- kernel-5.14.0-570.26.1.el9_6 (rockylinux9)
- 5.14.0-611.41.1.el9_7
- 2026-03-31 22:34:05
- 2026-04-01 16:30:14
- K20260331_30
- CVE-2025-38089
- Description:
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error
- CVE: https://access.redhat.com/security/cve/CVE-2025-38089
- Patch: rhel9/5.14.0-570.28.1.el9_6/CVE-2025-38089-sunrpc-handle-svc-garbage-during-svc-auth-processing-as-auth-error.patch
- From: 5.14.0-570.28.1.el9_6
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel9/5.14.0-570.28.1.el9_6/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 5.14.0-570.28.1.el9_6
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel9/5.14.0-570.28.1.el9_6/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 5.14.0-570.28.1.0.1.el9_6
- CVE-2025-37958
- Description:
mm/huge_memory: fix dereferencing invalid pmd migration entry
- CVE: https://access.redhat.com/security/cve/CVE-2025-37958
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-37958-mm-huge-memory-fix-dereferencing-invalid-pmd-migration-entry.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-22085
- Description:
RDMA/core: Fix use-after-free when rename device name
- CVE: https://access.redhat.com/security/cve/CVE-2025-22085
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-22085-rdma-core-fix-use-after-free-when-rename-device-name.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://access.redhat.com/security/cve/CVE-2025-21905
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-57980
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-38110
- Description:
net/mdiobus: Fix potential out-of-bounds clause 45 read/write access
- CVE: https://access.redhat.com/security/cve/CVE-2025-38110
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-38110-net-mdiobus-fix-potential-out-of-bounds-clause-45-read-write-access.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-22113
- Description:
ext4: avoid journaling sb update on error if journal is destroying
- CVE: https://access.redhat.com/security/cve/CVE-2025-22113
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-22113-ext4-define-ext4_journal_destroy-wrapper.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-22113
- Description:
ext4: avoid journaling sb update on error if journal is destroying
- CVE: https://access.redhat.com/security/cve/CVE-2025-22113
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-22113-ext4-avoid-journaling-sb-update-on-error-if-journal-is-destroying.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-22091
- Description:
RDMA/mlx5: Fix page_size variable overflow
- CVE: https://access.redhat.com/security/cve/CVE-2025-22091
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-22091-RDMA-mlx5-Fix-page_size-variable-overflow.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-22121
- Description:
ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()
- CVE: https://access.redhat.com/security/cve/CVE-2025-22121
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-22121-ext4-fix-out-of-bound-read-in-ext4_xattr_inode_dec_ref_all.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-22121
- Description:
ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()
- CVE: https://access.redhat.com/security/cve/CVE-2025-22121
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-22121-ext4-fix-out-of-bound-read-in-ext4_xattr_inode_dec_ref_all-kpatch.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-37797
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-37797-net_sched-hfsc-Fix-a-UAF-vulnerability-in-class-handling.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://access.redhat.com/security/cve/CVE-2025-38086
- Patch: rhel9/5.14.0-570.30.1.el9_6/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii_nway_restart.patch
- From: 5.14.0-570.30.1.el9_6
- CVE-2025-21962
- Description:
cifs: Fix integer overflow while processing closetimeo mount option
- CVE: https://access.redhat.com/security/cve/CVE-2025-21962
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-21962-cifs-fix-integer-overflow-while-processing-closetimeo-mount-option.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://access.redhat.com/security/cve/CVE-2025-21727
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-38087
- Description:
net/sched: fix use-after-free in taprio_dev_notifier
- CVE: https://access.redhat.com/security/cve/CVE-2025-38087
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-38087-net-sched-fix-use-after-free-in-taprio-dev-notifier.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2022-49788
- Description:
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49788
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2022-49788-misc-vmw-vmci-fix-an-infoleak-in-vmci-host-do-receive-datagram.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-22020
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://access.redhat.com/security/cve/CVE-2025-22020
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-21929
- Description:
HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21929
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-21929-hid-intel-ish-hid-fix-use-after-free-issue-in-hid-ishtp-cl-remove.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21928
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-37890
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-37890-net-sched-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc_enqueue.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-37890
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel9/5.14.0-570.32.1.el9_6/CVE-2025-37890-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 5.14.0-570.32.1.el9_6
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://access.redhat.com/security/cve/CVE-2025-38079
- Patch: rhel9/5.14.0-570.33.2.el9_6/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept.patch
- From: 5.14.0-570.33.2.el9_6
- CVE-2025-38292
- Description:
wifi: ath12k: fix invalid access to memory
- CVE: https://access.redhat.com/security/cve/CVE-2025-38292
- Patch: rhel9/5.14.0-570.33.2.el9_6/CVE-2025-38292-wifi-ath12k-fix-invalid-access-to-memory.patch
- From: 5.14.0-570.33.2.el9_6
- CVE-2024-28956
- Description:
Patch meant for use with microcode update
- CVE:
- Patch: skipped/CVE-2024-28956.patch
- From:
- CVE-2025-38124
- Description:
net: fix udp gso skb_segment after pull from frag_list
- CVE: https://access.redhat.com/security/cve/CVE-2025-38124
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-38124-net-fix-udp-gso-skb_segment-after-pull-from-frag_list.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-38159
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38250
- Description:
Bluetooth: hci_core: Fix use-after-free in vhci_flush()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38250
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-38250-bluetooth-hci-core-fix-use-after-free-in-vhci-flush.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38084
- Description:
mm/hugetlb: unshare page tables during VMA split, not before
- CVE: https://access.redhat.com/security/cve/CVE-2025-38084
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-38084-mm-hugetlb-unshare-page-tables-during-vma-split-not-before.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-38471
- Description:
tls: always refresh the queue when reading sock
- CVE: https://access.redhat.com/security/cve/CVE-2025-38471
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-38471-tls-always-refresh-the-queue-when-reading-sock.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38380
- Description:
i2c/designware: Fix an initialization issue
- CVE: https://access.redhat.com/security/cve/CVE-2025-38380
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-38380-i2c-designware-fix-an-initialization-issue.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-21867
- Description:
bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21867
- Patch: rhel9/5.14.0-570.35.1.el9_6/CVE-2025-21867-bpf-test-run-fix-use-after-free-issue-in-eth-skb-pkt-type.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://access.redhat.com/security/cve/CVE-2025-22058
- Patch: rhel9/5.14.0-570.37.1.el9_6/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 5.14.0-570.37.1.el9_6
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37914
- Patch: rhel9/5.14.0-570.37.1.el9_6/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.14.0-570.37.1.el9_6
- CVE-2025-38417
- Description:
ice: fix eswitch code memory leak in reset scenario
- CVE: https://access.redhat.com/security/cve/CVE-2025-38417
- Patch: rhel9/5.14.0-570.37.1.el9_6/CVE-2025-38417-ice-fix-eswitch-code-memory-leak-in-reset-scenario.patch
- From: 5.14.0-570.37.1.el9_6
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38461
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38461-vsock-fix-transport-toctou.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://access.redhat.com/security/cve/CVE-2025-38200
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38200-i40e-fix-mmio-write-access-to-an-invalid-page-in-i40e-clear-hw.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-37823
- Description:
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
- CVE: https://access.redhat.com/security/cve/CVE-2025-37823
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-37823-net-sched-hfsc-fix-a-potential-uaf-in-hfsc-dequeue-too.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38464
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-38500
- Description:
xfrm: interface: fix use-after-free after changing collect_md xfrm interface
- CVE: https://access.redhat.com/security/cve/CVE-2025-38500
