- kernel-uek-5.15.0-304.171.4.1.el9uek (oel9-uek7)
- 5.15.0-309.180.4.el9uek
- 2025-07-14 21:03:47
- 2025-07-17 09:08:58
- K20250714_99
- CVE-2024-50261, CVSSv2 Score: 7.8
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://linux.oracle.com/cve/CVE-2024-50261.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-50301, CVSSv2 Score: 7.1
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://linux.oracle.com/cve/CVE-2024-50301.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new-kpatch.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations-kpatch.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Initialize struct nfsd4_copy earlier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Initialize-struct-nfsd4_copy-earlier.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974, CVSSv2 Score: 5.5
- Description:
NFSD: Never decrement pending_async_copies on error
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Never-decrement-pending_async_copies-on-error.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-53227, CVSSv2 Score:
- Description:
Patch affects __init
- CVE:
- Patch: skipped/CVE-2024-53227.patch
- From:
- CVE-2024-49950, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-49950.patch
- From:
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://linux.oracle.com/cve/CVE-2024-53104.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53142, CVSSv2 Score:
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53165, CVSSv2 Score:
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56581, CVSSv2 Score: 7.8
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://linux.oracle.com/cve/CVE-2024-56581.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56606, CVSSv2 Score: 7.8
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56606.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56614, CVSSv2 Score: 7.8
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56614.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56615, CVSSv2 Score: 7.8
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56615.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-42138, CVSSv2 Score: 7.8
- Description:
mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
- CVE: https://linux.oracle.com/cve/CVE-2024-42138.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-42138-mlxsw-core-linecards-fix-double-memory-deallocation-in-case-of-invalid-ini-file.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50264, CVSSv2 Score: 7.8
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://linux.oracle.com/cve/CVE-2024-50264.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53156, CVSSv2 Score: 7.8
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://linux.oracle.com/cve/CVE-2024-53156.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44949, CVSSv2 Score:
- Description:
Architecture PARISC is not supported
- CVE:
- Patch: skipped/CVE-2024-44949.patch
- From:
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://linux.oracle.com/cve/CVE-2024-56642.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56661, CVSSv2 Score: 5.5
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://linux.oracle.com/cve/CVE-2024-56661.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56661-tipc-fix-null-deref-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://linux.oracle.com/cve/CVE-2024-53061.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50121, CVSSv2 Score: 7.8
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://linux.oracle.com/cve/CVE-2024-50121.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50267, CVSSv2 Score: 7.8
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://linux.oracle.com/cve/CVE-2024-50267.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53150, CVSSv2 Score: 7.1
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://linux.oracle.com/cve/CVE-2024-53150.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50275, CVSSv2 Score:
- Description:
Irrelevant for x64 kernels
- CVE:
- Patch: skipped/CVE-2024-50275.patch
- From:
- CVE-2024-50036, CVSSv2 Score: 7.0
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-50036.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56650, CVSSv2 Score: 7.1
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://linux.oracle.com/cve/CVE-2024-56650.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56627, CVSSv2 Score: 7.1
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://linux.oracle.com/cve/CVE-2024-56627.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56662, CVSSv2 Score: 7.1
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://linux.oracle.com/cve/CVE-2024-56662.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53155, CVSSv2 Score: 7.1
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://linux.oracle.com/cve/CVE-2024-53155.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53099, CVSSv2 Score: 7.1
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://linux.oracle.com/cve/CVE-2024-53099.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50268, CVSSv2 Score: 7.1
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-50268.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50279, CVSSv2 Score: 7.1
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50279.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-38538, CVSSv2 Score: 7.1
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://linux.oracle.com/cve/CVE-2024-38538.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50283, CVSSv2 Score: 7.8
- Description:
ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp
- CVE: https://linux.oracle.com/cve/CVE-2024-50283.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50283-ksmbd-fix-slab-use-after-free-in-smb3-preauth-hash-rsp.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53141, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://linux.oracle.com/cve/CVE-2024-53141.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53171, CVSSv2 Score: 7.8
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://linux.oracle.com/cve/CVE-2024-53171.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56704, CVSSv2 Score: 7.8
- Description:
9p/xen: fix release of IRQ
- CVE: https://linux.oracle.com/cve/CVE-2024-56704.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56602.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://linux.oracle.com/cve/CVE-2024-56596.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-47730, CVSSv2 Score: 7.8
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://linux.oracle.com/cve/CVE-2024-47730.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-39494, CVSSv2 Score: 7.8
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://linux.oracle.com/cve/CVE-2024-39494.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56626, CVSSv2 Score: 7.8
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://linux.oracle.com/cve/CVE-2024-56626.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759, CVSSv2 Score: 7.8
- Description:
btrfs: rename and export __btrfs_cow_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-rename-and-export-__btrfs_cow_block.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759, CVSSv2 Score: 7.8
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53240, CVSSv2 Score: 6.8
- Description:
xen/netfront: fix crash when removing device
