- kernel-5.14.0-427.42.1.el9_4 (almalinux9-arm64)
- 5.14.0-503.22.1.el9_5
- 2025-01-29 01:31:06
- 2025-01-29 06:40:50
- K20250129_03
- CVE-2024-26612, CVSSv2 Score: 5.5
- Description:
netfs, fscache: Prevent Oops in fscache_put_cache()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26612
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26612-netfs-fscache-prevent-oops-in-fscache-put-cache.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26601, CVSSv2 Score: 5.5
- Description:
ext4: regenerate buddy after block freeing failed if under fc replay
- CVE: https://access.redhat.com/security/cve/CVE-2024-26601
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26601-ext4-regenerate-buddy-after-block-freeing-failed-if-under-fc-replay.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0340
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-memset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-1151, CVSSv2 Score: 5.5
- Description:
net: openvswitch: limit the number of recursions from action sets
- CVE: https://access.redhat.com/security/cve/CVE-2024-1151
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-1151-net-openvswitch-limit-the-number-of-recursions-from-action-sets.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-25739, CVSSv2 Score: 5.5
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://access.redhat.com/security/cve/CVE-2024-25739
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-25739-ubi-Check-for-too-small-LEB-size-in-VTBL-code.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26591, CVSSv2 Score: 5.5
- Description:
bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- CVE: https://access.redhat.com/security/cve/CVE-2024-26591
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26591-bpf-fix-re-attachment-branch-in-bpf-tracing-prog-attach.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26603, CVSSv2 Score: 5.5
- Description:
x86/fpu: Stop relying on userspace for info to fault in xsave buffer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26603
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26603-x86-fpu-stop-relying-on-userspace-for-info-to-fault-in-xsave-buffer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26614, CVSSv2 Score: 5.5
- Description:
tcp: make sure init the accept_queue's spinlocks once
- CVE: https://access.redhat.com/security/cve/CVE-2024-26614
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26614-tcp-make-sure-init-the-accept-queue-s-spinlocks-once.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: core: avoid recursive cec_claim_log_addrs kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-23848-media-cec-core-avoid-recursive-cec_claim_log_addrs.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: core: avoid recursive cec_claim_log_addrs kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-23848-media-cec-core-avoid-recursive-cec_claim_log_addrs-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2019-25162, CVSSv2 Score: 7.8
- Description:
i2c: Fix a potential use after free
- CVE: https://access.redhat.com/security/cve/CVE-2019-25162
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2019-25162-i2c__Fix_a_potential_use_after_free.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48672, CVSSv2 Score: 7.8
- Description:
of: fdt: fix off-by-one error in unflatten_dt_nodes()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48672
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48672-of-fdt-fix-off-by-one-error-in-unflatten-dt-nodes.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52445, CVSSv2 Score: 7.8
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2023-52445
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconnection.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52451, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52451.patch
- From:
- CVE-2023-52464, CVSSv2 Score: 7.8
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://access.redhat.com/security/cve/CVE-2023-52464
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52464-edac-thunderx-fix-possible-out-of-bounds-string-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26882, CVSSv2 Score: 7.8
- Description:
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26882
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26882-net-ip-tunnel-make-sure-to-pull-inner-header-in-ip-tunnel-rcv.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-23307, CVSSv2 Score: 7.8
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://access.redhat.com/security/cve/CVE-2024-23307
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5_cache_count.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26589, CVSSv2 Score: 7.8
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://access.redhat.com/security/cve/CVE-2024-26589
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26589-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26907, CVSSv2 Score: 7.8
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://access.redhat.com/security/cve/CVE-2024-26907
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26907-rdma-mlx5-fix-fortify-source-warning-while-accessing-eth-segment.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47386, CVSSv2 Score: 7.8
- Description:
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47386
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47386-hwmon___w83791d__Fix_NULL_pointer_dereference_by_r.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35801, CVSSv2 Score: 7.8
- Description:
x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
- CVE: https://access.redhat.com/security/cve/CVE-2024-35801
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35801-x86-fpu-keep-xfd-state-in-sync-with-msr-ia32-xfd.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35801, CVSSv2 Score: 7.8
- Description:
x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
- CVE: https://access.redhat.com/security/cve/CVE-2024-35801
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35801-x86-fpu-keep-xfd-state-in-sync-with-msr-ia32-xfd-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38627, CVSSv2 Score: 7.8
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38627
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38555, CVSSv2 Score: 7.8
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://access.redhat.com/security/cve/CVE-2024-38555
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26934, CVSSv2 Score: 7.8
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26934
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26934-usb-core-fix-deadlock-in-usb-deauthorize-interface.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39291, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-39291.patch
- From:
- CVE-2024-38581, CVSSv2 Score: 7.8
- Description:
drm/amdgpu/mes: fix use-after-free issue
- CVE: https://access.redhat.com/security/cve/CVE-2024-38581
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38581-drm-amdgpu-mes-fix-use-after-free-issue.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40903, CVSSv2 Score: 7.8
- Description:
usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps
- CVE: https://access.redhat.com/security/cve/CVE-2024-40903
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40903-usb-typec-tcpm-fix-use-after-free-case-in-tcpm-register-source-caps.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26933, CVSSv2 Score: 7.8
- Description:
USB: core: Fix deadlock in port "disable" sysfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26933-01-USB-core-Add-hub_get-and-hub_put-routines.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26933, CVSSv2 Score: 7.8
- Description:
USB: core: Fix deadlock in port "disable" sysfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26933-02-usb-core-fix-deadlock-in-port-disable-sysfs-attribute.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39479, CVSSv2 Score: 7.8
- Description:
USB: core: Fix deadlock in port "disable" sysfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-39479
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39479-drm-i915-hwmon-get-rid-of-devm.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-40906, CVSSv2 Score: 7.8
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-40906
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41039, CVSSv2 Score: 7.8
- Description:
firmware: cs_dsp: Fix overflow checking of wmfw header
- CVE: https://access.redhat.com/security/cve/CVE-2024-41039
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41039-firmware-cs-dsp-fix-overflow-checking-of-wmfw-header.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41039, CVSSv2 Score: 7.8
- Description:
firmware: cs_dsp: Fix overflow checking of wmfw header (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-41039
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41039-firmware-cs-dsp-fix-overflow-checking-of-wmfw-header-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41049, CVSSv2 Score: 7.8
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://access.redhat.com/security/cve/CVE-2024-41049
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41092, CVSSv2 Score: 7.8
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-41092
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42159, CVSSv2 Score: 7.8
- Description:
scsi: mpi3mr: Sanitise num_phys
- CVE: https://access.redhat.com/security/cve/CVE-2024-42159
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42159-scsi-mpi3mr-sanitise-num-phys.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://access.redhat.com/security/cve/CVE-2024-42228
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42271, CVSSv2 Score: 7.8
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42271
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://access.redhat.com/security/cve/CVE-2024-42301
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43842, CVSSv2 Score: 7.8
- Description:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43842
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-43842-wifi-rtw89-fix-array-index-mistake-in-rtw89-sta-info-get-iter.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52606, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52606.patch
- From:
- CVE-2023-52696, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52696.patch
- From:
- CVE-2024-26672, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-26672.patch
- From:
- CVE-2024-26815, CVSSv2 Score: 7.1
- Description:
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
