- kernel-5.14.0-362.13.0.1.el9_3 (oel9)
- 5.14.0-427.42.1.el9_4
- 2024-11-24 10:37:26
- 2024-11-26 16:37:40
- K20241124_03
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-51042, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix potential fence use-after-free v2
- CVE: https://access.redhat.com/security/cve/CVE-2023-51042
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-51042-patch-drm-amdgpu-fix-potential-fence-use-after-free-v2.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6606
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6606-smb-client-fix-oob-in-smbcalcsize.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6610, CVSSv2 Score: 7.1
- Description:
smb: client: fix potential OOB in smb2_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6610-smb-client-fix-potential-oob-in-smb2-dump-detail.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6817, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: skip inactive elements during set walk
- CVE: https://access.redhat.com/security/cve/CVE-2023-6817
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6817-netfilter-nft-set-pipapo-skip-inactive-elements-during-set-walk.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2024-0193, CVSSv2 Score:
- Description:
Vulnerable commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) was introduced later than kernel-5.14.0-362.18.1.el9_3. None of our kernels are vulnerable.
- CVE:
- Patch: skipped/CVE-2024-0193.patch
- From:
- CVE-2024-0646, CVSSv2 Score: 7.0
- Description:
net: tls, update curr on splice as well
- CVE: https://access.redhat.com/security/cve/CVE-2024-0646
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2024-0646-net-tls-update-curr-on-splice-as-well.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inv.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: remove boilerplate code
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-remove-boilerplate-code.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2023-6356 CVE-2023-6536 CVE-2023-6535, CVSSv2 Score: 6.5
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel9/5.14.0-362.24.1.el9_3/CVE-2023-6535-6536-6356-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation.patch
- From: 5.14.0-362.24.1.el9_3
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2023-51780
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-51780-atm-Fix-Use-After-Free-in-do_vcc_ioctl.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6931-perf-fix-perf-event-validate-size.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size() lockdep
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6931-perf-fix-perf-event-validate-size-lockdep-splat.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of
- CVE: https://access.redhat.com/security/cve/CVE-2023-6040
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6040-netfilter-nf-tables-reject-tables-of-unsupported-family.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://access.redhat.com/security/cve/CVE-2023-6932
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6546, CVSSv2 Score: 7.8
- Description:
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2023-6546
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6546-tty-n-gsm-fix-the-uaf-caused-by-race-condition-in-gsm_cleanup_mux.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6176
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6176-net-tls-do-not-free-tls-rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-0565, CVSSv2 Score: 8.8
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0565
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-0565-smb-client-fix-OOB-in-receive_encrypted_standard.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in smb2_parse_contexts()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52434-smb-client-fix-potential-OOBs-in-smb2_parse_context.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create context
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52434-smb-client-fix-parsing-of-SMB3.1.1-POSIX-create-context.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-1085, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://access.redhat.com/security/cve/CVE-2024-1085
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-1085-netfilter-nf-tables-check-if-catch-all-set-5.14.0-362.18.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-51779-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6531, CVSSv2 Score: 7.0
- Description:
io_uring/af_unix: disable sending io_uring over sockets
- CVE: https://access.redhat.com/security/cve/CVE-2023-6531
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6531-io-uring-af-unix-disable-sending-io-uring-over.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-3567-vc-screen-move-load-of-struct-vc-data-pointer-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-3567-vc-screen-don-t-clobber-return-value-in-vcs-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39198, CVSSv2 Score: 7.5
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://access.redhat.com/security/cve/CVE-2023-39198
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26593, CVSSv2 Score: 4.4
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://access.redhat.com/security/cve/CVE-2024-26593
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6915, CVSSv2 Score: 6.2
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://access.redhat.com/security/cve/CVE-2023-6915
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-0841, CVSSv2 Score: 6.6
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super {CVE-2024-0841}
- CVE: https://access.redhat.com/security/cve/CVE-2024-0841
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-28464, CVSSv2 Score: 7.8
- Description:
Bluetooth: Fix double free in hci_conn_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2023-28464
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanu-pre5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52581, CVSSv2 Score:
- Description:
The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
- CVE:
- Patch: skipped/CVE-2023-52581.patch
- From:
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://access.redhat.com/security/cve/CVE-2023-24023
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-24023-Bluetooth-Add-more-enc-key-size-check.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39189
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://access.redhat.com/security/cve/CVE-2023-39193
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: modify kobject_get_path() to take a const *
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2022-0480, CVSSv2 Score: 5.5
- Description:
Reapply "memcg: enable accounting for file lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-0480
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-0480-reapply-memcg-enable-accounting-for-file-lock-caches.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6622, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: bail out on mismatching
- CVE: https://access.redhat.com/security/cve/CVE-2023-6622
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52529, CVSSv2 Score: 6.0
- Description:
HID: sony: Fix a potential memory leak in sony_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52529
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52529-hid-sony-fix-a-potential-memory-leak-in-sony_probe.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52610, CVSSv2 Score: 6.4
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2022-38096, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://access.redhat.com/security/cve/CVE-2022-38096
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-4133, CVSSv2 Score: 5.5
- Description:
cxgb4: fix use after free bugs caused by circular
- CVE: https://access.redhat.com/security/cve/CVE-2023-4133
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-4133-cxgb4-fix-use-after-free-bugs-caused-by-circular-dependency-problem.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26602, CVSSv2 Score: 4.7
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26602
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://access.redhat.com/security/cve/CVE-2023-42754
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52448, CVSSv2 Score: 4.7
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52476, CVSSv2 Score: 5.5
