhat.com/security/cve/CVE-2024-35808
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35808-md-dm-raid-don-t-call-md-reap-sync-thread-directly.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35809
- Description:
PCI/PM: Drain runtime-idle callbacks before driver removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-35809
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35809-pci-pm-drain-runtime-idle-callbacks-before-driver-removal-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35812
- Description:
Patch for this CVE has been reverted. Hence skipped
- CVE:
- Patch: skipped/CVE-2024-35812.patch
- From:
- CVE-2024-35817
- Description:
drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-35817
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35817-drm-amdgpu-amdgpu_ttm_gart_bind-set-gtt-bound-flag-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35822
- Description:
usb: udc: remove warning when queue disabled ep
- CVE: https://access.redhat.com/security/cve/CVE-2024-35822
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35822-usb-udc-remove-warning-when-queue-disabled-ep.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35824
- Description:
misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-35824
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35824-misc-lis3lv02d-i2c-fix-regulators-getting-en-dis-abled-twice-on-suspend-resume.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-45005
- Description:
s390 arch not supported.
- CVE:
- Patch: skipped/CVE-2024-45005.patch
- From:
- CVE-2024-44984
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-44984.patch
- From:
- CVE-2020-10135
- Description:
Already fixed in the existing el9 kernels.
- CVE:
- Patch: skipped/CVE-2020-10135.patch
- From:
- CVE-2024-44960
- Description:
tusb: gadget: core: Check for unset descriptor
- CVE: https://access.redhat.com/security/cve/CVE-2024-44960
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-44960-usb-gadget-core-Check-for-unset-descriptor.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26862
- Description:
packet: annotate data-races around ignore_outgoing
- CVE: https://access.redhat.com/security/cve/CVE-2024-26862
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26862-packet-annotate-data-races-around-ignore_outgoing.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-44965
- Description:
x86/mm: Fix pti_clone_pgtable() alignment assumption
- CVE: https://access.redhat.com/security/cve/CVE-2024-44965
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-44965-x86-mm-Fix-pti_clone_pgtable-alignment-assumption.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26835
- Description:
netfilter: nf_tables: set dormant flag on hook register failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-26835
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26835-netfilter-nf_tables-set-dormant-flag-on-hook-register-failure.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52615
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed-hwrng.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52621
- Description:
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- CVE: https://access.redhat.com/security/cve/CVE-2023-52621
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52621-bpf-check-rcu-read-lock-trace-held-before-calling-bpf-map-helpers-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52643
- Description:
iio: core: fix memleak in iio_device_register_sysfs
- CVE: https://access.redhat.com/security/cve/CVE-2023-52643
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52643-iio-core-fix-memleak-in-iio-device-register-sysfs.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26638
- Description:
nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-26638.patch
- From:
- CVE-2024-26645
- Description:
tracing: Ensure visibility when inserting an element into tracing_map
- CVE: https://access.redhat.com/security/cve/CVE-2024-26645
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26645-tracing-ensure-visibility-when-inserting-an-element-into-tracing-map.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26646
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26646.patch
- From:
- CVE-2024-26746
- Description:
Kernel not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-26746.patch
- From:
- CVE-2024-27011
- Description:
netfilter: nf_tables: fix memleak in map from abort path
- CVE: https://access.redhat.com/security/cve/CVE-2024-27011
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27011-netfilter-nf-tables-fix-memleak-in-map-from-abort-path-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39503
- Description:
commit that introduces CVE is not present
- CVE:
- Patch: skipped/CVE-2024-39503.patch
- From:
- CVE-2023-52624
- Description:
older kernels do not have support for DisplayCoreNext 3.5
- CVE:
- Patch: skipped/CVE-2023-52624.patch
- From:
- CVE-2023-52625
- Description:
older kernels do not have support for DisplayCoreNext 3.5
- CVE:
- Patch: skipped/CVE-2023-52625.patch
- From:
- CVE-2024-35924
- Description:
usb: typec: ucsi: Limit read size on v1.2
- CVE: https://access.redhat.com/security/cve/CVE-2024-35924
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35924-usb-typec-ucsi-limit-read-size-on-v1-2-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35925
- Description:
block: prevent division by zero in blk_rq_stat_sum()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35925
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35925-block-prevent-division-by-zero-in-blk_rq_stat_sum.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35927
- Description:
drm: Check output polling initialized before disabling
- CVE: https://ubuntu.com/security/CVE-2024-35927
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35927-drm-Check-output-polling-initialized-before-disabling-284.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35928
- Description:
The patch was later reverted in eb4f139888f6
- CVE:
- Patch: skipped/CVE-2024-35928.patch
- From:
- CVE-2024-35930
- Description:
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35930
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35930-scsi-lpfc-Fix-possible-memory-leak-in-lpfc_rcv_padis.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35938
- Description:
wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.
- CVE:
- Patch: skipped/CVE-2024-35938.patch
- From:
- CVE-2024-35939
- Description:
dma-direct: Leak pages on dma_set_decrypted() failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-35939
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35939-dma-direct-leak-pages-on-dma-set-decrypted-failure-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35944
- Description:
VMCI: Use struct_size() in kmalloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35944-vmci-use-struct-size-in-kmalloc.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35944
- Description:
VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35944-vmci-fix-memcpy-run-time-warning-in-dg-dispatch-as-host.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35944
- Description:
VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35944-vmci-fix-possible-memcpy-run-time-warning-in-vmci-datagram-invoke-guest-handler.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26962
- Description:
None of the existing kernels is affected
- CVE:
- Patch: skipped/CVE-2024-26962.patch
- From:
- CVE-2024-41007
- Description:
Low-score CVE which might introduce problems in net subsystem
- CVE:
- Patch: skipped/CVE-2024-41007.patch
- From:
- CVE-2024-26812
- Description:
Complex adaptation required, not worth the effort for 4.4 score CVE
- CVE:
- Patch: skipped/CVE-2024-26812.patch
- From:
- CVE-2024-41065
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41084
- Description:
None of our RHEL9 kernels are affected by the bug
- CVE:
- Patch: skipped/CVE-2024-41084.patch
- From:
- CVE-2024-41079
- Description:
nvmet: always initialize cqe.result
- CVE: https://access.redhat.com/security/cve/CVE-2024-41079
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41079-nvmet-always-initialize-cqe-result.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41089
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- CVE: https://access.redhat.com/security/cve/CVE-2024-41089
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41095
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- CVE: https://access.redhat.com/security/cve/CVE-2024-41095
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41095-drm-nouveau-dispnv04-fix-null-pointer-dereference.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41077
- Description:
null_blk: fix validation of block size
- CVE: https://access.redhat.com/security/cve/CVE-2024-41077
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41077-null-blk-fix-validation-of-block-size-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41082
- Description:
nvme-fabrics: use reserved tag for reg read/write command
- CVE: https://access.redhat.com/security/cve/CVE-2024-41082
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41082-nvme-fabrics-use-reserved-tag-for-reg-read-write-command-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42226
- Description:
Patch introduced regression and was reverted later.