- CVE: https://access.redhat.com/security/cve/CVE-2024-26815
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26815-net-sched-taprio-proper-TCA_TAPRIO_TC_ENTRY_INDEX-check.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26815, CVSSv2 Score: 7.1
- Description:
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-26815
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26815-net-sched-taprio-proper-TCA_TAPRIO_TC_ENTRY_INDEX-check-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35814, CVSSv2 Score: 7.1
- Description:
minmax: add umin(a, b) and umax(a, b)
- CVE: https://access.redhat.com/security/cve/CVE-2024-35814
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35814-minmax-add-umin-a-b-and-umax-a-b.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35814, CVSSv2 Score: 7.1
- Description:
swiotlb: Fix double-allocation of slots due to broken alignment handling
- CVE: https://access.redhat.com/security/cve/CVE-2024-35814
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35814-swiotlb-fix-double-allocation-of-slots-due-to-broken-alignment-handling.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36030, CVSSv2 Score: 7.1
- Description:
octeontx2-af: fix the double free in rvu_npc_freemem()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36030
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36030-octeontx2-af-fix-the-double-free-in-rvu-npc-freemem.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36955, CVSSv2 Score: 7.7
- Description:
ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36955
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36955-alsa-hda-intel-sdw-acpi-fix-usage-of-device-get-named-child-node.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39471-drm-amdgpu-fix-signedness-bug-in-sdma_v4_0_process_trap_irq.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39486, CVSSv2 Score: 7.0
- Description:
drm/drm_file: Fix pid refcounting race
- CVE: https://access.redhat.com/security/cve/CVE-2024-39486
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39486-drm-drm_file-fix-pid-refcounting-race.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-43888, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-43888.patch
- From:
- CVE-2021-47428, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2021-47428.patch
- From:
- CVE-2021-47429, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2021-47429.patch
- From:
- CVE-2021-47454, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2021-47454.patch
- From:
- CVE-2022-48669, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2022-48669.patch
- From:
- CVE-2021-47432, CVSSv2 Score: 5.5
- Description:
include/linux/generic-radix-tree.h: replace kernel.h with the necessary inclusions
- CVE: https://access.redhat.com/security/cve/CVE-2021-47432
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47432-include-linux-generic-radix-tree-h-replace-kernel-h-with-the-necessary-inclusions.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47432, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Don't overflow in peek()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47432
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47432-lib-generic-radix-tree-c-don-t-overflow-in-peek.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457, CVSSv2 Score: 5.5
- Description:
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-can-isotp-isotp-sendmsg-add-result-check-for-wait-event-interruptible.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457, CVSSv2 Score: 5.5
- Description:
can: isotp: isotp_sendmsg(): fix TX buffer concurrent access in isotp_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-can-isotp-isotp_sendmsg-fix-TX-buffer-concurrent-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457, CVSSv2 Score: 5.5
- Description:
can: isotp: isotp_sendmsg(): fix TX buffer concurrent access in isotp_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47457, CVSSv2 Score: 5.5
- Description:
can: isotp: fix error path in isotp_sendmsg() to unlock wait queue
- CVE: https://access.redhat.com/security/cve/CVE-2021-47457
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47457-can-isotp-fix-error-path-in-isotp_sendmsg-to-unlock-wait-queue.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47495, CVSSv2 Score: 5.5
- Description:
usbnet: sanity check for maxpacket
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47495-usbnet-sanity-check-for-maxpacket.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47497, CVSSv2 Score: 5.5
- Description:
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
- CVE: https://access.redhat.com/security/cve/CVE-2021-47497
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47497-nvmem-Fix-shift-out-of-bound-UBSAN-with-byte-size-cells.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26618, CVSSv2 Score: 6.0
- Description:
arm64/sme: Always exit sme_alloc() early with existing
- CVE: https://access.redhat.com/security/cve/CVE-2024-26618
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26618-arm64-sme-Always-exit-sme_alloc-early-with-existing-storage.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47098, CVSSv2 Score: 6.0
- Description:
hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
- CVE: https://access.redhat.com/security/cve/CVE-2021-47098
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47098-hwmon-lm90-prevent-integer-overflow-underflow-in-hysteresis-calculations.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2021-47101, CVSSv2 Score: 6.0
- Description:
asix: fix uninit-value in asix_mdio_read()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47101
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2021-47101-asix-fix-uninit-value-in-asix_mdio_read.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26924, CVSSv2 Score: 5.9
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://access.redhat.com/security/cve/CVE-2024-26924
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26894, CVSSv2 Score: 6.0
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26894
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in-acpi-processor-power-exit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52834, CVSSv2 Score: 5.5
- Description:
atl1c: Work around the DMA RX overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2023-52834
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52834-atl1c-Work-around-the-DMA-RX-overflow-issue.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52834, CVSSv2 Score: 5.5
- Description:
atl1c: Work around the DMA RX overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2023-52834
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52834-atl1c-Work-around-the-DMA-RX-overflow-issue-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41057, CVSSv2 Score: 7.8
- Description:
cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41057
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41057-netfs-fscache-export-fscache_put_volume-and-add-fsca.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41057, CVSSv2 Score: 7.8
- Description:
cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41057
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41057-cachefiles-fix-slab-use-after-free-in-cachefiles-withdraw-cookie.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41058, CVSSv2 Score: 7.8
- Description:
cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41058
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41058-cachefiles-fix-slab-use-after-free-in-fscache-withdraw-volume.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41058, CVSSv2 Score: 7.8
- Description:
cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41058
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41058-cachefiles-fix-slab-use-after-free-in-fscache-withdraw-volume-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26890, CVSSv2 Score: 6.5
- Description:
Bluetooth: btrtl: fix out of bounds memory access
- CVE: https://access.redhat.com/security/cve/CVE-2024-26890
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26890-bluetooth-btrtl-fix-out-of-bounds-memory-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26890, CVSSv2 Score: 6.5
- Description:
Bluetooth: btrtl: fix out of bounds memory access
- CVE: https://access.redhat.com/security/cve/CVE-2024-26890
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26890-bluetooth-btrtl-fix-out-of-bounds-memory-access-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52482, CVSSv2 Score:
- Description:
CVE patch is for AMD Inception vulnerability related to Speculative Return Stack Overflow (SRSO)
- CVE:
- Patch: skipped/CVE-2023-52482.patch
- From:
- CVE-2023-52475, CVSSv2 Score: 6.7
- Description:
Input: powermate - fix use-after-free in powermate_config_complete
- CVE: https://access.redhat.com/security/cve/CVE-2023-52475
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52475-Input-powermate-fix-use-after-free-in-powermate_conf.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-24857, CVSSv2 Score: 6.8
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://access.redhat.com/security/cve/CVE-2024-24857
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-24857-bluetooth-fix-toctou-in-hci-debugfs-implementation.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35976, CVSSv2 Score: 6.7
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://access.redhat.com/security/cve/CVE-2024-35976
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35853, CVSSv2 Score: 6.4
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-35853
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during-rehash.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://access.redhat.com/security/cve/CVE-2024-41012
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-22099 CVE-2024-26903, CVSSv2 Score: 6.3
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://access.redhat.com/security/cve/CVE-2024-22099
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-22099-bluetooth-rfcomm-fix-null-ptr-deref-in-rfcomm-check-security.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-22099 CVE-2024-26903, CVSSv2 Score: 6.3
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://access.redhat.com/security/cve/CVE-2024-22099
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-22099-Bluetooth-rfcomm-Fix-null-ptr-deref-in-rfcomm_check_security-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26759, CVSSv2 Score: 5.5
- Description:
mm/swap: fix race when skipping swapcache
