- kernel-uek-5.4.17-2102.200.13.el7uek (oel7-uek6)
- 5.4.17-2136.344.4.1.el7uek
- 2025-07-05 23:01:51
- 2025-07-08 11:21:55
- K20250706_07
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2021-28038
- Patch: 4.14.0/CVE-2021-28038-Xen-gnttab-handle-p2m-update-errors-on-a-per-slot-basis.patch
- From: 4.14.225-121.357.amzn1
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://access.redhat.com/security/cve/CVE-2021-28950
- Patch: 5.4.17/CVE-2021-28950-fuse-fix-bad-inode.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://access.redhat.com/security/cve/CVE-2021-28950
- Patch: 5.4.17/CVE-2021-28950-fuse-fix-live-lock-in-fuse_iget.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-28971, CVSSv2 Score: 4.7
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://access.redhat.com/security/cve/CVE-2021-28971
- Patch: 5.4.17/CVE-2021-28971-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-status.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-28964, CVSSv2 Score: 4.1
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old
- CVE: https://access.redhat.com/security/cve/CVE-2021-28964
- Patch: 4.14.0/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of-an-old.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-28688, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28688
- Patch: 4.14.0/CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from-xen_blkbk_map.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-29266, CVSSv2 Score: 7.8
- Description:
vhost-vdpa: fix use-after-free of v->config_ctx
- CVE: https://access.redhat.com/security/cve/CVE-2021-29266
- Patch: 5.4.17/CVE-2021-29266-vhost-vdpa-fix-use-after-free-of-v-config_ctx.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-29266, CVSSv2 Score: 7.8
- Description:
vhost-vdpa: set v->config_ctx to NULL if eventfd_ctx_fdget()
- CVE: https://access.redhat.com/security/cve/CVE-2021-29266
- Patch: 5.4.17/CVE-2021-29266-vhost-vdpa-set-v-config_ctx-to-NULL-if-eventfd_ctx_fdget.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29650
- Patch: ubuntu-focal/5.4.0-73.82/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 5.4.0-73.82
- CVE-2021-29154, CVSSv2 Score: 7.8
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29154
- Patch: 5.4.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: >kernel-5.4.0-70.78
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-31916
- Patch: 4.14.0/CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devices.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-23133
- Patch: 5.4.17/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 5.4.17/CVE-2020-28374-scsi-target-Fix-XCOPY-NAA-identifier-lookup.patch
- From: kernel-uek-5.4.17-2102.202.5.el7uek
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 4.18.0/CVE-2020-28374-scsi-target-Fix-XCOPY-NAA-identifier-lookup-kpatch-1.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-36310, CVSSv2 Score: 5.5
- Description:
KVM: SVM: avoid infinite loop on NPF from bad address
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-36310
- Patch: 5.4.17/CVE-2020-36310-KVM-SVM-avoid-infinite-loop-on-NPF-from-bad-address.patch
- From: kernel-uek-5.4.17-2102.202.5.el7uek
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.4.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write.patch
- From: kernel-4.4.0-213.245
- CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25670-nfc-fix-refcount-leak-in-llcp_sock_bind.patch
- From: 5.4.0-74.83
- CVE-2020-25671, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25671
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25671-nfc-fix-refcount-leak-in-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE-2020-25672, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25672
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25672-nfc-fix-memory-leak-in-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.8.0/CVE-2021-29155-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.17/CVE-2021-29155-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-all-types.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.8.0/CVE-2021-29155-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-error-path.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Improve verifier error messages for users
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.0/CVE-2021-29155-bpf-Improve-verifier-error-messages-for-user.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 5.4.0/CVE-2021-29155-bpf-Refactor-and-streamline-bounds-check-into-helper.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move sanitize_val_alu out of op switch
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.0/CVE-2020-29155-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Tighten speculative pointer arithmetic mask
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.0/CVE-2021-29155-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From: kernel-5.4.0-77.86
- CVE-2021-23133, CVSSv2 Score:
- Description:
The patch is reverted in the upstream by 01bfe5e8e4 as introducing a deadlock
- CVE:
- Patch: skipped/CVE-2021-23133.patch
- From:
- CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix masking negation logic upon negative dst register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-31829
- Patch: 4.14.0/CVE-2021-31829-bpf-Fix-masking-negation-logic-upon-negative-dst-register.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- CVE: https://ubuntu.com/security/CVE-2021-32399
- Patch: 5.4.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the-HCI-controller.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33033
- Patch: 4.14.0/CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-DOI-refcounts.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-33033, CVSSv2 Score: 7.8
- Description:
net: mac802154: Fix general protection fault
- CVE: https://linux.oracle.com/cve/CVE-2021-33033.html
- Patch: oel8-uek6/5.4.17-2102.203.5.el8uek/CVE-2021-33033-net-mac802154-fix-general-protection-fault.patch
- From: 5.4.17-2102.203.5.el8uek
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://ubuntu.com/security/CVE-2021-33909
- Patch: 5.0.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: >kernel-5.3.0-75.71
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4: Fix EEPROM dump support
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 5.4.17/CVE-2020-14304-net-mlx4-Fix-EEPROM-dump-support.patch
- From: 5.4.17-2102.203.6.el8uek
- CVE-2021-23134, CVSSv2 Score: 7.8
- Description:
net/nfc: fix use-after-free llcp_sock_bind/connect
- CVE: https://ubuntu.com/security/CVE-2021-23134
- Patch: 5.4.0/CVE-2021-23134-net-nfc-fix-use-after-free-llcp_sock_bind-connect.patch
- From: kernel-5.4.0-77.86
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 5.4.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-5.4.0-77.86
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: add CCMP PN replay protection for fragmented frames
- CVE: https://access.redhat.com/security/cve/CVE-2020-26145
- Patch: 5.4.17/CVE-2020-26145-ath10k-add-CCMP-PN-replay-protection-for-fragmented-frames.patch
- From: 5.4.17-2102.203.6.el8uek
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for PCIe
- CVE: https://access.redhat.com/security/cve/CVE-2020-26145
- Patch: 5.4.17/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-PCIe.patch
- From: 5.4.17-2102.203.6.el8uek
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for SDIO
- CVE: https://access.redhat.com/security/cve/CVE-2020-26145
- Patch: 5.4.17/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-SDIO.patch
- From: 5.4.17-2102.203.6.el8uek
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
ath10k: Fix TKIP Michael MIC verification for PCIe
- CVE: https://access.redhat.com/security/cve/CVE-2020-26141
- Patch: 5.4.17/CVE-2020-26141-ath10k-Fix-TKIP-Michael-MIC-verification-for-PCIe.patch
- From: 5.4.17-2102.203.6.el8uek
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
ath10k: drop MPDU which has discard flag set by firmware for SDIO
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-ath10k-drop-MPDU-which-has-discard-flag-set-by-firmware-for-SDIO.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.4.17/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042-header.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment-cache-attacks.patch
- From: 5.8.0-59.66
- CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: add fragment cache to sta_info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24586
- Patch: 5.8.0/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: kernel-5.8.0-59.66
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 4.19.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.14.191-1
- CVE-2021-3656, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested
- CVE: https://access.redhat.com/security/cve/CVE-2021-3656
- Patch: 5.4.17/CVE-2021-3656-KVM_nSVM-always-intercept-VMLOAD_VMSAVE-when-nested.patch
- From: 5.4.17-2102.204.4.3
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-3653
- Patch: 5.4.17/CVE-2021-3653-KVM_nSVM-avoid-picking-up-unsupported-bits-from-L2-in-int_ctl.patch
- From: 5.4.17-2102.204.4.3
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-bionic/4.15.0-156.163/CVE-2021-3653-kpatch.patch
- From: 4.15.0-156.163
- CVE-2020-36311, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Periodically schedule when unregistering regions on destroy
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36311
- Patch: ubuntu-focal/5.4.0-84.94/CVE-2020-36311-KVM-SVM-Periodically-schedule-when-unregistering-regions-on-destroy.patch
- From: 5.4.0-84.94
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://ubuntu.com/security/CVE-2021-22543
- Patch: 4.18.0/CVE-2021-22543-17896-KVM-do-not-allow-mapping-valid-but-non-reference-co.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3573
- Patch: ubuntu-focal/5.4.0-81.91/0001-CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 5.4.0-81.91
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From: kernel-5.8.0-59.66
- CVE-2021-3656, CVSSv2 Score:
- Description:
Already included in ELSA-2021-9420
- CVE:
- Patch: skipped/CVE-2021-3656.patch
- From:
- CVE-2021-3739, CVSSv2 Score: 6.2
- Description:
btrfs: fix NULL pointer dereference when deleting device by invalid id
- CVE: https://linux.oracle.com/cve/CVE-2021-3739.html
- Patch: 5.4.17/CVE-2021-3739-btrfs-fix-null-pointer-dereference-when-deleting-device-by-invalid.patch
- From: 5.4.17-2102.205.7.3
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
hso: fix bailout in error case of probe
- CVE: https://access.redhat.com/security/cve/CVE-2021-37159
- Patch: 5.4.17/CVE-2021-37159-hso-fix-bailout-in-error-case-of-probe.patch
- From: 5.4.17-2102.206.1.el8uek
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://access.redhat.com/security/cve/CVE-2021-37159
- Patch: 5.4.17/CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_device.patch
- From: 5.4.17-2102.206.1.el8uek
- CVE-2021-38198, CVSSv2 Score: 6.4
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: 5.4.17/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get.patch
- From: 5.4.17-2102.206.1.el8uek
- CVE-2021-38198, CVSSv2 Score: 6.4
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: 5.4.17/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-kpatch.patch
- From: 5.4.17-2102.206.1.el8uek
- CVE-2021-3743, CVSSv2 Score: 6.2
- Description:
net: qrtr: fix another OOB Read in qrtr_endpoint_post
- CVE: https://access.redhat.com/security/cve/CVE-2021-3743
- Patch: 5.4.17/CVE-2021-3743-net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch
- From: 5.4.17-2102.206.1.el8uek
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its xattrs are changing
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-40490
- Patch: debian11/CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-i.patch
- From: 5.10.46-5
- CVE-2017-6074, CVSSv2 Score:
- Description:
Patch already exists in 5.4.y kernels.