- CVE:
- Patch: skipped/CVE-2024-42226.patch
- From:
- CVE-2021-47185
- Description:
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
- CVE: https://access.redhat.com/security/cve/CVE-2021-47185
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47185-tty-tty_buffer-Fix-the-softlockup-issue-in-flush_to_ldisc.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52477
- Description:
usb: hub: Guard against accesses to uninitialized BOS descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2023-52477
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52477-usb-hub-Guard-against-accesses-to-uninitialized-BOS-descriptors-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52492
- Description:
dmaengine: fix NULL pointer in channel unregistration function
- CVE: https://access.redhat.com/security/cve/CVE-2023-52492
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52492-dmaengine-fix-NULL-pointer-in-channel-unregistration-function.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52498
- Description:
PM: sleep: Fix possible deadlocks in core system-wide PM code
- CVE: https://access.redhat.com/security/cve/CVE-2023-52498
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52498-async-Split-async_schedule_node_domain.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52498
- Description:
PM: sleep: Fix possible deadlocks in core system-wide PM code
- CVE: https://access.redhat.com/security/cve/CVE-2023-52498
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52498-async-Introduce-async_schedule_dev_nocall.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52498
- Description:
PM: sleep: Fix possible deadlocks in core system-wide PM code
- CVE: https://access.redhat.com/security/cve/CVE-2023-52498
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52498-PM-sleep-Fix-possible-deadlocks-in-core-system-wide-PM-code-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52513
- Description:
RDMA/siw: Fix connection failure handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52513
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52513-RDMA-siw-Fix-a-condition-race-issue-in-MPA-request-processing.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52513
- Description:
RDMA/siw: Fix connection failure handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52513
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52513-RDMA-siw-Fix-connection-failure-handling.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52528
- Description:
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
- CVE: https://access.redhat.com/security/cve/CVE-2023-52528
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52528-net-usb-smsc75xx-Fix-uninit-value-access-in-__smsc75xx_read_reg.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52594
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-read-in-ath9k_htc_txstatus.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52595
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52614
- Description:
PM / devfreq: Fix buffer overflow in trans_stat_show
- CVE: https://access.redhat.com/security/cve/CVE-2023-52614
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52614-PM-devfreq-Fix-buffer-overflow-in-trans_stat_show-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27010
- Description:
net/sched: Fix mirred deadlock on device recursion
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-27010
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27010-net-sched-Fix-mirred-deadlock-on-device-recursion-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27010
- Description:
net/sched: Fix mirred deadlock on device recursion
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-27010
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27010-net-sched-Fix-mirred-deadlock-on-device-recursion-kpatch-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27014
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27014
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-kpatch-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26605
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-26605.patch
- From:
- CVE-2024-39508
- Description:
io_uring/io-wq: Use set_bit() and test_bit() at worker->flags
- CVE: https://access.redhat.com/security/cve/CVE-2024-39508
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39508-io_uring-io-wq-Use-set_bit-and-test_bit-at-worker-flags-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://access.redhat.com/security/cve/CVE-2023-52622
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://access.redhat.com/security/cve/CVE-2023-52622
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch-70.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52819
- Description:
drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
- CVE: https://access.redhat.com/security/cve/CVE-2023-52819
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52819-drm-amd-fix-ubsan-array-index-out-of-bounds-for-polaris-and-tonga.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47505
- Description:
A complex adaptation is needed which is not possible to implement safely. Only Android OS is affected. Low score CVE.
- CVE:
- Patch: skipped/CVE-2021-47505.patch
- From:
- CVE-2024-35880
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-35880.patch
- From:
- CVE-2024-36028
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-36028.patch
- From:
- CVE-2024-36885
- Description:
This CVE has been rejected upstream
- CVE:
- Patch: skipped/CVE-2024-36885.patch
- From:
- CVE-2023-52637
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)
- CVE: https://access.redhat.com/security/cve/CVE-2023-52637
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during-setsockopt-so-j1939-filter.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52637
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (kpatch)
- CVE: https://access.redhat.com/security/cve/CVE-2023-52637
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during-setsockopt-so-j1939-filter-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43870
- Description:
The patch for CVE-2025-37747 reverts the patch for this CVE.
- CVE:
- Patch: skipped/CVE-2024-43870.patch
- From:
- CVE-2024-43869
- Description:
The patch for CVE-2025-37747 reverts the patch for this CVE.
- CVE:
- Patch: skipped/CVE-2024-43869.patch
- From:
- CVE-2024-26670
- Description:
Out of scope - affects 'smartphones' SoCs based on Cortex-A510 and Cortex-A520
- CVE:
- Patch: skipped/CVE-2024-26670.patch
- From:
- CVE-2024-26734
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26734.patch
- From:
- CVE-2023-52935
- Description:
mm/khugepaged: fix ->anon_vma race
- CVE: https://access.redhat.com/security/cve/CVE-2023-52935
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52935-mm-khugepaged-fix-anon_vma-race-162.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52932
- Description:
mm/swapfile: add cond_resched() in get_swap_pages()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52932
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52932-mm-swapfile-add-cond-resched-in-get-swap-pages.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-49267
- Description:
mmc: core: use sysfs_emit() instead of sprintf()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49267
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-49267-mmc-core-use-sysfs-emit-instead-of-sprintf.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-49329
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-49329.patch
- From:
- CVE-2022-49549
- Description:
x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-49549
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-49549-x86-mce-amd-fix-memory-leak-when-threshold-create-bank-fails-362.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52486
- Description:
drm: Don't unref the same fb many times by mistake due to deadlock handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52486
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to-deadlock-handling.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36928
- Description:
s390: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36928.patch
- From:
- CVE-2022-49078
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-49078.patch
- From:
- CVE-2024-42283
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://access.redhat.com/security/cve/CVE-2024-42283
- Patch: rhel9/5.14.0-503.14.1.el9_5/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.14.0-503.14.1.el9_5
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-46858
- Patch: rhel9/5.14.0-503.14.1.el9_5/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 5.14.0-503.14.1.el9_5
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-41009-bpf-fix-overrunning-reservations-in-ringbuf-284.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-41009-bpf-fix-overrunning-reservations-in-ringbuf-kpatch-284.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-42244
- Description:
USB: serial: mos7840: fix crash on resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-42244-USB-serial-mos7840-fix-crash-on-resume.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-42244
- Description:
USB: serial: mos7840: fix crash on resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-42244-USB-serial-mos7840-fix-crash-on-resume-kpatch.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-50251
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50251
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum-427.13.1.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-26615
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://access.redhat.com/security/cve/CVE-2024-26615
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-43854