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26759-mm-swap-fix-race-when-skipping-swapcache.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26761, CVSSv2 Score: 5.5
- Description:
cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26761
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26761-cxl-pci-Fix-disabling-memory-if-DVSEC-CXL-Range-does.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26767, CVSSv2 Score: 5.5
- Description:
drm/amd/display: fixed integer types and null check locations
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26767
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26767-drm-amd-display-fixed-integer-types-and-null-check-l.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26772, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group
- CVE: https://access.redhat.com/security/cve/CVE-2024-26772
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26774, CVSSv2 Score: 5.5
- Description:
ext4: avoid dividing by 0 in mb_update_avg_fragment_size()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26774
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26774-ext4-avoid-dividing-by-0-in-mb-update-avg-fragment-size.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26782, CVSSv2 Score: 5.5
- Description:
mptcp: fix double-free on socket dismantle
- CVE: https://access.redhat.com/security/cve/CVE-2024-26782
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26782-mptcp-fix-double-free-on-socket-dismantle.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26785, CVSSv2 Score: 5.5
- Description:
iommufd: Fix protection fault in iommufd_test_syz_conv_iova
- CVE: https://access.redhat.com/security/cve/CVE-2024-26785
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26785-iommufd-Fix-protection-fault-in-iommufd_test_syz_con.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26786, CVSSv2 Score: 5.5
- Description:
iommufd: Fix iopt_access_list_id overwrite bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26786
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26786-iommufd-Fix-iopt_access_list_id-overwrite-bug.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26803, CVSSv2 Score: 5.5
- Description:
net: veth: clear GRO when clearing XDP even when down MIME-Version: 1.0
- CVE: https://access.redhat.com/security/cve/CVE-2024-26803
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26803-net-veth-clear-GRO-when-clearing-XDP-even-when-down.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52683, CVSSv2 Score:
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2023-52683.patch
- From:
- CVE-2023-52676, CVSSv2 Score: 5.5
- Description:
bpf: Guard stack limits against 32bit overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-52676
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52676-bpf-guard-stack-limits-against-32bit-overflow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52679, CVSSv2 Score: 5.5
- Description:
of: Fix double free in of_parse_phandle_with_args_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-52679
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52679-of-fix-double-free-in-of_parse_phandle_with_args_map.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52674, CVSSv2 Score: 5.5
- Description:
ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52674
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52674-ALSA-scarlett2-Add-clamp-in-scarlett2_mixer_ctl_put.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52680, CVSSv2 Score: 5.5
- Description:
ALSA: scarlett2: Add missing error checks to *_ctl_get()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52680
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52680-ALSA-scarlett2-Add-missing-error-checks-to-_ctl_get.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52659, CVSSv2 Score: 6.7
- Description:
x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
- CVE: https://access.redhat.com/security/cve/CVE-2023-52659
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52659-x86-mm-ensure-input-to-pfn-to-kaddr-is-treated-as-a-64-bit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52664, CVSSv2 Score: 5.5
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://access.redhat.com/security/cve/CVE-2023-52664
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52662, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
- CVE: https://access.redhat.com/security/cve/CVE-2023-52662
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52662-drm-vmwgfx-fix-a-memleak-in-vmw_gmrid_man_get_node.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52663, CVSSv2 Score: 5.5
- Description:
ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52663
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52663-asoc-sof-amd-fix-memory-leak-in-amd-sof-acp-probe.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52661, CVSSv2 Score: 5.5
- Description:
drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52661
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52661-01-drm-tegra-rgb-Fix-some-error-handling-paths-in-tegra_dc_rgb_probe.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52661, CVSSv2 Score: 5.5
- Description:
drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52661
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52661-02-drm-tegra-rgb-fix-missing-clk-put-in-the-error-handling.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26712, CVSSv2 Score:
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2024-26743, CVSSv2 Score: 5.5
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26743
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26717, CVSSv2 Score: 5.5
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://access.redhat.com/security/cve/CVE-2024-26717
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26717, CVSSv2 Score: 5.5
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://access.redhat.com/security/cve/CVE-2024-26717
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26744, CVSSv2 Score: 5.5
- Description:
RDMA/srpt: Support specifying the srpt_service_guid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26744
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26733, CVSSv2 Score: 5.5
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://access.redhat.com/security/cve/CVE-2024-26733
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26758, CVSSv2 Score: 5.5
- Description:
md: Don't ignore suspended array in md_check_recovery()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26758
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26758-md-don-t-ignore-suspended-array-in-md-check-recovery.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26740, CVSSv2 Score: 5.5
- Description:
net/sched: act_mirred: use the backlog for mirred ingress
- CVE: https://access.redhat.com/security/cve/CVE-2024-26740
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26740-net-sched-act-mirred-use-the-backlog-for-mirred-ingress.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26757, CVSSv2 Score: 5.5
- Description:
md: Don't ignore read-only array in md_check_recovery()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26757
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26757-md-don-t-ignore-read-only-array-in-md-check-recovery.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48804, CVSSv2 Score: 5.5
- Description:
vt_ioctl: fix array_index_nospec in vt_setactivate
- CVE: https://access.redhat.com/security/cve/CVE-2022-48804
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48804-vt-ioctl-fix-array-index-nospec-in-vt-setactivate.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52473, CVSSv2 Score: 5.5
- Description:
thermal: core: Fix NULL pointer dereference in zone registration error path
- CVE: https://access.redhat.com/security/cve/CVE-2023-52473
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52473-thermal-core-fix-null-pointer-dereference-in-zone-registration-error-path.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52501, CVSSv2 Score: 5.5
- Description:
ring-buffer: Do not attempt to read past "commit"
- CVE: https://access.redhat.com/security/cve/CVE-2023-52501
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52501-ring-buffer-do-not-attempt-to-read-past-commit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2022-48703, CVSSv2 Score: 5.5
- Description:
thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
- CVE: https://access.redhat.com/security/cve/CVE-2022-48703
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2022-48703-thermal-int340x-thermal-handle-data-vault-when-the-value-is-zero-size-ptr.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52462, CVSSv2 Score: 5.5
- Description:
bpf: fix check for attempt to corrupt spilled pointer
- CVE: https://access.redhat.com/security/cve/CVE-2023-52462
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52462-bpf-fix-check-for-attempt-to-corrupt-spilled-pointer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52467, CVSSv2 Score: 5.5
- Description:
mfd: syscon: Fix null pointer dereference in of_syscon_register()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52467
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52467-mfd-syscon-fix-null-pointer-dereference-in-of-syscon-register.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52490, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2023-52490.patch
- From:
- CVE-2023-52520, CVSSv2 Score: 5.5
- Description:
platform/x86: think-lmi: Fix reference leak
- CVE: https://access.redhat.com/security/cve/CVE-2023-52520
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52520-platform-x86-think-lmi-fix-reference-leak.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52585, CVSSv2 Score: 4.4
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52585
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52585-drm-amdgpu-fix-possible-null-dereference-in.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52762, CVSSv2 Score: 5.5
- Description:
virtio-blk: fix implicit overflow on virtio_max_dma_size
- CVE: https://access.redhat.com/security/cve/CVE-2023-52762
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52762-virtio-blk-fix-implicit-overflow-on-virtio-max-dma-size.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52784, CVSSv2 Score: 5.5
- Description:
bonding: stop the device in bond_setup_by_slave()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52784
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52784-bonding-stop-the-device-in-bond-setup-by-slave.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52751, CVSSv2 Score: 5.5