- Description:
perf/x86/lbr: Filter vsyscall addresses
- CVE: https://access.redhat.com/security/cve/CVE-2023-52476
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52476-perf-x86-lbr-filter-vsyscall-addresses.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52522, CVSSv2 Score: 5.5
- Description:
neigh: make sure used and confirmed times are valid
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52522-neigh-make-sure-used-and-confirmed-times-are-valid.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52522, CVSSv2 Score: 5.5
- Description:
net: fix possible store tearing in neigh_periodic_work()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52522-net-fix-possible-store-tearing-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52580, CVSSv2 Score: 5.5
- Description:
net/core: Fix ETH_P_1588 flow dissector
- CVE: https://access.redhat.com/security/cve/CVE-2023-52580
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52580-net-core-fix-eth-p-1588-flow-dissector.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52620, CVSSv2 Score: 2.5
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://access.redhat.com/security/cve/CVE-2023-52620
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26633, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26633
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26633-ip6-tunnel-fix-nexthdr-fragment-handling-in.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26582, CVSSv2 Score: 8.4
- Description:
net: tls: fix use-after-free with partial reads
- CVE: https://access.redhat.com/security/cve/CVE-2024-26582
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2024-26582-net-tls-fix-use-after-free-with-partial-reads-beyond-162.23.1.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26583, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26583.patch
- From:
- CVE-2024-26584, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26584.patch
- From:
- CVE-2024-26585, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26585.patch
- From:
- CVE-2023-52489, CVSSv2 Score:
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: Reject connection with the device
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-reject-connection-with-the-device-162.6.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Fix using memcmp when
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Fix coding style
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: avoid memcmp() out of bounds warning
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-28866, CVSSv2 Score: 5.3
- Description:
Bluetooth: HCI: Fix global-out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-28866
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-28866-bluetooth-hci-fix-global-out-of-bounds-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY
- CVE: https://access.redhat.com/security/cve/CVE-2023-31083
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-31083-bluetooth-hci-ldisc-check-hci-uart-proto-ready.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Fix race between
- CVE: https://access.redhat.com/security/cve/CVE-2023-42756
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-42756-netfilter-ipset-fix-race-between.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-46862, CVSSv2 Score: 4.7
- Description:
io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
- CVE: https://ubuntu.com/security/CVE-2023-46862
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-46862-patch-io-uring-fdinfo-lock-sq-thread-while-retrieving-thread-362.8.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-add-atomic_long_t-to-net_device_stats-fields-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-bridge-use-dev-stats-inc.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52578-net-bridge-use-dev-stats-inc-newest-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Unite old scheme and new scheme
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0001-Unite-old-scheme-and-new-scheme-descriptor-reads-362.8.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Change usb_get_device_descriptor() API
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0002-Change-usb_get_device_descriptor-API-362.8.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0003-Fix-race-by-not-overwriting-udev-descriptor-in-hub_p-284.11.1-and-newer.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-37453-0004-Fix-oversight-in-SuperSpeed-initialization-my-cherry.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39194
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-39194-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the
- CVE: https://access.redhat.com/security/cve/CVE-2023-6121
- Patch: rhel9/5.14.0-427.13.1.el9_4/CVE-2023-6121-nvmet-nul-terminate-the-nqns-passed-in-the.patch
- From: 5.14.0-427.13.1.el9_4
- CVE-2024-26609, CVSSv2 Score:
- Description:
CVE has been marked as REJECTED on the NVD website.
- CVE:
- Patch: skipped/CVE-2024-26609.patch
- From:
- CVE-2024-1086, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://access.redhat.com/security/cve/CVE-2024-1086
- Patch: rhel9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-362.18.patch
- From: v6.7
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel9/5.14.0-427.16.1.el9_4/CVE-2023-6240-crypto-akcipher-Disable-signing-and-decryption.patch
- From: 5.14.0-427.16.1.el9_4
- CVE-2024-25742 CVE-2024-25743, CVSSv2 Score: 7.1
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://access.redhat.com/security/cve/CVE-2024-25743
- Patch: rhel9/5.14.0-427.16.1.el9_4/CVE-2024-25742-CVE-2024-25743-x86-sev-harden-vc-instruction-emulation-284.patch
- From: 5.14.0-427.16.1.el9_4
- CVE-2024-26642, CVSSv2 Score: 4.7
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26673, CVSSv2 Score: 6.1
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- CVE: https://access.redhat.com/security/cve/CVE-2024-26673
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26673-netfilter-nft_ct-sanitize-layer-3-and-4-protocol-number-in-custom-expectations.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26673, CVSSv2 Score: 6.1
- Description:
netfilter: nft_ct: fix l3num expectations with inet pseudo family
- CVE: https://access.redhat.com/security/cve/CVE-2024-26673
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26673-netfilter-nft_ct-fix-l3num-expectations-with-inet-pseudo-family.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26804, CVSSv2 Score: 5.5
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel9/5.14.0-427.18.1.el9_4/CVE-2024-26804-net-ip_tunnel-prevent-perpetual-headroom-growth.patch
- From: 5.14.0-427.18.1.el9_4
- CVE-2024-26735, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel9/5.14.0-427.20.1.el9_4/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 5.14.0-427.20.1.el9_4
- CVE-2024-26993, CVSSv2 Score: 5.5
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel9/5.14.0-427.20.1.el9_4/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 5.14.0-427.20.1.el9_4
- CVE-2023-52667, CVSSv2 Score: 5.5
- Description:
net/mlx5e: fix a potential double-free in fs_any_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2023-52667
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26801, CVSSv2 Score: 5.5
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-35960, CVSSv2 Score: 5.5
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2021-47400, CVSSv2 Score: 4.7
- Description:
net: hns3: do not allow call hns3_nic_net_open repeatedly
- CVE: https://access.redhat.com/security/cve/CVE-2021-47400
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2021-47400-net-hns3-do-not-allow-call-hns3-nic-net-open.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-27393, CVSSv2 Score: 5.5
- Description:
xen-netfront: Add missing skb_mark_for_recycle
- CVE: https://access.redhat.com/security/cve/CVE-2024-27393
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-27393-xen-netfront-add-missing-skb-mark-for-recycle.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-35870, CVSSv2 Score: 5.5
- Description:
smb: client: fix UAF in smb2_reconnect_server()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35870
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-35870-smb-client-fix-uaf-in-smb2-reconnect-server-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26974, CVSSv2 Score: 5.5