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://access.redhat.com/security/cve/CVE-2024-43854
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media-427.42.1.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-46695
- Description:
selinux,smack: don't bypass permissions check in inode_setsecctx hook
- CVE: https://access.redhat.com/security/cve/CVE-2024-46695
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-27399
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://access.redhat.com/security/cve/CVE-2024-27399
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-38564
- Description:
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
- CVE: https://access.redhat.com/security/cve/CVE-2024-38564
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create-427.13.1.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50099
- Description:
arm64: probes: Remove broken LDR (literal) uprobe support
- CVE: https://access.redhat.com/security/cve/CVE-2024-50099
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50262
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50115
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://access.redhat.com/security/cve/CVE-2024-50115
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50115-KVM-nSVM-Ignore-nCR3-4-0-when-loading-PDPTEs-from-memory.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50110
- Description:
xfrm: fix one more kernel-infoleak in algo dumping
- CVE: https://access.redhat.com/security/cve/CVE-2024-50110
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-Zero-padding-when-dumping-algos-and-encap.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50110
- Description:
xfrm: fix one more kernel-infoleak in algo dumping
- CVE: https://access.redhat.com/security/cve/CVE-2024-50110
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50142
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://access.redhat.com/security/cve/CVE-2024-50142
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50148
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister
- CVE: https://access.redhat.com/security/cve/CVE-2024-50148
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-50148-Bluetooth-bnep-fix-wild-memory-access-in-proto_unregister.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50255
- Description:
Bluetooth subsystem. Patched function may wait for a while, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-50255.patch
- From:
- CVE-2024-49888
- Description:
bpf: Fix a sdiv overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2024-49888
- Patch: rhel9/5.14.0-503.19.1.el9_5/CVE-2024-49888-bpf-fix-a-sdiv-overflow-issue-427.patch
- From: 5.14.0-503.19.1.el9_5
- CVE-2024-50192
- Description:
arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware
- CVE:
- Patch: skipped/CVE-2024-50192.patch
- From:
- CVE-2024-50208
- Description:
RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
- CVE: https://access.redhat.com/security/cve/CVE-2024-50208
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://access.redhat.com/security/cve/CVE-2024-53122
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-46713
- Description:
perf/aux: Fix AUX buffer serialization
- CVE: https://access.redhat.com/security/cve/CVE-2024-46713
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-46713
- Description:
perf/aux: Fix AUX buffer serialization (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-46713
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch-70.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50154
- Patch: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unlink.patch
- From: 5.14.0-503.22.1.el9_5
- CVE-2024-50275
- Description:
Discard stale CPU state when handling SVE traps
- CVE: https://access.redhat.com/security/cve/CVE-2024-50275
- Patch: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-50275-arm64-sve-Discard-stale-CPU-state-when-handling-SVE-162.patch
- From: 5.14.0-503.22.1.el9_5
- CVE-2024-53088
- Description:
i40e: fix i40e_count_filters() to count only active/new filters
- CVE: https://access.redhat.com/security/cve/CVE-2024-53088
- Patch: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0001-i40e-fix-i40e_count_filters-to-count-only-active-new-427.patch
- From: 5.14.0-503.22.1.el9_5
- CVE-2024-53088
- Description:
fix race condition by adding filter's intermediate sync state
- CVE: https://access.redhat.com/security/cve/CVE-2024-53088
- Patch: rhel9/5.14.0-503.22.1.el9_5/CVE-2024-53088-0002-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state-284.patch
- From: 5.14.0-503.22.1.el9_5
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://access.redhat.com/security/cve/CVE-2024-53104
- Patch: rhel9/5.14.0-503.23.2.el9_5/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UNDEFINED-162.patch
- From: 5.14.0-503.23.2.el9_5
- CVE-2024-53113
- Description:
mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
- CVE: https://access.redhat.com/security/cve/CVE-2024-53113
- Patch: rhel9/5.14.0-503.31.1.el9_5/CVE-2024-53113-mm-fix-null-pointer-dereference-in-alloc-pages-bulk-noprof.patch
- From: 5.14.0-503.31.1.el9_5
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel9/5.14.0-503.31.1.el9_5/CVE-2024-53197-ALSA-usb-audio-Fix-potential-out-of-bound-accesses-for-Extigy-and-Mbox-devices-162.patch
- From: 5.14.0-503.31.1.el9_5
- CVE-2023-52922
- Description:
can: bcm: Fix UAF in bcm_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52922
- Patch: rhel9/5.14.0-503.31.1.el9_5/CVE-2023-52922-can-bcm-fix-uaf-in-bcm-proc-show.patch
- From: 5.14.0-503.31.1.el9_5
- CVE-2023-52605
- Description:
CVE Rejected
- CVE:
- Patch: skipped/CVE-2023-52605.patch
- From:
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://access.redhat.com/security/cve/CVE-2024-50264
- Patch: rhel9/5.14.0-503.31.1.el9_5/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.14.0-503.31.1.el9_5
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://access.redhat.com/security/cve/CVE-2024-50302
- Patch: rhel9/5.14.0-503.31.1.el9_5/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.14.0-503.31.1.el9_5
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://access.redhat.com/security/cve/CVE-2024-53150
- Patch: rhel9/5.14.0-503.38.1.el9_5/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.14.0-503.38.1.el9_5
- CVE-2024-42292
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42292
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-42322
- Description:
ipvs: properly dereference pe in ip_vs_add_service
- CVE: https://access.redhat.com/security/cve/CVE-2024-42322
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-42322-ipvs-properly-dereference-pe-in-ip-vs-add-service.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-44990
- Description:
bonding: fix null pointer deref in bond_ipsec_offload_ok
- CVE: https://access.redhat.com/security/cve/CVE-2024-44990
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-44990-bonding-fix-null-pointer-deref-in-bond_ipsec_offload.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-46826
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://access.redhat.com/security/cve/CVE-2024-46826
- Patch: rhel9/5.14.0-503.40.1.el9_5/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.14.0-503.40.1.el9_5
- CVE-2024-40956
- Description:
dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list
- CVE: https://access.redhat.com/security/cve/CVE-2024-40956
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-40956-dmaengine-idxd-fix-possible-use-after-free-in-irq-process-work-list-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47685
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-49006
- Description:
tracing: Free buffers when a used dynamic event is removed
- CVE: https://access.redhat.com/security/cve/CVE-2022-49006
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-49006-tracing-free-buffers-when-a-used-dynamic-event-is-removed.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-49029
- Description:
hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-49029
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-49029-hwmon-ibmpex-fix-possible-uaf-when-ibmpex-register-bmc-fails.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2022-49014
- Description:
net: tun: Fix use-after-free in tun_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49014
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-49014-net-tun-fix-use-after-free-in-tun-detach.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://access.redhat.com/security/cve/CVE-2024-43882
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-27008
- Description:
drm: nv04: Fix out of bounds access
- CVE: https://access.redhat.com/security/cve/CVE-2024-27008
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-27008-drm-nv04-Fix-out-of-bounds-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://access.redhat.com/security/cve/CVE-2024-43873
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://www.cve.org/CVERecord?id=CVE-2024-43873
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43873-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44934
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://access.redhat.com/security/cve/CVE-2024-44934
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-46756
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-46758
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-46759
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44987
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-44987
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-46673
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-46725
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44932
- Description:
Blamed commit 90912f9 ("idpf: convert header split mode to libeth + napi_build_skb()") is absent.