- Description:
smb: client: fix use-after-free in smb2_query_info_compound()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52751
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52751-smb-client-fix-use-after-free-in-smb2-query-info-compound.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52791, CVSSv2 Score: 5.5
- Description:
i2c: core: Run atomic i2c xfer when !preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2023-52791
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52791-i2c-core-run-atomic-i2c-xfer-when-preemptible.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52791, CVSSv2 Score: 5.5
- Description:
i2c: core: Fix atomic xfer check for non-preempt config
- CVE: https://access.redhat.com/security/cve/CVE-2023-52791
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52791-i2c-core-fix-atomic-xfer-check-for-non-preempt-config.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52756, CVSSv2 Score:
- Description:
Bug doesn't hit as enum values are just shifted numbers
- CVE:
- Patch: skipped/CVE-2023-52756.patch
- From:
- CVE-2023-52813, CVSSv2 Score: 5.5
- Description:
crypto: pcrypt - Fix hungtask for PADATA_RESET
- CVE: https://access.redhat.com/security/cve/CVE-2023-52813
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52813-crypto-pcrypt-fix-hungtask-for-padata-reset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52811, CVSSv2 Score: 5.5
- Description:
scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool
- CVE: https://access.redhat.com/security/cve/CVE-2023-52811
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52811-scsi-ibmvfc-remove-bug-on-in-the-case-of-an-empty-event-pool.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52775, CVSSv2 Score: 5.5
- Description:
net/smc: avoid data corruption caused by decline
- CVE: https://access.redhat.com/security/cve/CVE-2023-52775
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52775-net-smc-avoid-data-corruption-caused-by-decline.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52831, CVSSv2 Score: 5.5
- Description:
cpu/hotplug: Prevent self deadlock on CPU hot-unplug
- CVE: https://access.redhat.com/security/cve/CVE-2023-52831
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52831-cpu-hotplug-prevent-self-deadlock-on-cpu-hot-unplug.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52831, CVSSv2 Score: 5.5
- Description:
cpu/hotplug: Don't offline the last non-isolated CPU
- CVE: https://access.redhat.com/security/cve/CVE-2023-52831
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52831-cpu-hotplug-don-t-offline-the-last-non-isolated-cpu.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52833, CVSSv2 Score: 4.4
- Description:
Bluetooth: btusb: Add date->evt_skb is NULL check
- CVE: https://access.redhat.com/security/cve/CVE-2023-52833
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52833-bluetooth-btusb-add-date-evt-skb-is-null-check.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52840, CVSSv2 Score: 4.4
- Description:
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52840
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52840-input-synaptics-rmi4-fix-use-after-free-in-rmi-unregister-function.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52859, CVSSv2 Score: 6.0
- Description:
perf: hisi: Fix use-after-free when register pmu fails
- CVE: https://access.redhat.com/security/cve/CVE-2023-52859
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52859-perf-hisi-Fix-use-after-free-when-register-pmu-fails.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52869, CVSSv2 Score: 5.5
- Description:
pstore/platform: Add check for kstrdup
- CVE: https://access.redhat.com/security/cve/CVE-2023-52869
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52869-pstore-platform-add-check-for-kstrdup.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52878, CVSSv2 Score: 4.4
- Description:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-52878
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52878-can-dev-can_put_echo_skb-don-t-crash-kernel-if-can_priv-echo_skb-is-accessed-out-of-bounds.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52902, CVSSv2 Score:
- Description:
nommu: kernel is not vulnerable. Commit 8220543("nommu: remove uses of VMA linked list") is absent
- CVE:
- Patch: skipped/CVE-2023-52902.patch
- From:
- CVE-2024-26840, CVSSv2 Score: 5.5
- Description:
cachefiles: fix memory leak in cachefiles_add_cache()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26840
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles_add_cache.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26857, CVSSv2 Score: 5.5
- Description:
geneve: make sure to pull inner header in geneve_rx()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26857
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26857-geneve__make_sure_to_pull_inner_header_in_geneve_r.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26863, CVSSv2 Score: 5.5
- Description:
hsr: Fix uninit-value access in hsr_get_node()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26863
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26863-hsr__Fix_uninit-value_access_in_hsr_get_node__.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26870, CVSSv2 Score: 5.5
- Description:
NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
- CVE: https://access.redhat.com/security/cve/CVE-2024-26870
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26870-NFSv4_2__fix_nfs4_listxattr_kernel_BUG_at_mm_userc.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26878, CVSSv2 Score: 5.5
- Description:
quota: Fix potential NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-26878
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26878-quota__Fix_potential_NULL_pointer_dereference.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26889, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: Fix possible buffer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26889
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26889-Bluetooth-hci_core-Fix-possible-buffer-overflow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26899, CVSSv2 Score:
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-26899.patch
- From:
- CVE-2024-26901, CVSSv2 Score: 5.5
- Description:
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26901
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26901-do_sys_name_to_handle____use_kzalloc___to_fix_kern.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26906, CVSSv2 Score: 5.5
- Description:
x86/sev-es: Allow copy_from_kernel_nofault() in earlier boot
- CVE: https://access.redhat.com/security/cve/CVE-2024-26906
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26906-x86-sev-es-Allow-copy_from_kernel_nofault-in-earlier-boot.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26906, CVSSv2 Score: 5.5
- Description:
x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26906
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26906-x86_mm__Disallow_vsyscall_page_read_for_copy_from.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26915, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
- CVE: https://access.redhat.com/security/cve/CVE-2024-26915
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26915-drm-amdgpu-Reset-IH-OVERFLOW_CLEAR-bit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26920, CVSSv2 Score: 5.5
- Description:
tracing/trigger: Fix to return error if failed to alloc snapshot
- CVE: https://access.redhat.com/security/cve/CVE-2024-26920
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26920-tracing_trigger__Fix_to_return_error_if_failed_to_.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26921, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2024-26937, CVSSv2 Score: 5.5
- Description:
drm/i915/gt: Reset queue_priority_hint on parking
- CVE: https://access.redhat.com/security/cve/CVE-2024-26937
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26937-drm-i915-gt-Reset-queue_priority_hint-on-parking.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26938, CVSSv2 Score: 5.5
- Description:
drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26938
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26938-drm-i915-bios-Tolerate-devdata-NULL-in-intel_bios_encoder_supports_dp_dual_mode.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26939, CVSSv2 Score: 5.5
- Description:
drm/i915/vma: Fix UAF on destroy against retire race
- CVE: https://access.redhat.com/security/cve/CVE-2024-26939
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26939-drm-i915-vma-Fix-UAF-on-destroy-against-retire-race.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26940, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed
- CVE: https://access.redhat.com/security/cve/CVE-2024-26940
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26940-drm-vmwgfx-Create-debugfs-ttm_resource_manager-entry-only-if-needed.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26950, CVSSv2 Score: 5.5
- Description:
wireguard: netlink: access device through ctx instead of peer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26950
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26950-wireguard__netlink__access_device_through_ctx_inst.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26951, CVSSv2 Score: 5.5
- Description:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
- CVE: https://access.redhat.com/security/cve/CVE-2024-26951
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26951-wireguard__netlink__check_for_dangling_peer_via_is.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26953, CVSSv2 Score: 5.5
- Description:
net: esp: fix bad handling of pages from page_pool
- CVE: https://access.redhat.com/security/cve/CVE-2024-26953
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26953-net__esp__fix_bad_handling_of_pages_from_page_pool.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52837, CVSSv2 Score: 5.5
- Description:
nbd: fix uaf in nbd_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52837
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52837-nbd-fix-uaf-in-nbd-open.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52837, CVSSv2 Score: 5.5
- Description:
nbd: fix uaf in nbd_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52837
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52837-nbd-fix-uaf-in-nbd-open-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35983, CVSSv2 Score:
- Description:
Kernel is not vulnerable: commit f2d5dcb4 is absent.