- CVE:
- Patch: skipped/CVE-2017-6074.patch
- From:
- CVE-2020-16119, CVSSv2 Score: 7.8
- Description:
dccp: don't duplicate ccid when cloning dccp sock
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-16119
- Patch: debian11/CVE-2020-16119-dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch
- From: 5.10.46-5
- CVE-2021-3744, CVSSv2 Score: 5.5
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3744
- Patch: 5.4.17/CVE-2021-3744-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd.patch
- From: 5.4.17-2136.301.1.2
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://linux.oracle.com/cve/CVE-2021-41864.html
- Patch: 5.4.17/CVE-2021-41864-bpf-fix-integer-overflow-in-prealloc-elems-and-freelist.patch
- From: 5.4.17-2136.302.6.1.el8uek
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-kpatch-uek6.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-fget-check-that-the-fd-still-exists-after-getting-a-ref-to-it.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 5.4.17/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 5.4.17-2136.302.7.2
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
vfs: fs_context: fix up param length parsing in legacy_parse_param
- CVE: https://access.redhat.com/security/cve/CVE-2022-0185
- Patch: 4.18.0/CVE-2022-0185-vfs-fs_context-fix-up-param-length-parsing-in-legacy_parse_param.patch
- From: 4.18.0-348.12.2.el8_5
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: vfs: test that one given mount param is not larger than PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0185
- Patch: 5.4.0/CVE-2022-0185-UBUNTU-SAUCE-vfs-test-that-one-given-mount-param-is-not-larger-than-PAGE_SIZE.patch
- From: 5.4.0-96.109
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 5.4.17/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 5.4.17-2136.302.7.2.3
- CVE-2021-3640, CVSSv2 Score: 6.7
- Description:
Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://ubuntu.com/security/CVE-2021-3640
- Patch: 5.11.0/CVE-2021-3640-Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_msg.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
- CVE: https://access.redhat.com/security/cve/CVE-2021-44733
- Patch: 5.4.17/CVE-2021-44733-tee-handle-lookup-of-shm-with-reference-count.patch
- From: kernel-uek-5.4.17-2136.304.4.1
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
- CVE: https://access.redhat.com/security/cve/CVE-2021-44733
- Patch: 5.4.17/CVE-2021-44733-kpatch.patch
- From: kernel-uek-5.4.17-2136.304.4.1
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array size
- CVE: https://access.redhat.com/security/cve/CVE-2022-25636
- Patch: 4.18.0/CVE-2022-25636.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-3656 CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: x86: nSVM: don't copy virt_ext from vmcb12
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3656
- Patch: 5.4.17/CVE-2021-3656-KVM-x86-nSVM-dont-copy-virt_ext-from-vmcb12-1.patch
- From: 5.4.17-2136.305.4
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0330
- Patch: ubuntu-focal/5.4.0-100.113/0010-CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 5.4.0-100.113
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0330
- Patch: ubuntu-focal/5.4.0-100.113/CVE-2022-0330-kpatch.patch
- From: 5.4.0-100.113
- CVE-2021-39685, CVSSv2 Score: 7.8
- Description:
USB: gadget: zero allocate endpoint 0 buffers
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-39685
- Patch: 5.4.17/CVE-2021-39685-USB-gadget-zero-allocate-endpoint-0-buffers.patch
- From: 5.4.17-2136.305.1
- CVE-2021-39685, CVSSv2 Score: 7.8
- Description:
USB: gadget: detect too-big endpoint 0 requests
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-39685
- Patch: 5.4.17/CVE-2021-39685-USB-gadget-detect-too-big-endpoint-0-requests.patch
- From: 5.4.17-2136.305.1
- CVE-2021-39685, CVSSv2 Score: 7.8
- Description:
USB: gadget: bRequestType is a bitfield, not a enum
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-39685
- Patch: 5.4.17/CVE-2021-39685-USB-gadget-bRequestType-is-a-bitfield-not-a-enum.patch
- From: 5.4.17-2136.305.1
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.18.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records-193.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-23960, CVSSv2 Score:
- Description:
Out of scope as the patch is aarch64 related
- CVE:
- Patch: skipped/CVE-2022-23960.patch
- From:
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: drm/vmwgfx: Fix stale file descriptors on failed usercopy
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-22942
- Patch: ubuntu-focal/5.4.0-100.113/CVE-2022-22942-UBUNTU-SAUCE-drm-vmwgfx-Fix-stale-file-descriptors-on-failed-usercopy.patch
- From: 5.4.0-100.113
- CVE-2021-22600, CVSSv2 Score: 7.8
- Description:
net/packet: rx_owner_map depends on pg_vec
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-22600
- Patch: ubuntu-focal/5.4.0-100.113/0008-CVE-2021-22600-net-packet-rx_owner_map-depends-on-pg_vec.patch
- From: 5.4.0-100.113
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-24448
- Patch: 5.10.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 5.10.92-2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-26966, CVSSv2 Score: 4.6
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 5.4.17/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 5.4.17-2136.306.1.3
- CVE-2021-26341, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26341.patch
- From:
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: initialize registers in nft_do_chain()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1016
- Patch: 5.4.17/CVE-2022-1016-netfilter-nf_tables-initialize-registers-in-nft_do_chain.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-1158, CVSSv2 Score: N/A
- Description:
KVM: x86/mmu: do compare-and-exchange of gPTE via the user
- CVE: https://access.redhat.com/security/cve/CVE-2022-1158
- Patch: 5.4.17/CVE-2022-1158-KVM-x86-mmu-do-compare-and-exchange-of-gPTE-via-the-user-2102.patch
- From: 5.4.17-2136.306.1.3
- CVE-2021-45095, CVSSv2 Score: 5.5
- Description:
phonet: refcount leak in pep_sock_accep
- CVE: https://access.redhat.com/security/cve/CVE-2021-45095
- Patch: 5.10.0/CVE-2021-45095-phonet-refcount-leak-in-pep_sock_accep.patch
- From: kernel-5.10.92-1
- CVE-2022-1055, CVSSv2 Score:
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1055
- Patch: ubuntu-focal/5.4.0-107.121/0001-CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: 5.4.0-107.121
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2022-27666
- Patch: 5.4.17/CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformation.patch
- From: 5.4.17-2136.307.3.1.el8uek
- CVE-2022-21499, CVSSv2 Score:
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.10.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.10.113-1
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls.patch
- From: 5.4.17-2136.308.7
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.4.17-2136.308.7
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 5.4.17-2136.308.7
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-kpatch.patch
- From: 5.4.17-2136.308.7
- CVE-2022-23040, CVSSv2 Score: 7.0
- Description:
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23040
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23040-xen-xenbus-dont-let-xenbus_grant_ring-remove-grants-in-error-case.patch
- From: 4.15.0-177.186
- CVE-2022-23036 CVE-2022-23038, CVSSv2 Score: 7.0
- Description:
xen/grant-table: add gnttab_try_end_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23036-CVE-2022-23038-xen-grant-table-add-gnttab_try_end_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23037, CVSSv2 Score: 7.0
- Description:
xen/netfront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23037
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23037-xen-netfront-dont-use-gnttab_query_foreign_access-for-mapped-status-167.patch
- From: 4.15.0-177.186
- CVE-2022-23038, CVSSv2 Score: 7.0
- Description:
xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23038
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23038-xen-scsifront-dont-use-gnttab_query_foreign_access-for-mapped-status.patch
- From: 4.15.0-177.186
- CVE-2022-23039, CVSSv2 Score: 7.0
- Description:
xen/gntalloc: don't use gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23039
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23039-xen-gntalloc-dont-use-gnttab_query_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen: remove gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23041-xen-remove-gnttab_query_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/9p: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23041-xen-9p-use-alloc-free_pages_exact.patch
- From: 4.15.0-177.186
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/gnttab: fix gnttab_end_foreign_access() without page specified
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.17/CVE-2022-23041-xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
- From: 5.4.17-2136.308.7
- CVE-2022-23042, CVSSv2 Score: 7.0
- Description:
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23042
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23042-xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref-167.patch
- From: 4.15.0-177.186
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/gnttab: fix gnttab_end_foreign_access() without page specified (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.17/CVE-2022-23041-kpatch.patch
- From: 4.15.0-177.186
- CVE-2022-23042, CVSSv2 Score: 7.0
- Description:
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23042
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23042-kpatch.patch
- From: 4.15.0-177.186
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time credentials for process migraton perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.17/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm-checks.patch
- From: 5.4.17-2136.308.7
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-21505, CVSSv2 Score: 6.7
- Description:
Kernel lockdown bypass when UEFI secure boot is disabled / unavailable and IMA appraisal is enabled.