- CVE: https://linux.oracle.com/cve/CVE-2024-53240.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53240-xen-netfront-fix-crash-when-removing-device.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50302, CVSSv2 Score: 6.1
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-50302.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-40939, CVSSv2 Score: 5.5
- Description:
net: wwan: iosm: Fix tainted pointer delete is case of region creation fail
- CVE: https://linux.oracle.com/cve/CVE-2024-40939.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-40939-net-wwan-iosm-fix-tainted-pointer-delete-is-case-of-region-creation-fail.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-46841, CVSSv2 Score: 5.5
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://linux.oracle.com/cve/CVE-2024-46841.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56597, CVSSv2 Score: 5.5
- Description:
jfs: fix shift-out-of-bounds in dbSplit
- CVE: https://linux.oracle.com/cve/CVE-2024-56597.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56597-jfs-fix-shift-out-of-bounds-in-dbsplit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53181, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-56532, CVSSv2 Score: 5.5
- Description:
ALSA: us122l: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56532.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56532-alsa-us122l-use-snd-card-free-when-closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53112, CVSSv2 Score: 5.5
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://linux.oracle.com/cve/CVE-2024-53112.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://linux.oracle.com/cve/CVE-2024-53173.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56640, CVSSv2 Score: 7.8
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://linux.oracle.com/cve/CVE-2024-56640.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue-304.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create-continuation.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56601.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56600.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56595, CVSSv2 Score: 7.8
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://linux.oracle.com/cve/CVE-2024-56595.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44940, CVSSv2 Score: 7.8
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://linux.oracle.com/cve/CVE-2024-44940.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-40906, CVSSv2 Score: 7.8
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://linux.oracle.com/cve/CVE-2024-40906.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://linux.oracle.com/cve/CVE-2024-49996.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50055, CVSSv2 Score: 7.8
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://linux.oracle.com/cve/CVE-2024-50055.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50269, CVSSv2 Score: 7.8
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://linux.oracle.com/cve/CVE-2024-50269.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50282, CVSSv2 Score:
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://linux.oracle.com/cve/CVE-2024-53096.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53096-mm-resolve-faulty-mmap-region-error-path-behaviour.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53103, CVSSv2 Score: 7.8
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-53103.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
driver core: Introduce device_find_any_child() helper
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-driver-core-introduce-device_find_any_child-helper.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56598, CVSSv2 Score: 7.8
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://linux.oracle.com/cve/CVE-2024-56598.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56603, CVSSv2 Score: 7.8
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56603.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56708, CVSSv2 Score: 7.8
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-56708.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-41080, CVSSv2 Score: 5.5
- Description:
io_uring: fix possible deadlock in io_register_iowq_max_workers()
- CVE: https://linux.oracle.com/cve/CVE-2024-41080.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-41080-io-uring-fix-possible-deadlock-in-io-register-iowq-max-workers.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50299, CVSSv2 Score: 5.5
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://linux.oracle.com/cve/CVE-2024-50299.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53172, CVSSv2 Score: 5.5
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://linux.oracle.com/cve/CVE-2024-53172.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50292, CVSSv2 Score: 5.5
- Description:
ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
- CVE: https://linux.oracle.com/cve/CVE-2024-50292.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50292-asoc-stm32-spdifrx-fix-dma-channel-release-in-stm32-spdifrx-remove.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56616, CVSSv2 Score: 5.5
- Description:
drm/dp_mst: Fix MST sideband message body length check
- CVE: https://linux.oracle.com/cve/CVE-2024-56616.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56616-drm-dp-mst-fix-mst-sideband-message-body-length-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56623, CVSSv2 Score:
- Description:
low-scored CVE which causes verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-56623.patch
- From:
- CVE-2024-56637, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Hold module reference while requesting a module
- CVE: https://linux.oracle.com/cve/CVE-2024-56637.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56637-netfilter-ipset-hold-module-reference-while-requesting-a-module.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53161, CVSSv2 Score: 5.5
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-53161.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56531, CVSSv2 Score: 5.5
- Description:
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56531.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56531-ALSA-caiaq-Use-snd_card_free_when_closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56531, CVSSv2 Score: 5.5
- Description:
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56531.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56531-ALSA-caiaq-Use-snd_card_free_when_closed-at-disconnection-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56548, CVSSv2 Score:
- Description:
oel9-uek7 kernels are compiled without CONFIG_HFSPLUS_FS
- CVE:
- Patch: skipped/CVE-2024-56548.patch
- From:
- CVE-2024-56633, CVSSv2 Score: 5.5
- Description:
tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56633-tcp-bpf-fix-the-sk-mem-uncharge-logic-in-tcp-bpf-sendmsg.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56619, CVSSv2 Score: 7.8
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-56619.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56747, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56747.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56747-scsi-qedi-fix-a-possible-memory-leak-in-qedi-alloc-and-init-sb.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-43864, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Fix CT entry update leaks of modify header context