- CVE:
- Patch: skipped/CVE-2024-35983.patch
- From:
- CVE-2024-35946, CVSSv2 Score: 5.5
- Description:
wifi: rtw89: fix null pointer access when abort scan
- CVE: https://access.redhat.com/security/cve/CVE-2024-35946
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35946-wifi-rtw89-fix-null-pointer-access-when-abort-scan-pt1.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35946, CVSSv2 Score: 5.5
- Description:
wifi: rtw89: fix null pointer access when abort scan
- CVE: https://access.redhat.com/security/cve/CVE-2024-35946
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35946-wifi-rtw89-fix-null-pointer-access-when-abort-scan-pt2.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35947, CVSSv2 Score: 5.5
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://access.redhat.com/security/cve/CVE-2024-35947
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35947-dyndbg-fix-old-BUG_ON-in-control-parser.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35950, CVSSv2 Score: 5.5
- Description:
drm/client: Fully protect modes[] with dev->mode_config.mutex
- CVE: https://access.redhat.com/security/cve/CVE-2024-35950
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35950-drm-client-Fully-protect-modes-with-dev-mode_config-mutex.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35959, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Fix mlx5e_priv_init() cleanup flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-35959
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35959-net-mlx5e-fix-mlx5e-priv-init-cleanup-flow.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35973, CVSSv2 Score: 5.5
- Description:
geneve: fix header validation in geneve[6]_xmit_skb
- CVE: https://access.redhat.com/security/cve/CVE-2024-35973
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-geneve-fix-header-validation-in-geneve-6-xmit-skb.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35954, CVSSv2 Score: 5.5
- Description:
geneve: Fix incorrect inner network header offset when innerprotoinherit is set
- CVE: https://access.redhat.com/security/cve/CVE-2024-35954
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-geneve-Fix-incorrect-inner-network-header-offset-when-innerprotoinherit-is-set.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35954, CVSSv2 Score: 5.5
- Description:
bareudp: Pull inner IP header on xmit
- CVE: https://access.redhat.com/security/cve/CVE-2024-35954
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-bareudp-Pull-inner-IP-header-on-xmit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35954, CVSSv2 Score: 5.5
- Description:
vxlan: Pull inner IP header in vxlan_xmit_one()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35954
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35973-vxlan-Pull-inner-IP-header-in-vxlan_xmit_one.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36031, CVSSv2 Score: 9.8
- Description:
keys: Fix overwrite of key expiration on instantiation
- CVE: https://access.redhat.com/security/cve/CVE-2024-36031
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36031-keys-fix-overwrite-of-key-expiration-on-instantiation.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-36896, CVSSv2 Score: 9.1
- Description:
USB: core: Fix access violation during port device removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-36896
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36896-usb-core-fix-access-violation-during-port-device-removal.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35854, CVSSv2 Score: 9.1
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-35854
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35854-mlxsw-spectrum_acl_tcam-Fix-possible-use-after-free.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38605, CVSSv2 Score:
- Description:
Not a bug for a real-life RHEL9 setup
- CVE:
- Patch: skipped/CVE-2024-38605.patch
- From:
- CVE-2024-26843, CVSSv2 Score:
- Description:
EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
- CVE:
- Patch: skipped/CVE-2024-26843.patch
- From:
- CVE-2024-35957, CVSSv2 Score:
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-35957.patch
- From:
- CVE-2024-26900, CVSSv2 Score:
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-26900.patch
- From:
- CVE-2024-36926, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-36926.patch
- From:
- CVE-2024-36905, CVSSv2 Score: 9.8
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://access.redhat.com/security/cve/CVE-2024-36905
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv-sockets.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26927, CVSSv2 Score: 8.4
- Description:
ASoC: SOF: Add some bounds checking to firmware data
- CVE: https://access.redhat.com/security/cve/CVE-2024-26927
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26927-asoc-sof-add-some-bounds-checking-to-firmware-data.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://access.redhat.com/security/cve/CVE-2024-42154
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26707, CVSSv2 Score: 5.5
- Description:
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26707
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26707-net-hsr-remove-warn-once-in-send-hsr-supervision-frame.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26679, CVSSv2 Score: 5.5
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26679
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26678, CVSSv2 Score:
- Description:
Boot time issue
- CVE:
- Patch: skipped/CVE-2024-26678.patch
- From:
- CVE-2024-26691, CVSSv2 Score: 5.5
- Description:
KVM: arm64: Fix circular locking dependency
- CVE: https://access.redhat.com/security/cve/CVE-2024-26691
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26691-kvm-arm64-fix-circular-locking-dependency.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26680, CVSSv2 Score: 5.5
- Description:
net: atlantic: Fix DMA mapping for PTP hwts ring
- CVE: https://access.redhat.com/security/cve/CVE-2024-26680
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26680-net-atlantic-fix-dma-mapping-for-ptp-hwts-ring.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26686, CVSSv2 Score: 5.5
- Description:
fs/proc: do_task_stat: move thread_group_cputime_adjusted() outside of lock_task_sighand()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26686-fs-proc-do_task_stat-move-thread_group_cputime_adjus.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26686, CVSSv2 Score: 5.5
- Description:
fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to-gather-the-threads-children-stats.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26704, CVSSv2 Score: 5.5
- Description:
ext4: fix double-free of blocks due to wrong
- CVE: https://access.redhat.com/security/cve/CVE-2024-26704
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26700, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Fix MST Null Ptr for RV
- CVE: https://access.redhat.com/security/cve/CVE-2024-26700
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26700-drm-amd-display-Fix-MST-Null-Ptr-for-RV.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26675, CVSSv2 Score: 5.5
- Description:
ppp_async: limit MRU to 64K
- CVE: https://access.redhat.com/security/cve/CVE-2024-26675
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52757, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential deadlock when releasing mids
- CVE: https://access.redhat.com/security/cve/CVE-2023-52757
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52757-smb-client-fix-potential-deadlock-when-releasing-mids.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52632, CVSSv2 Score: 4.4
- Description:
drm/amdkfd: Fix lock dependency warning with srcu
- CVE: https://access.redhat.com/security/cve/CVE-2023-52632
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52632-drm-amdkfd-Fix-lock-dependency-warning-with-srcu.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52634, CVSSv2 Score:
- Description:
The patch for this CVE fixing vulnerability which was introduced in kernel v6.7
- CVE:
- Patch: skipped/CVE-2023-52634.patch
- From:
- CVE-2023-52635, CVSSv2 Score: 5.5
- Description:
PM / devfreq: Synchronize devfreq_monitor_[start/stop]
- CVE: https://access.redhat.com/security/cve/CVE-2023-52635
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52635-pm-devfreq-synchronize-devfreq-monitor-start-stop.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52648, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Unmap the surface before resetting it on a plane state state
- CVE: https://access.redhat.com/security/cve/CVE-2023-52648
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52648-drm-vmwgfx-unmap-the-surface-before-resetting-it-on-a-plane.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52649, CVSSv2 Score: 5.5
- Description:
drm/vkms: Avoid reading beyond LUT array
- CVE: https://access.redhat.com/security/cve/CVE-2023-52649
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52649-drm-vkms-avoid-reading-beyond-lut-array.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52650, CVSSv2 Score: 5.5
- Description:
drm/tegra: dsi: Add missing check for of_find_device_by_node
- CVE: https://access.redhat.com/security/cve/CVE-2023-52650
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52650-drm-tegra-dsi-add-missing-check-for-of-find-device-by-node.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52731, CVSSv2 Score: 5.5
- Description:
fbdev: Fix invalid page access after closing deferred I/O devices
- CVE: https://access.redhat.com/security/cve/CVE-2023-52731
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52731-fbdev-fix-invalid-page-access-after-closing-deferred-i-o-devices.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52686, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52686.patch
- From:
- CVE-2023-52740, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52740.patch
- From:
- CVE-2023-52690, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52690.patch
- From:
- CVE-2023-52730, CVSSv2 Score: 5.5
- Description:
mmc: sdio: fix possible resource leaks in some error paths
- CVE: https://access.redhat.com/security/cve/CVE-2023-52730
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52730-mmc-sdio-fix-possible-resource-leaks-in-some-error-paths.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52703, CVSSv2 Score: 5.5