- CVE: https://linux.oracle.com/cve/CVE-2022-21505.html
- Patch: 5.4.17/CVE-2022-21505.patch
- From: 5.4.17-2136.309.5
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/CVE-2022-2588
- Patch: 5.4.17/CVE-2022-2588.patch
- From: kernel-uek-5.4.17-2136.309.5.1.el8uek
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged
- CVE: https://linux.oracle.com/cve//CVE-2022-2153.html
- Patch: 5.4.17/CVE-2022-2153-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugged-200.patch
- From: 5.4.17-2136.310.7
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged (adaptation)
- CVE: https://linux.oracle.com/cve//CVE-2022-2153.html
- Patch: 5.4.17/CVE-2022-2153-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugged-kpatch-206.patch
- From: 5.4.17-2136.310.7
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2153
- Patch: 5.4.17/CVE-2022-2153-KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-SynIC-wasnt-activated.patch
- From: 5.4.17-2136.310.7
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 5.15.0/CVE-2022-2153-KVM-x86-Check-lapic_in_kernel-before-attempting-to-set-a-SynIC-irq.patch
- From: 5.15.35-36
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 5.15.0/CVE-2022-2153-KVM-x86-Avoid-theoretical-NULL-pointer-dereference-in-kvm_irq_delivery_to_apic_fast.patch
- From: 5.15.35-36
- CVE-2022-23816, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-23825, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23825.patch
- From:
- CVE-2022-29900, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-21385, CVSSv2 Score: 6.2
- Description:
rds: copy_from_user only once per rds_sendmsg system call
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21385
- Patch: 5.4.17/CVE-2022-21385-rds-copy_from_user-only-once-per-rds_sendmsg-system-call-202.patch
- From: 5.4.17-2136.310.7
- CVE-2021-3669, CVSSv2 Score: 5.5
- Description:
ipc: replace costly bailout check in sysvipc_find_ipc()
- CVE: https://linux.oracle.com/cve/CVE-2021-3669.html
- Patch: 5.4.17/CVE-2021-3669-ipc-replace-costly-bailout-check-in-sysvipc_find_ipc.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-1280, CVSSv2 Score: 6.3
- Description:
drm: add a locked version of drm_is_current_master
- CVE: https://linux.oracle.com/cve/CVE-2022-1280.html
- Patch: 5.4.17/CVE-2022-1280-0001-drm-add-a-locked-version-of-drm_is_current_master.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-1280, CVSSv2 Score: 6.3
- Description:
drm: add a locked version of drm_is_current_master
- CVE: https://linux.oracle.com/cve/CVE-2022-1280.html
- Patch: 5.4.17/CVE-2022-1280-0002-drm-serialize-drm_file.master-with-a-new-spinlock.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-1280, CVSSv2 Score: 6.3
- Description:
drm: add a locked version of drm_is_current_master
- CVE: https://linux.oracle.com/cve/CVE-2022-1280.html
- Patch: 5.4.17/CVE-2022-1280-0003-drm-protect-drm_master-pointers-in-drm_lease.c.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-1280, CVSSv2 Score: 6.3
- Description:
drm: add a locked version of drm_is_current_master (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-1280
- Patch: 5.4.17/CVE-2022-1280-kpatch.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0001-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0002-netfilter-nf_tables-do-not-allow-RULE_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-21546 (dependency), CVSSv2 Score: n/a
- Description:
scsi: target: Fix protect handling in WRITE SAME(32)
- CVE: n/a
- Patch: 5.4.17/CVE-2022-21546-scsi-target-Fix-protect-handling-in-WRITE_SAME.patch
- From: 5.4.17-2102.205.3
- CVE-2022-21546, CVSSv2 Score: n/a
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: n/a
- Patch: 4.14.35/CVE-2022-21546-scsi-target-Fix-WRITE_SAME-No-Data-Buffer-crash.patch
- From: kernel-uek-4.14.35-2047.517.3.el7uek
- CVE-2022-21499, CVSSv2 Score: 6.7
- Description:
lockdown: also lock down previous kgdb use
- CVE: https://linux.oracle.com/cve/CVE-2022-21499.html
- Patch: 5.4.17/CVE-2022-21499-lockdown-also-lock-down-previous-kgdb-use.patch
- From: 5.4.17-2136.312.3.4.el8uek
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 5.10.0/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.10.140-1
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/0001-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 5.4.0-135.152
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: 5.4.17/CVE-2022-3565-kpatch.patch
- From: 5.4.17-2136.314.6.2
- CVE-2022-2602, CVSSv2 Score: 7.0
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://access.redhat.com/security/cve/CVE-2022-2602
- Patch: 5.4.17/CVE-2022-2602-0001-io_uring-af_unix-defer-registered-files-gc-to-io_uri.patch
- From: 5.4.17-2136.314.6.2
- CVE-2022-2602, CVSSv2 Score: 7.0
- Description:
io_uring/af_unix: defer registered files gc to io_uring release (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-2602
- Patch: 5.4.17/CVE-2022-2602-kpatch.patch
- From: 5.4.17-2136.314.6.2
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 5.4.17/CVE-2022-4378-0001-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 5.4.17-2136.314.6.2
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 5.4.17/CVE-2022-4378-0002-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 5.4.17-2136.314.6.2
- CVE-2022-42895, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://linux.oracle.com/cve//CVE-2022-4378.html
- Patch: 5.4.17/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitialized-memory.patch
- From: 5.4.17-2136.315.5
- CVE-2022-4139, CVSSv2 Score: 7.8
- Description:
drm/i915/gt: Serialize TLB invalidates with GT resets
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-4139
- Patch: 5.4.17/CVE-2022-4139-1-lt-2136.312.3.patch
- From: 5.4.17-2136.312.3
- CVE-2022-4139, CVSSv2 Score: 7.8
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-4139
- Patch: 5.4.17/CVE-2022-4139-2.patch
- From: 5.4.17-2136.316.7
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-42896
- Patch: 5.4.17/CVE-2022-42896.patch
- From: 5.4.17-2136.316.7
- CVE-2022-41218, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://linux.oracle.com/cve/CVE-2022-41218.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 5.4.17-2136.317.5.3.el8uek
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://linux.oracle.com/cve/CVE-2022-2873.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-2873-i2c-ismt-Fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 5.4.17-2136.317.5.3