- Description:
crypto: qat - resolve race condition during AER recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-recovery-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-26974, CVSSv2 Score: 5.5
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel9/5.14.0-427.24.1.el9_4/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak-362.patch
- From: 5.14.0-427.24.1.el9_4
- CVE-2024-38580, CVSSv2 Score: 5.5
- Description:
epoll: be better about file lifetimes
- CVE: https://access.redhat.com/security/cve/CVE-2024-38580
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-38580-epoll-be-better-about-file-lifetimes.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35885, CVSSv2 Score: 5.5
- Description:
mlxbf_gige: stop interface during shutdown
- CVE: https://access.redhat.com/security/cve/CVE-2024-35885
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35885-mlxbf-gige-stop-interface-during-shutdown.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2022-48743, CVSSv2 Score: 5.5
- Description:
net: amd-xgbe: Fix skb data length underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48743
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2022-48743-net-amd-xgbe-fix-skb-data-length-underflow.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26880, CVSSv2 Score: 4.4
- Description:
dm: call the resume method on internal suspend
- CVE: https://access.redhat.com/security/cve/CVE-2024-26880
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-27046, CVSSv2 Score: 5.5
- Description:
nfp: flower: handle acti_netdevs allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-27046
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-27046-nfp-flower-handle-acti-netdevs-allocation-failure.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26852, CVSSv2 Score: 7.0
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26852
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6_route_mpath_notify.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35857, CVSSv2 Score: 5.5
- Description:
icmp: prevent possible NULL dereferences from icmp_build_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35857
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35857-icmp-prevent-possible-null-dereferences-from-icmp_build_probe.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2021-47459, CVSSv2 Score: 5.5
- Description:
can: j1939: j1939_netdev_start(): fix UAF for
- CVE: https://access.redhat.com/security/cve/CVE-2021-47459
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2021-47459-can-j1939-j1939-netdev-start-fix-uaf-for-rx_kref-of-j1939_priv.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26982, CVSSv2 Score: 5.5
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2023-52809, CVSSv2 Score: 5.5
- Description:
scsi: libfc: Fix potential NULL pointer
- CVE: https://access.redhat.com/security/cve/CVE-2023-52809
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2023-52809-scsi-libfc-fix-potential-null-pointer-dereference-in-fc_lport_ptp_setup.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-36952, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://access.redhat.com/security/cve/CVE-2024-36952
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-36952-scsi-lpfc-move-npivs-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2023-52458, CVSSv2 Score: 5.5
- Description:
block: add check that partition length needs to be aligned with block size
- CVE: https://access.redhat.com/security/cve/CVE-2023-52458
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2023-52458-block-add-check-that-partition-length-needs-to-be-aligned-with-block-size.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-35907, CVSSv2 Score: 5.5
- Description:
mlxbf_gige: call request_irq() after NAPI initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-35907
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-35907-mlxbf-gige-call-request-irq-after-napi-initialized-362.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-36924, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Release hbalock before calling
- CVE: https://access.redhat.com/security/cve/CVE-2024-36924
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-36924-scsi-lpfc-release-hbalock-before-calling-lpfc_worker_wake_up.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-26773, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26773
- Patch: rhel9/5.14.0-427.28.1.el9_4/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in-ext4_mb_try_best_found-362.patch
- From: 5.14.0-427.28.1.el9_4
- CVE-2024-27030, CVSSv2 Score:
- Description:
octeontx2: CVE patch is outside the scope.
- CVE:
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-26737, CVSSv2 Score:
- Description:
eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.
- CVE:
- Patch: skipped/CVE-2024-26737.patch
- From:
- CVE-2024-21823, CVSSv2 Score: 7.5
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the
- CVE: https://access.redhat.com/security/cve/CVE-2024-21823
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-362.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27052, CVSSv2 Score: 7.4
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-27052
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35845, CVSSv2 Score: 9.1
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-35845
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: annotate data-races around
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36971
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36971-net-annotate-data-races-around.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36971
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36971-net-fix-dst-negative-advice-race.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-39487, CVSSv2 Score: 7.1
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-39487
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35937, CVSSv2 Score: 5.8
- Description:
wifi: cfg80211: check A-MSDU format more
- CVE: https://access.redhat.com/security/cve/CVE-2024-35937
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35937-wifi-cfg80211-check-a-msdu-format-more.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2021-47606, CVSSv2 Score: 5.5
- Description:
net: netlink: af_netlink: Prevent empty skb by
- CVE: https://access.redhat.com/security/cve/CVE-2021-47606
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2021-47606-net-netlink-af-netlink-prevent-empty-skb-by.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2023-52651, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: fix NULL pointer dereference in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52651
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2023-52651-wifi-ath10k-fix-null-pointer-dereference-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2023-52864, CVSSv2 Score: 4.4
- Description:
platform/x86: wmi: remove unnecessary initializations
- CVE: https://access.redhat.com/security/cve/CVE-2023-52864
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2023-52864-platform-x86-wmi-remove-unnecessary.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2023-52864, CVSSv2 Score: 4.4
- Description:
platform/x86: wmi: Fix opening of char device
- CVE: https://access.redhat.com/security/cve/CVE-2023-52864
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2023-52864-platform-x86-wmi-fix-opening-of-char-device.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26600, CVSSv2 Score: 5.5
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26600
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26808, CVSSv2 Score: 5.5
- Description:
netfilter: nft_chain_filter: handle
- CVE: https://access.redhat.com/security/cve/CVE-2024-26808
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26808-netfilter-nft-chain-filter-handle.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26868, CVSSv2 Score: 5.5
- Description:
nfs: fix panic when nfs4_ff_layout_prepare_ds()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26868
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26868-nfs-fix-panic-when-nfs4-ff-layout-prepare-ds.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27065, CVSSv2 Score: 4.7
- Description:
netfilter: nf_tables: do not compare internal