- CVE:
- Patch: skipped/CVE-2024-44932.patch
- From:
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://access.redhat.com/security/cve/CVE-2024-49882
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49883
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49884
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49889
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-49930
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49950
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-49950
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49950-bluetooth-l2cap-fix-uaf-in-l2cap-connect.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49950
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://access.redhat.com/security/cve/CVE-2024-49950
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49950-bluetooth-hci-core-fix-calling-mgmt-device-connected.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://access.redhat.com/security/cve/CVE-2024-49960
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://access.redhat.com/security/cve/CVE-2024-49967
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-49983
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49991
- Description:
drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-49991
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49991-drm-amdkfd-amdkfd_free_gtt_mem-clear-the-correct-pointer-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46722
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://access.redhat.com/security/cve/cve-2024-46722
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://access.redhat.com/security/cve/cve-2024-46723
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46724
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://access.redhat.com/security/cve/cve-2024-46724
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://access.redhat.com/security/cve/CVE-2024-46743
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://access.redhat.com/security/cve/CVE-2024-46747
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49860
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://access.redhat.com/security/cve/CVE-2024-49860
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-50033
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://access.redhat.com/security/cve/CVE-2024-50035
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://access.redhat.com/security/cve/CVE-2024-46800
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46853
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-46853
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47748
- Description:
vhost_vdpa: don't setup irq offloading when irq_num < 0
- CVE: https://access.redhat.com/security/cve/CVE-2024-47748
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47748-vhost_vdpa-dont-setup-irq-offloading-when-irq_num-less-0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://access.redhat.com/security/cve/CVE-2024-47748
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly-362.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47745
- Description:
mm: call the security_mmap_file() LSM hook in remap_file_pages()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47745
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47745-mm-call-the-security-mmap-file-lsm-hook-in-remap-file-pages.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47745
- Description:
mm: split critical region in remap_file_pages() and invoke LSMs in between
- CVE: https://access.redhat.com/security/cve/CVE-2024-47745
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47745-mm-split-critical-region-in-remap_file_pages-and-invoke-LSMs-in-between.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46828
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://access.redhat.com/security/cve/CVE-2024-46828
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47718
- Description:
wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://access.redhat.com/security/cve/CVE-2024-47718
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50127
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://access.redhat.com/security/cve/CVE-2024-50143
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50186
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-50186
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://access.redhat.com/security/cve/CVE-2024-50151
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request-362.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53194
- Description:
PCI: Fix use-after-free of slot->bus on hot remove
- CVE: https://access.redhat.com/security/cve/CVE-2024-53194
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53194-pci-fix-use-after-free-of-slot-bus-on-hot-remove.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56558
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://access.redhat.com/security/cve/CVE-2024-56558
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56601
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56600
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://access.redhat.com/security/cve/CVE-2024-56551
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56604
- Description:
Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56604
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56604-bluetooth-rfcomm-avoid-leaving-dangling-sk-pointer-in-rfcomm-sock-alloc-5.14.0-427.42.1.el9_4.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://access.redhat.com/security/cve/CVE-2024-56614
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://access.redhat.com/security/cve/CVE-2024-56642
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56602
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56605
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56631
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57798
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57798
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://access.redhat.com/security/cve/CVE-2024-49995
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://access.redhat.com/security/cve/CVE-2024-50047
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption-70.26.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50055
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://access.redhat.com/security/cve/CVE-2024-50067
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2024-50073
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux-362.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://access.redhat.com/security/cve/CVE-2024-50074
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50126
- Description:
net: sched: use RCU read-side critical section in taprio_dump()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50126
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50126-net-sched-use-rcu-read-side-critical-section-in-taprio-dump-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://access.redhat.com/security/cve/CVE-2024-53057
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53059
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd-5.14.0-427.42.1.el9_4.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53095
- Description:
low-scored CVE which inevitably will cause verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-53095.patch
- From:
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-53103
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53174
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://access.redhat.com/security/cve/CVE-2024-53174
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53173
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53156
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42253
- Description:
gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
- CVE: https://access.redhat.com/security/cve/CVE-2024-42253
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42253-gpio-pca953x-fix-pca953x-irq-bus-sync-unlock-race.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42265
- Description:
fs: prevent out-of-bounds array speculation when closing a file descriptor
- CVE: https://access.redhat.com/security/cve/CVE-2024-42265
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42265-fs-prevent-out-of-bounds-array-speculation-when-closing-a-file-descriptor-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42291
- Description:
ice: Reset FDIR counter in FDIR init stage
- CVE: https://access.redhat.com/security/cve/CVE-2024-42291
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42291-ice-Reset-FDIR-counter-in-FDIR-init-stage.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42291
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://access.redhat.com/security/cve/CVE-2024-42291
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42291
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://access.redhat.com/security/cve/CVE-2024-42291
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42304
- Description:
ext4: make sure the first directory block is not a hole
- CVE: https://access.redhat.com/security/cve/CVE-2024-42304
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42304-ext4-make-sure-the-first-directory-block-is-not-a-hole-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42305
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://access.redhat.com/security/cve/CVE-2024-42305
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42312
- Description:
sysctl: always initialize i_uid/i_gid
- CVE: https://access.redhat.com/security/cve/CVE-2024-42312
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42312-sysctl-always-initialize-i-uid-i-gid.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43871
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43871
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43884
- Description:
Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43884
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43884-bluetooth-mgmt-add-error-handling-to-pair-device.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43898
- Description:
ext4: sanity check for NULL pointer after ext4_force_shutdown
- CVE: https://access.redhat.com/security/cve/CVE-2024-43898
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43898-ext4-sanity-check-for-null-pointer-after-ext4-force-shutdown-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43914
- Description:
md/raid5: avoid BUG_ON() while continue reshape after reassembling
- CVE: https://access.redhat.com/security/cve/CVE-2024-43914
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43914-md-raid5-avoid-bug-on-while-continue-reshape-after-reassembling.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44931
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-44931
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44952
- Description:
driver core: Fix uevent_show() vs driver detach race
- CVE: https://access.redhat.com/security/cve/CVE-2024-44952
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44952-driver-core-fix-uevent-show-vs-driver-detach-race-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46761
- Description:
pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
- CVE: https://access.redhat.com/security/cve/CVE-2024-46761
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46761-pci-hotplug-pnv-php-fix-hotplug-driver-crash-on-powernv.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46822
- Description:
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-46822
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46822-arm64-acpi-harden-get-cpu-for-acpi-id-against-missing-cpu-entry.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46787
- Description:
userfaultfd: fix checks for huge PMDs
- CVE: https://access.redhat.com/security/cve/CVE-2024-46787
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46787-userfaultfd-fix-checks-for-huge-pmds-5.14.0-380.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46783
- Description:
tcp_bpf: fix return value of tcp_bpf_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2024-46783
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46783-tcp-bpf-fix-return-value-of-tcp-bpf-sendmsg.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46807
- Description:
drm/amd/amdgpu: Check tbo resource pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-46807
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46807-drm-amd-amdgpu-Check-tbo-resource-pointer-5.14.0-333.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46819
- Description:
drm/amdgpu: the warning dereferencing obj for nbio_v7_4
- CVE: https://access.redhat.com/security/cve/CVE-2024-46819
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46819-drm-amdgpu-the-warning-dereferencing-obj-for-nbio_v7-5.14.0-126.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49933
- Description:
blk_iocost: fix more out of bound shifts
- CVE: https://access.redhat.com/security/cve/CVE-2024-49933
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49933-blk-iocost-fix-more-out-of-bound-shifts.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49934