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://linux.oracle.com/cve/CVE-2022-45934.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-45934-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 5.4.17-2136.317.5.3
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://linux.oracle.com/cve/CVE-2023-23455.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.4.17-2136.317.5.3
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://linux.oracle.com/cve/CVE-2023-23454.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.4.17-2136.317.5.3
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://linux.oracle.com/cve/CVE-2023-0394.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.4.17-2136.317.5.3
- CVE-2022-47929, CVSSv2 Score: 5.5
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://linux.oracle.com/cve/CVE-2022-47929.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 5.4.17-2136.317.5.3
- CVE-2022-45919 CVE-2022-45887 CVE-2022-45886 CVE-2022-45885 CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: adopts refcnt to avoid UAF
- CVE: https://linux.oracle.com/cve/CVE-2022-45919.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-45919-media-dvbdev-adopts-refcnt-to-avoid-UAF.patch
- From: 5.4.17-2136.317.5.3
- CVE-2022-45919 CVE-2022-45887 CVE-2022-45886 CVE-2022-45885 CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: fix refcnt bug
- CVE: https://linux.oracle.com/cve/CVE-2022-45919.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-45919-media-dvbdev-fix-refcnt-bug.patch
- From: 5.4.17-2136.317.5.3
- CVE-2022-45919 CVE-2022-45887 CVE-2022-45886 CVE-2022-45885 CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: adopts refcnt to avoid UAF (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-45919.html
- Patch: oel8-uek6/5.4.17-2136.317.5.3.el8uek/CVE-2022-45919-kpatch.patch
- From: 5.4.17-2136.317.5.3
- CVE-2022-3108, CVSSv2 Score: 5.5
- Description:
drm/amdkfd: Check for null pointer after calling kmemdup
- CVE: https://linux.oracle.com/cve/CVE-2022-3108.html
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-3108-patch-drm-amdkfd-check-for-null-pointer-after-calling-kmemdup.patch
- From: 5.4.17-2136.318.7.1.el8uek
- CVE-2022-2196, CVSSv2 Score: 8.8
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://linux.oracle.com/cve/CVE-2022-2196.html
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-2196-patch-kvm-vmx-execute-ibpb-on-emulated-vm-exit-when-guest-has.patch
- From: 5.4.17-2136.318.7.1.el8uek
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net: fix a concurrency bug in l2tp_tunnel_register()
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-4129-net-fix-a-concurrency-bug-in-l2tp_tunnel_register.patch
- From: 5.4.17-2136.318.7.1
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-4129-l2tp-Serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.4.17-2136.318.7.1
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-4129-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk_callback_lock.patch
- From: 5.4.17-2136.318.7.1
- CVE-2023-23559, CVSSv2 Score: 7.8
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://access.redhat.com/security/cve/CVE-2023-23559
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_query_oid.patch
- From: 5.4.17-2136.318.7.1
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672, CVSSv2 Score: 4.7
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-27672
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-pre309.patch
- From: kernel-uek-5.4.17-2136.318.7.1.el8uek
- CVE-2022-27672, CVSSv2 Score: 4.7
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-27672
- Patch: oel8-uek6/5.4.17-2136.318.7.1.el8uek/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-pre309-kpatch.patch
- From: kernel-uek-5.4.17-2136.318.7.1.el8uek
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://linux.oracle.com/cve/CVE-2023-32233.html
- Patch: oel8-uek6/5.4.17-2136.320.7.el8uek/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-pr.patch
- From: 5.4.17-2136.320.7
- CVE-2023-30456, CVSSv2 Score: 6.5
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://linux.oracle.com/cve/CVE-2023-30456.html
- Patch: oel8-uek6/5.4.17-2136.320.7.el8uek/CVE-2023-30456-KVM-nVMX-add-missing-consistency-checks-for-CR0-and-CR4-2102.patch
- From: 5.4.17-2136.320.7
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://linux.oracle.com/cve/CVE-2022-34918.html
- Patch: oel8-uek6/5.4.17-2136.321.4.el8uek/CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-data.patch
- From: 5.4.17-2136.321.4
- CVE-2022-39189, CVSSv2 Score: 7.8
- Description:
KVM: x86: do not report a vCPU as preempted outside instruction boundaries (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-39189.html
- Patch: oel8-uek6/5.4.17-2136.321.4.el8uek/CVE-2022-39189-KVM-x86-do-not-report-a-vCPU-as-preempted-outside-instruction-boundaries-kpatch-2102.206.patch
- From: 5.4.17-2136.321.4
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-22024, CVSSv2 Score: 5.5
- Description:
rds: Fix lack of reentrancy for connection reset with dst addr zero
- CVE: https://linux.oracle.com/cve/CVE-2023-22024.html
- Patch: 5.4.17/CVE-2023-22024-rds-Fix-lack-of-reentrancy-for-connection-reset-with-dst-addr-zero-2102.patch
- From: 5.4.17-2136.323.8.1
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://linux.oracle.com/cve/CVE-2023-42753.html
- Patch: 5.4.17/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.4.17-2136.323.8.2
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-20588, CVSSv2 Score: 5.5
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: oel8-uek6/5.4.17-2136.324.5.3.el8uek/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0-2102.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-1989, CVSSv2 Score: 7.0
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2023-1989.html
- Patch: oel8-uek6/5.4.17-2136.325.5.el8uek/CVE-2023-1989-patch-bluetooth-btsdio-fix-use-after-free-bug-in-btsdio-remove.patch
- From: 5.4.17-2136.325.5.el8uek
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://linux.oracle.com/cve/CVE-2023-5178.html
- Patch: oel8-uek6/5.4.17-2136.326.6.el8uek/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.4.17-2136.326.6.el8uek
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://linux.oracle.com/cve/CVE-2023-45863.html
- Patch: oel8-uek6/5.4.17-2136.328.3.el8uek/CVE-2023-45863-kobject-Fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 5.4.17-2136.328.3.