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38500-xfrm-interface-fix-use-after-free-after-changing-collect-md-xfrm-interface.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-38500
- Description:
xfrm: interface: fix use-after-free after changing collect_md xfrm interface
- CVE: https://access.redhat.com/security/cve/CVE-2025-38500
- Patch: rhel9/5.14.0-570.39.1.el9_6/CVE-2025-38500-xfrm-interface-fix-use-after-free-after-changing-collect-md-xfrm-interface-kpatch.patch
- From: 5.14.0-570.39.1.el9_6
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://access.redhat.com/security/cve/CVE-2025-37803
- Patch: rhel9/5.14.0-570.41.1.el9_6/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.14.0-570.41.1.el9_6
- CVE-2025-38392
- Description:
idpf: convert control queue mutex to a spinlock
- CVE: https://access.redhat.com/security/cve/CVE-2025-38392
- Patch: rhel9/5.14.0-570.41.1.el9_6/CVE-2025-38392-idpf-convert-control-queue-mutex-to-a-spinlock.patch
- From: 5.14.0-570.41.1.el9_6
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://access.redhat.com/security/cve/CVE-2025-38332
- Patch: rhel9/5.14.0-570.42.2.el9_6/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 5.14.0-570.42.2.el9_6
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://access.redhat.com/security/cve/CVE-2025-22097
- Patch: rhel9/5.14.0-570.42.2.el9_6/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 5.14.0-570.42.2.el9_6
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://access.redhat.com/security/cve/CVE-2025-22097
- Patch: rhel9/5.14.0-570.42.2.el9_6/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 5.14.0-570.42.2.el9_6
- CVE-2025-38449
- Description:
requires a very complex adaptation
- CVE:
- Patch: skipped/CVE-2025-38449.patch
- From:
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38352
- Patch: rhel9/5.14.0-570.42.2.el9_6/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.14.0-570.42.2.el9_6
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38550
- Patch: rhel9/5.14.0-570.44.1.el9_6/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 5.14.0-570.44.1.el9_6
- CVE-2025-37810
- Description:
usb: dwc3: gadget: check that event count does not exceed event buffer length
- CVE: https://access.redhat.com/security/cve/CVE-2025-37810
- Patch: rhel9/5.14.0-570.46.1.el9_6/CVE-2025-37810-usb-dwc3-gadget-check-that-event-count-does-not-exceed-event-buffer-length.patch
- From: 5.14.0-570.46.1.el9_6
- CVE-2025-38498
- Description:
do_change_type(): refuse to operate on unmounted/not ours mounts
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel9/5.14.0-570.46.1.el9_6/CVE-2025-38498-do-change-type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: 5.14.0-570.46.1.el9_6
- CVE-2025-39694
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-39694.patch
- From:
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Limit packet length to skb->len
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel9/5.14.0-570.46.1.el9_6/CVE-2023-53125-net-usb-smsc75xx-limit-packet-length-to-skb-len.patch
- From: 5.14.0-570.46.1.el9_6
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel9/5.14.0-570.46.1.el9_6/CVE-2023-53125-net-usb-smsc75xx-move-packet-length-check-to-prevent-kernel-panic-in-skb_pull.patch
- From: 5.14.0-570.46.1.el9_6
- CVE-2025-38472
- Description:
netfilter: nf_conntrack: fix crash due to removal of uninitialised entry
- CVE: https://access.redhat.com/security/cve/CVE-2025-38472
- Patch: rhel9/5.14.0-570.49.1.el9_6/CVE-2025-38472-netfilter-nf-conntrack-fix-crash-due-to-removal-of-uninitialised-entry.patch
- From: 5.14.0-570.49.1.el9_6
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://access.redhat.com/security/cve/CVE-2025-38527
- Patch: rhel9/5.14.0-570.49.1.el9_6/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs-oplock-break.patch
- From: 5.14.0-570.46.1.el9_6
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://access.redhat.com/security/cve/CVE-2025-38718
- Patch: rhel9/5.14.0-570.49.1.el9_6/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 5.14.0-570.49.1.el9_6
- CVE-2025-39682
- Description:
tls: fix handling of zero-length records on the rx_list
- CVE: https://access.redhat.com/security/cve/CVE-2025-39682
- Patch: rhel9/5.14.0-570.49.1.el9_6/CVE-2025-39682-tls-fix-handling-of-zero-length-records-on-the-rx-list.patch
- From: 5.14.0-570.49.1.el9_6
- CVE-2025-39698
- Description:
io_uring/futex: ensure io_futex_wait() cleans up properly on failure
- CVE: https://access.redhat.com/security/cve/CVE-2025-39698
- Patch: rhel9/5.14.0-570.49.1.el9_6/CVE-2025-39698-io-uring-futex-ensure-io-futex-wait-cleans-up-properly-on-failure.patch
- From: 5.14.0-570.49.1.el9_6
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://access.redhat.com/security/cve/CVE-2024-50301
- Patch: rhel9/5.14.0-570.51.1.el9_6/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.14.0-570.51.1.el9_6
- CVE-2025-38351
- Description:
KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
- CVE: https://access.redhat.com/security/cve/CVE-2025-38351
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-38351-kvm-x86-hyper-v-skip-non-canonical-addresses-during-pv-tlb-flush-5.14.0-570.62.1.el9_6.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-38351
- Description:
KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
- CVE: https://access.redhat.com/security/cve/CVE-2025-38351
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-38351-kvm-x86-hyper-v-skip-non-canonical-addresses-during-pv-tlb-flush-kpatch.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-39761
- Description:
wifi: ath12k: Decrement TID on RX peer frag setup error handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-39761
- Patch: rhel9/5.14.0-570.51.1.el9_6/CVE-2025-39761-wifi-ath12k-decrement-tid-on-rx-peer-frag-setup-error-handling.patch
- From: 5.14.0-570.51.1.el9_6
- CVE-2025-38614
- Description:
eventpoll: Fix semi-unbounded recursion
- CVE: https://access.redhat.com/security/cve/CVE-2025-38614
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38614-eventpoll-fix-semi-unbounded-recursion.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-38614
- Description:
eventpoll: Fix semi-unbounded recursion
- CVE: https://access.redhat.com/security/cve/CVE-2025-38614
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38614-eventpoll-fix-semi-unbounded-recursion-kpatch.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-38614
- Description:
eventpoll: Fix semi-unbounded recursion
- CVE: https://access.redhat.com/security/cve/CVE-2025-38614
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38614-eventpoll-fix-semi-unbounded-recursion-kpatch2.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-38556
- Description:
HID: simplify snto32()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38556-hid-simplify-snto32.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-38556
- Description:
HID: stop exporting hid_snto32()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38556-hid-stop-exporting-hid_snto32.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-38556
- Description:
HID: core: Harden s32ton() against conversion to 0 bits
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38556-hid-core-harden-s32ton-against-conversion-to-0-bits.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-38556
- Description:
HID: stop exporting hid_snto32()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-38556-hid-stop-exporting-hid_snto32-kpatch.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-39757
- Description:
ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2025-39757-alsa-usb-audio-fix-size-validation-in-convert_chmap_v3.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2023-53373
- Description:
crypto: seqiv - Handle EBUSY correctly
- CVE: https://access.redhat.com/security/cve/CVE-2023-53373
- Patch: rhel9/5.14.0-570.52.1.el9_6/CVE-2023-53373-crypto-seqiv-handle-ebusy-correctly.patch
- From: 5.14.0-570.52.1.el9_6
- CVE-2025-22026
- Description:
nfsd: don't ignore the return code of svc_proc_register()
- CVE: https://access.redhat.com/security/cve/CVE-2025-22026
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-22026-nfsd-don-t-ignore-the-return-code-of-svc-proc-register.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2025-39849
- Description:
wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39849
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-39849-wifi-cfg80211-sme-cap-ssid-length-in-cfg80211-connect-result.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2025-38566
- Description:
sunrpc: fix handling of server side tls alerts
- CVE: https://access.redhat.com/security/cve/CVE-2025-38566
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-38566-sunrpc-fix-handling-of-server-side-tls-alerts.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2025-39817
- Description:
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
- CVE: https://access.redhat.com/security/cve/CVE-2025-39817
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-39817-efivarfs-fix-slab-out-of-bounds-in-efivarfs-d-compare.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2025-38571
- Description:
sunrpc: fix client side handling of tls alerts
- CVE: https://access.redhat.com/security/cve/CVE-2025-38571
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-38571-sunrpc-fix-client-side-handling-of-tls-alerts.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2025-38571
- Description:
SUNRPC: call xs_sock_process_cmsg for all cmsg
- CVE: https://access.redhat.com/security/cve/CVE-2025-38571
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-38571-sunrpc-call-xs_sock_process_cmsg-for-all-cmsg.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2025-39841