- Description:
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
- CVE: https://access.redhat.com/security/cve/CVE-2023-52703
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52703-net-usb-kalmia-don-t-pass-act-len-in-usb-bulk-msg-error-path.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52697, CVSSv2 Score: 5.5
- Description:
ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52697
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52697-ASoC-Intel-sof_sdw_rt_sdca_jack_common-ctx-headset_codec_dev-NULL.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52698, CVSSv2 Score: 5.5
- Description:
calipso: fix memory leak in netlbl_calipso_add_pass()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52698
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52698-calipso-fix-memory-leak-in-netlbl_calipso_add_pass.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2023-52689, CVSSv2 Score: 5.5
- Description:
ALSA: scarlett2: Add missing mutex lock around get meter levels
- CVE: https://access.redhat.com/security/cve/CVE-2023-52689
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2023-52689-alsa-scarlett2-add-missing-mutex-lock-around-get-meter-levels.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26958, CVSSv2 Score: 5.5
- Description:
nfs: fix UAF in direct writes
- CVE: https://access.redhat.com/security/cve/CVE-2024-26958
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26958-nfs-fix-UAF-in-direct-writes.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26958, CVSSv2 Score: 5.5
- Description:
nfs: fix UAF in direct writes
- CVE: https://access.redhat.com/security/cve/CVE-2024-26958
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26958-nfs-fix-UAF-in-direct-writes-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26960, CVSSv2 Score: 5.5
- Description:
mm: swap: fix race between free_swap_and_cache() and swapoff()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26960
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26960-mm-swap-fix-race-between-free_swap_and_cache-and-swa.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26964, CVSSv2 Score: 5.5
- Description:
usb: xhci: Add error handling in xhci_map_urb_for_dma
- CVE: https://access.redhat.com/security/cve/CVE-2024-26964
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26964-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26973, CVSSv2 Score: 5.5
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://access.redhat.com/security/cve/CVE-2024-26973
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26975, CVSSv2 Score: 5.5
- Description:
powercap: intel_rapl: Fix a NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-26975
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26975-powercap-intel_rapl-Fix-a-NULL-pointer-dereference.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26984, CVSSv2 Score: 5.5
- Description:
nouveau: fix instmem race condition around ptr stores
- CVE: https://access.redhat.com/security/cve/CVE-2024-26984
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26984-nouveau-fix-instmem-race-condition-around-ptr-stores.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26987, CVSSv2 Score: 5.5
- Description:
mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2024-26987
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26987-mm-memory-failure-fix-deadlock-when-hugetlb_optimize_vmemmap-is-enabled.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26988, CVSSv2 Score:
- Description:
Out of scope as the patch is for vmlinux init sections which are discarded after the boot
- CVE:
- Patch: skipped/CVE-2024-26988.patch
- From:
- CVE-2024-26989, CVSSv2 Score: 5.5
- Description:
arm64: hibernate: Fix level3 translation fault in swsusp_save()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26989
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26989-arm64-hibernate-Fix-level3-translation-fault-in-swsusp_save.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27025, CVSSv2 Score: 5.5
- Description:
nbd: null check for nla_nest_start
- CVE: https://access.redhat.com/security/cve/CVE-2024-27025
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27025-nbd-null-check-for-nla-nest-start.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27023, CVSSv2 Score:
- Description:
Fix commit isn't present
- CVE:
- Patch: skipped/CVE-2024-27023.patch
- From:
- CVE-2024-27389, CVSSv2 Score: 5.5
- Description:
pstore: inode: Only d_invalidate() is needed
- CVE: https://access.redhat.com/security/cve/CVE-2024-27389
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27389-pstore-inode-only-d-invalidate-is-needed.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27038, CVSSv2 Score: 5.5
- Description:
clk: Fix clk_core_get NULL dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-27038
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27038-clk-Fix-clk_core_get-NULL-dereference.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27042, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
- CVE: https://access.redhat.com/security/cve/CVE-2024-27042
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27042-drm-amdgpu-Fix-potential-out-of-bounds-access-in-amdgpu_discovery_reg_base_init.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27048, CVSSv2 Score: 5.5
- Description:
wifi: brcm80211: handle pmk_op allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-27048
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27048-wifi-brcm80211-handle-pmk_op-allocation-failure.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27057, CVSSv2 Score: 5.5
- Description:
ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
- CVE: https://access.redhat.com/security/cve/CVE-2024-27057
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27057-ASoC-SOF-ipc4-pcm-Workaround-for-crashed-firmware-on-system-suspend.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27395, CVSSv2 Score: 5.5
- Description:
net: openvswitch: Fix Use-After-Free in ovs_ct_exit
- CVE: https://access.redhat.com/security/cve/CVE-2024-27395
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27395-net-openvswitch-fix-use-after-free-in-ovs-ct-exit.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27404, CVSSv2 Score:
- Description:
Complex adaptation required. Network services prevents update because they can sleep in subflow_finish_connect() function.
- CVE:
- Patch: skipped/CVE-2024-27404.patch
- From:
- CVE-2024-27410, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://access.redhat.com/security/cve/CVE-2024-27410
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-chang.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27414, CVSSv2 Score: 5.5
- Description:
rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
- CVE: https://access.redhat.com/security/cve/CVE-2024-27414
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27414-rtnetlink-fix-error-logic-of-IFLA_BRIDGE_FLAGS-writing-back.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35787, CVSSv2 Score: 5.5
- Description:
md/md-bitmap: fix incorrect usage for sb_index
- CVE: https://access.redhat.com/security/cve/CVE-2024-35787
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35787-md-md-bitmap-fix-incorrect-usage-for-sb_index.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35795, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: fix deadlock while reading mqd from debugfs
- CVE: https://access.redhat.com/security/cve/CVE-2024-35795
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35795-drm-amdgpu-fix-deadlock-while-reading-mqd-from-debugfs.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27431, CVSSv2 Score: 5.5
- Description:
cpumap: Zero-initialise xdp_rxq_info struct before running
- CVE: https://access.redhat.com/security/cve/CVE-2024-27431
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27431-cpumap-Zero-initialise-xdp_rxq_info-struct-before-running-xdp-program.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27436, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Stop parsing channels bits when all channels
- CVE: https://access.redhat.com/security/cve/CVE-2024-27436
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27436-ALSA-usb-audio-Stop-parsing-channels-bits-when-all-channels.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-31076, CVSSv2 Score: 5.1
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
- CVE: https://access.redhat.com/security/cve/CVE-2024-31076
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-31076-genirq-cpuhotplug-x86-vector-Prevent-vector-leak-during-CPU-offline.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35794, CVSSv2 Score:
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-35794.patch
- From:
- CVE-2024-27079, CVSSv2 Score:
- Description:
Bug triggers in kdump kernel which we don't patch
- CVE:
- Patch: skipped/CVE-2024-27079.patch
- From:
- CVE-2024-26641, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26641
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26641-ip6-tunnel-make-sure-to-pull-inner-header-in-ip6-tnl-rcv.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26656, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: fix use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26656
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26660, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Implement bounds check for stream encoder creation in DCN301
- CVE: https://access.redhat.com/security/cve/CVE-2024-26660
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream-encoder-creation-in-DCN301.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26661, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
- CVE: https://access.redhat.com/security/cve/CVE-2024-26661
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26661-drm-amd-display-add-null-test-for-timing-generator-in-dcn21_set_pipe.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26662, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'
- CVE: https://access.redhat.com/security/cve/CVE-2024-26662
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26662-drm-amd-display-fix-panel_cntl-could-be-null-in-dcn21_set_backlight_level.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26663, CVSSv2 Score: 5.5
- Description:
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26663