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2024-1086, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel8-uek6/5.4.17-2136.329.3.2.el8uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-323.patch
- From: 5.4.17-2136.329.3.2
- CVE-2024-0340, CVSSv2 Score: 4.4
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://linux.oracle.com/cve/CVE-2024-0340.html
- Patch: oel8-uek6/5.4.17-2136.330.7.1.el8uek/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-memset.patch
- From: 5.4.17-2136.330.7.1
- CVE-2024-0607, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://linux.oracle.com/cve/CVE-2024-0607.html
- Patch: oel8-uek6/5.4.17-2136.330.7.1.el8uek/CVE-2024-0607-nf_tables-fix-pointer-math-issue-in-nft_byteorder_eval.patch
- From: 5.4.17-2136.330.7.1
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alternative2 asm definition
- CVE: https://www.kernel.org
- Patch: 5.4.0/kpatch-add-alt2-asm-definitions.patch
- From: N/A
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://ubuntu.com/security/CVE-2024-2201
- Patch: 5.4.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-5.4-304.patch
- From: kernel-uek-5.4.17-2136.330.7.1.el8uek
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: 5.15.0/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 5.15.0/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://linux.oracle.com/cve/CVE-2024-36971.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36971-net-fix-__dst_negative_advice-race-2136.327.patch
- From: 5.4.17-2136.334.6
- CVE-2024-38583, CVSSv2 Score:
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-36015, CVSSv2 Score: 5.5
- Description:
ppdev: Add an error check in register_device
- CVE: https://linux.oracle.com/cve/CVE-2024-36015.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36015-ppdev-add-an-error-check-in-register-device-5.4.17-2136.333.5.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38582, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential hang in nilfs_detach_log_writer()
- CVE: https://linux.oracle.com/cve/CVE-2024-38582.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38582-nilfs2-fix-potential-hang-in-nilfs-detach-log-writer-5.4.17-2136.333.5.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39480, CVSSv2 Score: 7.8
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://linux.oracle.com/cve/CVE-2024-39480.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39480-kdb-Fix-buffer-overflow-during-tab-complete.patch
- From: 5.4.17-2136.334.6
- CVE-2024-38612, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix invalid unregister error path
- CVE: https://linux.oracle.com/cve/CVE-2024-38612.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38612-ipv6-sr-fix-invalid-unregister-error-path-2136.330.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36016, CVSSv2 Score: 6.4
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://linux.oracle.com/cve/CVE-2024-36016.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://linux.oracle.com/cve/CVE-2024-38579.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38599, CVSSv2 Score: 5.5
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://linux.oracle.com/cve/CVE-2024-38599.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38567, CVSSv2 Score: 5.5
- Description:
USB: core: Add routines for endpoint checks in old drivers
- CVE: https://linux.oracle.com/cve/CVE-2024-38567.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38567-USB-core-Add-routines-for-endpoint-checks-in-old-drivers.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38567, CVSSv2 Score: 5.5
- Description:
wifi: carl9170: add a proper sanity check for endpoints
- CVE: https://linux.oracle.com/cve/CVE-2024-38567.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38567-wifi-carl9170-add-a-proper-sanity-check-for-endpoints.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38549, CVSSv2 Score: 5.5
- Description:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
- CVE: https://linux.oracle.com/cve/CVE-2024-38549.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38549-drm-mediatek-add-0-size-check-to-mtk-drm-gem-obj.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36014, CVSSv2 Score: 5.5
- Description:
drm/arm/malidp: fix a possible null pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-36014.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36014-drm-arm-malidp-fix-a-possible-null-pointer-dereference.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38633, CVSSv2 Score: 5.5
- Description:
serial: max3100: Update uart_driver_registered on driver
- CVE: https://linux.oracle.com/cve/CVE-2024-38633.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38633-serial-max3100-update-uart-driver-registered-on-driver.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://linux.oracle.com/cve/CVE-2024-36286.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38659, CVSSv2 Score: 5.5
- Description:
enic: Validate length of nl attributes in enic_set_vf_port
- CVE: https://linux.oracle.com/cve/CVE-2024-38659.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38659-enic-validate-length-of-nl-attributes-in-enic-set-vf-port.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38661, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38661.patch
- From:
- CVE-2024-35976, CVSSv2 Score: 5.5
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://linux.oracle.com/cve/CVE-2024-35976.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38552, CVSSv2 Score: 4.4
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://linux.oracle.com/cve/CVE-2024-38552.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38560, CVSSv2 Score: 5.1
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://linux.oracle.com/cve/CVE-2024-38560.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38596, CVSSv2 Score: 4.7
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-38596.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38596-af-unix-fix-data-races-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38637, CVSSv2 Score: 4.4
- Description:
greybus: lights: check return of get_channel_from_mode
- CVE: https://linux.oracle.com/cve/CVE-2024-38637.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38637-greybus-lights-check-return-of-get-channel-from-mode.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37353, CVSSv2 Score: 4.4
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://linux.oracle.com/cve/CVE-2024-37353.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when-request-irq.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38618, CVSSv2 Score: 4.4
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://linux.oracle.com/cve/CVE-2024-38618.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://linux.oracle.com/cve/CVE-2024-37356.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://linux.oracle.com/cve/CVE-2024-37356.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha-kpatch.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38565, CVSSv2 Score: 5.5
- Description:
wifi: ar5523: enable proper endpoint verification
- CVE: https://linux.oracle.com/cve/CVE-2024-38565.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38565-wifi-ar5523-enable-proper-endpoint-verification.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38578, CVSSv2 Score: 5.5
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://linux.oracle.com/cve/CVE-2024-38578.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38601, CVSSv2 Score: 5.5
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://linux.oracle.com/cve/CVE-2024-38601.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38634, CVSSv2 Score: 5.5
- Description:
serial: max3100: Lock port->lock when calling
- CVE: https://linux.oracle.com/cve/CVE-2024-38634.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38634-serial-max3100-lock-port-lock-when-calling.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39276, CVSSv2 Score: 5.5
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in
- CVE: https://linux.oracle.com/cve/CVE-2024-39276.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39467, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on i_xattr_nid in
- CVE: https://linux.oracle.com/cve/CVE-2024-39467.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-39471.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39488, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture issue
- CVE:
- Patch: skipped/CVE-2024-39488.patch
- From:
- CVE-2024-33621, CVSSv2 Score: 4.4
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://linux.oracle.com/cve/CVE-2024-33621.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound-5.4.17-2136.320.7.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix gss_free_in_token_pages()
- CVE: https://linux.oracle.com/cve/CVE-2024-36288.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36288-sunrpc-fix-gss_free_in_token_pages.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
- CVE: https://linux.oracle.com/cve/CVE-2024-36288.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36288-sunrpc-fix-loop-termination-condition-in-5.4.17-2136.316.7.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://linux.oracle.com/cve/CVE-2024-36270.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled-on-the.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://linux.oracle.com/cve/CVE-2024-38558.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38559, CVSSv2 Score: 4.4
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://linux.oracle.com/cve/CVE-2024-38559.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38635, CVSSv2 Score:
- Description:
soundwire: Skipped as code which CVE fixes doesn't exists in older releaes
- CVE:
- Patch: skipped/CVE-2024-38635.patch
- From:
- CVE-2024-39301, CVSSv2 Score: 5.5
- Description:
net/9p: fix uninit-value in p9_client_rpc()
- CVE: https://linux.oracle.com/cve/CVE-2024-39301.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39301-net-9p-fix-uninit-value-in-p9-client-rpc.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38615, CVSSv2 Score: 5.5
- Description:
cpufreq: exit() callback is optional
- CVE: https://linux.oracle.com/cve/CVE-2024-38615.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38613, CVSSv2 Score:
- Description:
Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38613.patch
- From:
- CVE-2024-38589, CVSSv2 Score: 5.5
- Description:
netrom: fix possible dead-lock in nr_rt_ioctl()
- CVE: https://linux.oracle.com/cve/CVE-2024-38589.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38589-netrom-fix-possible-dead-lock-in-nr-rt-ioctl.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38627, CVSSv2 Score: 5.5
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-38627.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39292, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-38621, CVSSv2 Score: 5.5
- Description:
media: stk1160: fix bounds checking in stk1160_copy_video()
- CVE: https://linux.oracle.com/cve/CVE-2024-38621.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38621-media-stk1160-fix-bounds-checking-in-stk1160-copy-video.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39489, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix memleak in seg6_hmac_init_algo
- CVE: https://linux.oracle.com/cve/CVE-2024-39489.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39489-ipv6-sr-fix-memleak-in-seg6-hmac-init-algo.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38780, CVSSv2 Score: 5.5
- Description:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
- CVE: https://linux.oracle.com/cve/CVE-2024-38780.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38780-dma-buf-sw-sync-don-t-enable-irq-from-sync-print-obj.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-40958, CVSSv2 Score: 7.8
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://linux.oracle.com/cve/CVE-2024-40958.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net-203.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41049, CVSSv2 Score: 7.8
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://linux.oracle.com/cve/CVE-2024-41049.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode-324.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2023-52628, CVSSv2 Score: 7.0
- Description:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
- CVE: https://linux.oracle.com/cve/CVE-2023-52628.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2023-52628-netfilter-nftables-exthdr-fix-4-byte-stack-oob-write.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42094, CVSSv2 Score: 7.8
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42094.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39487, CVSSv2 Score: 7.1
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://linux.oracle.com/cve/CVE-2024-39487.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41046, CVSSv2 Score: 7.8
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://linux.oracle.com/cve/CVE-2024-41046.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach-5.4.17-2136.334.6.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42104, CVSSv2 Score: 7.8
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://linux.oracle.com/cve/CVE-2024-42104.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2022-3567, CVSSv2 Score: 6.4
- Description:
ipv6: annotate some data-races around sk->sk_prot
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2022-3567-ipv6-annotate-some-data-races-around-sk-sk_prot.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2022-3567, CVSSv2 Score: 6.4
- Description:
ipv6: Fix data races around sk->sk_prot.
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2022-3567-ipv6-fix-data-races-around-sk-sk_prot.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2022-3566, CVSSv2 Score: 7.1
- Description:
tcp: Fix data races around icsk->icsk_af_ops.