- Description:
scsi: lpfc: Fix buffer free/clear order in deferred receive path
- CVE: https://access.redhat.com/security/cve/CVE-2025-39841
- Patch: rhel9/5.14.0-570.55.1.el9_6/CVE-2025-39841-scsi-lpfc-fix-buffer-free-clear-order-in-deferred-receive-path.patch
- From: 5.14.0-570.55.1.el9_6
- CVE-2022-50087
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-50087.patch
- From:
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39730
- Patch: rhel9/5.14.0-570.58.1.el9_6/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 5.14.0-570.58.1.el9_6
- CVE-2025-39751
- Description:
This CVE has been rejected or withdrawn by its CVE Numbering Authority as per NVD website
- CVE:
- Patch: skipped/CVE-2025-39751.patch
- From:
- CVE-2025-39819
- Description:
fs/smb: Fix inconsistent refcnt update
- CVE: https://access.redhat.com/security/cve/CVE-2025-39819
- Patch: rhel9/5.14.0-570.58.1.el9_6/CVE-2025-39819-fs-smb-fix-inconsistent-refcnt-update.patch
- From: 5.14.0-570.58.1.el9_6
- CVE-2025-39718
- Description:
vsock/virtio: Validate length in packet header before skb_put()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39718
- Patch: rhel9/5.14.0-570.58.1.el9_6/CVE-2025-39718-vsock-virtio-validate-length-in-packet-header-before-skb-put.patch
- From: 5.14.0-570.58.1.el9_6
- CVE-2023-53331
- Description:
pstore/ram: Check start of empty przs during init
- CVE: https://access.redhat.com/security/cve/CVE-2023-53331
- Patch: rhel9/5.14.0-570.58.1.el9_6/CVE-2023-53331-pstore-ram-check-start-of-empty-przs-during-init.patch
- From: 5.14.0-570.58.1.el9_6
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://access.redhat.com/security/cve/CVE-2025-39702
- Patch: rhel9/5.14.0-570.60.1.el9_6/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 5.14.0-570.60.1.el9_6
- CVE-2022-50367
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2022-50367
- Patch: rhel9/5.14.0-570.60.1.el9_6/CVE-2022-50367-fs-fix-uaf-gpf-bug-in-nilfs-mdt-destroy.patch
- From: 5.14.0-570.60.1.el9_6
- CVE-2023-53494
- Description:
crypto: xts - Handle EBUSY correctly
- CVE: https://access.redhat.com/security/cve/CVE-2023-53494
- Patch: rhel9/5.14.0-570.60.1.el9_6/CVE-2023-53494-crypto-xts-handle-ebusy-correctly.patch
- From: 5.14.0-570.60.1.el9_6
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://access.redhat.com/security/cve/CVE-2024-46744
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56603
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21648
- Description:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
- CVE: https://access.redhat.com/security/cve/CVE-2025-21648
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21648-netfilter-conntrack-clamp-maximum-hashtable-size-to-int-max.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21796
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://access.redhat.com/security/cve/CVE-2025-21796
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21671
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21671.patch
- From:
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21791
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58014
- Description:
wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
- CVE: https://access.redhat.com/security/cve/CVE-2024-58014
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58014-wifi-brcmsmac-add-gain-range-check-to-wlc-phy-iqcal-gainparams-nphy.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://access.redhat.com/security/cve/CVE-2024-56662
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://access.redhat.com/security/cve/CVE-2025-37994
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53229
- Description:
RDMA/rxe: Fix the qp flush warnings in req
- CVE: https://access.redhat.com/security/cve/CVE-2024-53229
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53229-RDMA-rxe-fix-the-qp-flush-warnings-in-req.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21647
- Description:
sched: sch_cake: add bounds checks to host bulk flow fairness counts
- CVE: https://access.redhat.com/security/cve/CVE-2025-21647
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21647-sched-sch_cake-add-bounds-checks-to-host-bulk-flow-fairness-counts.patch
- From: 5.14.0-570.12.1.el9_6
- CVE-2025-21691
- Description:
cachestat: fix page cache statistics permission checking
- CVE: https://access.redhat.com/security/cve/CVE-2025-21691
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21691-cachestat-fix-page-cache-statistics-permission-checking.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21702
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://access.redhat.com/security/cve/CVE-2025-21702
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21702-pfifo_tail_enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21738
- Description:
ata: libata-sff: Ensure that we cannot write outside the allocated buffer
- CVE: https://access.redhat.com/security/cve/CVE-2025-21738
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21738-ata-libata-sff-ensure-that-we-cannot-write-outside-the-allocated-buffer.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49627
- Description:
ima: Fix potential memory leak in ima_init_crypto()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49627
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49627-ima-fix-potential-memory-leak-in-ima-init-crypto.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49643
- Description:
ima: Fix a potential integer overflow in ima_appraise_measurement
- CVE: https://access.redhat.com/security/cve/CVE-2022-49643
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49643-ima-fix-a-potential-integer-overflow-in-ima-appraise-measurement.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49648
- Description:
tracing/histograms: Fix memory leak problem
- CVE: https://access.redhat.com/security/cve/CVE-2022-49648
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49648-tracing-histograms-fix-memory-leak-problem.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49657
- Description:
usbnet: fix memory leak in error case
- CVE: https://access.redhat.com/security/cve/CVE-2022-49657
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49657-usbnet-fix-memory-leak-in-error-case.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49672
- Description:
net: tun: unlink NAPI from device on destruction
- CVE: https://access.redhat.com/security/cve/CVE-2022-49672
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49672-net-tun-unlink-napi-from-device-on-destruction.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-46689
- Description:
soc: qcom: cmd-db: Map shared memory as WC, not WB
- CVE: https://access.redhat.com/security/cve/CVE-2024-46689
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-46689-soc-qcom-cmd-db-map-shared-memory-as-wc-not-wb.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-47679
- Description:
vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47679
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-47679-vfs-fix-race-between-evice-inodes-and-find-inode-iput.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56690
- Description:
crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
- CVE: https://access.redhat.com/security/cve/CVE-2024-56690
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56690-crypto-pcrypt-call-crypto-layer-directly-when-padata-do-parallel-return-ebusy.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57986
- Description:
HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
- CVE: https://access.redhat.com/security/cve/CVE-2024-57986
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57986-hid-core-fix-assumption-that-resolution-multipliers-must-be-in-logical-collections.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56739
- Description:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56739
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56739-rtc-check-if-rtc-read-time-was-successful-in-rtc-timer-do-work.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21848
- Description:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21848
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21848-nfp-bpf-add-check-for-nfp-app-ctrl-msg-alloc.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49845
- Description:
can: j1939: j1939_send_one(): fix missing CAN header initialization
- CVE: https://access.redhat.com/security/cve/CVE-2022-49845
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49845-can-j1939-j1939-send-one-fix-missing-can-header-initialization.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49024
- Description:
can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods
- CVE: https://access.redhat.com/security/cve/CVE-2022-49024
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49024-can-m-can-pci-add-missing-m-can-class-free-dev-in-probe-remove-methods.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49432
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49432.patch
- From:
- CVE-2025-21728
- Description:
bpf: Send signals asynchronously if !preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2025-21728
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21728-bpf-send-signals-asynchronously-if-preemptible.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21728
- Description:
[PATCH] bpf: Use preempt_count() directly in bpf_send_signal_common()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21728
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21728-bpf-Use-preempt_count-directly-in-bpf_send_signal_common.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21855
- Description:
CONFIG_IBMVNIC is not enabled on EL9.