- Description:
fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name
- CVE: https://access.redhat.com/security/cve/CVE-2024-49934
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49934-fs-inode-prevent-dump-mapping-accessing-invalid-dentry-d-name-name-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49935
- Description:
ACPI: PAD: fix crash in exit_round_robin()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49935
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49935-acpi-pad-fix-crash-in-exit-round-robin.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49938
- Description:
wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49938
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49938-wifi-ath9k-hif-usb-fix-use-after-free-in-ath9k-hif-usb-reg-in-cb-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49938
- Description:
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
- CVE: https://access.redhat.com/security/cve/CVE-2024-49938
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49938-wifi-ath9k-htc-use-skb-set-length-for-resetting-urb-before-resubmit.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49939
- Description:
wifi: rtw89: avoid to add interface to list twice when SER
- CVE: https://access.redhat.com/security/cve/CVE-2024-49939
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49939-wifi-rtw89-avoid-to-add-interface-to-list-twice-when-ser-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49946
- Description:
ppp: do not assume bh is held in ppp_channel_bridge_input()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49946
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49946-ppp-do-not-assume-bh-is-held-in-ppp-channel-bridge-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49948
- Description:
net: add more sanity checks to qdisc_pkt_len_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49948
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49948-net-add-more-sanity-checks-to-qdisc-pkt-len-init.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44958
- Description:
sched/smt: Introduce sched_smt_present_inc/dec() helper
- CVE: https://access.redhat.com/security/cve/cve-2024-44958
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44958-sched-smt-introduce-sched-smt-present-inc-dec-helper.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-44958
- Description:
sched/smt: Fix unbalance sched_smt_present dec/inc
- CVE: https://access.redhat.com/security/cve/cve-2024-44958
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44958-sched-smt-fix-unbalance-sched-smt-present-dec-inc-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52672
- Description:
pipe: wakeup wr_wait after setting max_usage
- CVE: https://access.redhat.com/security/cve/CVE-2023-52672
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2023-52672-pipe-wakeup-wr-wait-after-setting-max-usage.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52672
- Description:
pipe: wakeup wr_wait after setting max_usage kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2023-52672
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2023-52672-pipe-wakeup-wr-wait-after-setting-max-usage-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-23138
- Description:
watch_queue: fix pipe accounting mismatch
- CVE: https://access.redhat.com/security/cve/CVE-2025-23138
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-23138-watch_queue-fix-pipe-accounting-mismatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50128
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://access.redhat.com/security/cve/CVE-2024-50128
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50128
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://access.redhat.com/security/cve/CVE-2024-50128
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50228
- Description:
Vendor reverted in d1aa0c04294 as it causes deadlocks
- CVE:
- Patch: skipped/CVE-2024-50228.patch
- From:
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-50278
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50058
- Description:
serial: protect uart_port_dtr_rts() in uart_shutdown() too
- CVE: https://access.redhat.com/security/cve/CVE-2024-50058
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50058-serial-protect-uart-port-dtr-rts-in-uart-shutdown-too-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50082
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://access.redhat.com/security/cve/CVE-2024-50082
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50093
- Description:
thermal: intel: int340x: processor: Fix warning during module unload
- CVE: https://access.redhat.com/security/cve/CVE-2024-50093
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50093-thermal-intel-int340x-processor-fix-warning-during-module-unload-5.14.0-427.42.1.el9_4.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53146
- Description:
NFSD: Prevent a potential integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-53146
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53146-nfsd-prevent-a-potential-integer-overflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-53161
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53164
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://access.redhat.com/security/cve/CVE-2024-53164
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53190
- Description:
wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures
- CVE: https://access.redhat.com/security/cve/CVE-2024-53190
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53190-wifi-rtlwifi-drastically-reduce-the-attempts-to-read-efuse-in-case-of-failures.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43823
- Description:
PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43823
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43823-pci-keystone-fix-null-pointer-dereference-in-case-of-dt-error-in-ks-pcie-setup-rc-app-regs-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42321
- Description:
net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE
- CVE: https://access.redhat.com/security/cve/CVE-2024-42321
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42321-net-flow-dissector-use-debug-net-warn-on-once.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-42321
- Description:
net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE
- CVE: https://access.redhat.com/security/cve/CVE-2024-42321
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-42321-net-flow-dissector-use-debug-net-warn-on-once-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43828
- Description:
ext4: fix infinite loop when replaying fast_commit
- CVE: https://access.redhat.com/security/cve/CVE-2024-43828
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43828-ext4-fix-infinite-loop-when-replaying-fast-commit.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43853
- Description:
cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43853
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43853-cgroup-cpuset-prevent-uaf-in-proc-cpuset-show.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43846
- Description:
lib: objagg: Fix general protection fault
- CVE: https://access.redhat.com/security/cve/CVE-2024-43846
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43846-lib-objagg-fix-general-protection-fault.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43834
- Description:
xdp: fix invalid wait context of page_pool_destroy()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43834
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-43834-xdp-fix-invalid-wait-context-of-page-pool-destroy-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46839
- Description:
workqueue: wq_watchdog_touch is always called with valid CPU
- CVE: https://access.redhat.com/security/cve/CVE-2024-46839
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46839-workqueue-wq-watchdog-touch-is-always-called-with-valid-cpu.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47660
- Description:
fsnotify: clear PARENT_WATCHED flags lazily
- CVE: https://access.redhat.com/security/cve/CVE-2024-47660
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47660-fsnotify-clear-parent-watched-flags-lazily.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47668
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47668
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47705
- Description:
block: fix potential invalid pointer dereference in blk_add_partition
- CVE: https://access.redhat.com/security/cve/CVE-2024-47705
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47705-block-fix-potential-invalid-pointer-dereference-in-blk-add-partition.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47678
- Description:
icmp: change the order of rate limits
- CVE: https://access.redhat.com/security/cve/CVE-2024-47678
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47678-icmp-change-the-order-of-rate-limits-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49856
- Description:
x86/sgx: Fix deadlock in SGX NUMA node search
- CVE: https://access.redhat.com/security/cve/CVE-2024-49856
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49856-x86-sgx-fix-deadlock-in-sgx-numa-node-search.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49875
- Description:
nfsd: map the EBADMSG to nfserr_io to avoid warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-49875
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49875-nfsd-map-the-ebadmsg-to-nfserr-io-to-avoid-warning-kpatch-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49878
- Description:
resource: fix region_intersects() vs add_memory_driver_managed()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49878
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49878-resource-fix-region-intersects-vs-add-memory-driver-managed-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49881
- Description:
ext4: update orig_path in ext4_find_extent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49881
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49881-ext4-update-orig-path-in-ext4-find-extent.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49927
- Description:
x86/ioapic: Handle allocation failures gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2024-49927
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49927-x86-ioapic-handle-allocation-failures-gracefully.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49929
- Description:
wifi: iwlwifi: mvm: avoid NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-49929
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49929-wifi-iwlwifi-mvm-avoid-null-pointer-dereference-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36968
- Description:
Complex adaptation required (too many dependency patches)
- CVE:
- Patch: skipped/CVE-2024-36968.patch
- From:
- CVE-2024-35963
- Description:
net: Make copy_safe_from_sockptr() match documentation
- CVE: https://access.redhat.com/security/cve/CVE-2024-35963
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35963-35967-Add-a-helper-header-with-copy_safe_from_sockptr.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35965
- Description:
Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35965
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35965-bluetooth-L2CAP-uninitialized-variables-in-l2cap_sock_setsockopt.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35965
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35965
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input-507.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35966
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35966
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35967
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35967
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input-105.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35978
- Description:
Bluetooth: Fix memory leak in hci_req_sync_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35978
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35978-bluetooth-fix-memory-leak-in-hci-req-sync-complete.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36880
- Description:
Bluetooth: qca: add missing firmware sanity checks
- CVE: https://access.redhat.com/security/cve/CVE-2024-36880
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-36880-bluetooth-qca-add-missing-firmware-sanity-checks.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36880
- Description:
Bluetooth: qca: fix firmware check error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36880
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-36880-bluetooth-qca-fix-firmware-check-error-path.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46754
- Description:
bpf: Remove tst_run from lwt_seg6local_prog_ops.
- CVE: https://access.redhat.com/security/cve/CVE-2024-46754
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46754-bpf-remove-tst-run-from-lwt-seg6local-prog-ops.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46754
- Description:
bpf: Remove tst_run from lwt_seg6local_prog_ops.