- CVE: https://access.redhat.com/security/cve/CVE-2024-27065
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27065-netfilter-nf-tables-do-not-compare-internal.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27417, CVSSv2 Score: 5.5
- Description:
ipv6: fix potential "struct net" leak in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27417
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36020, CVSSv2 Score: 5.5
- Description:
i40e: fix vf may be used uninitialized in this
- CVE: https://access.redhat.com/security/cve/CVE-2024-36020
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36020-i40e-fix-vf-may-be-used-uninitialized-in-this.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36922, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: read txq->read_ptr under lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-36922
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36922-wifi-iwlwifi-read-txq-read-ptr-under-lock.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36903, CVSSv2 Score: 5.5
- Description:
ipv6: Fix potential uninit-value access in __ip6_make_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36903
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36903-ipv6-fix-potential-uninit-value-access-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36921, CVSSv2 Score: 6.7
- Description:
wifi: iwlwifi: mvm: guard against invalid STA ID on removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-36921
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36921-wifi-iwlwifi-mvm-guard-against-invalid-sta-id.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-40954, CVSSv2 Score: 7.8
- Description:
net: do not leave a dangling sk pointer, when socket creation fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-40954
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-40958, CVSSv2 Score: 7.1
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://access.redhat.com/security/cve/CVE-2024-40958
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40958-netns-Make-get_net_ns-handle-zero-refcount-net.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-33621, CVSSv2 Score: 4.4
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://access.redhat.com/security/cve/CVE-2024-33621
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-33621-ipvlan-dont-use-skb-sk-in.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35789, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
- CVE: https://access.redhat.com/security/cve/CVE-2024-35789
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35823, CVSSv2 Score: 5.5
- Description:
vt: fix unicode buffer corruption when deleting characters
- CVE: https://access.redhat.com/security/cve/CVE-2024-35823
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35848, CVSSv2 Score: 5.5
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://access.redhat.com/security/cve/CVE-2024-35848
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-5.14.0-427.28.1.el9_4.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35852, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35899, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: flush pending destroy work before exit_net release
- CVE: https://access.redhat.com/security/cve/CVE-2024-35899
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35899-netfilter-nf_tables-flush-pending-destroy-work-befo-5.14.0-362.18.1.el9_3.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35911, CVSSv2 Score: 5.5
- Description:
ice: fix memory corruption bug with suspend and rebuild
- CVE: https://access.redhat.com/security/cve/CVE-2024-35911
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35911-ice-fix-memory-corruption-bug-with-suspend-and.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35969, CVSSv2 Score: 5.5
- Description:
ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr
- CVE: https://access.redhat.com/security/cve/CVE-2024-35969
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-35969-ipv6-fix-race-condition-between-ipv6-get-ifaddr.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26897, CVSSv2 Score:
- Description:
WiFi - Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-40961, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40961
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6_nh_init.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha-kpatch.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://access.redhat.com/security/cve/CVE-2024-38558
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-ICMPv6.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-26853, CVSSv2 Score: 4.4
- Description:
igc: avoid returning frame twice in XDP_REDIRECT
- CVE: https://access.redhat.com/security/cve/CVE-2024-26853
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-26853-igc-avoid-returning-frame-twice-in-xdp-redirect-362.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-38575, CVSSv2 Score: 5.5
- Description:
wifi: brcmfmac: pcie: handle randbuf allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-38575
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-38575-wifi-brcmfmac-pcie-handle-randbuf-allocation-failure.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-38391, CVSSv2 Score: 5.5
- Description:
cxl/region: Fix cxlr_pmem leaks
- CVE: https://access.redhat.com/security/cve/CVE-2024-38391
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-38391-cxl-region-fix-cxlr-pmem-leaks-362.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-40928, CVSSv2 Score: 5.5
- Description:
net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40928
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-40928-net-ethtool-fix-the-error-condition-in-ethtool_get_phy_stats_ethtool.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-27434, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't set the MFP flag for the GTK
- CVE: https://access.redhat.com/security/cve/CVE-2024-27434
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-27434-wifi-iwlwifi-mvm-don-t-set-the-mfp-flag-for-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35800, CVSSv2 Score:
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2024-35800.patch
- From:
- CVE-2024-36489, CVSSv2 Score: 6.1
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36489
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-37353, CVSSv2 Score: 5.5
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-37353
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36941, CVSSv2 Score: 5.7
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://access.redhat.com/security/cve/CVE-2024-36941
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36929, CVSSv2 Score: 5.5
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://access.redhat.com/security/cve/CVE-2024-36929
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36017, CVSSv2 Score: 6.1
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- CVE: https://access.redhat.com/security/cve/CVE-2024-36017
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-36005, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: honor table dormant flag from netdev release event path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36005
- Patch: rhel9/5.14.0-427.31.1.el9_4/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag.patch
- From: 5.14.0-427.31.1.el9_4
- CVE-2024-35839, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-35839.patch
- From:
- CVE-2024-36025, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix off by one in
- CVE: https://access.redhat.com/security/cve/CVE-2024-36025
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-36025-scsi-qla2xxx-fix-off-by-one-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-39476, CVSSv2 Score: 5.5
- Description:
md/raid5: fix deadlock that raid5d() wait for
- CVE: https://access.redhat.com/security/cve/CVE-2024-39476
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-39476-md-raid5-fix-deadlock-that-raid5d-wait-for.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-39476, CVSSv2 Score: 5.5
- Description:
md/raid5: remove pr_debug() in raid5d()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39476
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-39476-md-raid5-fix-deadlock-that-raid5d-wait-for-kpatch.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27020, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27020