- CVE:
- Patch: skipped/CVE-2025-21855.patch
- From:
- CVE-2024-56675
- Description:
bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
- CVE: https://access.redhat.com/security/cve/CVE-2024-56675
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56675-bpf-fix-uaf-via-mismatching-bpf-prog-attachment-rcu-flavors.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21853
- Description:
bpf: avoid holding freeze_mutex during mmap operation
- CVE: https://access.redhat.com/security/cve/CVE-2025-21853
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21853-bpf-avoid-holding-freeze-mutex-during-mmap-operation.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-50060
- Description:
io_uring: check if we need to reschedule during overflow flush
- CVE: https://access.redhat.com/security/cve/CVE-2024-50060
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-50060-io-uring-check-if-we-need-to-reschedule-during-overflow-flush.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53216
- Description:
SUNRPC: introduce cache_check_rcu to help check in rcu context
- CVE: https://access.redhat.com/security/cve/CVE-2024-53216
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53216-sunrpc-introduce-cache-check-rcu-to-help-check-in-rcu-context.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53216
- Description:
SUNRPC: introduce cache_check_rcu to help check in rcu context
- CVE: https://access.redhat.com/security/cve/CVE-2024-53216
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53216-sunrpc-introduce-cache-check-rcu-to-help-check-in-rcu-context-header-optimization.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53216
- Description:
SUNRPC: no need get cache ref when protected by rcu
- CVE: https://access.redhat.com/security/cve/CVE-2024-53216
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53216-sunrpc-no-need-get-cache-ref-when-protected-by-rcu.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53216
- Description:
nfsd: no need get cache ref when protected by rcu
- CVE: https://access.redhat.com/security/cve/CVE-2024-53216
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53216-nfsd-no-need-get-cache-ref-when-protected-by-rcu.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53216
- Description:
nfsd: fix UAF when access ex_uuid or ex_stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-53216
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53216-nfsd-fix-uaf-when-access-ex-uuid-or-ex-stats.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-54456
- Description:
NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()
- CVE: https://access.redhat.com/security/cve/CVE-2024-54456
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-54456-nfs-fix-potential-buffer-overflowin-nfs-sysfs-link-rpc-client.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56709
- Description:
io_uring: check if iowq is killed before queuing
- CVE: https://access.redhat.com/security/cve/CVE-2024-56709
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56709-io-uring-check-if-iowq-is-killed-before-queuing.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21631
- Description:
block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21631
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21631-block-bfq-fix-waker-bfqq-uaf-after-bfq-split-bfqq.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21863
- Description:
io_uring: prevent opcode speculation
- CVE: https://access.redhat.com/security/cve/CVE-2025-21863
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21863-io-uring-prevent-opcode-speculation.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21714
- Description:
RDMA/mlx5: Fix implicit ODP use after free
- CVE: https://access.redhat.com/security/cve/CVE-2025-21714
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21714-rdma-mlx5-fix-implicit-odp-use-after-free.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21714
- Description:
RDMA/mlx5: Fix unsafe xarray access in implicit ODP handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-21714
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21714-RDMA-mlx5-Fix-unsafe-xarray-access-in-implicit-ODP-handling.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21714
- Description:
RDMA/mlx5: Fix implicit ODP hang on parent deregistration
- CVE: https://access.redhat.com/security/cve/CVE-2025-21714
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21714-RDMA-mlx5-Fix-implicit-ODP-hang-on-parent-deregistration.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57995
- Description:
wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57995
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57995-wifi-ath12k-fix-read-pointer-after-free-in-ath12k-mac-assign-vif-to-vdev.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21729
- Description:
wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion
- CVE: https://access.redhat.com/security/cve/CVE-2025-21729
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21729-wifi-rtw89-fix-race-between-cancel-hw-scan-and-hw-scan-completion.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57990
- Description:
wifi: mt76: mt7925: fix off by one in mt7925_load_clc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57990
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57990-wifi-mt76-mt7925-fix-off-by-one-in-mt7925-load-clc.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49670
- Description:
linux/dim: Fix divide by 0 in RDMA DIM
- CVE: https://access.redhat.com/security/cve/CVE-2022-49670
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49670-linux-dim-fix-divide-by-0-in-rdma-dim.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-50195
- Description:
posix-clock: Fix missing timespec64 check in pc_clock_settime()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50195
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-50195-posix-clock-fix-missing-timespec64-check-in-pc-clock-settime.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-50195
- Description:
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50195
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-50195-posix-clock-posix-clock-fix-unbalanced-locking-in-pc-clock-settime-5.14.0-570.62.1.el9_6.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57987
- Description:
Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57987
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57987-bluetooth-btrtl-check-for-null-in-btrtl-setup-realtek.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57988
- Description:
Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57988
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57988-bluetooth-btbcm-fix-null-deref-in-btbcm-get-board-name.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58075
- Description:
crypto: tegra - do not transfer req when tegra init fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-58075
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58075-crypto-tegra-do-not-transfer-req-when-tegra-init-fails.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58077
- Description:
ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
- CVE: https://access.redhat.com/security/cve/CVE-2024-58077
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58077-asoc-soc-pcm-don-t-use-soc-pcm-ret-on-prepare-callback.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21826
- Description:
netfilter: nf_tables: reject mismatching sum of field_len with set key length
- CVE: https://access.redhat.com/security/cve/CVE-2025-21826
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21826-netfilter-nf-tables-reject-mismatching-sum-of-field-len-with-set-key-length.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-22056
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://access.redhat.com/security/cve/CVE-2024-56672
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53170
- Description:
block: fix uaf for flush rq while iterating tags
- CVE: https://access.redhat.com/security/cve/CVE-2024-53170
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53170-block-fix-uaf-for-flush-rq-while-iterating-tags.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-47727
- Description:
x86/tdx: Fix "in-kernel MMIO" check
- CVE: https://access.redhat.com/security/cve/CVE-2024-47727
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-47727-x86-tdx-fix-in-kernel-mmio-check.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57998
- Description:
OPP: add index check to assert to avoid buffer overflow in _read_freq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57998
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57998-opp-add-index-check-to-assert-to-avoid-buffer-overflow-in-read-freq.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58068
- Description:
OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-58068
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58068-opp-fix-dev-pm-opp-find-bw-when-bandwidth-table-not-initialized.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21745
- Description:
blk-cgroup: Fix class @block_class's subsystem refcount leakage
- CVE: https://access.redhat.com/security/cve/CVE-2025-21745
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21745-blk-cgroup-fix-class-block-class-s-subsystem-refcount-leakage.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://access.redhat.com/security/cve/CVE-2024-58083
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21787
- Description:
team: better TEAM_OPTION_TYPE_STRING validation
- CVE: https://access.redhat.com/security/cve/CVE-2025-21787
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21787-team-better-team-option-type-string-validation.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21790
- Description:
vxlan: check vxlan_vnigroup_init() return value
- CVE: https://access.redhat.com/security/cve/CVE-2025-21790
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21790-vxlan-check-vxlan-vnigroup-init-return-value.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21829
- Description:
Patches a sleepable function, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2025-21829.patch
- From:
- CVE-2025-21672
- Description:
afs: Fix merge preference rule failure condition
- CVE: https://access.redhat.com/security/cve/CVE-2025-21672
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21672-afs-fix-merge-preference-rule-failure-condition.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-49864
- Description:
rxrpc: Fix a race between socket set up and I/O thread creation
- CVE: https://access.redhat.com/security/cve/CVE-2024-49864
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-49864-rxrpc-fix-a-race-between-socket-set-up-and-i-o-thread-creation.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21844
- Description:
smb: client: Add check for next_buffer in receive_encrypted_standard()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21844
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21844-smb-client-add-check-for-next-buffer-in-receive-encrypted-standard.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-52332
- Description:
igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://access.redhat.com/security/cve/CVE-2024-52332
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-52332-igb-fix-potential-invalid-memory-access-in-igb-init-module.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56786
- Description:
bpf: put bpf_link's program when link is safe to be deallocated
- CVE: https://access.redhat.com/security/cve/CVE-2024-56786
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56786-bpf-put-bpf_link-s-program-when-link-is-safe-to-be-deallocated.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-56786
- Description:
bpf: put bpf_link's program when link is safe to be deallocated
- CVE: https://access.redhat.com/security/cve/CVE-2024-56786
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56786-bpf-put-bpf_link-s-program-when-link-is-safe-to-be-deallocated-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58012
- Description:
ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params
- CVE: https://access.redhat.com/security/cve/CVE-2024-58012
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58012-asoc-sof-intel-hda-dai-ensure-dai-widget-is-valid-during-params.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://access.redhat.com/security/cve/CVE-2024-53052
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53052-io-uring-rw-fix-missing-nowait-check-for-o-direct-start-write.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21847
- Description:
ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21847
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21847-asoc-sof-stream-ipc-check-for-cstream-nullity-in-sof-ipc-msg-data.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21837
- Description:
CVE has been marked as REJECTED on the NVD website.