- CVE: https://access.redhat.com/security/cve/CVE-2024-46754
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46754-bpf-remove-tst-run-from-lwt-seg6local-prog-ops-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-36013
- Description:
Requires adaptation (missing commit e7b02296)
- CVE:
- Patch: skipped/CVE-2024-36013.patch
- From:
- CVE-2024-47692
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://access.redhat.com/security/cve/CVE-2024-47692
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47692-nfsd-return-EINVAL-when-namelen-is-0-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-48969
- Description:
xen/netfront: stop tx queues during live migration
- CVE: https://access.redhat.com/security/cve/CVE-2024-48969
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-48969-xen-netfront-stop-tx-queues-during-live-migration.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-48969
- Description:
xen-netfront: Fix NULL sring after live migration
- CVE: https://access.redhat.com/security/cve/CVE-2024-48969
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2022-48969-xen-netfront-fix-NULL-sring-after-live-migration.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52917
- Description:
ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52917
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2023-52917-ntb-intel-fix-the-NULL-vs-IS_ERR-bug-for-debugfs_create_dir.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35933
- Description:
Bluetooth: btintel: Fix null ptr deref in btintel_read_version
- CVE: https://access.redhat.com/security/cve/CVE-2024-35933
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35933-bluetooth-btintel-fix-null-ptr-deref-in-btintel-read-version.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-35934
- Description:
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35934
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-35934-net-smc-reduce-rtnl-pressure-in-smc-pnet-create-pnetids-list.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56688
- Description:
sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
- CVE: https://access.redhat.com/security/cve/CVE-2024-56688
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56688-sunrpc-clear-xprt-sock-upd-timeout-when-reset-transport-5.14.0-178.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56779
- Description:
nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur
- CVE: https://access.redhat.com/security/cve/CVE-2024-56779
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56779-nfsd-fix-nfs4-openowner-leak-when-concurrent-nfsd4-open-occur.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57809
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57809.patch
- From:
- CVE-2024-49959
- Description:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
- CVE: https://access.redhat.com/security/cve/CVE-2024-49959
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49959-jbd2-stop-waiting-for-space-when-jbd2-cleanup-journal-tail-returns-error.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49962
- Description:
ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
- CVE: https://access.redhat.com/security/cve/CVE-2024-49962
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49962-acpica-check-null-return-of-acpi-allocate-zeroed-in-acpi-db-convert-to-package.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49968
- Description:
ext4: filesystems without casefold feature cannot be mounted with siphash
- CVE: https://access.redhat.com/security/cve/CVE-2024-49968
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49968-ext4-filesystems-without-casefold-feature-cannot-be-mounted-with-siphash.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49971
- Description:
Older kernels don't have the affected src code
- CVE:
- Patch: skipped/CVE-2024-49971.patch
- From:
- CVE-2024-49973
- Description:
r8169: Fix spelling mistake: "tx_underun" -> "tx_underrun"
- CVE: https://access.redhat.com/security/cve/CVE-2024-49973
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49973-r8169-fix-spelling-mistake-tx-underun-tx-underrun.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49973
- Description:
r8169: add tally counter fields added with RTL8125
- CVE: https://access.redhat.com/security/cve/CVE-2024-49973
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49973-r8169-add-tally-counter-fields-added-with-rtl8125.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49973
- Description:
r8169: add tally counter fields added with RTL8125
- CVE: https://access.redhat.com/security/cve/CVE-2024-49973
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49973-r8169-add-tally-counter-fields-added-with-rtl8125-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49974
- Description:
NFSD: Force all NFSv4.2 COPY requests to be synchronous
- CVE: https://access.redhat.com/security/cve/CVE-2024-49974
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49974-nfsd-force-all-nfsv4-2-copy-requests-to-be-synchronous-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49975
- Description:
uprobes: fix kernel info leak via "[uprobes]" vma
- CVE: https://access.redhat.com/security/cve/CVE-2024-49975
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49975-uprobes-fix-kernel-info-leak-via-uprobes-vma.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49977
- Description:
net: stmmac: Fix zero-division error when disabling tc cbs
- CVE: https://access.redhat.com/security/cve/CVE-2024-49977
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49977-net-stmmac-fix-zero-division-error-when-disabling-tc-cbs.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49993
- Description:
iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count
- CVE: https://access.redhat.com/security/cve/CVE-2024-49993
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49993-iommu-vt-d-fix-potential-lockup-if-qi-submit-sync-called-with-0-count.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49994
- Description:
block: fix integer overflow in BLKSECDISCARD
- CVE: https://access.redhat.com/security/cve/CVE-2024-49994
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49994-block-fix-integer-overflow-in-blksecdiscard-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50182
- Description:
secretmem: disable memfd_secret() if arch cannot set direct map
- CVE: https://access.redhat.com/security/cve/CVE-2024-50182
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50182-secretmem-disable-memfd-secret-if-arch-cannot-set-direct-map-362.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50191
- Description:
ext4: don't set SB_RDONLY after filesystem errors
- CVE: https://access.redhat.com/security/cve/CVE-2024-50191
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50191-ext4-don-t-set-sb-rdonly-after-filesystem-errors-427.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50199
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://access.redhat.com/security/cve/CVE-2024-50199
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50201
- Description:
drm/radeon: Fix encoder->possible_clones
- CVE: https://access.redhat.com/security/cve/CVE-2024-50201
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50201-drm-radeon-Fix-encoder-possible_clones.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50236
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://access.redhat.com/security/cve/CVE-2024-50236
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49999
- Description:
bugfix for module from non-standard kernel-modules-partner package
- CVE:
- Patch: skipped/CVE-2024-49999.patch
- From:
- CVE-2024-50002
- Description:
static_call: Handle module init failure correctly in static_call_del_module()
- CVE: https://access.redhat.com/security/cve/cve-2024-50002
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50002-static-call-handle-module-init-failure-correctly-in-static-call-del-module-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50006
- Description:
ext4: fix i_data_sem unlock order in ext4_ind_migrate()
- CVE: https://access.redhat.com/security/cve/cve-2024-50006
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50006-ext4-fix-i-data-sem-unlock-order-in-ext4-ind-migrate-362.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50008
- Description:
Patch not necessary, the size of the struct remains the same.
- CVE:
- Patch: skipped/CVE-2024-50008.patch
- From:
- CVE-2024-50009
- Description:
Kernels not vulnerable
- CVE:
- Patch: skipped/CVE-2024-50009.patch
- From:
- CVE-2024-50013
- Description:
exfat: fix memory leak in exfat_load_bitmap()
- CVE: https://access.redhat.com/security/cve/cve-2024-50013
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50013-exfat-fix-memory-leak-in-exfat-load-bitmap.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50014
- Description:
ext4: fix access to uninitialised lock in fc replay path
- CVE: https://access.redhat.com/security/cve/cve-2024-50014
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50014-ext4-fix-access-to-uninitialised-lock-in-fc-replay-path-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50019
- Description:
kthread: unpark only parked kthread
- CVE: https://access.redhat.com/security/cve/cve-2024-50019
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50019-kthread-unpark-only-parked-kthread.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2023-52735
- Description:
bpf, sock_map: Move cancel_work_sync() out of sock lock
- CVE: https://access.redhat.com/security/cve/CVE-2023-52735
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-52735-bpf-sock_map-Move-cancel_work_sync-out-of-sock-lock-105.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2023-52735
- Description:
bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
- CVE: https://access.redhat.com/security/cve/CVE-2023-52735
- Patch: rhel9/5.14.0-362.8.1.el9_3/CVE-2023-52735-bpf-sockmap-Dont-let-sock_map_close-destroy-unhash-call-itself-105.patch
- From: 5.14.0-362.8.1.el9_3
- CVE-2024-56664
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56664
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56664-bpf-sockmap-Fix-race-between-element-replace-and-close-408.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-39500
- Description:
sock_map: avoid race between sock_map_close and sk_psock_put
- CVE: https://access.redhat.com/security/cve/CVE-2024-39500
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-39500-sock_map-avoid-race-between-sock_map_close-and-sk_psock_put.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-39500
- Description:
bpf, sockmap: Avoid using sk_socket after free when sending
- CVE: https://access.redhat.com/security/cve/CVE-2024-39500
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-39500-bpf-sockmap-Avoid-using-sk_socket-after-free-when-sending.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50163
- Description:
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://access.redhat.com/security/cve/CVE-2024-50163
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50163-bpf-make-sure-internal-and-uapi-bpf-redirect-flags-don-t-overlap.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50163
- Description:
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://access.redhat.com/security/cve/CVE-2024-50163
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50163-bpf-make-sure-internal-and-uapi-bpf_redirect-flags-don-t-overlap-kpatch-362.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-43889
- Description:
Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.