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26663-tipc-check-the-bearer-type-before-calling-tipc_udp_nl_bearer_add.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26669, CVSSv2 Score: 7.1
- Description:
net/sched: flower: Fix chain template offload kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-26669
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26669-net-sched-flower-fix-chain-template-offload-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26674, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-26674.patch
- From:
- CVE-2024-26990, CVSSv2 Score: 5.5
- Description:
KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
- CVE: https://access.redhat.com/security/cve/CVE-2024-26990
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26990-KVM-x86-mmu-Write-protect-L2-SPTEs-in-TDP-MMU-when-clearing-dirty-status.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27013, CVSSv2 Score: 5.5
- Description:
tun: limit printing rate when illegal packet received by tun dev
- CVE: https://access.redhat.com/security/cve/CVE-2024-27013
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27013-tun-limit-printing-rate-when-illegal-packet-received-by-tun-dev.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27015, CVSSv2 Score: 5.5
- Description:
netfilter: flowtable: incorrect pppoe tuple
- CVE: https://access.redhat.com/security/cve/CVE-2024-27015
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27015-netfilter-flowtable-incorrect-pppoe-tuple.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35877, CVSSv2 Score: 5.5
- Description:
x86/mm/pat: fix VM_PAT handling in COW mappings
- CVE: https://access.redhat.com/security/cve/CVE-2024-35877
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35877-x86-mm-pat-fix-vm-pat-handling-in-cow-mappings.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35864, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35864
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35864-smb__client__fix_potential_UAF_in_smb2_is_valid_le.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35866, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35866
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35865, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in smb2_is_valid_oplock_break()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35865
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35865-smb-client-fix-potential-uaf-in-smb2-is-valid-oplock-break.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35867, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35867
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35867-smb__client__fix_potential_UAF_in_cifs_stats_proc_.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35878, CVSSv2 Score: 5.5
- Description:
of: module: prevent NULL pointer dereference in vsnprintf()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35878
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35878-of-module-prevent-null-pointer-dereference-in-vsnprintf.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35872, CVSSv2 Score: 5.5
- Description:
mm/secretmem: fix GUP-fast succeeding on secretmem folios
- CVE: https://access.redhat.com/security/cve/CVE-2024-35872
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35872-mm-secretmem-fix-gup-fast-succeeding-on-secretmem-folios.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35876, CVSSv2 Score: 5.5
- Description:
x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35876
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35876-x86-mce-make-sure-to-grab-mce-sysfs-mutex-in-set-bank.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35886, CVSSv2 Score: 5.5
- Description:
ipv6: Fix infinite recursion in fib6_dump_done().
- CVE: https://access.redhat.com/security/cve/CVE-2024-35886
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35886-ipv6-fix-infinite-recursion-in-fib6-dump-done.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35888, CVSSv2 Score: 5.5
- Description:
erspan: make sure erspan_base_hdr is present in skb->head
- CVE: https://access.redhat.com/security/cve/CVE-2024-35888
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35888-erspan-make-sure-erspan_base_hdr-is-present-in-skb-h.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35892, CVSSv2 Score: 5.5
- Description:
net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35892
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35892-net-sched-fix-lockdep-splat-in-qdisc-tree-reduce-backlog.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35894, CVSSv2 Score: 5.5
- Description:
mptcp: prevent BPF accessing lowat from a subflow socket.
- CVE: https://access.redhat.com/security/cve/CVE-2024-35894
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35894-mptcp-prevent-bpf-accessing-lowat-from-a-subflow-socket.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35900, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: reject new basechain after table flag update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35900
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35900-netfilter-nf-tables-reject-new-basechain-after-table-flag-update.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35905, CVSSv2 Score: 5.5
- Description:
bpf: Fix verification of indirect var-off stack access
- CVE: https://access.redhat.com/security/cve/CVE-2024-35905
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35905-bpf-Fix-verification-of-indirect-var-off-stack-access.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35905, CVSSv2 Score: 5.5
- Description:
bpf: Protect against int overflow for stack access size
- CVE: https://access.redhat.com/security/cve/CVE-2024-35905
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35905-bpf-protect-against-int-overflow-for-stack-access-size.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35908, CVSSv2 Score: 5.5
- Description:
tls: get psock ref after taking rxlock to avoid leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-35908
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35908-tls-get-psock-ref-after-taking-rxlock-to-avoid-leak.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35912, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: rfi: fix potential response leaks
- CVE: https://access.redhat.com/security/cve/CVE-2024-35912
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35912-wifi-iwlwifi-mvm-rfi-fix-potential-response-leaks.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35913, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF
- CVE: https://access.redhat.com/security/cve/CVE-2024-35913
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35913-wifi-iwlwifi-mvm-pick-the-version-of-SESSION_PROTECT.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35918, CVSSv2 Score:
- Description:
It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.
- CVE:
- Patch: skipped/CVE-2024-35918.patch
- From:
- CVE-2024-38604, CVSSv2 Score:
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-38604.patch
- From:
- CVE-2024-38632, CVSSv2 Score:
- Description:
Existing kernels aren't affected
- CVE:
- Patch: skipped/CVE-2024-38632.patch
- From:
- CVE-2024-38635, CVSSv2 Score: 5.5
- Description:
soundwire: cadence: fix invalid PDI offset
- CVE: https://access.redhat.com/security/cve/CVE-2024-38635
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38635-soundwire-cadence-fix-invalid-PDI-offset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38618, CVSSv2 Score: 5.5
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://access.redhat.com/security/cve/CVE-2024-38618
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38596, CVSSv2 Score: 5.5
- Description:
af_unix: Fix data races around sk->sk_shutdown.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38596-01-af_unix-Fix-data-races-around-sk-sk_shutdown.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38596, CVSSv2 Score: 5.5
- Description:
af_unix: Fix data races around sk->sk_shutdown.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38596-02-af_unix-Fix-data-races-around-sk-sk_shutdown.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38596, CVSSv2 Score: 5.5
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38596-03-af_unix-Fix-data-races-in-unix_stream_sendmsg.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-39276, CVSSv2 Score: 5.5
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39276
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in-ext4-xattr-block-cache-find.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38600, CVSSv2 Score: 5.5
- Description:
ALSA: Fix deadlocks with kctl removals at disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2024-38600
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38600-alsa-fix-deadlocks-with-kctl-removals-at-disconnection.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38629, CVSSv2 Score: 5.5
- Description:
dmaengine: idxd: Avoid unnecessary destruction of file_ida
- CVE: https://access.redhat.com/security/cve/CVE-2024-38629
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38629-dmaengine-idxd-Avoid-unnecessary-destruction-of-file_ida.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38388, CVSSv2 Score: 5.5
- Description:
ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2024-38388
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38388-alsa-hda-cs-dsp-ctl-use-private-free-for-control-cleanup.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-38598, CVSSv2 Score: 5.5
- Description:
md: fix resync softlockup when bitmap size is less than array size
- CVE: https://access.redhat.com/security/cve/CVE-2024-38598
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-38598-md-fix-resync-softlockup-when-bitmap-size-is-less-than-array-size.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42124, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2024-42124
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42101, CVSSv2 Score: 5.5
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42101.html
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in-nouveau-connector-get-modes.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42084, CVSSv2 Score: 5.7
- Description:
ftruncate: pass a signed offset
- CVE: https://access.redhat.com/security/cve/CVE-2024-42084
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42090, CVSSv2 Score: 4.7