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27020-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26668, CVSSv2 Score: 7.1
- Description:
netfilter: nft_limit: reject configurations that cause integer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26668
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-26668-netfilter-nft-limit-reject-configurations-that.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38538, CVSSv2 Score: 5.5
- Description:
net: bridge: xmit: make sure we have at least eth
- CVE: https://access.redhat.com/security/cve/CVE-2024-38538
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-362.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2023-52880, CVSSv2 Score: 5.5
- Description:
tty: n_gsm: require CAP_NET_ADMIN to attach
- CVE: https://access.redhat.com/security/cve/CVE-2023-52880
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2023-52880-tty-n-gsm-require-cap-net-admin-to-attach-427.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26908, CVSSv2 Score:
- Description:
CVE marked as rejected by vendor
- CVE:
- Patch: skipped/CVE-2024-26908.patch
- From:
- CVE-2024-27016, CVSSv2 Score: 5.5
- Description:
netfilter: flowtable: validate pppoe header
- CVE: https://access.redhat.com/security/cve/CVE-2024-27016
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27016-netfilter-flowtable-validate-pppoe-header.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27019, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27019
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27019-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35896, CVSSv2 Score: 5.5
- Description:
netfilter: validate user input for expected length
- CVE: https://access.redhat.com/security/cve/CVE-2024-35896
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35896-netfilter-validate-user-input-for-expected.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35962, CVSSv2 Score: 5.5
- Description:
netfilter: complete validation of user input
- CVE: https://access.redhat.com/security/cve/CVE-2024-35962
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35962-netfilter-complete-validation-of-user-input.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35897, CVSSv2 Score: 5.5
- Description:
nf_tables: disable toggling dormant table state more than once
- CVE: https://access.redhat.com/security/cve/CVE-2024-35897
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35897-netfilter-nf_tables-disable-toggling-dormant-table-state-more-than-once.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35897, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: discard table flag update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35897
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35897-netfilter-nf_tables-reject-table-flag-and-netdev-basechain-updates.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35897, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: discard table flag update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35897
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35897-netfilter-nf-tables-discard-table-flag-update.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2023-52771, CVSSv2 Score: 4.4
- Description:
cxl/port: Fix delete_endpoint() vs parent
- CVE: https://access.redhat.com/security/cve/CVE-2023-52771
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2023-52771-cxl-port-fix-delete-endpoint-vs-parent-427.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26810, CVSSv2 Score: 4.4
- Description:
vfio/pci: Lock external INTx masking ops
- CVE: https://access.redhat.com/security/cve/CVE-2024-26810
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-42152, CVSSv2 Score: 5.5
- Description:
nvmet: fix a possible leak when destroy a ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2024-42152
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-26855, CVSSv2 Score: 4.4
- Description:
net: ice: Fix potential NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-26855
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-26855-net-ice-fix-potential-null-pointer-dereference.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41076, CVSSv2 Score: 5.5
- Description:
NFSv4: Fix memory leak in nfs4_set_security_label
- CVE: https://access.redhat.com/security/cve/CVE-2024-41076
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41076-nfsv4-fix-memory-leak-in-nfs4-set-security-label.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://access.redhat.com/security/cve/CVE-2024-41041
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-42110, CVSSv2 Score: 5.5
- Description:
net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42110
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-42110-net-ntb-netdev-move-ntb-netdev-rx-handler-to.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40957, CVSSv2 Score: 5.5
- Description:
seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors
- CVE: https://access.redhat.com/security/cve/CVE-2024-40957
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40957-seg6-fix-parameter-passing-when-calling.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40978, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-40978
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40941, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://access.redhat.com/security/cve/CVE-2024-40941
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40929, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://access.redhat.com/security/cve/CVE-2024-40929
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40912
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40912-wifi-mac80211-fix-deadlock-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40911, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://access.redhat.com/security/cve/CVE-2024-40911
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40911-wifi-cfg80211-lock-wiphy-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40939, CVSSv2 Score: 5.5
- Description:
net: wwan: iosm: Fix tainted pointer delete is case of region creation fail
- CVE: https://access.redhat.com/security/cve/CVE-2024-40939
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40939-net-wwan-iosm-fix-tainted-pointer-delete-is.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40905, CVSSv2 Score: 5.5
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40905
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40905-ipv6-fix-possible-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40983, CVSSv2 Score: 5.5
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://access.redhat.com/security/cve/CVE-2024-40983
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-40914, CVSSv2 Score: 4.7
- Description:
mm/huge_memory: don't unpoison huge_zero_folio
- CVE: https://access.redhat.com/security/cve/CVE-2024-40914
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-40914-mm-huge_memory-don-t-unpoison-huge_zero_folio.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38544, CVSSv2 Score: 5.5
- Description:
RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt
- CVE: https://access.redhat.com/security/cve/CVE-2024-38544
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38544-rdma-rxe-fix-seg-fault-in-rxe-comp-queue-pkt.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://access.redhat.com/security/cve/CVE-2024-38579
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38540, CVSSv2 Score: 5.5
- Description:
bnxt_re: avoid shift undefined behavior in
- CVE: https://access.redhat.com/security/cve/CVE-2024-38540
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38540-bnxt-re-avoid-shift-undefined-behavior-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-35898, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-35898
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-35898-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38608, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Add wrapping for auxiliary_driver ops and remove unused args
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38608-net-mlx5e-Add-wrapping-for-auxiliary_driver-ops-and.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-38608, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Fix netif state handling