- CVE:
- Patch: skipped/CVE-2025-21837.patch
- From:
- CVE-2025-21726
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21726.patch
- From:
- CVE-2024-58072
- Description:
wifi: rtlwifi: remove unused check_buddy_priv
- CVE: https://access.redhat.com/security/cve/CVE-2024-58072
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58072-wifi-rtlwifi-remove-unused-check-buddy-priv.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49437
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49437.patch
- From:
- CVE-2022-49623
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49623.patch
- From:
- CVE-2024-56645
- Description:
can: j1939: j1939_session_new(): fix skb reference counting
- CVE: https://access.redhat.com/security/cve/CVE-2024-56645
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-56645-can-j1939-j1939-session-new-fix-skb-reference-counting.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-38396
- Description:
fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass
- CVE: https://access.redhat.com/security/cve/CVE-2025-38396
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-38396-fs-export-anon-inode-make-secure-inode-and-fix-secretmem-lsm-bypass.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-38396
- Description:
CVE-2025-38396 header optimization: move anon_inode_make_secure_inode declaration to kc_fs.h
- CVE: https://access.redhat.com/security/cve/CVE-2025-38396
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-38396-fs-export-anon-inode-make-secure-inode-and-fix-secretmem-lsm-bypass-header-optimization.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21795
- Description:
NFSD: fix hang in nfsd4_shutdown_callback
- CVE: https://access.redhat.com/security/cve/CVE-2025-21795
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21795-nfsd-fix-hang-in-nfsd4-shutdown-callback.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53119
- Description:
virtio/vsock: Fix accept_queue memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-53119
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53119-virtio-vsock-fix-accept-queue-memory-leak.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58088
- Description:
bpf: Fix deadlock when freeing cgroup storage
- CVE: https://access.redhat.com/security/cve/CVE-2024-58088
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58088-bpf-fix-deadlock-when-freeing-cgroup-storage.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21851
- Description:
arm64 and CONFIG_PAGE_SIZE_64KB specific
- CVE:
- Patch: skipped/CVE-2025-21851.patch
- From:
- CVE-2024-57993
- Description:
HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check
- CVE: https://access.redhat.com/security/cve/CVE-2024-57993
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57993-hid-hid-thrustmaster-fix-warning-in-thrustmaster-probe-by-adding-endpoint-check.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57993
- Description:
HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57993
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57993-hid-hid-thrustmaster-fix-stack-out-of-bounds-read-in-usb-check-int-endpoints.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57993
- Description:
HID: thrustmaster: fix memory leak in thrustmaster_interrupts()
- CVE: https://access.redhat.com/security/cve/CVE-2024-57993
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57993-hid-thrustmaster-fix-memory-leak-in-thrustmaster-interrupts.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21739
- Description:
config CONFIG_SCSI_UFSHCD is not set for any kernel version
- CVE:
- Patch: skipped/CVE-2025-21739.patch
- From:
- CVE-2025-22112
- Description:
eth: bnxt: fix out-of-range access of vnic_info array
- CVE: https://access.redhat.com/security/cve/CVE-2025-22112
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-22112-eth-bnxt-fix-out-of-range-access-of-vnic-info-array.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://access.redhat.com/security/cve/CVE-2025-38075
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49357
- Description:
Out of scope: T2 Macs not supported
- CVE:
- Patch: skipped/CVE-2022-49357.patch
- From:
- CVE-2022-49353
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49353.patch
- From:
- CVE-2025-21786
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2025-21786.patch
- From:
- CVE-2025-38116
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-38116.patch
- From:
- CVE-2024-57981
- Description:
usb: xhci: Fix NULL pointer dereference on certain command aborts
- CVE: https://access.redhat.com/security/cve/CVE-2024-57981
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57981-usb-xhci-fix-null-pointer-dereference-on-certain-command-aborts.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21861
- Description:
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21861
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-lru-in-migrate-device-finalize.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-58062
- Description:
wifi: iwlwifi: mvm: avoid NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-58062
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-58062-wifi-iwlwifi-mvm-avoid-null-pointer-dereference.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-57989
- Description:
wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links
- CVE: https://access.redhat.com/security/cve/CVE-2024-57989
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-57989-wifi-mt76-mt7925-fix-null-deref-check-in-mt7925-change-vif-links.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21696
- Description:
Patch for mm subsystem from CVE of medium (5.5) impact
- CVE:
- Patch: skipped/CVE-2025-21696.patch
- From:
- CVE-2022-48830
- Description:
CAN isn't used in servers
- CVE:
- Patch: skipped/CVE-2022-48830.patch
- From:
- CVE-2022-49269
- Description:
CAN isn't used in servers
- CVE:
- Patch: skipped/CVE-2022-49269.patch
- From:
- CVE-2025-21828
- Description:
wifi: mac80211: don't flush non-uploaded STAs
- CVE: https://access.redhat.com/security/cve/CVE-2025-21828
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21828-wifi-mac80211-don-t-flush-non-uploaded-stas.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-49570
- Description:
drm/xe/tracing: Fix a potential TP_printk UAF
- CVE: https://access.redhat.com/security/cve/CVE-2024-49570
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-49570-drm-xe-tracing-fix-a-potential-tp-printk-uaf-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://access.redhat.com/security/cve/CVE-2024-53135
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://access.redhat.com/security/cve/CVE-2024-53135
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-50294
- Description:
rxrpc: Fix missing locking causing hanging calls
- CVE: https://access.redhat.com/security/cve/CVE-2024-50294
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-50294-rxrpc-fix-missing-locking-causing-hanging-calls.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-50294
- Description:
rxrpc: Fix missing locking causing hanging calls
- CVE: https://access.redhat.com/security/cve/CVE-2024-50294
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-50294-rxrpc-fix-missing-locking-causing-hanging-calls-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21839
- Description:
KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
- CVE: https://access.redhat.com/security/cve/CVE-2025-21839
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21839-KVM-x86-Load-DR6-with-guest-value-only-before-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21746
- Description:
Input: serio - define serio_pause_rx guard to pause and resume serio ports
- CVE: https://access.redhat.com/security/cve/CVE-2025-21746
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21746-input-serio-define-serio-pause-rx-guard-to-pause-and-resume-serio-ports.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21746
- Description:
Input: synaptics - fix crash when enabling pass-through port
- CVE: https://access.redhat.com/security/cve/CVE-2025-21746
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21746-input-synaptics-fix-crash-when-enabling-pass-through-port.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21746
- Description:
Input: synaptics - fix crash when enabling pass-through port
- CVE: https://access.redhat.com/security/cve/CVE-2025-21746
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21746-input-synaptics-fix-crash-when-enabling-pass-through-port-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2022-49443
- Description:
list: fix a data-race around ep->rdllist
- CVE: https://access.redhat.com/security/cve/CVE-2022-49443