- CVE: https://linux.oracle.com/cve/CVE-2022-3566.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2022-3566-tcp-Fix-data-races-around-icsk-icsk_af_ops.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39469, CVSSv2 Score: 5.5
- Description:
nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors
- CVE: https://linux.oracle.com/cve/CVE-2024-39469.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39469-nilfs2-fix-nilfs-empty-dir-misjudgment-and-long-loop-on-5.4.17-2136.334.6.1.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39499, CVSSv2 Score: 5.5
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://linux.oracle.com/cve/CVE-2024-39499.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39506, CVSSv2 Score: 5.5
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://linux.oracle.com/cve/CVE-2024-39506.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://linux.oracle.com/cve/CVE-2024-40904.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40932, CVSSv2 Score: 5.5
- Description:
drm/exynos/vidi: fix memory leak in .get_modes()
- CVE: https://linux.oracle.com/cve/CVE-2024-40932.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40932-drm-exynos-vidi-fix-memory-leak-in-get-modes.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://linux.oracle.com/cve/CVE-2024-40960.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40988, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40988.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41035, CVSSv2 Score: 5.5
- Description:
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
- CVE: https://linux.oracle.com/cve/CVE-2024-41035.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41035-usb-core-fix-duplicate-endpoint-bug-by-clearing-reserved.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41097, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://linux.oracle.com/cve/CVE-2024-41097.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42076, CVSSv2 Score: 5.5
- Description:
net: can: j1939: Initialize unused data in j1939_send_one()
- CVE: https://linux.oracle.com/cve/CVE-2024-42076.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42076-net-can-j1939-initialize-unused-data-in-j1939-send-one-315.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40943, CVSSv2 Score: 5.5
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://linux.oracle.com/cve/CVE-2024-40943.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40995, CVSSv2 Score: 5.5
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-40995.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://linux.oracle.com/cve/CVE-2024-41044.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets-307.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42089, CVSSv2 Score: 5.5
- Description:
ASoC: fsl-asoc-card: set priv->pdev before using it
- CVE: https://linux.oracle.com/cve/CVE-2024-42089.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42089-asoc-fsl-asoc-card-set-priv-pdev-before-using-it.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
net: tcp: fix unexcepted socket die when snd_wnd is 0
- CVE: https://linux.oracle.com/cve/CVE-2024-41007.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41007-net-tcp-fix-unexcepted-socket-die-when-snd_wnd-is-0.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: use signed arithmetic in tcp_rtx_probe0_timed_out()
- CVE: https://linux.oracle.com/cve/CVE-2024-41007.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41007-tcp-use-signed-arithmetic-in-tcp_rtx_probe0_timed_out.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: avoid too many retransmit packets
- CVE: https://linux.oracle.com/cve/CVE-2024-41007.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41007-tcp-avoid-too-many-retransmit-packets.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://linux.oracle.com/cve/CVE-2024-42096.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40978, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://linux.oracle.com/cve/CVE-2024-40978.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42106, CVSSv2 Score: 5.5
- Description:
inet_diag: Initialize pad field in struct inet_diag_req_v2
- CVE: https://linux.oracle.com/cve/CVE-2024-42106.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42106-inet-diag-initialize-pad-field-in-struct-inet-diag-req-v2.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40987, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40987.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40987-drm-amdgpu-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-36894, CVSSv2 Score:
- Description:
USB composite function controllers related patch
- CVE:
- Patch: skipped/CVE-2024-36894.patch
- From:
- CVE-2024-36974, CVSSv2 Score: 6.1
- Description:
net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://linux.oracle.com/cve/CVE-2024-36974.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-36974-net-sched-taprio-always-validate-tca-taprio-attr-priomap.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://linux.oracle.com/cve/CVE-2024-39501.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
driver core: Fix uevent_show() vs driver detach race
- CVE: https://linux.oracle.com/cve/CVE-2024-39501.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39501-driver-core-fix-uevent_show-vs-driver-detach-race.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39505, CVSSv2 Score:
- Description:
ARM related patch
- CVE:
- Patch: skipped/CVE-2024-39505.patch
- From:
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://linux.oracle.com/cve/CVE-2024-40959.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41034, CVSSv2 Score:
- Description:
nilfs2 related patch
- CVE:
- Patch: skipped/CVE-2024-41034.patch
- From:
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://linux.oracle.com/cve/CVE-2024-41041.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42097, CVSSv2 Score: 5.5
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://linux.oracle.com/cve/CVE-2024-42097.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42105, CVSSv2 Score:
- Description:
nilfs2 related patch
- CVE:
- Patch: skipped/CVE-2024-42105.patch
- From:
- CVE-2024-42223, CVSSv2 Score: 5.5
- Description:
media: dvb-frontends: tda10048: Fix integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-42223.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42223-media-dvb-frontends-tda10048-fix-integer-overflow.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40945, CVSSv2 Score: 5.5
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-40945.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41022, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://linux.oracle.com/cve/CVE-2024-41022.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41022-drm-amdgpu-fix-signedness-bug-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41095, CVSSv2 Score: 5.5
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-41095.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41095-drm-nouveau-dispnv04-fix-null-pointer-dereference-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42087, CVSSv2 Score: 5.5
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
- CVE: https://linux.oracle.com/cve/CVE-2024-42087.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42101, CVSSv2 Score: 5.5
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42101.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42119, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Skip finding free audio for unknown engine_id
- CVE: https://linux.oracle.com/cve/CVE-2024-42119.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42119-drm-amd-display-skip-finding-free-audio-for-unknown.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-37078, CVSSv2 Score:
- Description:
nilfs2 is not enabled
- CVE:
- Patch: skipped/CVE-2024-37078.patch
- From:
- CVE-2024-39509, CVSSv2 Score: 5.5
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://linux.oracle.com/cve/CVE-2024-39509.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-38619-usb-storage-alauda-Fix-uninit-value-in-alauda_check_media.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40901, CVSSv2 Score: 5.5
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://linux.oracle.com/cve/CVE-2024-40901.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-5.4.17-2102.202.5.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://linux.oracle.com/cve/CVE-2024-40912.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40912-wifi-mac80211-fix-deadlock-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40941, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://linux.oracle.com/cve/CVE-2024-40941.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40942, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://linux.oracle.com/cve/CVE-2024-40942.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40968, CVSSv2 Score:
- Description:
MIPS related CVE.
- CVE:
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40993, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix suspicious rcu_dereference_protected()
- CVE: https://linux.oracle.com/cve/CVE-2024-40993.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40993-netfilter-ipset-fix-suspicious-rcu-dereference-protected-5.4.17-2136.327.2.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42084, CVSSv2 Score: 5.5
- Description:
ftruncate: pass a signed offset
- CVE: https://linux.oracle.com/cve/CVE-2024-42084.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42127, CVSSv2 Score: 5.5
- Description:
drm/lima: fix shared irq handling on driver remove
- CVE: https://linux.oracle.com/cve/CVE-2024-42127.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42127-drm-lima-fix-shared-irq-handling-on-driver-remove.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42157, CVSSv2 Score:
- Description:
s390 architecture related CVE.