- CVE:
- Patch: skipped/CVE-2024-43889.patch
- From:
- CVE-2024-56562
- Description:
i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56562
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56562-i3c-master-fix-miss-free-init-dyn-addr-at-i3c-master-put-i3c-addrs.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56590
- Description:
Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet
- CVE: https://access.redhat.com/security/cve/CVE-2024-56590
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56590-bluetooth-hci-core-fix-not-checking-skb-length-on-hci-acldata-packet-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56647
- Description:
net: Fix icmp host relookup triggering ip_rt_bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-56647
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56647-net-fix-icmp-host-relookup-triggering-ip-rt-bug.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56591
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-56591.patch
- From:
- CVE-2024-56570
- Description:
ovl: Filter invalid inodes with missing lookup function
- CVE: https://access.redhat.com/security/cve/CVE-2024-56570
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56570-ovl-filter-invalid-inodes-with-missing-lookup-function.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56616
- Description:
drm/dp_mst: Fix MST sideband message body length check
- CVE: https://access.redhat.com/security/cve/CVE-2024-56616
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-56616-drm-dp-mst-fix-mst-sideband-message-body-length-check-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-56535
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-56535.patch
- From:
- CVE-2024-44989
- Description:
bonding: fix xfrm real_dev null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-44989
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-44989-bonding-fix-xfrm-real-dev-null-pointer-dereference.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45016
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-45016
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46675
- Description:
usb: dwc3: core: Prevent USB core invalid event buffer address access
- CVE: https://access.redhat.com/security/cve/CVE-2024-46675
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46675-usb-dwc3-core-prevent-usb-core-invalid-event-buffer-address-access.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46745
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://access.redhat.com/security/cve/CVE-2024-46745
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-46750
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-46750.patch
- From:
- CVE-2024-47706
- Description:
block, bfq: fix possible UAF for bfqq->bic with merge chain
- CVE: https://access.redhat.com/security/cve/CVE-2024-47706
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47706-block-bfq-fix-possible-uaf-for-bfqq-bic-with-merge-chain.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47737
- Description:
nfsd: call cache_put if xdr_reserve_space returns NULL
- CVE: https://access.redhat.com/security/cve/CVE-2024-47737
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47737-nfsd-call-cache-put-if-xdr-reserve-space-returns-null.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47710
- Description:
sock_map: Add a cond_resched() in sock_hash_free()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47710
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47710-sock-map-add-a-cond-resched-in-sock-hash-free.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49851
- Description:
tpm: Clean up TPM space after command failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-49851
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49851-tpm-clean-up-tpm-space-after-command-failure.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47739
- Description:
padata: use integer wrap around to prevent deadlock on seq_nr overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-47739
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47739-padata-use-integer-wrap-around-to-prevent-deadlock-on-seq-nr-overflow-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47738
- Description:
wifi: mac80211: don't use rate mask for scanning
- CVE: https://access.redhat.com/security/cve/CVE-2024-47738
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47738-wifi-mac80211-don-t-use-rate-mask-for-scanning-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47738
- Description:
wifi: mac80211: don't use rate mask for offchannel TX either
- CVE: https://access.redhat.com/security/cve/CVE-2024-47738
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47738-wifi-mac80211-don-t-use-rate-mask-for-offchannel-tx-either-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-47713
- Description:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47713
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-47713-wifi-mac80211-use-two-phase-skb-reclamation-in-ieee80211-do-stop.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-49569
- Description:
nvme-rdma: unquiesce admin_q before destroy it
- CVE: https://access.redhat.com/security/cve/CVE-2024-49569
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-49569-nvme-rdma-unquiesce-admin-q-before-destroy-it-5.14.0-284.30.1.el9_2.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50109
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-50109.patch
- From:
- CVE-2024-50117
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://access.redhat.com/security/cve/CVE-2024-50117
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53060
- Description:
drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://access.redhat.com/security/cve/CVE-2024-53060
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53060-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50153
- Description:
scsi: target: core: Fix null-ptr-deref in target_alloc_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50153
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50153-scsi-target-core-fix-null-ptr-deref-in-target-alloc-device.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50162
- Description:
bpf: devmap: provide rxq after redirect
- CVE: https://access.redhat.com/security/cve/CVE-2024-50162
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50162-bpf-devmap-provide-rxq-after-redirect-5.14.0-70.30.1.el9_0.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21668
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2025-21668.patch
- From:
- CVE-2025-21669
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://access.redhat.com/security/cve/CVE-2025-21669
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21666
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://access.redhat.com/security/cve/CVE-2025-21666
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21689
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21689
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21663
- Description:
Out of scope as the patch is for NVIDIA Tegra SoCs targeting mobile devices
- CVE:
- Patch: skipped/CVE-2025-21663.patch
- From:
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore
- CVE: https://access.redhat.com/security/cve/CVE-2025-21694
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://access.redhat.com/security/cve/CVE-2025-21694
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45009
- Description:
mptcp: pm: only decrement add_addr_accepted for MPJ req
- CVE: https://access.redhat.com/security/cve/CVE-2024-45009
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45009-mptcp-pm-only-decrement-add-addr-accepted-for-mpj-req-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-45009
- Description:
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-45009
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-45009-mptcp-pm-fix-uaf-read-in-mptcp-pm-nl-rm-addr-or-subflow-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50024
- Description:
net: Fix an unsafe loop on the list
- CVE: https://access.redhat.com/security/cve/CVE-2024-50024
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50024
- Description:
net: Fix an unsafe loop on the list
- CVE: https://access.redhat.com/security/cve/CVE-2024-50024
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50039
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2024-50039
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50039-net-sched-accept-tca-stab-only-for-root-qdisc-5.14.0-162.23.1.el9_1.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50044
- Description:
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
- CVE: https://access.redhat.com/security/cve/CVE-2024-50044
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50044-bluetooth-rfcomm-fix-possible-deadlock-in-rfcomm-sk-state-change.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50150
- Description:
usb: typec: altmode should keep reference to parent
- CVE: https://access.redhat.com/security/cve/CVE-2024-50150
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50150-usb-typec-altmode-should-keep-reference-to-parent.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50150
- Description:
usb: typec: altmode should keep reference to parent
- CVE: https://access.redhat.com/security/cve/CVE-2024-50150
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50150-usb-typec-altmode-should-keep-reference-to-parent-kpatch.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-1272
- Description:
The vulnerable commit isn't present in the kernel
- CVE:
- Patch: skipped/CVE-2025-1272.patch
- From:
- CVE-2024-53152
- Description:
The vulnerable commit isn't present in the kernel
- CVE:
- Patch: skipped/CVE-2024-53152.patch
- From:
- CVE-2024-57884
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57884
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57888
- Description:
workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker
- CVE: https://access.redhat.com/security/cve/CVE-2024-57888
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57888-workqueue-do-not-warn-when-cancelling-wq-mem-reclaim-work-from-wq-mem-reclaim-worker-427.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57890
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2024-57890
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue-284.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57929
- Description:
dm array: fix releasing a faulty array block twice in dm_array_cursor_end
- CVE: https://access.redhat.com/security/cve/CVE-2024-57929
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57929-dm-array-fix-releasing-a-faulty-array-block-twice-in-dm-array-cursor-end.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57931