- CVE: https://linux.oracle.com/cve/CVE-2024-43864.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-43864-net-mlx5e-fix-ct-entry-update-leaks-of-modify-header-context.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56622, CVSSv2 Score: 5.5
- Description:
scsi: ufs: core: sysfs: Prevent div by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-56622.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56622-scsi-ufs-core-sysfs-prevent-div-by-zero.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53145, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53217, CVSSv2 Score: 5.5
- Description:
NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53217-nfsd-prevent-null-dereference-in-nfsd4-process-cb-update.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50287, CVSSv2 Score: 5.5
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-50287.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53131, CVSSv2 Score: 5.5
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53131.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56672, CVSSv2 Score: 7.8
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://linux.oracle.com/cve/CVE-2024-56672.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56631, CVSSv2 Score: 7.8
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-56631.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53162, CVSSv2 Score: 7.1
- Description:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
- CVE: https://linux.oracle.com/cve/CVE-2024-53162.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53162-crypto-qat-qat-4xxx-fix-off-by-one-in-uof-get-name.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-36899, CVSSv2 Score: 7.0
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://linux.oracle.com/cve/CVE-2024-36899.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47687, CVSSv2 Score: 5.5
- Description:
vdpa/mlx5: Fix invalid mr resource destroy
- CVE: https://linux.oracle.com/cve/CVE-2024-47687.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47687-vdpa-mlx5-fix-invalid-mr-resource-destroy-5.15.0-304.171.4.3.el9uek.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47707, CVSSv2 Score: 5.5
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-47707.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53124, CVSSv2 Score: 5.5
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://linux.oracle.com/cve/CVE-2024-53124.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-57804, CVSSv2 Score: 5.5
- Description:
scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs
- CVE: https://linux.oracle.com/cve/CVE-2024-57804.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-57804-scsi-mpi3mr-fix-corrupt-config-pages-phy-state-is-switched-in-sysfs.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53110, CVSSv2 Score: 5.5
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53110, CVSSv2 Score: 5.5
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error-kpatch.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56760, CVSSv2 Score: 5.5
- Description:
PCI/MSI: Handle lack of irqdomain gracefully
- CVE: https://linux.oracle.com/cve/CVE-2024-56760.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56760-pci-msi-handle-lack-of-irqdomain-gracefully.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-53213, CVSSv2 Score: 7.8
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://linux.oracle.com/cve/CVE-2024-53213.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-50155, CVSSv2 Score: 7.8
- Description:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-50155.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-50155-netdevsim-use-cond-resched-in-nsim-dev-trap-report-work.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-41079, CVSSv2 Score: 5.5
- Description:
nvmet-auth: complete a request only after freeing the dhchap pointers
- CVE: https://linux.oracle.com/cve/CVE-2024-41079.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-41079-nvmet-auth-complete-a-request-only-after-freeing-the-dhchap-pointers.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-41079, CVSSv2 Score: 5.5
- Description:
nvmet: always initialize cqe.result
- CVE: https://linux.oracle.com/cve/CVE-2024-41079.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-41079-nvmet-always-initialize-cqe-result.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-35972, CVSSv2 Score: 5.5
- Description:
bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-35972.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-35972-bnxt-en-fix-possible-memory-leak-in-bnxt-rdma-aux-device-init.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-40919, CVSSv2 Score: 5.5
- Description:
bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
- CVE: https://linux.oracle.com/cve/CVE-2024-40919.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-40919-bnxt-en-adjust-logging-of-firmware-messages-in-case-of-released-token-in-hwrm-send.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-53209, CVSSv2 Score: 5.5
- Description:
bnxt_en: Fix receive ring space parameters when XDP is active
- CVE: https://linux.oracle.com/cve/CVE-2024-53209.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-53209-bnxt-en-fix-receive-ring-space-parameters-when-xdp-is-active.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56656, CVSSv2 Score: 5.5
- Description:
bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips
- CVE: https://linux.oracle.com/cve/CVE-2024-56656.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56656-bnxt-en-fix-aggregation-id-mask-to-prevent-oops-on-5760x-chips.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56660, CVSSv2 Score: 5.5
- Description:
net/mlx5: DR, prevent potential error pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-56660.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56660-net-mlx5-dr-prevent-potential-error-pointer-dereference.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-50215, CVSSv2 Score: 7.8
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://linux.oracle.com/cve/CVE-2024-50215.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-46842, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
- CVE: https://linux.oracle.com/cve/CVE-2024-46842.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-46842-scsi-lpfc-Handle-mailbox-timeouts-in-lpfc_get_sfp_info.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-44984, CVSSv2 Score: 5.5
- Description:
bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
- CVE: https://linux.oracle.com/cve/CVE-2024-44984.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-44984-bnxt_en-Fix-double-DMA-unmapping-for-XDP_REDIRECT.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56583, CVSSv2 Score: 5.5
- Description:
sched/deadline: Fix warning in migrate_enable for boosted tasks
- CVE: https://linux.oracle.com/cve/CVE-2024-56583.html
- Patch: oel9-uek7/5.15.0-308.179.6.el9uek/CVE-2024-56583-sched-deadline-fix-warning-in-migrate-enable-for-boosted-tasks.patch
- From: 5.15.0-308.179.6.el9uek
- CVE-2024-28956, CVSSv2 Score:
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-28956.patch
- From:
- CVE-2024-8805, CVSSv2 Score: nan
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://linux.oracle.com/cve/CVE-2024-8805.html
- Patch: oel9-uek7/5.15.0-309.180.4.el9uek/CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-309.180.4.el9uek
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A