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2022-49443-list-fix-a-data-race-around-ep-rdllist-570.51.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53680
- Description:
ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-53680
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53680-ipvs-fix-ub-due-to-uninitialized-stack-access-in-ip-vs-protocol-init.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21864
- Description:
tcp: drop secpath at the same time as we currently drop dst
- CVE: https://access.redhat.com/security/cve/CVE-2025-21864
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21864-tcp-drop-secpath-at-the-same-time-as-we-currently-dr.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21846
- Description:
acct: perform last write from workqueue
- CVE: https://access.redhat.com/security/cve/CVE-2025-21846
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21846-acct-perform-last-write-from-workqueue.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21846
- Description:
acct: perform last write from workqueue
- CVE: https://access.redhat.com/security/cve/CVE-2025-21846
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21846-acct-perform-last-write-from-workqueue-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21806
- Description:
net: let net.core.dev_weight always be non-zero
- CVE: https://access.redhat.com/security/cve/CVE-2025-21806
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21806-net-let-net-core-dev-weight-always-be-non-zero.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21806
- Description:
net: let net.core.dev_weight always be non-zero
- CVE: https://access.redhat.com/security/cve/CVE-2025-21806
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21806-net-let-net-core-dev-weight-always-be-non-zero-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53090
- Description:
afs: Fix lock recursion
- CVE: https://access.redhat.com/security/cve/CVE-2024-53090
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2024-53090-afs-fix-lock-recursion-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21693
- Description:
[PATCH] mm: zswap: properly synchronize freeing resources during CPU hotunplug
- CVE: https://access.redhat.com/security/cve/CVE-2025-21693
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21693-mm-zswap-properly-synchronize-freeing-resources-during-CPU-hotunplug.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21693
- Description:
[PATCH] mm: zswap: properly synchronize freeing resources during CPU hotunplug
- CVE: https://access.redhat.com/security/cve/CVE-2025-21693
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21693-mm-zswap-properly-synchronize-freeing-resources-during-CPU-hotunplug-kpatch.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21693
- Description:
[PATCH] mm: zswap: move allocations during CPU init outside the lock
- CVE: https://access.redhat.com/security/cve/CVE-2025-21693
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21693-mm-zswap-move-allocations-during-CPU-init-outside-the-lock.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2025-21693
- Description:
[PATCH] mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21693
- Patch: rhel9/5.14.0-611.5.1.el9_7/CVE-2025-21693-mm-zswap-fix-crypto_free_acomp-deadlock-in-zswap_cpu_comp_dead.patch
- From: 5.14.0-611.5.1.el9_7
- CVE-2024-53241
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-53241.patch
- From:
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39864
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38724
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-39898
- Description:
CVE rejected
- CVE:
- Patch: skipped/CVE-2025-39898.patch
- From:
- CVE-2025-40058
- Description:
iommu/vt-d: Disallow dirty tracking if incoherent page walk
- CVE: https://access.redhat.com/security/cve/CVE-2025-40058
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-40058-iommu-vt-d-disallow-dirty-tracking-if-incoherent-page-walk.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-40185
- Description:
ice: ice_adapter: release xa entry on adapter allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2025-40185
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-40185-ice-ice-adapter-release-xa-entry-on-adapter-allocation-failure-570.44.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-39918
- Description:
wifi: mt76: fix linked list corruption
- CVE: https://access.redhat.com/security/cve/CVE-2025-39918
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-39918-wifi-mt76-fix-linked-list-corruption.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-39981
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2025-39981.patch
- From:
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://access.redhat.com/security/cve/CVE-2025-39955
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-39955-tcp-clear-tcp-sk-sk-fastopen-rsk-in-tcp-disconnect.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://access.redhat.com/security/cve/CVE-2025-39955
- Patch: rhel9/5.14.0-611.11.1.el9_7/CVE-2025-39955-tcp-don-t-call-reqsk_fastopen_remove-in-tcp_conn_request.patch
- From: 5.14.0-611.11.1.el9_7
- CVE-2025-39843
- Description:
mm: slub: avoid wake up kswapd in set_track_prepare
- CVE: https://access.redhat.com/security/cve/CVE-2025-39843
- Patch: rhel9/5.14.0-611.9.1.el9_7/CVE-2025-39843-mm-slub-avoid-wake-up-kswapd-in-set-track-prepare.patch
- From: 5.14.0-611.9.1.el9_7
- CVE-2025-39982
- Description:
Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync
- CVE: https://access.redhat.com/security/cve/CVE-2025-39982
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-39982-bluetooth-hci-event-fix-uaf-in-hci-acl-create-conn-sync.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-39983
- Description:
Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue
- CVE: https://access.redhat.com/security/cve/CVE-2025-39983
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-39983-bluetooth-hci-event-fix-uaf-in-hci-conn-tx-dequeue.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-40047
- Description:
io_uring/waitid: always prune wait queue entry in io_waitid_wait()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40047
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-40047-io-uring-waitid-always-prune-wait-queue-entry-in-io-waitid-wait.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-39971
- Description:
i40e: fix idx validation in config queues msg
- CVE: https://access.redhat.com/security/cve/CVE-2025-39971
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-39971-i40e-fix-idx-validation-in-config-queues-msg.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-39697
- Description:
NFS: Fix a race when updating an existing write
- CVE: https://access.redhat.com/security/cve/CVE-2025-39697
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-39697-NFS-Fix-a-race-when-updating-an-existing-write.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-39697
- Description:
avoid modifying nfs_page_group_sync_on_bit
- CVE: https://access.redhat.com/security/cve/CVE-2025-39697
- Patch: rhel9/5.14.0-611.8.1.el9_7/CVE-2025-39697-avoid-modifying-nfs_page_group_sync_on_bit.patch
- From: 5.14.0-611.8.1.el9_7
- CVE-2025-39925
- Description:
can: j1939: implement NETDEV_UNREGISTER notification handler
- CVE: https://access.redhat.com/security/cve/CVE-2025-39925
- Patch: rhel9/5.14.0-611.13.1.el9_7/CVE-2025-39925-can-j1939-implement-netdev-unregister-notification-handler.patch
- From: 5.14.0-611.13.1.el9_7
- CVE-2025-39925
- Description:
can: j1939: add missing calls in NETDEV_UNREGISTER notification handler
- CVE: https://access.redhat.com/security/cve/CVE-2025-39925
- Patch: rhel9/5.14.0-611.13.1.el9_7/CVE-2025-39925-can-j1939-add-missing-calls-in-netdev-unregister-notification-handler.patch
- From: 5.14.0-611.13.1.el9_7
- CVE-2025-39979
- Description:
Blamed commit b581f4266928 is not present
- CVE:
- Patch: skipped/CVE-2025-39979.patch
- From:
- CVE-2025-40176
- Description:
tls: wait for pending async decryptions if tls_strp_msg_hold fails
- CVE: https://access.redhat.com/security/cve/CVE-2025-40176
- Patch: rhel9/5.14.0-611.16.1.el9_7/CVE-2025-40176-tls-wait-for-pending-async-decryptions-if-tls-strp-msg-hold-fails.patch
- From: 5.14.0-611.16.1.el9_7
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://access.redhat.com/security/cve/CVE-2025-38499
- Patch: rhel9/5.14.0-611.16.1.el9_7/CVE-2025-38499-clone-private-mnt-make-sure-that-caller-has-cap-sys-admin-in-the-right-userns.patch
- From: 5.14.0-611.16.1.el9_7
- CVE-2025-39966
- Description:
iommufd: Fix race during abort for file descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39966