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-38608-net-mlx5e-Fix-netif-state-handling.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27415, CVSSv2 Score: 5.5
- Description:
netfilter: bridge: confirm multicast packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-27415
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27415-netfilter-bridge-confirm-multicast-packets.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-27415, CVSSv2 Score: 5.5
- Description:
netfilter: bridge: confirm multicast packets kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-27415
- Patch: rhel9/5.14.0-427.33.1.el9_4/CVE-2024-27415-netfilter-bridge-confirm-multicast-packets-kpatch.patch
- From: 5.14.0-427.33.1.el9_4
- CVE-2024-36979, CVSSv2 Score: 7.8
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-36979
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36979-net-bridge-mst-fix-vlan-use-after-free.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36979 CVE-2024-40920, CVSSv2 Score: 7.8
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-36979
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36979-CVE-2024-40920-net-bridge-mst-fix-suspicious-rcu-usage-in-br_mst_se.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36979 CVE-2024-40921, CVSSv2 Score: 7.8
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-36979
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36979-CVE-2024-40921-net-bridge-mst-pass-vlan-group-directly-to-br_mst_vl.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41096, CVSSv2 Score: 7.8
- Description:
PCI/MSI: Fix UAF in msi_capability_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-41096
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41096-PCI-MSI-Fix-UAF-in-msi_capability_init.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41073, CVSSv2 Score: 7.8
- Description:
nvme: avoid double free special payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-41073
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41073-vme-avoid-double-free-special-payload.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41040, CVSSv2 Score: 7.0
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://access.redhat.com/security/cve/CVE-2024-41040
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41040-net-sched-Fix-UAF-when-resolving-a-clash.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52801, CVSSv2 Score: 9.1
- Description:
iommufd: Fix missing update of domains_itree after splitting iopt_area
- CVE: https://access.redhat.com/security/cve/CVE-2023-52801
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52801-iommufd-Fix-missing-update-of-domains_itree-after-s.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26629, CVSSv2 Score: 5.5
- Description:
nfsd: fix RELEASE_LOCKOWNER
- CVE: https://access.redhat.com/security/cve/CVE-2024-26629
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-26629-nfsd-fix-RELEASE_LOCKOWNER.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26946, CVSSv2 Score: 5.5
- Description:
kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address
- CVE: https://access.redhat.com/security/cve/CVE-2024-26946
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-26946-kprobes-x86-use-copy-from-kernel-nofault-to.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36000, CVSSv2 Score: 5.5
- Description:
mm/hugetlb: fix missing hugetlb_lock for resv
- CVE: https://access.redhat.com/security/cve/CVE-2024-36000
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36000-mm-hugetlb-fix-missing-hugetlb_lock-for-resv-unchar-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26720, CVSSv2 Score:
- Description:
This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata
- CVE:
- Patch: skipped/CVE-2024-26720.patch
- From:
- CVE-2023-52463, CVSSv2 Score: 5.5
- Description:
efivarfs: force RO when remounting if SetVariable
- CVE: https://access.redhat.com/security/cve/CVE-2023-52463
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52463-efivarfs-force-RO-when-remounting-if-SetVariable-is-not-supported.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52463, CVSSv2 Score: 5.5
- Description:
efivarfs: force RO when remounting if SetVariable
- CVE: https://access.redhat.com/security/cve/CVE-2023-52463
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52463-efivarfs-force-RO-when-remounting-if-SetVariable-is-not-supported-kpatch.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35791, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Flush pages under kvm->lock to fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2024-35791
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35791-kvm-svm-flush-pages-under-kvm-lock-to-fix-uaf.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36883, CVSSv2 Score: 5.5
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36883
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38559, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Ensure the copied buf is NUL
- CVE: https://access.redhat.com/security/cve/CVE-2024-38559
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-40927, CVSSv2 Score: 5.5
- Description:
xhci: Handle TD clearing for multiple streams
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-40927-xhci-handle-td-clearing-for-multiple-streams.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed
- CVE: https://access.redhat.com/security/cve/CVE-2024-41044
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41055, CVSSv2 Score:
- Description:
Fix for skipped CVE-2023-52489 that modifies structure mem_section_usage only used at boot time
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-42082, CVSSv2 Score: 5.5
- Description:
xdp: Remove WARN() from __xdp_reg_mem_model()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42082
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42082-xdp-remove-warn-from-xdp-reg-mem-model.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42096
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-42102, CVSSv2 Score:
- Description:
Reverts CVE-2024-26720, which we don't use.
- CVE:
- Patch: skipped/CVE-2024-42102.patch
- From:
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://access.redhat.com/security/cve/CVE-2024-42131
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35875, CVSSv2 Score: 5.5
- Description:
x86/coco: Require seeding RNG with RDRAND on CoCo
- CVE: https://access.redhat.com/security/cve/CVE-2024-35875
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35875-x86-coco-Require-seeding-RNG-with-RDRAND-on-CoCo-systems-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35875, CVSSv2 Score: 5.5
- Description:
x86/coco: Require seeding RNG with RDRAND on CoCo
- CVE: https://access.redhat.com/security/cve/CVE-2024-35875
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35875-x86-coco-Require-seeding-RNG-with-RDRAND-on-CoCo-systems-kpatch-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-Fix-uninit-value-in-alauda_check_media.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-362.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch-362.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26929, CVSSv2 Score: 7.8
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://access.redhat.com/security/cve/CVE-2024-26929
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26929-scsi-qla2xxx-fix-double-free-of-fcport.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26930, CVSSv2 Score: 7.8
- Description:
scsi: qla2xxx: Fix double free of the ha->vp_map pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26930
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26930-scsi-qla2xxx-fix-double-free-of-the-ha-vp-map-pointer.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-27022, CVSSv2 Score: 7.8
- Description:
fork: defer linking file vma until vma is fully initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-27022
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-27022-fork-defer-linking-file-vma-until-vma-is-fully-initialized.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38562, CVSSv2 Score: 7.8
- Description:
wifi: nl80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-38562
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38562-wifi-nl80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-41071, CVSSv2 Score: 7.8