- Description:
selinux: ignore unknown extended permissions
- CVE: https://access.redhat.com/security/cve/CVE-2024-57931
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57931-selinux-ignore-unknown-extended-permissions.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-57940
- Description:
exfat: fix the infinite loop in exfat_readdir()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57940
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-57940-exfat-fix-the-infinite-loop-in-exfat-readdir.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21646
- Description:
bugfix for module from non-standard kernel-modules-partner package
- CVE:
- Patch: skipped/CVE-2025-21646.patch
- From:
- CVE-2024-50299
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50299
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50304
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50304
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find-427.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50237
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://access.redhat.com/security/cve/CVE-2024-50237
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-get-txpower-427.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50256
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50256
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6-427.31.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50272
- Description:
filemap: Fix bounds checking in filemap_read()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50272
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50272-filemap-fix-bounds-checking-in-filemap-read-70.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-50018
- Description:
net: napi: Prevent overflow of napi_defer_hard_irqs
- CVE: https://access.redhat.com/security/cve/cve-2024-50018
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-50018-net-napi-prevent-overflow-of-napi-defer-hard-irqs-162.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53118
- Description:
vsock: Fix sk_error_queue memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-53118
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53118-vsock-fix-sk-error-queue-memory-leak.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53120
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-53120
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2024-53121
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://access.redhat.com/security/cve/CVE-2024-53121
- Patch: rhel9/5.14.0-570.12.1.el9_6/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21927
- Description:
nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
- CVE: http://access.redhat.com/security/cve/cve-2025-21927
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2025-21927-nvme-tcp-fix-potential-memory-corruption-in-nvme_tcp.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://access.redhat.com/security/cve/CVE-2024-58069
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58005
- Description:
low score CVE with complex adaptation
- CVE:
- Patch: skipped/CVE-2024-58005.patch
- From:
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21993
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58007
- Description:
soc: qcom: Add check devm_kasprintf() returned value
- CVE: https://access.redhat.com/security/cve/CVE-2024-58007
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58007-soc-qcom-add-check-devm-kasprintf-returned-value.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58007
- Description:
soc: qcom: socinfo: fix revision check in qcom_socinfo_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-58007
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58007-soc-qcom-socinfo-fix-revision-check-in-qcom-socinfo-probe.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2024-58007
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://access.redhat.com/security/cve/CVE-2024-58007
- Patch: rhel9/5.14.0-570.16.1.el9_6/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number.patch
- From: 5.14.0-570.16.1.el9_6
- CVE-2025-21756
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-21756
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-21756
- Description:
vsock: Orphan socket after transport release
- CVE: https://access.redhat.com/security/cve/CVE-2025-21756
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://access.redhat.com/security/cve/CVE-2025-37749
- Patch: rhel9/5.14.0-570.17.1.el9_6/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.14.0-570.17.1.el9_6
- CVE-2025-21647
- Description:
sched: sch_cake: add bounds checks to host bulk flow fairness counts
- CVE: https://access.redhat.com/security/cve/CVE-2025-21647
- Patch: rhel9/CVE-2025-21647-sched-sch_cake-add-bounds-checks-to-host-bulk-flow-fairness-counts-427.13.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21964
- Description:
cifs: Fix integer overflow while processing acregmax mount option
- CVE: https://access.redhat.com/security/cve/CVE-2025-21964
- Patch: rhel9/5.14.0-570.18.1.el9_6/CVE-2025-21964-cifs-fix-integer-overflow-while-processing-acregmax-mount-option-362.patch
- From: 5.14.0-570.18.1.el9_6
- CVE-2022-3424
- Description:
misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os
- CVE: https://access.redhat.com/security/cve/CVE-2022-3424
- Patch: rhel9/5.14.0-570.19.1.el9_6/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_con.patch
- From: 5.14.0-570.19.1.el9_6
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://access.redhat.com/security/cve/CVE-2025-21920
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-21926
- Description:
net: gso: fix ownership in __udp_gso_segment
- CVE: https://access.redhat.com/security/cve/CVE-2025-21926
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-21926-net-gso-fix-ownership-in-udp-gso-segment.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2025-22055
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2025-22055
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-37785
- Description:
ext4: fix OOB read when checking dotdot dir
- CVE: https://access.redhat.com/security/cve/CVE-2025-37785
- Patch: rhel9/5.14.0-570.21.1.el9_6/CVE-2025-37785-ext4-fix-OOB-read-when-checking-dotdot-dir.patch
- From: 5.14.0-570.21.1.el9_6
- CVE-2025-21963
- Description:
cifs: Fix integer overflow while processing acdirmax mount option
- CVE: https://access.redhat.com/security/cve/CVE-2025-21963
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21963-cifs-fix-integer-overflow-while-processing-acdirmax-mount-option-362.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21999
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21999
- Patch: rhel9/5.14.0-570.22.1.el9_6/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.14.0-570.22.1.el9_6
- CVE-2024-38663
- Description:
Not vulnerable: buggy commit 3b8cc6298 (blk-cgroup: Optimize blkcg_rstat_flush) was introduced in v6.2 upstream and appeared in RHEL9's 284.11.1
- CVE:
- Patch: skipped/CVE-2024-38663.patch
- From:
- CVE-2024-26858
- Description:
Not vulnerable: mapping mechanism that the bug applies to was introduced in v6.6 upstream (3178308ad4c) and appeared in RHEL9's since -427
- CVE:
- Patch: skipped/CVE-2024-26858.patch
- From:
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for
- CVE: https://access.redhat.com/security/cve/CVE-2024-27397
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-upto-162.23.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for
- CVE: https://access.redhat.com/security/cve/CVE-2024-27397
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-kpatch-upto-162.23.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-27435
- Description:
nvme: fix reconnection fail due to reserved tag
- CVE: https://access.redhat.com/security/cve/CVE-2024-27435
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27435-nvme-fix-reconnection-fail-due-to-reserved-tag-upto-162.23.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38543
- Description:
Not vulnerable: function with the buggy code `dmirror_device_evict_chunk()` exists since 362.8.1
- CVE:
- Patch: skipped/CVE-2024-38543.patch
- From:
- CVE-2024-38593
- Description:
Not vulnerable: buggy function was introduced in v6.5 upsteam (or RHEL9's 427.13.1), and no similar code patterns existed before for this module
- CVE:
- Patch: skipped/CVE-2024-38593.patch
- From:
- CVE-2024-26783
- Description:
Not vulnerable: vulnerable calls to `wakeup_kswapd()` did not exist prior to 284.11.1
- CVE:
- Patch: skipped/CVE-2024-26783.patch
- From:
- CVE-2024-36886
- Description:
tipc: fix UAF in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36886
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2021-47548
- Description:
ethernet: hisilicon: hns: hns_dsaf_misc: fix a
- CVE: https://access.redhat.com/security/cve/CVE-2021-47548
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2021-47548-ethernet-hisilicon-hns-hns-dsaf-misc-fix-a.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36957
- Description:
octeontx2-af: avoid off-by-one read from
- CVE: https://access.redhat.com/security/cve/CVE-2024-36957
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36957-octeontx2-af-avoid-off-by-one-read-from.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-35958
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2022-48627
- Description:
vt: fix memory overlapping when deleting chars in
- CVE: https://access.redhat.com/security/cve/CVE-2022-48627
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36904
- Description:
tcp: Use refcount_inc_not_zero() in
- CVE: https://access.redhat.com/security/cve/CVE-2024-36904
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2023-52638
- Description:
can: j1939: prevent deadlock by changing
- CVE: https://access.redhat.com/security/cve/CVE-2023-52638
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2023-52638
- Description:
can: j1939: prevent deadlock by changing
- CVE: https://access.redhat.com/security/cve/CVE-2023-52638
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-kpatch.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38586
- Description:
r8169: Fix possible ring buffer corruption on
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2021-47596
- Description:
net: hns3: fix use-after-free bug in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47596
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2021-47596-net-hns3-fix-use-after-free-bug-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36270
- Description:
netfilter: tproxy: bail out if IP has been
- CVE: https://access.redhat.com/security/cve/CVE-2024-36270
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been.patch
- From: 5.14.0-427.26.1.el9_4