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://access.redhat.com/security/cve/CVE-2024-42090
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42114, CVSSv2 Score: 4.4
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42114, CVSSv2 Score: 4.4
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42125, CVSSv2 Score:
- Description:
kernel version 5.14 not affected
- CVE:
- Patch: skipped/CVE-2024-42125.patch
- From:
- CVE-2024-42123, CVSSv2 Score:
- Description:
kernel version 5.14 not affected
- CVE:
- Patch: skipped/CVE-2024-42123.patch
- From:
- CVE-2024-42078, CVSSv2 Score:
- Description:
kernel version 5.14 not affected
- CVE:
- Patch: skipped/CVE-2024-42078.patch
- From:
- CVE-2024-42132, CVSSv2 Score: 5.5
- Description:
bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
- CVE: https://access.redhat.com/security/cve/CVE-2024-42132
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42132-bluetooth-hci-disallow-setting-handle-bigger-than-hci-conn-handle-max.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-42070, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-42070
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-42070-netfilter-nf-tables-fully-validate-nft-data-value-on-store-to-data-registers.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27004, CVSSv2 Score: 5.5
- Description:
clk: Get runtime PM before walking tree during disable_unused
- CVE: https://access.redhat.com/security/cve/cve-2024-27004
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27004-clk-Get-runtime-PM-before-walking-tree-during-disable_unused.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27004, CVSSv2 Score: 5.5
- Description:
clk: Get runtime PM before walking tree during disable_unused
- CVE: https://access.redhat.com/security/cve/cve-2024-27004
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27004-clk-Get-runtime-PM-before-walking-tree-during-disable_unused-adapt.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26708, CVSSv2 Score: 5.5
- Description:
mptcp: really cope with fastopen race
- CVE: https://access.redhat.com/security/cve/CVE-2024-26708
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26708-mptcp-really-cope-with-fastopen-race.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27003, CVSSv2 Score: 5.5
- Description:
Get runtime PM before walking tree for clk_summaryatch-description:
- CVE: https://access.redhat.com/security/cve/cve-2024-27003
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27003-clk-Get-runtime-PM-before-walking-tree-for-clk_summary.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27062, CVSSv2 Score: 5.5
- Description:
nouveau: lock the client object tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-27062
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27062-nouveau-lock-the-client-object-tree.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-27062, CVSSv2 Score: 5.5
- Description:
nouveau: lock the client object tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-27062
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-27062-nouveau-lock-the-client-object-tree-kpatch.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35904, CVSSv2 Score:
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-35904.patch
- From:
- CVE-2024-35859, CVSSv2 Score:
- Description:
None of the kernels is affected
- CVE:
- Patch: skipped/CVE-2024-35859.patch
- From:
- CVE-2024-35835, CVSSv2 Score: 5.5
- Description:
net/mlx5e: fix a double-free in arfs_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2024-35835
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35835-net-mlx5e-fix-a-double-free-in-arfs-create-groups.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35840, CVSSv2 Score: 5.5
- Description:
mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35840
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35840-mptcp-use-option-mptcp-mpj-synack-in-subflow-finish-connect.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35855, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35855
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35855-mlxsw-spectrum-acl-tcam-fix-possible-use-after-free-during-activity-update.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35838, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: fix potential sta-link leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-35838
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35838-wifi-mac80211-fix-potential-sta-link-leak.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35847, CVSSv2 Score: 5.5
- Description:
irqchip/gic-v3-its: Prevent double free on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-35847
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35847-irqchip-gic-v3-its-prevent-double-free-on-error.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35831, CVSSv2 Score: 5.5
- Description:
io_uring: Fix release of pinned pages when __io_uaddr_map fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-35831
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35831-io_uring-Fix-release-of-pinned-pages-when-__io_uaddr_map-fails.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26928, CVSSv2 Score: 5.6
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26928
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26928-smb-client-fix-potential-UAF-in-cifs_debug_files_proc_show.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35861, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35861
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35861-smb-client-fix-potential-uaf-in-cifs-signal-cifsd-for-reconnect.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35862, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in smb2_is_network_name_deleted()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35862
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35862-smb-client-fix-potential-uaf-in-smb2-is-network-name-deleted.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35863, CVSSv2 Score: 5.5
- Description:
smb: client: fix potential UAF in is_valid_oplock_break()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35863
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-35863-smb-client-fix-potential-uaf-in-is-valid-oplock-break.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-26837, CVSSv2 Score: 5.5
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload
- CVE: https://access.redhat.com/security/cve/CVE-2024-26837
- Patch: rhel9/5.14.0-503.11.1.el9_5/CVE-2024-26837-net-bridge-switchdev-Skip-MDB-replays-of-deferred-ev.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2024-35942, CVSSv2 Score:
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2024-35942.patch
- From:
- CVE-2024-42283, CVSSv2 Score: 5.5
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://access.redhat.com/security/cve/CVE-2024-42283
- Patch: rhel9/5.14.0-503.14.1.el9_5/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.14.0-503.14.1.el9_5
- CVE-2024-46858, CVSSv2 Score: 7.0
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-46858
- Patch: rhel9/5.14.0-503.14.1.el9_5/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 5.14.0-503.14.1.el9_5
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-41009-bpf-fix-overrunning-reservations-in-ringbuf.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-41009-bpf-fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-42244, CVSSv2 Score: 5.5
- Description:
USB: serial: mos7840: fix crash on resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-42244-USB-serial-mos7840-fix-crash-on-resume.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-42244, CVSSv2 Score: 5.5
- Description:
USB: serial: mos7840: fix crash on resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-42244-USB-serial-mos7840-fix-crash-on-resume-kpatch.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-50226, CVSSv2 Score: 7.8
- Description:
cxl/port: Fix use-after-free, permit out-of-order decoder shutdown
- CVE: https://access.redhat.com/security/cve/CVE-2024-50226
- Patch: rhel9/5.14.0-503.15.1.el9_5/CVE-2024-50226-cxl-port-fix-use-after-free-permit-out-of-order-decoder-shutdown-427.patch
- From: 5.14.0-503.15.1.el9_5
- CVE-2024-50251, CVSSv2 Score: 6.2
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50251
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-50251-netfilter-nft_payload-sanitize-offset-and-length-before-calling-skb_checksum.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-26615, CVSSv2 Score: 5.5
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://access.redhat.com/security/cve/CVE-2024-26615
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-46695, CVSSv2 Score: 5.5
- Description:
selinux,smack: don't bypass permissions check in inode_setsecctx hook
- CVE: https://access.redhat.com/security/cve/CVE-2024-46695
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-49949, CVSSv2 Score: 5.5
- Description:
net: avoid potential underflow in qdisc_pkt_len_init() with UFO
- CVE: https://access.redhat.com/security/cve/CVE-2024-49949
- Patch: rhel9/5.14.0-503.16.1.el9_5/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc_pkt_len_init-with-UFO.patch
- From: 5.14.0-503.16.1.el9_5
- CVE-2024-50208, CVSSv2 Score: 5.5
- Description:
RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
- CVE: https://access.redhat.com/security/cve/CVE-2024-50208
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-53122, CVSSv2 Score: 5.5
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://access.redhat.com/security/cve/CVE-2024-53122
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-50252, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address
- CVE: https://access.redhat.com/security/cve/CVE-2024-50252
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-50252-mlxsw-spectrum_ipip-Fix-memory-leak-when-changing-remote-IPv6-address.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-46713, CVSSv2 Score: 5.5
- Description:
perf/aux: Fix AUX buffer serialization
- CVE: https://access.redhat.com/security/cve/CVE-2024-46713
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization.patch
- From: 5.14.0-503.21.1.el9_5
- CVE-2024-46713, CVSSv2 Score: 5.5
- Description:
perf/aux: Fix AUX buffer serialization (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-46713
- Patch: rhel9/5.14.0-503.21.1.el9_5/CVE-2024-46713-perf-aux-Fix-AUX-buffer-serialization-kpatch.patch
- From: 5.14.0-503.21.1.el9_5