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36016, CVSSv2 Score: 7.7
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36016
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38573, CVSSv2 Score: 7.5
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-38573
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-42225, CVSSv2 Score: 7.5
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-42225
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38615, CVSSv2 Score: 5.5
- Description:
cpufreq: exit() callback is optional
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36899, CVSSv2 Score: 5.5
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://access.redhat.com/security/cve/CVE-2024-36899
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-35895, CVSSv2 Score: 5.5
- Description:
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
- CVE: https://access.redhat.com/security/cve/CVE-2024-35895
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-35895-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem-5.14.0-362.24.1.el9_3.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26931, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix command flush on cable pull
- CVE: https://access.redhat.com/security/cve/CVE-2024-26931
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26931-scsi-qla2xxx-fix-command-flush-on-cable-pull.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38601, CVSSv2 Score: 5.5
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://access.redhat.com/security/cve/CVE-2024-38601
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2023-52884, CVSSv2 Score: 5.5
- Description:
Input: cyapa - add missing input core locking to suspend/resume functions
- CVE: https://access.redhat.com/security/cve/CVE-2023-52884
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2023-52884-input-cyapa-add-missing-input-core-locking-to-suspend-resume-functions.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26947, CVSSv2 Score:
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2024-26947.patch
- From:
- CVE-2024-40984, CVSSv2 Score: 5.5
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
- CVE: https://access.redhat.com/security/cve/CVE-2024-40984
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-40984-acpica-revert-acpica-avoid-info-mapping-multiple-bars-your-kernel-is-fine.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-42246, CVSSv2 Score: 5.5
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://access.redhat.com/security/cve/CVE-2024-42246
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26739, CVSSv2 Score: 5.5
- Description:
net/sched: act_mirred: Create function tcf_mirred_to_dev and improve readability
- CVE: https://access.redhat.com/security/cve/CVE-2024-26739
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26739-net-sched-act_mirred-Create-function-tcf_mirred_to_-362.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26739, CVSSv2 Score: 5.5
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://access.redhat.com/security/cve/CVE-2024-26739
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb-362.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36978, CVSSv2 Score: 7.8
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36978
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in-multiq-tune.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-42284
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2021-47385, CVSSv2 Score: 5.5
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2021-47385-hwmon-w83792d-fix-null-pointer-dereference-by-removing-unnecessary-structure-field-362.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2021-47385, CVSSv2 Score: 5.5
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2021-47385-hwmon-w83792d-fix-null-pointer-dereference-by-removing-unnecessary-structure-field-kpatch-362.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-35989, CVSSv2 Score: 5.5
- Description:
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
- CVE: https://access.redhat.com/security/cve/CVE-2024-35989
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-35989-dmaengine-idxd-fix-oops-during-rmmod-on-single-cpu-platforms.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40959
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-42079, CVSSv2 Score: 5.5
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://access.redhat.com/security/cve/CVE-2024-42079
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2023-28746, CVSSv2 Score:
- Description:
RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.
- CVE:
- Patch: skipped/CVE-2023-28746.patch
- From:
- CVE-2023-52658, CVSSv2 Score: 5.5
- Description:
Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
- CVE: https://access.redhat.com/security/cve/CVE-2023-52658
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2023-52658-revert-net-mlx5-block-entering-switchdev-mode-with-ns-inconsistency.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-27403, CVSSv2 Score: 5.5
- Description:
netfilter: nft_flow_offload: reset dst in route object after setting up flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-27403
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-27403-netfilter-nft-flow-offload-reset-dst-in-route-object-after-setting-up-flow.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-36889, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-36889
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on-connect-427.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-39483, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Don't try to pointlessly single-step SEV-ES guests for NMI window
- CVE: https://access.redhat.com/security/cve/CVE-2024-39483
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-39483-KVM-SVM-Don-t-try-to-pointlessly-single-step-SEV-ES-.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-39483, CVSSv2 Score: 5.5
- Description:
KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
- CVE: https://access.redhat.com/security/cve/CVE-2024-39483
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-39483-kvm-svm-warn-on-vnmi-nmi-window-iff-nmis-are-outright-masked.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-39502, CVSSv2 Score:
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-39502.patch
- From:
- CVE-2024-45018, CVSSv2 Score: 5.5
- Description:
netfilter: flowtable: initialise extack before use
- CVE: https://access.redhat.com/security/cve/CVE-2024-45018
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-45018-netfilter-flowtable-initialise-extack-before-use.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41005, CVSSv2 Score: 5.5
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://access.redhat.com/security/cve/CVE-2024-41005
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26923-af_unix-Fix-garbage-collector-racing-against-connec.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41013, CVSSv2 Score: 5.5
- Description:
xfs: don't walk off the end of a directory data block
- CVE: https://access.redhat.com/security/cve/CVE-2024-41013
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41013-xfs-don-t-walk-off-the-end-of-a-directory-data-block.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41014, CVSSv2 Score: 5.5
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40995, CVSSv2 Score: 5.5
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40995
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in-tcf-idr-check-alloc.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://access.redhat.com/security/cve/CVE-2024-43854
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40960
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40972, CVSSv2 Score: 5.5
- Description:
ext4: fold quota accounting into ext4_xattr_inode_lookup_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40972
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40972-ext4-fold-quota-accounting-into-ext4-xattr-inode-lookup-create-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40972, CVSSv2 Score: 5.5
- Description:
ext4: do not create EA inode under buffer lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-40972
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40972-ext4-do-not-create-ea-inode-under-buffer-lock.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40998, CVSSv2 Score: 5.5