- Patch: rhel9/5.14.0-611.16.1.el9_7/CVE-2025-39966-iommufd-Fix-race-during-abort-for-file-descriptors-570.patch
- From: 5.14.0-611.16.1.el9_7
- CVE-2025-39966
- Description:
iommufd: Fix race during abort for file descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39966
- Patch: rhel9/5.14.0-611.16.1.el9_7/CVE-2025-39966-iommufd-Fix-race-during-abort-for-file-descriptors-kpatch-570.patch
- From: 5.14.0-611.16.1.el9_7
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://access.redhat.com/security/cve/CVE-2025-39883
- Patch: rhel9/5.14.0-611.20.1.el9_7/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 5.14.0-611.20.1.el9_7
- CVE-2025-40240
- Description:
sctp: avoid NULL dereference when chunk data buffer is missing
- CVE: https://access.redhat.com/security/cve/CVE-2025-40240
- Patch: rhel9/5.14.0-611.20.1.el9_7/CVE-2025-40240-sctp-avoid-null-dereference-when-chunk-data-buffer-is-missing.patch
- From: 5.14.0-611.20.1.el9_7
- CVE-2025-39806
- Description:
HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39806
- Patch: rhel9/5.14.0-611.20.1.el9_7/CVE-2025-39806-hid-multitouch-fix-slab-out-of-bounds-access-in-mt-report-fixup.patch
- From: 5.14.0-611.20.1.el9_7
- CVE-2025-40277
- Description:
drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
- CVE: https://access.redhat.com/security/cve/CVE-2025-40277
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-40277-drm-vmwgfx-validate-command-header-size-against-svga-cmd-max-datasize.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://access.redhat.com/security/cve/CVE-2025-68285
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have-mon-and-osd-map.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://access.redhat.com/security/cve/CVE-2025-68285
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have-mon-and-osd-map-kpatch.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-68287
- Description:
usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths
- CVE: https://access.redhat.com/security/cve/CVE-2025-68287
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-68287-usb-dwc3-fix-race-condition-between-concurrent-dwc3-remove-requests-call-paths.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-38703
- Description:
drm/xe: Make dma-fences compliant with the safe access rules
- CVE: https://access.redhat.com/security/cve/CVE-2025-38703
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-38703-drm-xe-make-dma-fences-compliant-with-the-safe-access-rules.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-38703
- Description:
drm/xe: Make dma-fences compliant with the safe access rules
- CVE: https://access.redhat.com/security/cve/CVE-2025-38703
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-38703-drm-xe-make-dma-fences-compliant-with-the-safe-access-rules-kpatch.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-39933
- Description:
smb: client: let recv_done verify data_offset, data_length and remaining_data_length
- CVE: https://access.redhat.com/security/cve/CVE-2025-39933
- Patch: rhel9/5.14.0-611.24.1.el9_7/CVE-2025-39933-smb-client-let-recv_done-verify-data_offset-data_len.patch
- From: 5.14.0-611.24.1.el9_7
- CVE-2025-38349
- Description:
eventpoll: don't decrement ep refcount while still holding the ep mutex
- CVE: https://access.redhat.com/security/cve/CVE-2025-38349
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-38349-eventpoll-don-t-decrement-ep-refcount-while-still-holding-the-ep-mutex-5.14.0-570.51.1.el9_6.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-40248
- Description:
vsock: Ignore signal/timeout on connect() if already established
- CVE: https://access.redhat.com/security/cve/CVE-2025-40248
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-40248-vsock-ignore-signal-timeout-on-connect-if-already-established.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-40258
- Description:
mptcp: fix race condition in mptcp_schedule_work()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40258
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-40258-mptcp-fix-race-condition-in-mptcp-schedule-work.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-68301
- Description:
net: atlantic: fix fragment overflow handling in RX path
- CVE: https://access.redhat.com/security/cve/CVE-2025-68301
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-68301-net-atlantic-fix-fragment-overflow-handling-in-rx-path.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-40294
- Description:
Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40294
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-40294-bluetooth-mgmt-fix-oob-access-in-parse-adv-monitor-pattern.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-40294
- Description:
Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40294
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-40294-bluetooth-mgmt-fix-oob-access-in-parse-adv-monitor-pattern-kpatch.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-38141
- Description:
dm: fix dm_blk_report_zones
- CVE: https://access.redhat.com/security/cve/CVE-2025-38141
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-38141-dm-fix-dm-blk-report-zones.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-38141
- Description:
dm: fix dm_blk_report_zones
- CVE: https://access.redhat.com/security/cve/CVE-2025-38141
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-38141-dm-fix-dm-blk-report-zones-kpatch.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-68305
- Description:
Bluetooth: hci_sock: Prevent race in socket write iter and sock bind
- CVE: https://access.redhat.com/security/cve/CVE-2025-68305
- Patch: rhel9/5.14.0-611.26.1.el9_7/CVE-2025-68305-bluetooth-hci-sock-prevent-race-in-socket-write-iter-and-sock-bind.patch
- From: 5.14.0-611.26.1.el9_7
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://access.redhat.com/security/cve/CVE-2025-40154
- Patch: rhel9/5.14.0-611.27.1.el9_7/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 5.14.0-611.27.1.el9_7
- CVE-2025-40251
- Description:
devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2025-40251
- Patch: rhel9/5.14.0-611.27.1.el9_7/CVE-2025-40251-devlink-rate-unset-parent-pointer-in-devl-rate-nodes-destroy.patch
- From: 5.14.0-611.27.1.el9_7
- CVE-2025-38568
- Description:
net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing
- CVE: https://access.redhat.com/security/cve/CVE-2025-38568
- Patch: rhel9/5.14.0-611.27.1.el9_7/CVE-2025-38568-net-sched-mqprio-fix-stack-out-of-bounds-write-in-tc-entry-parsing.patch
- From: 5.14.0-611.27.1.el9_7
- CVE-2025-38568
- Description:
net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing
- CVE: https://access.redhat.com/security/cve/CVE-2025-38568
- Patch: rhel9/5.14.0-611.27.1.el9_7/CVE-2025-38568-net-sched-mqprio-fix-stack-out-of-bounds-write-in-tc-entry-parsing-kpatch.patch
- From: 5.14.0-611.27.1.el9_7
- CVE-2025-40141
- Description:
Bluetooth: ISO: Fix possible UAF on iso_conn_free
- CVE: https://access.redhat.com/security/cve/CVE-2025-40141
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40141-bluetooth-iso-fix-possible-uaf-on-iso-conn-free.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-37789
- Description:
net: openvswitch: fix nested key length validation in the set() action
- CVE: https://access.redhat.com/security/cve/CVE-2025-37789
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-37789-net-openvswitch-fix-nested-key-length-validation-in-the-set-action.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-37819
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37819.patch
- From:
- CVE-2025-38022
- Description:
RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
- CVE: https://access.redhat.com/security/cve/CVE-2025-38022
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38022-rdma-core-fix-kasan-slab-use-after-free-read-in-ib-register-device-problem.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40318
- Description:
Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
- CVE: https://access.redhat.com/security/cve/CVE-2025-40318
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40318-bluetooth-hci-sync-fix-race-in-hci-cmd-sync-dequeue-once.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40271
- Description:
fs/proc: fix uaf in proc_readdir_de()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40271
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40271-fs-proc-fix-uaf-in-proc-readdir-de.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://access.redhat.com/security/cve/CVE-2025-38024
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-39760
- Description:
usb: core: config: Prevent OOB read in SS endpoint companion parsing
- CVE: https://access.redhat.com/security/cve/CVE-2025-39760