- CVE:
- Patch: skipped/CVE-2024-42157.patch
- From:
- CVE-2024-40905, CVSSv2 Score: 5.5
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://linux.oracle.com/cve/CVE-2024-40905.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40905-ipv6-fix-possible-race-in-fib6-drop-pcpu-from.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42070, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store
- CVE: https://linux.oracle.com/cve/CVE-2024-42070.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42070-netfilter-nf-tables-fully-validate-nft-data-value-on-store-5.4.17-2136.320.7.1.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40963, CVSSv2 Score:
- Description:
Out of scope as the patch is for MIPS arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40963.patch
- From:
- CVE-2024-40974, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-42145, CVSSv2 Score: 5.5
- Description:
IB/core: Implement a limit on UMAD receive List
- CVE: https://linux.oracle.com/cve/CVE-2024-42145.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42145-ib-core-implement-a-limit-on-umad-receive-list.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42145, CVSSv2 Score: 5.5
- Description:
IB/core: Implement a limit on UMAD receive List (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2024-42145.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42145-ib-core-implement-a-limit-on-umad-receive-list-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2023-52803, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix RPC client cleaned up the freed pipefs dentries kpatch
- CVE: https://linux.oracle.com/cve/CVE-2023-52803.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2023-52803-sunrpc-fix-rpc-client-cleaned-up-the-freed-pipefs-dentries-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-36978, CVSSv2 Score: 7.8
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://linux.oracle.com/cve/CVE-2024-36978.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40902, CVSSv2 Score: 7.8
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://linux.oracle.com/cve/CVE-2024-40902.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39495, CVSSv2 Score: 7.8
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://linux.oracle.com/cve/CVE-2024-39495.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42093, CVSSv2 Score: 7.8
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42093.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41087, CVSSv2 Score: 7.8
- Description:
ata: libata-core: Fix double free on error
- CVE: https://linux.oracle.com/cve/CVE-2024-41087.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42224, CVSSv2 Score: 7.8
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://linux.oracle.com/cve/CVE-2024-42224.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42148, CVSSv2 Score: 7.8
- Description:
bnx2x: Fix multiple UBSAN array-index-out-of-bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-42148.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42148-bnx2x-fix-multiple-ubsan-array-index-out-of-bounds-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40961, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-40961.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6-nh-init.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40981, CVSSv2 Score: 5.5
- Description:
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
- CVE: https://linux.oracle.com/cve/CVE-2024-40981.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40981-batman-adv-bypass-empty-buckets-in-batadv-purge-orig-ref.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41089, CVSSv2 Score: 5.5
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in
- CVE: https://linux.oracle.com/cve/CVE-2024-41089.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42092, CVSSv2 Score: 5.5
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://linux.oracle.com/cve/CVE-2024-42092.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42115, CVSSv2 Score: 5.5
- Description:
jffs2: Fix potential illegal address access in
- CVE: https://linux.oracle.com/cve/CVE-2024-42115.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42115-jffs2-fix-potential-illegal-address-access-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39502, CVSSv2 Score:
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-39502.patch
- From:
- CVE-2024-41006, CVSSv2 Score: 5.5
- Description:
netrom: Fix a memory leak in nr_heartbeat_expiry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41006.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41006-netrom-fix-a-memory-leak-in-nr-heartbeat-expiry-5.4.17-2102.204.4.4.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42236, CVSSv2 Score: 5.5
- Description:
usb: gadget: configfs: Prevent OOB read/write in
- CVE: https://linux.oracle.com/cve/CVE-2024-42236.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in-5.4.17-2102.202.5.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42090, CVSSv2 Score: 5.5
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling
- CVE: https://linux.oracle.com/cve/CVE-2024-42090.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42086, CVSSv2 Score: 5.5
- Description:
iio: chemical: bme680: Fix overflows in compensate()
- CVE: https://linux.oracle.com/cve/CVE-2024-42086.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42086-iio-chemical-bme680-fix-overflows-in-compensate.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42124, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://linux.oracle.com/cve/CVE-2024-42124.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42143, CVSSv2 Score: 5.5
- Description:
orangefs: fix out-of-bounds fsid access
- CVE: https://linux.oracle.com/cve/CVE-2024-42143.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42143-orangefs-fix-out-of-bounds-fsid-access.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-36484, CVSSv2 Score:
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-36484.patch
- From:
- CVE-2024-40980, CVSSv2 Score: 5.5
- Description:
drop_monitor: replace spin_lock by raw_spin_lock
- CVE: https://linux.oracle.com/cve/CVE-2024-40980.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40980-drop-monitor-replace-spin-lock-by-raw-spin-lock.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42153, CVSSv2 Score: 5.5
- Description:
i2c: pnx: Fix potential deadlock warning from
- CVE: https://linux.oracle.com/cve/CVE-2024-42153.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42153-i2c-pnx-fix-potential-deadlock-warning-from.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42153, CVSSv2 Score: 5.5
- Description:
i2c: pnx: Fix potential deadlock warning from
- CVE: https://linux.oracle.com/cve/CVE-2024-42153.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42153-i2c-pnx-fix-potential-deadlock-warning-from-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42232, CVSSv2 Score: 5.5
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://linux.oracle.com/cve/CVE-2024-42232.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-49863, CVSSv2 Score: 5.5
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://linux.oracle.com/cve/CVE-2024-49863.html
- Patch: oel8-uek6/5.4.17-2136.335.4.1.el8uek/CVE-2024-49863-vhost-scsi-null-ptr-dereference-in-vhost_scsi_get_req-uek6.patch
- From: 5.4.17-2136.335.4.1.el8uek
- CVE-2024-44954, CVSSv2 Score: 5.5
- Description:
ALSA: line6: Fix racy access to midibuf
- CVE: https://linux.oracle.com/cve/CVE-2024-44954.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44954-alsa-line6-fix-racy-access-to-midibuf-5.4.17-2136.316.7.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41070, CVSSv2 Score: 7.8
- Description:
KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
- CVE: https://linux.oracle.com/cve/CVE-2024-41070.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41070-kvm-ppc-book3s-hv-prevent-uaf-in-kvm-spapr-tce-attach-iommu-group.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://linux.oracle.com/cve/CVE-2024-42301.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41059, CVSSv2 Score: 7.1
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://linux.oracle.com/cve/CVE-2024-41059.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://linux.oracle.com/cve/CVE-2024-42313.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42285, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://linux.oracle.com/cve/CVE-2024-42285.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://linux.oracle.com/cve/CVE-2024-43858.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://linux.oracle.com/cve/CVE-2024-42284.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://linux.oracle.com/cve/CVE-2024-42280.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42271, CVSSv2 Score: 7.8
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://linux.oracle.com/cve/CVE-2024-42271.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://linux.oracle.com/cve/CVE-2024-43882.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://linux.oracle.com/cve/CVE-2024-46738.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41072, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://linux.oracle.com/cve/CVE-2024-41072.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42297, CVSSv2 Score: 5.5
- Description:
f2fs: fix to don't dirty inode for readonly filesystem
- CVE: https://linux.oracle.com/cve/CVE-2024-42297.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42297-f2fs-fix-to-don-t-dirty-inode-for-readonly-filesystem.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42292, CVSSv2 Score: 5.5
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://linux.oracle.com/cve/CVE-2024-42292.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43856, CVSSv2 Score: 5.5
- Description:
dma: fix call order in dmam_free_coherent
- CVE: https://linux.oracle.com/cve/CVE-2024-43856.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43856-dma-fix-call-order-in-dmam-free-coherent.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://linux.oracle.com/cve/CVE-2024-42131.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43867, CVSSv2 Score: 5.5
- Description:
drm/nouveau: prime: fix refcount underflow
- CVE: https://linux.oracle.com/cve/CVE-2024-43867.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43867-drm-nouveau-prime-fix-refcount-underflow.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44969, CVSSv2 Score:
- Description:
s390 arch not supported.