- Description:
ext4: turn quotas off if mount failed after enabling quotas
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40998-ext4-turn-quotas-off-if-mount-failed-after-enabling-quotas.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40998, CVSSv2 Score: 5.5
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40977, CVSSv2 Score: 5.5
- Description:
wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-40977
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40977-wifi-mt76-mt7921s-fix-potential-hung-tasks-during-chip-recovery-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2021-47383, CVSSv2 Score: 5.5
- Description:
tty: Fix out-of-bound vmalloc access in imageblit
- CVE: https://access.redhat.com/security/cve/CVE-2021-47383
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2021-47383-tty-fix-out-of-bound-vmalloc-access-in-imageblit.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26640, CVSSv2 Score: 5.5
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://www.cve.org/CVERecord?id=CVE-CVE-2024-26640
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26826, CVSSv2 Score: 5.5
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26826
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935, CVSSv2 Score: 5.5
- Description:
scsi: core: Remove the /proc/scsi/${proc_name} directory earlier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-Remove-the-proc-scsi-proc_name-directory-e.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935, CVSSv2 Score: 5.5
- Description:
scsi: core: Fix a procfs host directory removal regression
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-Fix-a-procfs-host-directory-removal-regres.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935, CVSSv2 Score: 5.5
- Description:
scsi: core: Fix unremoved procfs host directory regression
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-fix-unremoved-procfs-host-directory-regression.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26961, CVSSv2 Score: 5.5
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26961, CVSSv2 Score: 5.5
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new-kpatch.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-36244, CVSSv2 Score: 5.5
- Description:
net/sched: taprio: extend minimum interval restriction to entire cycle too
- CVE: https://access.redhat.com/security/cve/CVE-2024-36244
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-36244-net-sched-taprio-extend-minimum-interval-restriction-to-entire.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39472, CVSSv2 Score: 5.5
- Description:
xfs: fix log recovery buffer allocation for the
- CVE: https://access.redhat.com/security/cve/CVE-2024-39472
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-lega.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39504, CVSSv2 Score: 5.5
- Description:
netfilter: nft_inner: validate mandatory meta and payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-39504
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39504-netfilter-nft_inner-validate-mandatory-meta.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://access.redhat.com/security/cve/CVE-2024-40904
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40931, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_una is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-40931
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40931-mptcp-ensure-snd_una-is-properly-initialized-on-con.patch
- From: 5.14.0-427.42.1.el9_4
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: rhel9/5.14.0-427.42.1.el9_4/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-362.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-38663, CVSSv2 Score: 5.5
- Description:
blk-cgroup: fix list corruption from resetting io
- CVE: https://access.redhat.com/security/cve/CVE-2024-38663
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-38663-blk-cgroup-fix-list-corruption-from-resetting-io-upto-362.24.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-26858, CVSSv2 Score:
- Description:
Not vulnerable: mapping mechanism that the bug applies to was introduced in v6.6 upstream (3178308ad4c) and appeared in RHEL9's since -427
- CVE:
- Patch: skipped/CVE-2024-26858.patch
- From:
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for
- CVE: https://access.redhat.com/security/cve/CVE-2024-27397
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-upto-362.18.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for
- CVE: https://access.redhat.com/security/cve/CVE-2024-27397
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-kpatch-upto-362.18.1.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-27435, CVSSv2 Score: 5.5
- Description:
nvme: fix reconnection fail due to reserved tag
- CVE: https://access.redhat.com/security/cve/CVE-2024-27435
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-27435-nvme-fix-reconnection-fail-due-to-reserved-tag.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38543, CVSSv2 Score: 5.5
- Description:
lib/test_hmm.c: handle src_pfns and dst_pfns
- CVE: https://access.redhat.com/security/cve/CVE-2024-38543
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-38543-lib-test-hmm-c-handle-src-pfns-and-dst-pfns.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38593, CVSSv2 Score:
- Description:
Not vulnerable: buggy function was introduced in v6.5 upsteam (or RHEL9's 427.13.1), and no similar code patterns existed before for this module
- CVE:
- Patch: skipped/CVE-2024-38593.patch
- From:
- CVE-2024-26783, CVSSv2 Score: 5.5
- Description:
mm/vmscan: fix a bug calling wakeup_kswapd() with
- CVE: https://access.redhat.com/security/cve/CVE-2024-26783
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-26783-0002-mm-vmscan-fix-a-bug-calling-wakeup-kswapd-with.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36886, CVSSv2 Score: 5.5
- Description:
tipc: fix UAF in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36886
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2021-47548, CVSSv2 Score: 5.5
- Description:
ethernet: hisilicon: hns: hns_dsaf_misc: fix a
- CVE: https://access.redhat.com/security/cve/CVE-2021-47548
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2021-47548-ethernet-hisilicon-hns-hns-dsaf-misc-fix-a.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36957, CVSSv2 Score: 5.5
- Description:
octeontx2-af: avoid off-by-one read from
- CVE: https://access.redhat.com/security/cve/CVE-2024-36957
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36957-octeontx2-af-avoid-off-by-one-read-from.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-35958, CVSSv2 Score: 5.5
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2022-48627, CVSSv2 Score: 4.4
- Description:
vt: fix memory overlapping when deleting chars in
- CVE: https://access.redhat.com/security/cve/CVE-2022-48627
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36904, CVSSv2 Score: 5.5
- Description:
tcp: Use refcount_inc_not_zero() in
- CVE: https://access.redhat.com/security/cve/CVE-2024-36904
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2023-52638, CVSSv2 Score: 5.5
- Description:
can: j1939: prevent deadlock by changing
- CVE: https://access.redhat.com/security/cve/CVE-2023-52638
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2023-52638, CVSSv2 Score: 5.5
- Description:
can: j1939: prevent deadlock by changing
- CVE: https://access.redhat.com/security/cve/CVE-2023-52638
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-kpatch.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-38586, CVSSv2 Score: 5.5
- Description:
r8169: Fix possible ring buffer corruption on
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2021-47596, CVSSv2 Score: 5.5
- Description:
net: hns3: fix use-after-free bug in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47596
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2021-47596-net-hns3-fix-use-after-free-bug-in.patch
- From: 5.14.0-427.26.1.el9_4
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been
- CVE: https://access.redhat.com/security/cve/CVE-2024-36270
- Patch: rhel9/5.14.0-427.26.1.el9_4/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been.patch
- From: 5.14.0-427.26.1.el9_4