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-39760-usb-core-config-prevent-oob-read-in-ss-endpoint-companion-parsing.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://access.redhat.com/security/cve/CVE-2025-38415
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://access.redhat.com/security/cve/CVE-2025-38415
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize-kpatch.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://access.redhat.com/security/cve/CVE-2025-38415
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40269
- Description:
ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
- CVE: https://access.redhat.com/security/cve/CVE-2025-40269
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40269-alsa-usb-audio-fix-potential-overflow-of-pcm-transfer-buffer.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://access.redhat.com/security/cve/CVE-2025-38403
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40158
- Description:
net: dst: add four helpers to annotate data-races around dst->dev
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40158-01-net-dst-add-four-helpers-to-annotate-data-races-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40158
- Description:
net: Add locking to protect skb->dev access in ip_output
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40158-02-net-add-locking-to-protect-skb-dev-access-in-ip_output-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40158
- Description:
ipv4: use RCU protection in __ip_rt_update_pmtu()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40158-03-ipv4-use-RCU-protection-in-__ip_rt_update_pmtu-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40158
- Description:
net: dst: introduce dst->dev_rcu
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40158-04-net-dst-introduce-dst-dev_rcu-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40158
- Description:
ipv6: use RCU in ip6_output()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40158-ipv6-use-RCU-in-ip6_output-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40135
- Description:
ipv6: use RCU in ip6_xmit()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40135
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40135-ipv6-use-RCU-in-ip6_xmit-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40170
- Description:
CVE-2025-40170: optimize kpatch by redirecting inline callers to kc_ wrappers in kc_dst.h
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40170-00-optimize-kpatch-5.14.0-570.62.1.el9_6.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40170
- Description:
net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40170-01-net-ipv4-Consolidate-ipv4_mtu-and-ip_dst_mtu_maybe_forward-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40170
- Description:
ipv4: use RCU protection in ip_dst_mtu_maybe_forward()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40170-02-ipv4-use-RCU-protection-in-ip_dst_mtu_maybe_forward-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-40170
- Description:
net: use dst_dev_rcu() in sk_setup_caps()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-40170-net-use-dst-dev-rcu-in-sk-setup-caps-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38459
- Description:
atm: clip: Fix infinite recursive call of clip_push().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38459
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38459-atm-clip-fix-infinite-recursive-call-of-clip-push.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-38730
- Description:
io_uring/net: commit partial buffers on retry
- CVE: https://access.redhat.com/security/cve/CVE-2025-38730
- Patch: rhel9/5.14.0-611.30.1.el9_7/CVE-2025-38730-io_uring-net-commit-partial-buffers-on-retry-5.14.0-611.27.1.el9_7.patch
- From: 5.14.0-611.30.1.el9_7
- CVE-2025-68349
- Description:
NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
- CVE: https://access.redhat.com/security/cve/CVE-2025-68349
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2025-68349-nfsv4-pnfs-clear-nfs-ino-layoutcommit-in-pnfs-mark-layout-stateid-invalid.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2025-68811
- Description:
svcrdma: use rc_pageoff for memcpy byte offset
- CVE: https://access.redhat.com/security/cve/CVE-2025-68811
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2025-68811-svcrdma-use-rc-pageoff-for-memcpy-byte-offset.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2026-22998
- Description:
nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec
- CVE: https://access.redhat.com/security/cve/CVE-2026-22998
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2026-22998-nvme-tcp-fix-null-pointer-dereferences-in-nvmet-tcp-build-pdu-iovec.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2025-40322
- Description:
fbdev: bitblit: bound-check glyph index in bit_putcs*
- CVE: https://access.redhat.com/security/cve/CVE-2025-40322
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2025-40322-fbdev-bitblit-bound-check-glyph-index-in-bit-putcs.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2025-40304
- Description:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-40304
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2025-40304-fbdev-add-bounds-checking-in-bit-putcs-to-fix-vmalloc-out-of-bounds.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2023-53034
- Description:
ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
- CVE: https://access.redhat.com/security/cve/CVE-2023-53034
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2023-53034-ntb-hw-switchtec-fix-shift-out-of-bounds-in-switchtec-ntb-mw-set-trans.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2025-40064
- Description:
smc: Fix use-after-free in __pnet_find_base_ndev().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40064
- Patch: rhel9/5.14.0-611.34.1.el9_7/CVE-2025-40064-smc-fix-use-after-free-in-pnet-find-base-ndev.patch
- From: 5.14.0-611.34.1.el9_7
- CVE-2025-38206
- Description:
exfat: fix double free in delayed_free
- CVE: https://access.redhat.com/security/cve/CVE-2025-38206
- Patch: rhel9/5.14.0-611.35.1.el9_7/CVE-2025-38206-exfat-fix-double-free-in-delayed-free.patch
- From: 5.14.0-611.35.1.el9_7
- CVE-2025-38129
- Description:
page_pool: Fix use-after-free in page_pool_recycle_in_ring
- CVE: https://access.redhat.com/security/cve/CVE-2025-38129
- Patch: rhel9/5.14.0-611.35.1.el9_7/CVE-2025-38129-page-pool-fix-use-after-free-in-page-pool-recycle-in-ring.patch
- From: 5.14.0-611.35.1.el9_7
- CVE-2025-40168
- Description:
smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40168
- Patch: rhel9/5.14.0-611.36.1.el9_7/CVE-2025-40168-smc-use-sk-dst-get-and-dst-dev-rcu-in-smc-clc-prfx-match-611.27.patch
- From: 5.14.0-611.36.1.el9_7
- CVE-2025-71085
- Description:
ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
- CVE: https://access.redhat.com/security/cve/CVE-2025-71085
- Patch: rhel9/5.14.0-611.36.1.el9_7/CVE-2025-71085-ipv6-bug-in-pskb-expand-head-as-part-of-calipso-skbuff-setattr.patch
- From: 5.14.0-611.36.1.el9_7
- CVE-2026-23097
- Description:
migrate: correct lock ordering for hugetlb file folios
- CVE: https://access.redhat.com/security/cve/CVE-2026-23097
- Patch: rhel9/5.14.0-611.36.1.el9_7/CVE-2026-23097-migrate-correct-lock-ordering-for-hugetlb-file-folios.patch
- From: 5.14.0-611.36.1.el9_7
- CVE-2025-38106
- Description:
io_uring: fix use-after-free of sq->thread in __io_uring_show_fdinfo()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38106
- Patch: rhel9/5.14.0-611.38.1.el9_7/CVE-2025-38106-io-uring-fix-use-after-free-of-sq-thread-in-io-uring-show-fdinfo.patch
- From: 5.14.0-611.38.1.el9_7
- CVE-2025-38106
- Description:
KPATCH: drop io_sq_thread changes from CVE-2025-38106
- CVE: https://access.redhat.com/security/cve/CVE-2025-38106
- Patch: rhel9/5.14.0-611.38.1.el9_7/CVE-2025-38106-io-uring-fix-use-after-free-of-sq-thread-in-io-uring-show-fdinfo-kpatch.patch
- From: 5.14.0-611.38.1.el9_7
- CVE-2026-23001
- Description:
macvlan: fix possible UAF in macvlan_forward_source()
- CVE: https://access.redhat.com/security/cve/CVE-2026-23001
- Patch: rhel9/5.14.0-611.38.1.el9_7/CVE-2026-23001-macvlan-fix-possible-uaf-in-macvlan-forward-source.patch
- From: 5.14.0-611.38.1.el9_7
- CVE-2025-68800
- Description:
mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
- CVE: https://access.redhat.com/security/cve/CVE-2025-68800
- Patch: rhel9/5.14.0-611.38.1.el9_7/CVE-2025-68800-mlxsw-spectrum-mr-fix-use-after-free-when-updating-multicast-route-stats.patch
- From: 5.14.0-611.38.1.el9_7
- CVE-2025-39818
- Description:
Out of scope: intel-thc-hid driver not present in this kernel (introduced in 6.14)
- CVE:
- Patch: skipped/CVE-2025-39818.patch
- From: