- kernel-uek-5.15.0-303.171.5.2.2.el8uek (oel8-uek7)
- 5.15.0-317.197.5.1.el8uek
- 2026-03-10 22:05:00
- 2026-03-11 11:20:07
- K20260310_13
- CVE-2024-50261
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://linux.oracle.com/cve/CVE-2024-50261.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://linux.oracle.com/cve/CVE-2024-50301.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new-kpatch.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations-kpatch.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Initialize struct nfsd4_copy earlier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Initialize-struct-nfsd4_copy-earlier.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Never decrement pending_async_copies on error
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Never-decrement-pending_async_copies-on-error.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-53227
- Description:
Patch affects __init
- CVE:
- Patch: skipped/CVE-2024-53227.patch
- From:
- CVE-2024-49950
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-49950.patch
- From:
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://linux.oracle.com/cve/CVE-2024-53104.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53165
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://linux.oracle.com/cve/CVE-2024-56581.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56606.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56614.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56615.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-42138
- Description:
mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
- CVE: https://linux.oracle.com/cve/CVE-2024-42138.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-42138-mlxsw-core-linecards-fix-double-memory-deallocation-in-case-of-invalid-ini-file.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://linux.oracle.com/cve/CVE-2024-50264.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://linux.oracle.com/cve/CVE-2024-53156.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44949
- Description:
Architecture PARISC is not supported
- CVE:
- Patch: skipped/CVE-2024-44949.patch
- From:
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://linux.oracle.com/cve/CVE-2024-56642.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56661
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://linux.oracle.com/cve/CVE-2024-56661.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56661-tipc-fix-null-deref-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://linux.oracle.com/cve/CVE-2024-53061.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50121
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://linux.oracle.com/cve/CVE-2024-50121.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://linux.oracle.com/cve/CVE-2024-50267.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://linux.oracle.com/cve/CVE-2024-53150.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50275
- Description:
Irrelevant for x64 kernels
- CVE:
- Patch: skipped/CVE-2024-50275.patch
- From:
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-50036.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://linux.oracle.com/cve/CVE-2024-56650.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://linux.oracle.com/cve/CVE-2024-56627.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://linux.oracle.com/cve/CVE-2024-56662.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://linux.oracle.com/cve/CVE-2024-53155.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53099
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://linux.oracle.com/cve/CVE-2024-53099.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-50268.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50279.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://linux.oracle.com/cve/CVE-2024-38538.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50283
- Description:
ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp
- CVE: https://linux.oracle.com/cve/CVE-2024-50283.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50283-ksmbd-fix-slab-use-after-free-in-smb3-preauth-hash-rsp.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://linux.oracle.com/cve/CVE-2024-53141.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53171
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://linux.oracle.com/cve/CVE-2024-53171.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://linux.oracle.com/cve/CVE-2024-56704.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56602.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://linux.oracle.com/cve/CVE-2024-56596.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://linux.oracle.com/cve/CVE-2024-47730.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://linux.oracle.com/cve/CVE-2024-39494.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://linux.oracle.com/cve/CVE-2024-56626.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759
- Description:
btrfs: rename and export __btrfs_cow_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-rename-and-export-__btrfs_cow_block.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53240
- Description:
xen/netfront: fix crash when removing device
- CVE: https://linux.oracle.com/cve/CVE-2024-53240.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53240-xen-netfront-fix-crash-when-removing-device.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-50302.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-40939
- Description:
net: wwan: iosm: Fix tainted pointer delete is case of region creation fail
- CVE: https://linux.oracle.com/cve/CVE-2024-40939.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-40939-net-wwan-iosm-fix-tainted-pointer-delete-is-case-of-region-creation-fail.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-46841
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://linux.oracle.com/cve/CVE-2024-46841.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56597
- Description:
jfs: fix shift-out-of-bounds in dbSplit
- CVE: https://linux.oracle.com/cve/CVE-2024-56597.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56597-jfs-fix-shift-out-of-bounds-in-dbsplit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-56532
- Description:
ALSA: us122l: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56532.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56532-alsa-us122l-use-snd-card-free-when-closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://linux.oracle.com/cve/CVE-2024-53112.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://linux.oracle.com/cve/CVE-2024-53173.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://linux.oracle.com/cve/CVE-2024-56640.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue-304.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create-continuation.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56601.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56600.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://linux.oracle.com/cve/CVE-2024-56595.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44940
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://linux.oracle.com/cve/CVE-2024-44940.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-40906
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://linux.oracle.com/cve/CVE-2024-40906.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://linux.oracle.com/cve/CVE-2024-49996.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://linux.oracle.com/cve/CVE-2024-50055.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://linux.oracle.com/cve/CVE-2024-50269.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50282
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-53096
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://linux.oracle.com/cve/CVE-2024-53096.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53096-mm-resolve-faulty-mmap-region-error-path-behaviour.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-53103.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237
- Description:
driver core: Introduce device_find_any_child() helper
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-driver-core-introduce-device_find_any_child-helper.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://linux.oracle.com/cve/CVE-2024-56598.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56603.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-56708.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-41080
- Description:
io_uring: fix possible deadlock in io_register_iowq_max_workers()
- CVE: https://linux.oracle.com/cve/CVE-2024-41080.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-41080-io-uring-fix-possible-deadlock-in-io-register-iowq-max-workers.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50299
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://linux.oracle.com/cve/CVE-2024-50299.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53172
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://linux.oracle.com/cve/CVE-2024-53172.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50292
- Description:
ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
- CVE: https://linux.oracle.com/cve/CVE-2024-50292.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50292-asoc-stm32-spdifrx-fix-dma-channel-release-in-stm32-spdifrx-remove.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56616
- Description:
drm/dp_mst: Fix MST sideband message body length check
- CVE: https://linux.oracle.com/cve/CVE-2024-56616.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56616-drm-dp-mst-fix-mst-sideband-message-body-length-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56623
- Description:
low-scored CVE which causes verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-56623.patch
- From:
- CVE-2024-56637
- Description:
netfilter: ipset: Hold module reference while requesting a module
- CVE: https://linux.oracle.com/cve/CVE-2024-56637.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56637-netfilter-ipset-hold-module-reference-while-requesting-a-module.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-53161.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56531
- Description:
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56531.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56531-ALSA-caiaq-Use-snd_card_free_when_closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56531
- Description:
ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56531.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56531-ALSA-caiaq-Use-snd_card_free_when_closed-at-disconnection-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56548
- Description:
oel9-uek7 kernels are compiled without CONFIG_HFSPLUS_FS
- CVE:
- Patch: skipped/CVE-2024-56548.patch
- From:
- CVE-2024-56633
- Description:
tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56633-tcp-bpf-fix-the-sk-mem-uncharge-logic-in-tcp-bpf-sendmsg.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-56619.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56747
- Description:
scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56747.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56747-scsi-qedi-fix-a-possible-memory-leak-in-qedi-alloc-and-init-sb.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-43864
- Description:
net/mlx5e: Fix CT entry update leaks of modify header context
- CVE: https://linux.oracle.com/cve/CVE-2024-43864.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-43864-net-mlx5e-fix-ct-entry-update-leaks-of-modify-header-context.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56622
- Description:
scsi: ufs: core: sysfs: Prevent div by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-56622.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56622-scsi-ufs-core-sysfs-prevent-div-by-zero.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53145
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53217
- Description:
NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53217-nfsd-prevent-null-dereference-in-nfsd4-process-cb-update.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50287
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-50287.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53131
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53131.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56634
- Description:
gpio: grgpio: Add NULL check in grgpio_probe
- CVE: https://linux.oracle.com/cve/CVE-2024-56634.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56634-gpio-grgpio-add-NULL-check-in-grgpio_probe-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56571
- Description:
Rejected and is no longer a valid CVE
- CVE:
- Patch: skipped/CVE-2024-56571.patch
- From:
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://linux.oracle.com/cve/CVE-2024-53052.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53052-io-uring-rw-fix-missing-nowait-check-for-o-direct-start-write.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56705
- Description:
media: atomisp: Add check for rgby_data memory allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-56705.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56705-media-atomisp-add-check-for-rgby-data-memory-allocation-failure.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56728
- Description:
octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c
- CVE: https://linux.oracle.com/cve/CVE-2024-56728.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56728-octeontx2-pf-handle-otx2-mbox-get-rsp-errors-in-otx2-ethtool-c.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56694
- Description:
bpf: fix recursive lock when verdict program return SK_PASS
- CVE: https://linux.oracle.com/cve/CVE-2024-56694.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56694-bpf-fix-recursive-lock-when-verdict-program-return-sk-pass.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56746
- Description:
fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()
- CVE: https://linux.oracle.com/cve/CVE-2024-56746.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56746-fbdev-sh7760fb-fix-a-possible-memory-leak-in-sh7760fb-alloc-mem.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53180
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://linux.oracle.com/cve/CVE-2024-53180.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56739
- Description:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-56739.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56739-rtc-check-if-rtc-read-time-was-successful-in-rtc-timer-do-work.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://linux.oracle.com/cve/CVE-2024-56644.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56715
- Description:
ionic: Fix netdev notifier unregister on failure
- CVE: https://linux.oracle.com/cve/CVE-2024-56715.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56715-ionic-fix-netdev-notifier-unregister-on-failure.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56754
- Description:
crypto: caam - Fix the pointer passed to caam_qi_shutdown()
- CVE: https://linux.oracle.com/cve/CVE-2024-56754.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56754-crypto-caam-fix-the-pointer-passed-to-caam-qi-shutdown-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50296
- Description:
net: hns3: fix kernel crash when uninstalling driver
- CVE: https://linux.oracle.com/cve/CVE-2024-50296.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50296-net-hns3-fix-kernel-crash-when-uninstalling-driver.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50295
- Description:
The ndev->dev.parent mappings cannot be changed to ndev->dev.parent and driver is broken already
- CVE:
- Patch: skipped/CVE-2024-50295.patch
- From:
- CVE-2024-53101
- Description:
fs: Fix uninitialized value issue in from_kuid and from_kgid
- CVE: https://linux.oracle.com/cve/CVE-2024-53101.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53101-fs-fix-uninitialized-value-issue-in-from-kuid-and-from-kgid.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56630
- Description:
ocfs2: free inode when ocfs2_get_init_inode() fails
- CVE: https://linux.oracle.com/cve/CVE-2024-56630.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56630-ocfs2-free-inode-when-ocfs2-get-init-inode-fails.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56610
- Description:
This patch fixes kcsan issue on PREEMPT_RT kernels. Our customers don't have kernels with kcsan since it is a debugging feature
- CVE:
- Patch: skipped/CVE-2024-56610.patch
- From:
- CVE-2024-53066
- Description:
nfs: Fix KMSAN warning in decode_getfattr_attrs()
- CVE: https://linux.oracle.com/cve/CVE-2024-53066.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53066-nfs-fix-kmsan-warning-in-decode-getfattr-attrs.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56763
- Description:
tracing: Prevent bad count for tracing_cpumask_write
- CVE: https://linux.oracle.com/cve/CVE-2024-56763.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56763-tracing-prevent-bad-count-for-tracing-cpumask-write.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56562
- Description:
i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
- CVE: https://linux.oracle.com/cve/CVE-2024-56562.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56562-i3c-master-Fix-miss-free-init_dyn_addr-at-i3c_master_put_i3c_addrs.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53241
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-53241.patch
- From:
- CVE-2024-42268
- Description:
net/mlx5: Fix missing lock on sync reset reload
- CVE: https://linux.oracle.com/cve/CVE-2024-42268.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-42268-net-mlx5-fix-missing-lock-on-sync-reset-reload.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-42315
- Description:
exfat: fix potential deadlock on __exfat_get_dentry_se
- CVE: https://linux.oracle.com/cve/CVE-2024-42315.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-42315-exfat-fix-potential-deadlock-on-exfat-get-dentry-set.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-53174
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://linux.oracle.com/cve/CVE-2024-53174.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-56568
- Description:
Patch targets ARM architecture, which this distro does not support.
- CVE:
- Patch: skipped/CVE-2024-56568.patch
- From:
- CVE-2024-56648
- Description:
net: hsr: avoid potential out-of-bound access in fill_frame_info()
- CVE: https://linux.oracle.com/cve/CVE-2024-56648.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56648-net-hsr-avoid-potential-out-of-bound-access-in-fill-frame-info.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-56659
- Description:
net: lapb: increase LAPB_HEADER_LEN
- CVE: https://linux.oracle.com/cve/CVE-2024-56659.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56659-net-lapb-increase-lapb-header-len.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-56690
- Description:
crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
- CVE: https://linux.oracle.com/cve/CVE-2024-56690.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56690-crypto-pcrypt-call-crypto-layer-directly-when-padata-do-parallel-return-ebusy.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-56716
- Description:
netdevsim: prevent bad user input in nsim_dev_health_break_write()
- CVE: https://linux.oracle.com/cve/CVE-2024-56716.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56716-netdevsim-prevent-bad-user-input-in-nsim-dev-health-break-write.patch
- From: 5.15.0-305.176.4.el8uek
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://linux.oracle.com/cve/CVE-2024-56672.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-56631.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53162
- Description:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
- CVE: https://linux.oracle.com/cve/CVE-2024-53162.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53162-crypto-qat-qat-4xxx-fix-off-by-one-in-uof-get-name.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://linux.oracle.com/cve/CVE-2024-36899.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47687
- Description:
vdpa/mlx5: Fix invalid mr resource destroy
- CVE: https://linux.oracle.com/cve/CVE-2024-47687.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47687-vdpa-mlx5-fix-invalid-mr-resource-destroy-5.15.0-304.171.4.3.el9uek.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-47707.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://linux.oracle.com/cve/CVE-2024-53124.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-57804
- Description:
scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs
- CVE: https://linux.oracle.com/cve/CVE-2024-57804.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-57804-scsi-mpi3mr-fix-corrupt-config-pages-phy-state-is-switched-in-sysfs.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53110
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53110
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error-kpatch.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56760
- Description:
PCI/MSI: Handle lack of irqdomain gracefully
- CVE: https://linux.oracle.com/cve/CVE-2024-56760.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56760-pci-msi-handle-lack-of-irqdomain-gracefully.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-53213
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://linux.oracle.com/cve/CVE-2024-53213.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-50155
- Description:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-50155.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-50155-netdevsim-use-cond-resched-in-nsim-dev-trap-report-work.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-41079
- Description:
nvmet-auth: complete a request only after freeing the dhchap pointers
- CVE: https://linux.oracle.com/cve/CVE-2024-41079.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-41079-nvmet-auth-complete-a-request-only-after-freeing-the-dhchap-pointers.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-41079
- Description:
nvmet: always initialize cqe.result
- CVE: https://linux.oracle.com/cve/CVE-2024-41079.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-41079-nvmet-always-initialize-cqe-result.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-35972
- Description:
bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-35972.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-35972-bnxt-en-fix-possible-memory-leak-in-bnxt-rdma-aux-device-init.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-40919
- Description:
bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
- CVE: https://linux.oracle.com/cve/CVE-2024-40919.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-40919-bnxt-en-adjust-logging-of-firmware-messages-in-case-of-released-token-in-hwrm-send.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-53209
- Description:
bnxt_en: Fix receive ring space parameters when XDP is active
- CVE: https://linux.oracle.com/cve/CVE-2024-53209.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-53209-bnxt-en-fix-receive-ring-space-parameters-when-xdp-is-active.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56656
- Description:
bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips
- CVE: https://linux.oracle.com/cve/CVE-2024-56656.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56656-bnxt-en-fix-aggregation-id-mask-to-prevent-oops-on-5760x-chips.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56660
- Description:
net/mlx5: DR, prevent potential error pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-56660.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56660-net-mlx5-dr-prevent-potential-error-pointer-dereference.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-50215
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://linux.oracle.com/cve/CVE-2024-50215.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-46842
- Description:
scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
- CVE: https://linux.oracle.com/cve/CVE-2024-46842.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-46842-scsi-lpfc-Handle-mailbox-timeouts-in-lpfc_get_sfp_info.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-44984
- Description:
bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
- CVE: https://linux.oracle.com/cve/CVE-2024-44984.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-44984-bnxt_en-Fix-double-DMA-unmapping-for-XDP_REDIRECT.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56583
- Description:
sched/deadline: Fix warning in migrate_enable for boosted tasks
- CVE: https://linux.oracle.com/cve/CVE-2024-56583.html
- Patch: oel9-uek7/5.15.0-308.179.6.el9uek/CVE-2024-56583-sched-deadline-fix-warning-in-migrate-enable-for-boosted-tasks.patch
- From: 5.15.0-308.179.6.el9uek
- CVE-2024-28956
- Description:
Patch meant for use with microcode update
- CVE:
- Patch: skipped/CVE-2024-28956.patch
- From:
- CVE-2024-8805
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://linux.oracle.com/cve/CVE-2024-8805.html
- Patch: oel9-uek7/5.15.0-309.180.4.el9uek/CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-309.180.4.el9uek
- CVE-2025-37758
- Description:
ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()
- CVE: https://linux.oracle.com/cve/CVE-2025-37758.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37758-ata-pata-pxa-fix-potential-null-pointer-dereference-in-pxa-ata-probe.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37757
- Description:
tipc: fix memory leak in tipc_link_xmit
- CVE: https://linux.oracle.com/cve/CVE-2025-37757.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37757-tipc-fix-memory-leak-in-tipc-link-xmit.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37756
- Description:
net: tls: explicitly disallow disconnect
- CVE: https://linux.oracle.com/cve/CVE-2025-37756.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37756-net-tls-explicitly-disallow-disconnect.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://linux.oracle.com/cve/CVE-2025-37749.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-37859
- Description:
page_pool: avoid infinite loop to schedule delayed worker
- CVE: https://linux.oracle.com/cve/CVE-2025-37859.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37859-page-pool-avoid-infinite-loop-to-schedule-delayed-worker.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37742
- Description:
jfs: Fix uninit-value access of imap allocated in the diMount() function
- CVE: https://linux.oracle.com/cve/CVE-2025-37742.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37742-jfs-fix-uninit-value-access-of-imap-allocated-in-the-dimount-function.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37858
- Description:
fs/jfs: Prevent integer overflow in AG size calculation
- CVE: https://linux.oracle.com/cve/CVE-2025-37858.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37858-fs-jfs-prevent-integer-overflow-in-ag-size-calculation.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37741
- Description:
jfs: Prevent copying of nlink with value 0 from disk inode
- CVE: https://linux.oracle.com/cve/CVE-2025-37741.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37741-jfs-prevent-copying-of-nlink-with-value-0-from-disk-inode.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37740
- Description:
jfs: add sanity check for agwidth in dbMount
- CVE: https://linux.oracle.com/cve/CVE-2025-37740.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37740-jfs-add-sanity-check-for-agwidth-in-dbmount.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37739
- Description:
f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()
- CVE: https://linux.oracle.com/cve/CVE-2025-37739.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37739-f2fs-fix-to-avoid-out-of-bounds-access-in-f2fs-truncate-inode-blocks.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37738
- Description:
ext4: ignore xattrs past end
- CVE: https://linux.oracle.com/cve/CVE-2025-37738.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37738-ext4-ignore-xattrs-past-end.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37857
- Description:
scsi: st: Fix array overflow in st_setup()
- CVE: https://linux.oracle.com/cve/CVE-2025-37857.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37857-scsi-st-fix-array-overflow-in-st-setup.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23163
- Description:
net: vlan: don't propagate flags on open
- CVE: https://linux.oracle.com/cve/CVE-2025-23163.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23163-net-vlan-don-t-propagate-flags-on-open.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37850
- Description:
pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()
- CVE: https://linux.oracle.com/cve/CVE-2025-37850.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37850-pwm-mediatek-prevent-divide-by-zero-in-pwm-mediatek-config.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23159
- Description:
media: venus: hfi: add a check to handle OOB in sfr region
- CVE: https://linux.oracle.com/cve/CVE-2025-23159.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23159-media-venus-hfi-add-a-check-to-handle-oob-in-sfr-region.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23158
- Description:
media: venus: hfi: add check to handle incorrect queue size
- CVE: https://linux.oracle.com/cve/CVE-2025-23158.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23158-media-venus-hfi-add-check-to-handle-incorrect-queue-size.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37840
- Description:
mtd: rawnand: brcmnand: fix PM resume warning
- CVE: https://linux.oracle.com/cve/CVE-2025-37840.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37840-mtd-rawnand-brcmnand-fix-pm-resume-warning.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23157
- Description:
media: venus: hfi_parser: add check to avoid out of bound access
- CVE: https://linux.oracle.com/cve/CVE-2025-23157.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23157-media-venus-hfi-parser-add-check-to-avoid-out-of-bound-access.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23156
- Description:
media: venus: hfi_parser: refactor hfi packet parsing logic
- CVE: https://linux.oracle.com/cve/CVE-2025-23156.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23156-media-venus-hfi-parser-refactor-hfi-packet-parsing-logic.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23151
- Description:
bus: mhi: host: Fix race between unprepare and queue_buf
- CVE: https://linux.oracle.com/cve/CVE-2025-23151.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23151-bus-mhi-host-fix-race-between-unprepare-and-queue-buf.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://linux.oracle.com/cve/CVE-2025-23150.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23147
- Description:
i3c: Add NULL pointer check in i3c_master_queue_ibi()
- CVE: https://linux.oracle.com/cve/CVE-2025-23147.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23147-i3c-add-null-pointer-check-in-i3c-master-queue-ibi.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37839
- Description:
jbd2: remove wrong sb->s_sequence check
- CVE: https://linux.oracle.com/cve/CVE-2025-37839.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37839-jbd2-remove-wrong-sb-s-sequence-check.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23146
- Description:
mfd: ene-kb3930: Fix a potential NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2025-23146.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23146-mfd-ene-kb3930-fix-a-potential-null-pointer-dereference.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://linux.oracle.com/cve/CVE-2025-37892.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37940
- Description:
ftrace: Add cond_resched() to ftrace_graph_set_hash()
- CVE: https://linux.oracle.com/cve/CVE-2025-37940.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37940-ftrace-add-cond-resched-to-ftrace-graph-set-hash.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://linux.oracle.com/cve/CVE-2025-37838.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37796
- Description:
wifi: at76c50x: fix use after free access in at76_disconnect
- CVE: https://linux.oracle.com/cve/CVE-2025-37796.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37796-wifi-at76c50x-fix-use-after-free-access-in-at76-disconnect.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37794
- Description:
wifi: mac80211: Purge vif txq in ieee80211_do_stop()
- CVE: https://linux.oracle.com/cve/CVE-2025-37794.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37794-wifi-mac80211-purge-vif-txq-in-ieee80211-do-stop.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://linux.oracle.com/cve/CVE-2025-37982.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37867
- Description:
RDMA/core: Silence oversized kvmalloc() warning
- CVE: https://linux.oracle.com/cve/CVE-2025-37867.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37867-rdma-core-silence-oversized-kvmalloc-warning.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37792
- Description:
Bluetooth: btrtl: Prevent potential NULL dereference
- CVE: https://linux.oracle.com/cve/CVE-2025-37792.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37792-bluetooth-btrtl-prevent-potential-null-dereference.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37875
- Description:
igc: fix PTM cycle trigger logic
- CVE: https://linux.oracle.com/cve/CVE-2025-37875.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37875-igc-fix-ptm-cycle-trigger-logic.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37790
- Description:
net: mctp: Set SOCK_RCU_FREE
- CVE: https://linux.oracle.com/cve/CVE-2025-37790.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37790-net-mctp-set-sock-rcu-free.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37789
- Description:
net: openvswitch: fix nested key length validation in the set() action
- CVE: https://linux.oracle.com/cve/CVE-2025-37789.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37789-net-openvswitch-fix-nested-key-length-validation-in-the-set-action.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37788
- Description:
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
- CVE: https://linux.oracle.com/cve/CVE-2025-37788.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37788-cxgb4-fix-memory-leak-in-cxgb4-init-ethtool-filters-error-path.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37787
- Description:
net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered
- CVE: https://linux.oracle.com/cve/CVE-2025-37787.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37787-net-dsa-mv88e6xxx-avoid-unregistering-devlink-regions-which-were-never-registered.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37781
- Description:
i2c: cros-ec-tunnel: defer probe if parent EC is not present
- CVE: https://linux.oracle.com/cve/CVE-2025-37781.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37781-i2c-cros-ec-tunnel-defer-probe-if-parent-ec-is-not-present.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37780
- Description:
isofs: Prevent the use of too small fid
- CVE: https://linux.oracle.com/cve/CVE-2025-37780.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37780-isofs-prevent-the-use-of-too-small-fid.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37773
- Description:
virtiofs: add filesystem context source name check
- CVE: https://linux.oracle.com/cve/CVE-2025-37773.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37773-virtiofs-add-filesystem-context-source-name-check.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37771
- Description:
drm/amd/pm: Prevent division by zero
- CVE: https://linux.oracle.com/cve/CVE-2025-37771.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37771-drm-amd-pm-prevent-division-by-zero.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37770
- Description:
drm/amd/pm/powerplay: Prevent division by zero
- CVE: https://linux.oracle.com/cve/CVE-2025-37770.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37770-drm-amd-pm-powerplay-prevent-division-by-zero.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37768
- Description:
drm/amd/pm/powerplay/hwmgr/smu7_thermal: Prevent division by zero
- CVE: https://linux.oracle.com/cve/CVE-2025-37768.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37768-drm-amd-pm-powerplay-hwmgr-smu7-thermal-prevent-division-by-zero.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37767
- Description:
drm/amd/pm/swsmu/smu13/smu_v13_0: Prevent division by zero
- CVE: https://linux.oracle.com/cve/CVE-2025-37767.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37767-drm-amd-pm-swsmu-smu13-smu-v13-0-prevent-division-by-zero.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37766
- Description:
drm/amd/pm/powerplay/hwmgr/vega20_thermal: Prevent division by zero
- CVE: https://linux.oracle.com/cve/CVE-2025-37766.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37766-drm-amd-pm-powerplay-hwmgr-vega20-thermal-prevent-division-by-zero.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37765
- Description:
drm/nouveau: prime: fix ttm_bo_delayed_delete oops
- CVE: https://linux.oracle.com/cve/CVE-2025-37765.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37765-drm-nouveau-prime-fix-ttm-bo-delayed-delete-oops.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-23140
- Description:
misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error
- CVE: https://linux.oracle.com/cve/CVE-2025-23140.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-23140-misc-pci-endpoint-test-avoid-issue-of-interrupts-remaining-after-request-irq-error.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-50272
- Description:
filemap: Fix bounds checking in filemap_read()
- CVE: https://linux.oracle.com/cve/CVE-2024-50272.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50272-filemap-fix-bounds-checking-in-filemap-read.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-27402
- Description:
phonet/pep: fix racy skb_queue_empty() use
- CVE: https://linux.oracle.com/cve/CVE-2024-27402.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-27402-phonet-pep-fix-racy-skb-queue-empty-use.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-38540
- Description:
bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
- CVE: https://linux.oracle.com/cve/CVE-2024-38540.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-38540-bnxt-re-avoid-shift-undefined-behavior-in-bnxt-qplib-alloc-init-hwq.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://linux.oracle.com/cve/CVE-2024-56551.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-35866.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26952
- Description:
CONFIG_SMB_SERVER is not enabled.
- CVE:
- Patch: skipped/CVE-2024-26952.patch
- From:
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://linux.oracle.com/cve/CVE-2024-50047.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53185
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://linux.oracle.com/cve/CVE-2024-53185.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-46742
- Description:
smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()
- CVE: https://linux.oracle.com/cve/CVE-2024-46742.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-46742-smb-server-fix-potential-null-ptr-deref-of-lease-ctx-info-in-smb2-open.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2023-52757
- Description:
[PATCH] smb: client: fix potential deadlock when releasing mids
- CVE: https://linux.oracle.com/cve/CVE-2023-52757.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2023-52757-smb-client-fix-potential-deadlock-when-releasing-mids.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2023-52757
- Description:
[PATCH] smb: client: fix potential deadlock when releasing mids
- CVE: https://linux.oracle.com/cve/CVE-2023-52757.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2023-52757-smb-client-fix-potential-deadlock-when-releasing-mids-kpatch.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-26928.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-26928-smb-client-fix-potential-UAF-in-cifs_debug_files_proc_show.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-35867.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-21853
- Description:
bpf: avoid holding freeze_mutex during mmap operation
- CVE: https://linux.oracle.com/cve/CVE-2025-21853.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-21853-bpf-avoid-holding-freeze-mutex-during-mmap-operation.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2023-52621
- Description:
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- CVE: https://linux.oracle.com/cve/CVE-2023-52621.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2023-52621-bpf-check-rcu-read-lock-trace-held-before-calling-bpf-map-helpers.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-36908
- Description:
blk-iocost: do not WARN if iocg was already offlined
- CVE: https://linux.oracle.com/cve/CVE-2024-36908.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-36908-blk-iocost-do-not-warn-if-iocg-was-already-offlined.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://linux.oracle.com/cve/CVE-2024-49960.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-42322
- Description:
ipvs: properly dereference pe in ip_vs_add_service
- CVE: https://linux.oracle.com/cve/CVE-2024-42322.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-42322-ipvs-properly-dereference-pe-in-ip-vs-add-service.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-21681
- Description:
Patch for this CVE not required for versions we support
- CVE:
- Patch: skipped/CVE-2025-21681.patch
- From:
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://linux.oracle.com/cve/CVE-2024-54458.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://linux.oracle.com/cve/CVE-2024-56658.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://linux.oracle.com/cve/CVE-2024-56658.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-44938
- Description:
jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://linux.oracle.com/cve/CVE-2024-44938.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-44938-jfs-fix-shift-out-of-bounds-in-dbdiscardag.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://linux.oracle.com/cve/CVE-2024-50280.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
- CVE: https://linux.oracle.com/cve/CVE-2024-26686.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to-gather-the-threads-children-stats.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-42160
- Description:
f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- CVE: https://linux.oracle.com/cve/CVE-2024-42160.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in-f2fs-build-fault-attr.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35943
- Description:
pmdomain: ti: Add a null pointer check to the omap_prm_domain_init
- CVE: https://linux.oracle.com/cve/CVE-2024-35943.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35943-pmdomain-ti-add-a-null-pointer-check-to-the-omap-prm-domain-init.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-50125.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://linux.oracle.com/cve/CVE-2025-37844.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37830
- Description:
cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()
- CVE: https://linux.oracle.com/cve/CVE-2025-37830.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37830-cpufreq-scmi-fix-null-ptr-deref-in-scmi-cpufreq-get-rate.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37829
- Description:
cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
- CVE: https://linux.oracle.com/cve/CVE-2025-37829.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37829-cpufreq-scpi-fix-null-ptr-deref-in-scpi-cpufreq-get-rate.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37989
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2025-37989.patch
- From:
- CVE-2025-37824
- Description:
tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
- CVE: https://linux.oracle.com/cve/CVE-2025-37824.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37824-tipc-fix-null-pointer-dereference-in-tipc-mon-reinit-self.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://linux.oracle.com/cve/CVE-2025-37797.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37797-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-handling.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37823
- Description:
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
- CVE: https://linux.oracle.com/cve/CVE-2025-37823.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37823-net-sched-hfsc-fix-a-potential-uaf-in-hfsc-dequeue-too.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37817
- Description:
mcb: fix a double free bug in chameleon_parse_gdd()
- CVE: https://linux.oracle.com/cve/CVE-2025-37817.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37817-mcb-fix-a-double-free-bug-in-chameleon-parse-gdd.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37885
- Description:
KVM: x86: Reset IRTE to host control if *new* route isn't postable
- CVE: https://linux.oracle.com/cve/CVE-2025-37885.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37885-kvm-x86-reset-irte-to-host-control-if-new-route-isn-t-postable.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37812
- Description:
usb: cdns3: Fix deadlock when using NCM gadget
- CVE: https://linux.oracle.com/cve/CVE-2025-37812.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37812-usb-cdns3-fix-deadlock-when-using-ncm-gadget.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37810
- Description:
usb: dwc3: gadget: check that event count does not exceed event buffer length
- CVE: https://linux.oracle.com/cve/CVE-2025-37810.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37810-usb-dwc3-gadget-check-that-event-count-does-not-exceed-event-buffer-length.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://linux.oracle.com/cve/CVE-2025-37985.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37805
- Description:
sound/virtio: Fix cancel_sync warnings on uninitialized work_structs
- CVE: https://linux.oracle.com/cve/CVE-2025-37805.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37805-sound-virtio-fix-cancel-sync-warnings-on-uninitialized-work-structs.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37881
- Description:
usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev()
- CVE: https://linux.oracle.com/cve/CVE-2025-37881.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37881-usb-gadget-aspeed-add-null-pointer-check-in-ast-vhub-init-dev.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37983
- Description:
qibfs: fix _another_ leak
- CVE: https://linux.oracle.com/cve/CVE-2025-37983.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37983-qibfs-fix-another-leak.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://linux.oracle.com/cve/CVE-2025-37803.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-49989.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://linux.oracle.com/cve/CVE-2025-37930.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://linux.oracle.com/cve/CVE-2025-37990.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://linux.oracle.com/cve/CVE-2025-37923.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://linux.oracle.com/cve/CVE-2024-26739.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37915.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37890.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37914.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37913.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37911
- Description:
bnxt_en: Fix out-of-bound memcpy() during ethtool -w
- CVE: https://linux.oracle.com/cve/CVE-2025-37911.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37911-bnxt-en-fix-out-of-bound-memcpy-during-ethtool-w.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://linux.oracle.com/cve/CVE-2024-38541.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://linux.oracle.com/cve/CVE-2025-37905.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://linux.oracle.com/cve/CVE-2025-37998.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://linux.oracle.com/cve/CVE-2025-37997.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://linux.oracle.com/cve/CVE-2025-37970.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://linux.oracle.com/cve/CVE-2025-37969.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://linux.oracle.com/cve/CVE-2025-37995.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://linux.oracle.com/cve/CVE-2025-37994.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://linux.oracle.com/cve/CVE-2025-38024.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://linux.oracle.com/cve/CVE-2025-38023.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38023-nfs-handle-failure-of-nfs-get-lock-context-in-unlock-path.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://linux.oracle.com/cve/CVE-2025-38009.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://linux.oracle.com/cve/CVE-2025-38005.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://linux.oracle.com/cve/CVE-2025-37967.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://linux.oracle.com/cve/CVE-2024-53203.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://linux.oracle.com/cve/CVE-2024-53203.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-46751
- Description:
btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()
- CVE: https://linux.oracle.com/cve/CVE-2024-46751.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-46751-btrfs-don-t-bug-on-when-0-reference-count-at-btrfs-lookup-extent-info.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38031
- Description:
padata: do not leak refcount in reorder_work
- CVE: https://linux.oracle.com/cve/CVE-2025-38031.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38031-padata-do-not-leak-refcount-in-reorder-work-307.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38089
- Description:
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error
- CVE: https://linux.oracle.com/cve/CVE-2025-38089.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2025-38089-sunrpc-handle-svc-garbage-during-svc-auth-processing-as-auth-error.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2024-57996
- Description:
net_sched: sch_sfq: don't allow 1 packet limit
- CVE: https://linux.oracle.com/cve/CVE-2024-57996.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2024-57996-net-sched-sch-sfq-don-t-allow-1-packet-limit.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2025-37752
- Description:
net_sched: sch_sfq: move the limit validation
- CVE: https://linux.oracle.com/cve/CVE-2025-37752.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2025-37752-net-sched-sch-sfq-move-the-limit-validation.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2024-53100
- Description:
nvme: tcp: avoid race between queue_lock lock and destroy
- CVE: https://linux.oracle.com/cve/CVE-2024-53100.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2024-53100-nvme-tcp-avoid-race-between-queue-lock-lock-and-destroy.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://linux.oracle.com/cve/CVE-2023-6931.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2023-6931-perf-fix-perf-event-validate-size.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://linux.oracle.com/cve/CVE-2023-6931.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2023-6931-perf-fix-perf-event-validate-size-lockdep-splat.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://linux.oracle.com/cve/CVE-2025-38061.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://linux.oracle.com/cve/CVE-2025-38051.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://linux.oracle.com/cve/CVE-2025-38066.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://linux.oracle.com/cve/CVE-2025-38065.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38065-orangefs-do-not-truncate-file-size-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38058
- Description:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
- CVE: https://linux.oracle.com/cve/CVE-2025-38058.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38058-legitimize-mnt-check-for-mnt-sync-umount-should-be-under-mount-lock-5.15.0-309.180.4.2.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://linux.oracle.com/cve/CVE-2025-38044.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38044-media-cx231xx-set-device-caps-for-417-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38035
- Description:
nvmet-tcp: don't restore null sk_state_change
- CVE: https://linux.oracle.com/cve/CVE-2025-38035.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38035-nvmet-tcp-don-t-restore-null-sk-state-change-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38037
- Description:
vxlan: Annotate FDB data races
- CVE: https://linux.oracle.com/cve/CVE-2025-38037.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38037-vxlan-annotate-fdb-data-races.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://linux.oracle.com/cve/CVE-2025-38075.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38043
- Description:
Patch targets ARM architecture, which this distro does not support.
- CVE:
- Patch: skipped/CVE-2025-38043.patch
- From:
- CVE-2025-38077
- Description:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
- CVE: https://linux.oracle.com/cve/CVE-2025-38077.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38077-platform-x86-dell-wmi-sysman-avoid-buffer-overflow-in-current-password-store-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38048
- Description:
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
- CVE: https://linux.oracle.com/cve/CVE-2025-38048.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38048-virtio-ring-fix-data-race-by-tagging-event-triggered-as-racy-for-kcsan-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://linux.oracle.com/cve/CVE-2025-38079.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://linux.oracle.com/cve/CVE-2025-38000.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue-5.15.0-309.180.4.2.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://linux.oracle.com/cve/CVE-2025-38001.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] sch_htb: make htb_qlen_notify() idempotent
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-sch_htb-make-htb_qlen_notify-idempotent.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-sch_qfq-make-qfq_qlen_notify-idempotent.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] sch_htb: make htb_deactivate() idempotent
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-sch_htb-make-htb_deactivate-idempotent.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] sch_ets: make est_qlen_notify() idempotent
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-sch_ets-make-est_qlen_notify-idempotent.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] sch_drr: make drr_qlen_notify() idempotent
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-sch_drr-make-drr_qlen_notify-idempotent.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-sch_hfsc-make-hfsc_qlen_notify-idempotent.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-net-sched-fix-lockdep-splat-in-qdisc_tree_reduce_backlog.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38350
- Description:
[PATCH] net/sched: Always pass notifications when child class becomes empty
- CVE: https://linux.oracle.com/cve/CVE-2025-38350.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38350-net-sched-Always-pass-notifications-when-child-class-becomes-empty.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38293
- Description:
wifi: ath11k: fix node corruption in ar->arvifs list
- CVE: https://linux.oracle.com/cve/CVE-2025-38293.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38293-wifi-ath11k-fix-node-corruption-in-ar-arvifs-list.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38160
- Description:
CONFIG_CLK_RASPBERRYPI is not enabled on UEK7
- CVE:
- Patch: skipped/CVE-2025-38160.patch
- From:
- CVE-2025-38285
- Description:
bpf: Fix WARN() in get_bpf_raw_tp_regs
- CVE: https://linux.oracle.com/cve/CVE-2025-38285.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38285-bpf-fix-warn-in-get-bpf-raw-tp-regs.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://linux.oracle.com/cve/CVE-2025-38159.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38157
- Description:
wifi: ath9k_htc: Abort software beacon handling if disabled
- CVE: https://linux.oracle.com/cve/CVE-2025-38157.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38157-wifi-ath9k-htc-abort-software-beacon-handling-if-disabled.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38280
- Description:
bpf: Avoid __bpf_prog_ret0_warn when jit fails
- CVE: https://linux.oracle.com/cve/CVE-2025-38280.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38280-bpf-avoid-bpf-prog-ret0-warn-when-jit-fails.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38147
- Description:
calipso: Don't call calipso functions for AF_INET sk.
- CVE: https://linux.oracle.com/cve/CVE-2025-38147.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38147-calipso-don-t-call-calipso-functions-for-af-inet-sk.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38147
- Description:
calipso: unlock rcu before returning -EAFNOSUPPORT
- CVE: https://linux.oracle.com/cve/CVE-2025-38147.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38147-calipso-unlock-rcu-before-returning-EAFNOSUPPORT.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38146
- Description:
net: openvswitch: Fix the dead loop of MPLS parse
- CVE: https://linux.oracle.com/cve/CVE-2025-38146.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38146-net-openvswitch-fix-the-dead-loop-of-mpls-parse.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://linux.oracle.com/cve/CVE-2025-38415.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://linux.oracle.com/cve/CVE-2025-38415.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38313
- Description:
bus: fsl-mc: fix double-free on mc_dev
- CVE: https://linux.oracle.com/cve/CVE-2025-38313.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38313-bus-fsl-mc-fix-double-free-on-mc-dev.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38312
- Description:
fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()
- CVE: https://linux.oracle.com/cve/CVE-2025-38312.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38312-fbdev-core-fbcvt-avoid-division-by-0-in-fb-cvt-hperiod.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38138
- Description:
dmaengine: ti: Add NULL check in udma_probe()
- CVE: https://linux.oracle.com/cve/CVE-2025-38138.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38138-dmaengine-ti-add-null-check-in-udma-probe.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38498
- Description:
do_change_type(): refuse to operate on unmounted/not ours mounts
- CVE: https://linux.oracle.com/cve/CVE-2025-38498.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38498-do-change-type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38498
- Description:
[PATCH] use uniform permission checks for all mount propagation
- CVE: https://linux.oracle.com/cve/CVE-2025-38498.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38119
- Description:
scsi: core: ufs: Fix a hang in the error handler
- CVE: https://linux.oracle.com/cve/CVE-2025-38119.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38119-scsi-core-ufs-fix-a-hang-in-the-error-handler.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38305
- Description:
ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()
- CVE: https://linux.oracle.com/cve/CVE-2025-38305.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38305-ptp-remove-ptp-n-vclocks-check-logic-in-ptp-vclock-in-use.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38305
- Description:
ptp: fix breakage after ptp_vclock_in_use() rework
- CVE: https://linux.oracle.com/cve/CVE-2025-38305.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38305-ptp-fix-breakage-after-ptp_vclock_in_use-rework.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://linux.oracle.com/cve/CVE-2025-38083.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38108
- Description:
net_sched: red: fix a race in __red_change()
- CVE: https://linux.oracle.com/cve/CVE-2025-38108.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38108-net-sched-red-fix-a-race-in-red-change.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://linux.oracle.com/cve/CVE-2025-38352.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38100
- Description:
x86/iopl: Cure TIF_IO_BITMAP inconsistencies
- CVE: https://linux.oracle.com/cve/CVE-2025-38100.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38100-x86-iopl-cure-tif-io-bitmap-inconsistencies.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38430
- Description:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
- CVE: https://linux.oracle.com/cve/CVE-2025-38430.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38430-nfsd-nfsd4-spo-must-allow-must-check-this-is-a-v4-compound-request.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38229
- Description:
media: cxusb: no longer judge rbuf when the write fails
- CVE: https://linux.oracle.com/cve/CVE-2025-38229.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38229-media-cxusb-no-longer-judge-rbuf-when-the-write-fails.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38336
- Description:
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
- CVE: https://linux.oracle.com/cve/CVE-2025-38336.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38336-ata-pata-via-force-pio-for-atapi-devices-on-vt6415-vt6330.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38214
- Description:
fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var
- CVE: https://linux.oracle.com/cve/CVE-2025-38214.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38214-fbdev-fix-fb-set-var-to-prevent-null-ptr-deref-in-fb-videomode-to-var.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38212
- Description:
ipc: fix to protect IPCS lookups using RCU
- CVE: https://linux.oracle.com/cve/CVE-2025-38212.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38212-ipc-fix-to-protect-ipcs-lookups-using-rcu.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://linux.oracle.com/cve/CVE-2025-38211.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://linux.oracle.com/cve/CVE-2025-38086.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii-nway-restart.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38206
- Description:
exfat: fix double free in delayed_free
- CVE: https://linux.oracle.com/cve/CVE-2025-38206.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38206-exfat-fix-double-free-in-delayed-free.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38204
- Description:
jfs: fix array-index-out-of-bounds read in add_missing_indices
- CVE: https://linux.oracle.com/cve/CVE-2025-38204.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38204-jfs-fix-array-index-out-of-bounds-read-in-add-missing-indices.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38342
- Description:
software node: Correct a OOB check in software_node_get_reference_args()
- CVE: https://linux.oracle.com/cve/CVE-2025-38342.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38342-software-node-correct-a-oob-check-in-software-node-get-reference-args.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://linux.oracle.com/cve/CVE-2025-38332.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://linux.oracle.com/cve/CVE-2025-38200.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38200-i40e-fix-mmio-write-access-to-an-invalid-page-in-i40e-clear-hw.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38197
- Description:
platform/x86: dell_rbu: Fix list usage
- CVE: https://linux.oracle.com/cve/CVE-2025-38197.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38197-platform-x86-dell-rbu-fix-list-usage.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38090
- Description:
drivers/rapidio/rio_cm.c: prevent possible heap overwrite
- CVE: https://linux.oracle.com/cve/CVE-2025-38090.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38090-drivers-rapidio-rio-cm-c-prevent-possible-heap-overwrite.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38194
- Description:
jffs2: check that raw node were preallocated before writing summary
- CVE: https://linux.oracle.com/cve/CVE-2025-38194.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38194-jffs2-check-that-raw-node-were-preallocated-before-writing-summary.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38328
- Description:
jffs2: check jffs2_prealloc_raw_node_refs() result in few other places
- CVE: https://linux.oracle.com/cve/CVE-2025-38328.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38328-jffs2-check-jffs2-prealloc-raw-node-refs-result-in-few-other-places.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38084
- Description:
mm/hugetlb: unshare page tables during VMA split, not before
- CVE: https://linux.oracle.com/cve/CVE-2025-38084.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38084-mm-hugetlb-unshare-page-tables-during-vma-split-not-before.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-38420
- Description:
wifi: carl9170: do not ping device which has failed to load firmware
- CVE: https://linux.oracle.com/cve/CVE-2025-38420.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38420-wifi-carl9170-do-not-ping-device-which-has-failed-to-load-firmware.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38324
- Description:
mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
- CVE: https://linux.oracle.com/cve/CVE-2025-38324.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38324-mpls-use-rcu-dereference-rtnl-in-mpls-route-input-rcu.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38184
- Description:
tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
- CVE: https://linux.oracle.com/cve/CVE-2025-38184.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38184-tipc-fix-null-ptr-deref-when-acquiring-remote-ip-of-ethernet-bearer.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38181
- Description:
calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().
- CVE: https://linux.oracle.com/cve/CVE-2025-38181.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38181-calipso-fix-null-ptr-deref-in-calipso-req-set-del-attr.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38320
- Description:
arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()
- CVE: https://linux.oracle.com/cve/CVE-2025-38320.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38320-arm64-ptrace-fix-stack-out-of-bounds-read-in-regs-get-kernel-stack-nth.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38363
- Description:
drm/tegra: Fix a possible null pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2025-38363.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38363-drm-tegra-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://linux.oracle.com/cve/CVE-2025-38403.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38412
- Description:
platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks
- CVE: https://linux.oracle.com/cve/CVE-2025-38412.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38412-platform-x86-dell-wmi-sysman-fix-wmi-data-block-retrieval-in-sysfs-callbacks.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38399
- Description:
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
- CVE: https://linux.oracle.com/cve/CVE-2025-38399.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38399-scsi-target-fix-null-pointer-dereference-in-core-scsi3-decode-spec-i-port.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38386
- Description:
ACPICA: Refuse to evaluate a method if arguments are missing
- CVE: https://linux.oracle.com/cve/CVE-2025-38386.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38386-acpica-refuse-to-evaluate-a-method-if-arguments-are-missing.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38264
- Description:
nvme-tcp: sanitize request list handling
- CVE: https://linux.oracle.com/cve/CVE-2025-38264.html
- Patch: oel9-uek7/5.15.0-312.187.5.3.el9uek/CVE-2025-38264-nvme-tcp-sanitize-request-list-handling.patch
- From: 5.15.0-312.187.5.3.el9uek
- CVE-2025-38264
- Description:
nvme-tcp: sanitize request list handling
- CVE: https://linux.oracle.com/cve/CVE-2025-38264.html
- Patch: oel9-uek7/5.15.0-312.187.5.3.el9uek/CVE-2025-38264-nvme-tcp-sanitize-request-list-handling-kpatch.patch
- From: 5.15.0-312.187.5.3.el9uek
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://linux.oracle.com/cve/CVE-2025-38499.html
- Patch: oel9-uek7/5.15.0-312.187.5.3.el9uek/CVE-2025-38499-clone-private-mnt-make-sure-that-caller-has-cap-sys-admin-in-the-right-userns.patch
- From: 5.15.0-312.187.5.3.el9uek
- CVE-2025-38495
- Description:
HID: core: ensure the allocated report buffer can contain the reserved report ID
- CVE: https://linux.oracle.com/cve/CVE-2025-38495.html
- Patch: oel9-uek7/5.15.0-312.187.5.3.el9uek/CVE-2025-38495-hid-core-ensure-the-allocated-report-buffer-can-contain-the-reserved-report-id.patch
- From: 5.15.0-312.187.5.3.el9uek
- CVE-2025-38494
- Description:
HID: core: do not bypass hid_hw_raw_request
- CVE: https://linux.oracle.com/cve/CVE-2025-38494.html
- Patch: oel9-uek7/5.15.0-312.187.5.3.el9uek/CVE-2025-38494-hid-core-do-not-bypass-hid-hw-raw-request.patch
- From: 5.15.0-312.187.5.3.el9uek
- CVE-2025-38618
- Description:
vsock: Do not allow binding to VMADDR_PORT_ANY
- CVE: https://linux.oracle.com/cve/CVE-2025-38618.html
- Patch: oel9-uek7/5.15.0-312.187.5.3.el9uek/CVE-2025-38618-vsock-do-not-allow-binding-to-vmaddr-port-any.patch
- From: 5.15.0-312.187.5.3.el9uek
- CVE-2025-38466
- Description:
perf: Revert to requiring CAP_SYS_ADMIN for uprobes
- CVE: https://linux.oracle.com/cve/CVE-2025-38466.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38466-perf-revert-to-requiring-cap-sys-admin-for-uprobes.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38441
- Description:
netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()
- CVE: https://linux.oracle.com/cve/CVE-2025-38441.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38441-netfilter-flowtable-account-for-ethernet-header-in-nf-flow-pppoe-proto.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38443
- Description:
nbd: fix uaf in nbd_genl_connect() error path
- CVE: https://linux.oracle.com/cve/CVE-2025-38443.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38443-nbd-fix-uaf-in-nbd-genl-connect-error-path.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38444
- Description:
raid10: cleanup memleak at raid10_make_request
- CVE: https://linux.oracle.com/cve/CVE-2025-38444.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38444-raid10-cleanup-memleak-at-raid10-make-request.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2024-26775
- Description:
aoe: avoid potential deadlock at set_capacity
- CVE: https://linux.oracle.com/cve/CVE-2024-26775.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2024-26775-aoe-avoid-potential-deadlock-at-set-capacity.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38467
- Description:
drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling
- CVE: https://linux.oracle.com/cve/CVE-2025-38467.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38467-drm-exynos-exynos7-drm-decon-add-vblank-check-in-irq-handling.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://linux.oracle.com/cve/CVE-2025-38464.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38457
- Description:
net/sched: Abort __tc_modify_qdisc if parent class does not exist
- CVE: https://linux.oracle.com/cve/CVE-2025-38457.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38457-net-sched-abort-tc-modify-qdisc-if-parent-class-does-not-exist.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38445
- Description:
md/raid1: Fix stack memory use after return in raid1_reshape
- CVE: https://linux.oracle.com/cve/CVE-2025-38445.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38445-md-raid1-fix-stack-memory-use-after-return-in-raid1-reshape.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38236
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2025-38236.patch
- From:
- CVE-2025-38462
- Description:
vsock: Fix transport_{g2h,h2g} TOCTOU
- CVE: https://linux.oracle.com/cve/CVE-2025-38462.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38462-vsock-fix-transport-g2h-h2g-toctou.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://linux.oracle.com/cve/CVE-2025-38461.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38461-vsock-fix-transport-toctou.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38375
- Description:
virtio-net: ensure the received length does not exceed allocated size
- CVE: https://linux.oracle.com/cve/CVE-2025-38375.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38375-virtio-net-ensure-the-received-length-does-not-exceed-allocated-size.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-39866
- Description:
fs: writeback: fix use-after-free in __mark_inode_dirty()
- CVE: https://linux.oracle.com/cve/CVE-2025-39866.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-39866-fs-writeback-fix-use-after-free-in-mark-inode-dirty.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38067
- Description:
rseq: Fix segfault on registration when rseq_cs is non-zero
- CVE: https://linux.oracle.com/cve/CVE-2025-38067.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38067-rseq-fix-segfault-on-registration-when-rseq-cs-is-non-zero.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38465
- Description:
netlink: Fix wraparounds of sk->sk_rmem_alloc.
- CVE: https://linux.oracle.com/cve/CVE-2025-38465.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38465-netlink-fix-wraparounds-of-sk-sk-rmem-alloc.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38448
- Description:
usb: gadget: u_serial: Fix race condition in TTY wakeup
- CVE: https://linux.oracle.com/cve/CVE-2025-38448.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38448-usb-gadget-u-serial-fix-race-condition-in-tty-wakeup-304.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38439
- Description:
bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
- CVE: https://linux.oracle.com/cve/CVE-2025-38439.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38439-bnxt-en-set-dma-unmap-len-correctly-for-xdp-redirect.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38727
- Description:
netlink: avoid infinite retry looping in netlink_unicast()
- CVE: https://linux.oracle.com/cve/CVE-2025-38727.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38727-netlink-avoid-infinite-retry-looping-in-netlink-unicast.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38513
- Description:
wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
- CVE: https://linux.oracle.com/cve/CVE-2025-38513.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38513-wifi-zd1211rw-fix-potential-null-pointer-dereference-in-zd-mac-tx-to-dev.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://linux.oracle.com/cve/CVE-2025-38458.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38458-atm-Revert-atm_account_tx-if-copy_from_iter_full-fails.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://linux.oracle.com/cve/CVE-2025-38458.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38458-atm-clip-Fix-NULL-pointer-dereference-in-vcc_sendmsg.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://linux.oracle.com/cve/CVE-2025-38458.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38458-atm-clip-Fix-NULL-pointer-dereference-in-vcc_sendmsg-kpatch-308.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38459
- Description:
atm: clip: Fix infinite recursive call of clip_push().
- CVE: https://linux.oracle.com/cve/CVE-2025-38459.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38459-atm-clip-Fix-infinite-recursive-call-of-clip_push.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38460
- Description:
atm: clip: Fix potential null-ptr-deref in to_atmarpd().
- CVE: https://linux.oracle.com/cve/CVE-2025-38460.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38460-atm-clip-Fix-potential-null-ptr-deref-in-to_atmarpd.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38546
- Description:
atm: clip: Fix memory leak of struct clip_vcc.
- CVE: https://linux.oracle.com/cve/CVE-2025-38546.html
- Patch: oel9-uek7/5.15.0-313.189.5.1.el9uek/CVE-2025-38546-atm-clip-Fix-memory-leak-of-struct-clip_vcc.patch
- From: 5.15.0-313.189.5.1.el9uek
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://linux.oracle.com/cve/CVE-2025-38724.html
- Patch: oel9-uek7/5.15.0-313.189.5.2.el9uek/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 5.15.0-313.189.5.2.el9uek
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2025-39964.html
- Patch: oel9-uek7/5.15.0-313.189.5.2.el9uek/CVE-2025-39964-crypto-af_alg-disallow-concurrent-writes-in-af_alg_sendmsg.patch
- From: 5.15.0-313.189.5.2.el9uek
- CVE-2025-39964
- Description:
crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
- CVE: https://linux.oracle.com/cve/CVE-2025-39964.html
- Patch: oel9-uek7/5.15.0-313.189.5.2.el9uek/CVE-2025-39964-crypto-af_alg-fix-incorrect-boolean-values-in-af_alg_ctx.patch
- From: 5.15.0-313.189.5.2.el9uek
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg kpatch
- CVE: https://linux.oracle.com/cve/CVE-2025-39964.html
- Patch: oel9-uek7/5.15.0-313.189.5.2.el9uek/CVE-2025-39964-crypto-af_alg-disallow-concurrent-writes-in-af_alg_sendmsg-kpatch.patch
- From: 5.15.0-313.189.5.2.el9uek
- CVE-2025-39973
- Description:
i40e: add validation for ring_len param
- CVE: https://linux.oracle.com/cve/CVE-2025-39973.html
- Patch: oel9-uek7/5.15.0-313.189.5.3.el9uek/CVE-2025-39973-i40e-add-validation-for-ring-len-param.patch
- From: 5.15.0-313.189.5.3.el9uek
- CVE-2025-39973
- Description:
i40e: validate ring_len parameter against hardware-specific values
- CVE: https://linux.oracle.com/cve/CVE-2025-39973.html
- Patch: oel9-uek7/5.15.0-313.189.5.3.el9uek/CVE-2025-39973-i40e-validate-ring-len-against-hw-specific-values.patch
- From: 5.15.0-313.189.5.3.el9uek
- CVE-2025-38535
- Description:
phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
- CVE: https://linux.oracle.com/cve/CVE-2025-38535.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38535-phy-tegra-xusb-fix-unbalanced-regulator-disable-in-utmi-phy-mode.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38497
- Description:
usb: gadget: configfs: Fix OOB read on empty string write
- CVE: https://linux.oracle.com/cve/CVE-2025-38497.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38497-usb-gadget-configfs-fix-oob-read-on-empty-string-write.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38474
- Description:
usb: net: sierra: check for no status endpoint
- CVE: https://linux.oracle.com/cve/CVE-2025-38474.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38474-usb-net-sierra-check-for-no-status-endpoint.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://linux.oracle.com/cve/CVE-2025-38550.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38335
- Description:
PEEMPT_RT config isn't enabled
- CVE:
- Patch: skipped/CVE-2025-38335.patch
- From:
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://linux.oracle.com/cve/CVE-2025-38668.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://linux.oracle.com/cve/CVE-2025-38668.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data-kpatch.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38604
- Description:
wifi: rtl818x: Kill URBs before clearing tx status queue
- CVE: https://linux.oracle.com/cve/CVE-2025-38604.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38604-wifi-rtl818x-kill-urbs-before-clearing-tx-status-queue.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://linux.oracle.com/cve/CVE-2025-39730.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://linux.oracle.com/cve/CVE-2025-38572.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://linux.oracle.com/cve/CVE-2025-39757.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-39757
- Description:
ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- CVE: https://linux.oracle.com/cve/CVE-2025-39757.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-39757-ALSA-usb-audio-fix-size-validation-in-convert_chmap_v3.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-39835
- Description:
xfs: do not propagate ENODATA disk errors into xattr code
- CVE: https://linux.oracle.com/cve/CVE-2025-39835.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2025-39835-xfs-do-not-propagate-enodata-disk-errors-into-xattr-code.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-39845
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39845.patch
- From:
- CVE-2025-39844
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39844.patch
- From:
- CVE-2024-50022
- Description:
device-dax: correct pgoff align in dax_set_mapping()
- CVE: https://linux.oracle.com/cve/CVE-2024-50022.html
- Patch: oel9-uek7/5.15.0-314.193.5.3.el9uek/CVE-2024-50022-device-dax-correct-pgoff-align-in-dax-set-mapping.patch
- From: 5.15.0-314.193.5.3.el9uek
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://linux.oracle.com/cve/CVE-2025-40019.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40019-crypto-essiv-check-ssize-for-decryption-and-in-place-encryption.patch
- From: 5.15.0-315.196.5.1.el9uek
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2025-39885
- Description:
ocfs2: fix recursive semaphore deadlock in fiemap call
- CVE: https://linux.oracle.com/cve/CVE-2025-39885.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39885-ocfs2-fix-recursive-semaphore-deadlock-in-fiemap-call.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39967
- Description:
fbcon: fix integer overflow in fbcon_do_set_font
- CVE: https://linux.oracle.com/cve/CVE-2025-39967.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39967-fbcon-fix-integer-overflow-in-fbcon-do-set-font.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39967
- Description:
fbcon: fix integer overflow in fbcon_do_set_font
- CVE: https://linux.oracle.com/cve/CVE-2025-39967.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39967-fbcon-fix-OOB-access-in-font-allocation.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40027
- Description:
net/9p: fix double req put in p9_fd_cancelled
- CVE: https://linux.oracle.com/cve/CVE-2025-40027.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40027-net-9p-fix-double-req-put-in-p9-fd-cancelled.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40173
- Description:
net/ip6_tunnel: Prevent perpetual tunnel growth
- CVE: https://linux.oracle.com/cve/CVE-2025-40173.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40173-net-ip6-tunnel-prevent-perpetual-tunnel-growth.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40085
- Description:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
- CVE: https://linux.oracle.com/cve/CVE-2025-40085.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40085-alsa-usb-audio-fix-null-pointer-deference-in-try-to-register-card.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40115
- Description:
scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()
- CVE: https://linux.oracle.com/cve/CVE-2025-40115.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40115-scsi-mpt3sas-fix-crash-in-transport-port-remove-by-using-ioc_info.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39923
- Description:
dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
- CVE: https://linux.oracle.com/cve/CVE-2025-39923.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39923-dmaengine-qcom-bam-dma-fix-dt-error-handling-for-num-channels-ees.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39945
- Description:
cnic: Fix use-after-free bugs in cnic_delete_task
- CVE: https://linux.oracle.com/cve/CVE-2025-39945.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39945-cnic-fix-use-after-free-bugs-in-cnic-delete-task.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39980
- Description:
nexthop: Forbid FDB status change while nexthop is in a group
- CVE: https://linux.oracle.com/cve/CVE-2025-39980.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39980-nexthop-forbid-fdb-status-change-while-nexthop-is-in-a-group.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40011
- Description:
drm/gma500: Fix null dereference in hdmi teardown
- CVE: https://linux.oracle.com/cve/CVE-2025-40011.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40011-drm-gma500-fix-null-dereference-in-hdmi-teardown.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39998
- Description:
scsi: target: target_core_configfs: Add length check to avoid buffer overflow
- CVE: https://linux.oracle.com/cve/CVE-2025-39998.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39998-scsi-target-target-core-configfs-add-length-check-to-avoid-buffer-overflow.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40081
- Description:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
- CVE: https://linux.oracle.com/cve/CVE-2025-40081.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40081-perf-arm-spe-prevent-overflow-in-perf-idx2off.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://linux.oracle.com/cve/CVE-2025-40154.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40140
- Description:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
- CVE: https://linux.oracle.com/cve/CVE-2025-40140.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40140-net-usb-remove-disruptive-netif-wake-queue-in-rtl8150-set-multicast.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40048
- Description:
uio_hv_generic: Let userspace take care of interrupt mask
- CVE: https://linux.oracle.com/cve/CVE-2025-40048.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40048-uio-hv-generic-let-userspace-take-care-of-interrupt-mask.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40153
- Description:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
- CVE: https://linux.oracle.com/cve/CVE-2025-40153.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40153-mm-hugetlb-avoid-soft-lockup-when-mprotect-to-large-memory-area.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40030
- Description:
pinctrl: check the return value of pinmux_ops::get_function_name()
- CVE: https://linux.oracle.com/cve/CVE-2025-40030.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40030-pinctrl-check-the-return-value-of-pinmux-ops-get-function-name.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40111
- Description:
drm/vmwgfx: Fix Use-after-free in validation
- CVE: https://linux.oracle.com/cve/CVE-2025-40111.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40111-drm-vmwgfx-fix-use-after-free-in-validation.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40187
- Description:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
- CVE: https://linux.oracle.com/cve/CVE-2025-40187.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40187-net-sctp-fix-a-null-dereference-in-sctp-disposition-sctp-sf-do-5-1d-ce.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40186
- Description:
tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().
- CVE: https://linux.oracle.com/cve/CVE-2025-40186.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40186-tcp-don-t-call-reqsk-fastopen-remove-in-tcp-conn-request.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40194
- Description:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
- CVE: https://linux.oracle.com/cve/CVE-2025-40194.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40194-cpufreq-intel-pstate-fix-object-lifecycle-issue-in-update-qos-request.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40204
- Description:
sctp: Fix MAC comparison to be constant-time
- CVE: https://linux.oracle.com/cve/CVE-2025-40204.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40204-sctp-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40026
- Description:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
- CVE: https://linux.oracle.com/cve/CVE-2025-40026.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40026-kvm-x86-don-t-re-check-l1-intercepts-when-completing-userspace-i-o.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40197
- Description:
media: mc: Clear minor number before put device
- CVE: https://linux.oracle.com/cve/CVE-2025-40197.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40197-media-mc-clear-minor-number-before-put-device.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40134
- Description:
dm: fix NULL pointer dereference in __dm_suspend()
- CVE: https://linux.oracle.com/cve/CVE-2025-40134.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40134-dm-fix-null-pointer-dereference-in-dm-suspend.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40178
- Description:
pid: Add a judgment for ns null in pid_nr_ns
- CVE: https://linux.oracle.com/cve/CVE-2025-40178.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40178-pid-add-a-judgment-for-ns-null-in-pid-nr-ns.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39913
- Description:
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
- CVE: https://linux.oracle.com/cve/CVE-2025-39913.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39913-tcp-bpf-call-sk-msg-free-when-tcp-bpf-send-verdict-fails-to-allocate-psock-cork.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40021
- Description:
tracing: dynevent: Add a missing lockdown check on dynevent
- CVE: https://linux.oracle.com/cve/CVE-2025-40021.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40021-tracing-dynevent-add-a-missing-lockdown-check-on-dynevent.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39996
- Description:
media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
- CVE: https://linux.oracle.com/cve/CVE-2025-39996.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39996-media-b2c2-fix-use-after-free-causing-by-irq-check-work-in-flexcop-pci-remove.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40109
- Description:
crypto: rng - Ensure set_ent is always present
- CVE: https://linux.oracle.com/cve/CVE-2025-40109.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40109-crypto-rng-ensure-set-ent-is-always-present.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40109
- Description:
crypto: rng - Ensure set_ent is always present (kpatch adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2025-40109.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40109-crypto-rng-ensure-set-ent-is-always-present-kpatch.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40125
- Description:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
- CVE: https://linux.oracle.com/cve/CVE-2025-40125.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40125-blk-mq-check-kobject-state-in-sysfs-before-deleting-in-blk-mq-unregister-hctx.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40078
- Description:
bpf: Explicitly check accesses to bpf_sock_addr
- CVE: https://linux.oracle.com/cve/CVE-2025-40078.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40078-bpf-explicitly-check-accesses-to-bpf-sock-addr.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40055
- Description:
ocfs2: fix double free in user_cluster_connect()
- CVE: https://linux.oracle.com/cve/CVE-2025-40055.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40055-ocfs2-fix-double-free-in-user-cluster-connect.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40183
- Description:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
- CVE: https://linux.oracle.com/cve/CVE-2025-40183.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40183-bpf-fix-metadata-dst-leak-bpf-redirect-neigh-v-46.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40167
- Description:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
- CVE: https://linux.oracle.com/cve/CVE-2025-40167.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40167-ext4-detect-invalid-inline-data-extents-flag-combination.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-38678
- Description:
netfilter: nf_tables: reject duplicate device on updates
- CVE: https://linux.oracle.com/cve/CVE-2025-38678.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-38678-netfilter-nf-tables-reject-duplicate-device-on-updates.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40035
- Description:
Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
- CVE: https://linux.oracle.com/cve/CVE-2025-40035.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40035-input-uinput-zero-initialize-uinput-ff-upload-compat-to-avoid-info-leak.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40105
- Description:
vfs: Don't leak disconnected dentries on umount
- CVE: https://linux.oracle.com/cve/CVE-2025-40105.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40105-vfs-don-t-leak-disconnected-dentries-on-umount.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://linux.oracle.com/cve/CVE-2025-40094.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40094-usb-gadget-f-acm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2024-43876
- Description:
PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()
- CVE: https://linux.oracle.com/cve/CVE-2024-43876.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2024-43876-pci-rcar-demote-warn-to-dev-warn-ratelimited-in-rcar-pcie-wakeup.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://linux.oracle.com/cve/CVE-2025-39880.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39911
- Description:
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
- CVE: https://linux.oracle.com/cve/CVE-2025-39911.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39911-i40e-fix-irq-freeing-in-i40e-vsi-request-irq-msix-error-path-5.15.0-314.193.5.5.el9uek.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://linux.oracle.com/cve/CVE-2025-39883.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39949
- Description:
qed: Don't collect too many protection override GRC elements
- CVE: https://linux.oracle.com/cve/CVE-2025-39949.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39949-qed-don-t-collect-too-many-protection-override-grc-elements.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://linux.oracle.com/cve/CVE-2025-39955.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39955-tcp-clear-tcp-sk-sk-fastopen-rsk-in-tcp-disconnect.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://linux.oracle.com/cve/CVE-2025-22058.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2024-43877
- Description:
Introduced and fixed in v5.15.0-315.196.3, no live patching needed.
- CVE:
- Patch: skipped/CVE-2024-43877.patch
- From:
- CVE-2025-40020
- Description:
can: peak_usb: fix shift-out-of-bounds issue
- CVE: https://linux.oracle.com/cve/CVE-2025-40020.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40020-can-peak-usb-fix-shift-out-of-bounds-issue.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://linux.oracle.com/cve/CVE-2025-39993.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-39994
- Description:
media: tuner: xc5000: Fix use-after-free in xc5000_release
- CVE: https://linux.oracle.com/cve/CVE-2025-39994.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-39994-media-tuner-xc5000-fix-use-after-free-in-xc5000-release-5.15.0-314.193.5.5.el9uek.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40118
- Description:
scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod
- CVE: https://linux.oracle.com/cve/CVE-2025-40118.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40118-scsi-pm80xx-fix-array-index-out-of-of-bounds-on-rmmod-5.15.0-309.180.4.2.el9uek.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40121
- Description:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
- CVE: https://linux.oracle.com/cve/CVE-2025-40121.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40121-asoc-intel-bytcr-rt5651-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40053
- Description:
net: dlink: handle copy_thresh allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2025-40053.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40053-net-dlink-handle-copy-thresh-allocation-failure.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40044
- Description:
fs: udf: fix OOB read in lengthAllocDescs handling
- CVE: https://linux.oracle.com/cve/CVE-2025-40044.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40044-fs-udf-fix-oob-read-in-lengthallocdescs-handling.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://linux.oracle.com/cve/CVE-2025-40179.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-5.15.0-313.189.5.3.el9uek.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big (kpatch adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2025-40179.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-5.15.0-313.189.5.3.el9uek-kpatch.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40190
- Description:
ext4: guard against EA inode refcount underflow in xattr update
- CVE: https://linux.oracle.com/cve/CVE-2025-40190.html
- Patch: oel9-uek7/5.15.0-315.196.5.1.el9uek/CVE-2025-40190-ext4-guard-against-ea-inode-refcount-underflow-in-xattr-update.patch
- From: 5.15.0-315.196.5.1.el9uek
- CVE-2025-40271
- Description:
fs/proc: fix uaf in proc_readdir_de()
- CVE: https://linux.oracle.com/cve/CVE-2025-40271.html
- Patch: oel9-uek7/5.15.0-316.196.4.1.el9uek/CVE-2025-40271-fs-proc-fix-uaf-in-proc-readdir-de.patch
- From: 5.15.0-316.196.4.1.el9uek
- CVE-2025-40280
- Description:
tipc: Fix use-after-free in tipc_mon_reinit_self().
- CVE: https://linux.oracle.com/cve/CVE-2025-40280.html
- Patch: oel9-uek7/5.15.0-316.196.4.1.el9uek/CVE-2025-40280-tipc-fix-use-after-free-in-tipc-mon-reinit-self.patch
- From: 5.15.0-316.196.4.1.el9uek
- CVE-2025-40250
- Description:
net/mlx5: Clean up only new IRQ glue on request_irq() failure
- CVE: https://linux.oracle.com/cve/CVE-2025-40250.html
- Patch: oel9-uek7/5.15.0-316.196.4.1.el9uek/CVE-2025-40250-net-mlx5-clean-up-only-new-irq-glue-on-request-irq-failure.patch
- From: 5.15.0-316.196.4.1.el9uek
- CVE-2025-40258
- Description:
mptcp: fix race condition in mptcp_schedule_work()
- CVE: https://linux.oracle.com/cve/CVE-2025-40258.html
- Patch: oel9-uek7/5.15.0-316.196.4.2.el9uek/CVE-2025-40258-mptcp-fix-race-condition-in-mptcp-schedule-work.patch
- From: 5.15.0-316.196.4.2.el9uek
- CVE-2025-40319
- Description:
bpf: Sync pending IRQ work before freeing ring buffer
- CVE: https://linux.oracle.com/cve/CVE-2025-40319.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40319-bpf-sync-pending-irq-work-before-freeing-ring-buffer.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68192
- Description:
net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup
- CVE: https://linux.oracle.com/cve/CVE-2025-68192.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68192-net-usb-qmi-wwan-initialize-mac-header-offset-in-qmimux-rx-fixup.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68244
- Description:
drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD
- CVE: https://linux.oracle.com/cve/CVE-2025-68244.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68244-drm-i915-avoid-lock-inversion-when-pinning-to-ggtt-on-chv-bxt-vtd.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40283
- Description:
Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
- CVE: https://linux.oracle.com/cve/CVE-2025-40283.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40283-bluetooth-btusb-reorder-cleanup-in-btusb-disconnect-to-avoid-uaf.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40281
- Description:
sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto
- CVE: https://linux.oracle.com/cve/CVE-2025-40281.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40281-sctp-prevent-possible-shift-out-of-bounds-in-sctp-transport-update-rto.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40275
- Description:
ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
- CVE: https://linux.oracle.com/cve/CVE-2025-40275.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40275-alsa-usb-audio-fix-null-pointer-dereference-in-snd-usb-mixer-controls-badd.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40040
- Description:
mm/ksm: fix flag-dropping behavior in ksm_madvise
- CVE: https://linux.oracle.com/cve/CVE-2025-40040.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40040-mm-ksm-fix-flag-dropping-behavior-in-ksm-madvise.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68241
- Description:
ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
- CVE: https://linux.oracle.com/cve/CVE-2025-68241.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68241-ipv4-route-prevent-rt-bind-exception-from-rebinding-stale-fnhe.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40264
- Description:
be2net: pass wrb_params in case of OS2BMC
- CVE: https://linux.oracle.com/cve/CVE-2025-40264.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40264-be2net-pass-wrb-params-in-case-of-os2bmc.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40259
- Description:
scsi: sg: Do not sleep in atomic context
- CVE: https://linux.oracle.com/cve/CVE-2025-40259.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40259-scsi-sg-do-not-sleep-in-atomic-context.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40324
- Description:
NFSD: Fix crash in nfsd4_read_release()
- CVE: https://linux.oracle.com/cve/CVE-2025-40324.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40324-nfsd-fix-crash-in-nfsd4-read-release.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40211
- Description:
ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
- CVE: https://linux.oracle.com/cve/CVE-2025-40211.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40211-acpi-video-fix-use-after-free-in-acpi-video-switch-brightness.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40342
- Description:
nvme-fc: use lock accessing port_state and rport state
- CVE: https://linux.oracle.com/cve/CVE-2025-40342.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40342-nvme-fc-use-lock-accessing-port-state-and-rport-state.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40363
- Description:
net: ipv6: fix field-spanning memcpy warning in AH output
- CVE: https://linux.oracle.com/cve/CVE-2025-40363.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40363-net-ipv6-fix-field-spanning-memcpy-warning-in-ah-output.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68185
- Description:
nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing
- CVE: https://linux.oracle.com/cve/CVE-2025-68185.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68185-nfs4-setup-readdir-insufficient-locking-for-d-parent-d-inode-dereferencing.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40309
- Description:
Bluetooth: SCO: Fix UAF on sco_conn_free
- CVE: https://linux.oracle.com/cve/CVE-2025-40309.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40309-bluetooth-sco-fix-uaf-on-sco-conn-free.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40308
- Description:
Bluetooth: bcsp: receive data only if registered
- CVE: https://linux.oracle.com/cve/CVE-2025-40308.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40308-bluetooth-bcsp-receive-data-only-if-registered.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40261
- Description:
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
- CVE: https://linux.oracle.com/cve/CVE-2025-40261.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40261-nvme-nvme-fc-ensure-ioerr-work-is-cancelled-in-nvme-fc-delete-ctrl.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68284
- Description:
libceph: prevent potential out-of-bounds writes in handle_auth_session_key()
- CVE: https://linux.oracle.com/cve/CVE-2025-68284.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68284-libceph-prevent-potential-out-of-bounds-writes-in-handle-auth-session-key.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40322
- Description:
fbdev: bitblit: bound-check glyph index in bit_putcs*
- CVE: https://linux.oracle.com/cve/CVE-2025-40322.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40322-fbdev-bitblit-bound-check-glyph-index-in-bit-putcs.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40304
- Description:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
- CVE: https://linux.oracle.com/cve/CVE-2025-40304.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40304-fbdev-add-bounds-checking-in-bit-putcs-to-fix-vmalloc-out-of-bounds.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40277
- Description:
drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
- CVE: https://linux.oracle.com/cve/CVE-2025-40277.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40277-drm-vmwgfx-validate-command-header-size-against-svga-cmd-max-datasize.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40269
- Description:
ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
- CVE: https://linux.oracle.com/cve/CVE-2025-40269.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40269-alsa-usb-audio-fix-potential-overflow-of-pcm-transfer-buffer.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40269
- Description:
ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
- CVE: https://linux.oracle.com/cve/CVE-2025-40269.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40269-ALSA-usb-audio-Fix-missing-unlock-at-error-path-of-maxpacksize-check.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40272
- Description:
mm/secretmem: fix use-after-free race in fault handler
- CVE: https://linux.oracle.com/cve/CVE-2025-40272.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40272-mm-secretmem-fix-use-after-free-race-in-fault-handler.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68301
- Description:
net: atlantic: fix fragment overflow handling in RX path
- CVE: https://linux.oracle.com/cve/CVE-2025-68301.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68301-net-atlantic-fix-fragment-overflow-handling-in-rx-path.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-40345
- Description:
usb: storage: sddr55: Reject out-of-bound new_pba
- CVE: https://linux.oracle.com/cve/CVE-2025-40345.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-40345-usb-storage-sddr55-reject-out-of-bound-new-pba.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68287
- Description:
usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths
- CVE: https://linux.oracle.com/cve/CVE-2025-68287.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68287-usb-dwc3-fix-race-condition-between-concurrent-dwc3-remove-requests-call-paths.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://linux.oracle.com/cve/CVE-2025-68285.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have-mon-and-osd-map.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://linux.oracle.com/cve/CVE-2025-68285.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have-mon-and-osd-map-kpatch.patch
- From: 5.15.0-317.197.5.1.el9uek
- CVE-2025-38239
- Description:
scsi: megaraid_sas: Fix invalid node index
- CVE: https://linux.oracle.com/cve/CVE-2025-38239.html
- Patch: oel9-uek7/5.15.0-317.197.5.1.el9uek/CVE-2025-38239-scsi-megaraid-sas-fix-invalid-node-index.patch
- From: 5.15.0-317.197.5.1.el9uek