- CVE:
- Patch: skipped/CVE-2024-44969.patch
- From:
- CVE-2024-43894, CVSSv2 Score: 5.5
- Description:
drm/client: fix null pointer dereference in drm_client_modeset_probe
- CVE: https://linux.oracle.com/cve/CVE-2024-43894.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43894-drm-client-fix-null-pointer-dereference-in-drm-client-modeset-probe-2136.322.6.5.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43890, CVSSv2 Score: 5.5
- Description:
tracing: Fix overflow in get_free_elt()
- CVE: https://linux.oracle.com/cve/CVE-2024-43890.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43890-tracing-fix-overflow-in-get-free-elt.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44944, CVSSv2 Score: 5.5
- Description:
netfilter: ctnetlink: use helper function to calculate expect ID
- CVE: https://linux.oracle.com/cve/CVE-2024-44944.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44944-netfilter-ctnetlink-use-helper-function-to-calculate-expect-id.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42289, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: During vport delete send async logout explicitly
- CVE: https://linux.oracle.com/cve/CVE-2024-42289.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42289-scsi-qla2xxx-during-vport-delete-send-async-logout-explicitly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43880.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43880.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning-kpatch.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43846, CVSSv2 Score: 5.5
- Description:
lib: objagg: Fix general protection fault
- CVE: https://linux.oracle.com/cve/CVE-2024-43846.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43846-lib-objagg-fix-general-protection-fault.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://linux.oracle.com/cve/CVE-2024-42265.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42283, CVSSv2 Score: 5.5
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://linux.oracle.com/cve/CVE-2024-42283.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41068, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-43830, CVSSv2 Score: 5.5
- Description:
leds: trigger: Unregister sysfs attributes before calling deactivate()
- CVE: https://linux.oracle.com/cve/CVE-2024-43830.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43830-leds-trigger-unregister-sysfs-attributes-before-calling-deactivate.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41015, CVSSv2 Score: 5.5
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41015.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42286, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: validate nvme_local_port correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-42286.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42286-scsi-qla2xxx-validate-nvme-local-port-correctly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42305, CVSSv2 Score: 5.5
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://linux.oracle.com/cve/CVE-2024-42305.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42308, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check for NULL pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-42308.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42308-drm-amd-display-check-for-null-pointer.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42309, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42309.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42309-drm-gma500-fix-null-pointer-dereference-in-psb-intel-lvds-get-modes.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43893, CVSSv2 Score: 5.5
- Description:
serial: core: check uartclk for zero to avoid divide by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-43893.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43893-serial-core-check-uartclk-for-zero-to-avoid-divide-by-zero.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43908, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix the null pointer dereference to ras_manager
- CVE: https://linux.oracle.com/cve/CVE-2024-43908.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43908-drm-amdgpu-fix-the-null-pointer-dereference-to-ras-manager.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44968, CVSSv2 Score:
- Description:
This CVE was introduced and fixed in the same kernel verison
- CVE:
- Patch: skipped/CVE-2024-44968.patch
- From:
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://linux.oracle.com/cve/CVE-2024-43871.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43883, CVSSv2 Score: 5.5
- Description:
usb: vhci-hcd: Do not drop references before new references are gained
- CVE: https://linux.oracle.com/cve/CVE-2024-43883.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43883-usb-vhci-hcd-do-not-drop-references-before-new-references-are-gained.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44935, CVSSv2 Score: 5.5
- Description:
sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE: https://linux.oracle.com/cve/CVE-2024-44935.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44935-sctp-fix-null-ptr-deref-in-reuseport-add-sock.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44948, CVSSv2 Score: 5.5
- Description:
x86/mtrr: Check if fixed MTRRs exist before saving them
- CVE: https://linux.oracle.com/cve/CVE-2024-44948.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44948-x86-mtrr-check-if-fixed-mtrrs-exist-before-saving-them.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42288, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix for possible memory corruption
- CVE: https://linux.oracle.com/cve/CVE-2024-42288.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42288-scsi-qla2xxx-fix-for-possible-memory-corruption.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43829, CVSSv2 Score: 5.5
- Description:
drm/qxl: Add check for drm_cvt_mode
- CVE: https://linux.oracle.com/cve/CVE-2024-43829.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43829-drm-qxl-add-check-for-drm-cvt-mode.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43861, CVSSv2 Score: 5.5
- Description:
net: usb: qmi_wwan: fix memory leak for not ip packets
- CVE: https://linux.oracle.com/cve/CVE-2024-43861.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43861-net-usb-qmi-wwan-fix-memory-leak-for-not-ip-packets.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43914, CVSSv2 Score: 5.5
- Description:
md/raid5: avoid BUG_ON() while continue reshape after reassembling
- CVE: https://linux.oracle.com/cve/CVE-2024-43914.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43914-md-raid5-avoid-bug-on-while-continue-reshape-after-reassembling.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44960, CVSSv2 Score: 5.5
- Description:
usb: gadget: core: Check for unset descriptor
- CVE: https://linux.oracle.com/cve/CVE-2024-44960.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44960-usb-gadget-core-check-for-unset-descriptor.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44965, CVSSv2 Score: 5.5
- Description:
x86/mm: Fix pti_clone_pgtable() alignment assumption
- CVE: https://linux.oracle.com/cve/CVE-2024-44965.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44965-x86-mm-fix-pti-clone-pgtable-alignment-assumption.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43860, CVSSv2 Score: 5.5
- Description:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
- CVE: https://linux.oracle.com/cve/CVE-2024-43860.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43860-remoteproc-imx-rproc-skip-over-memory-region-when-node-value-is-null-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42295, CVSSv2 Score: 5.5
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-42295.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42304, CVSSv2 Score: 5.5
- Description:
ext4: make sure the first directory block is not a hole
- CVE: https://linux.oracle.com/cve/CVE-2024-42304.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42304-ext4-make-sure-the-first-directory-block-is-not-a-hole-5.4.17-2136.309.5.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41017, CVSSv2 Score: 5.5
- Description:
jfs: don't walk off the end of ealist
- CVE: https://linux.oracle.com/cve/CVE-2024-41017.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42310, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42310.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42310-drm-gma500-fix-null-pointer-dereference-in-cdv-intel-lvds-get-modes.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://linux.oracle.com/cve/CVE-2024-41042.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42281, CVSSv2 Score: 5.5
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://linux.oracle.com/cve/CVE-2024-42281.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43879, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()
- CVE: https://linux.oracle.com/cve/CVE-2024-43879.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43879-wifi-cfg80211-handle-2x996-ru-allocation-in-cfg80211-calculate-bitrate-he.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43839, CVSSv2 Score: 5.5
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://linux.oracle.com/cve/CVE-2024-43839.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43839-bna-adjust-name-buf-size-of-bna_tcb-and-bna_ccb-structures.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41081, CVSSv2 Score: 5.5
- Description:
ila: block BH in ila_output()
- CVE: https://linux.oracle.com/cve/CVE-2024-41081.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41065, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41064, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41063, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-41063.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42311, CVSSv2 Score: 5.5
- Description:
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
- CVE: https://linux.oracle.com/cve/CVE-2024-42311.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42311-hfs-fix-to-initialize-fields-of-hfs-inode-info-after-hfs-alloc-inode.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42276, CVSSv2 Score: 5.5
- Description:
nvme-pci: add missing condition check for existence of mapped data
- CVE: https://linux.oracle.com/cve/CVE-2024-42276.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42276-nvme-pci-add-missing-condition-check-for-existence-of-mapped-data.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42259, CVSSv2 Score: 5.5
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://linux.oracle.com/cve/CVE-2024-42259.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43841, CVSSv2 Score: 5.5
- Description:
wifi: virt_wifi: avoid reporting connection success with wrong SSID
- CVE: https://linux.oracle.com/cve/CVE-2024-43841.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID-204.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43841, CVSSv2 Score: 5.5
- Description:
wifi: virt_wifi: avoid reporting connection success with wrong SSID
- CVE: https://linux.oracle.com/cve/CVE-2024-43841.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID-kpatch-204.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42290, CVSSv2 Score: 5.5
- Description:
irqchip/imx-irqsteer: Handle runtime power management correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-42290.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42290-irqchip-imx-irqsteer-handle-runtime-power-management-correctly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: clarify a confusing comment for remap_pfn_range()
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-clarify-a-confusing-comment-for-remap_pfn_range.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: fix ambiguous comments for better code readability
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-fix-ambiguous-comments-for-better-code-readability.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm/memory.c: make remap_pfn_range() reject unaligned addr
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-memory.c-make-remap_pfn_range-reject-unaligned-addr.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: add remap_pfn_range_notrack
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-add-remap_pfn_range_notrack.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-46740, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://linux.oracle.com/cve/CVE-2024-46740.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46740-binder-fix-uaf-caused-by-offsets-overwrite-5.4.17-2136.315.5.8.el8uek.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://linux.oracle.com/cve/CVE-2024-44998.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-44999.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://linux.oracle.com/cve/CVE-2024-42228.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46674, CVSSv2 Score: 7.8
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://linux.oracle.com/cve/CVE-2024-46674.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://linux.oracle.com/cve/CVE-2024-46673.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://linux.oracle.com/cve/CVE-2024-46818.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46723.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46722.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46782, CVSSv2 Score: 7.8
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://linux.oracle.com/cve/CVE-2024-46782.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46782-ila-call-nf-unregister-net-hooks-sooner-kpatch.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46756.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://linux.oracle.com/cve/CVE-2024-46747.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://linux.oracle.com/cve/CVE-2024-46743.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46781, CVSSv2 Score:
- Description:
nilfs2 module is not included
- CVE:
- Patch: skipped/CVE-2024-46781.patch
- From:
- CVE-2024-44946, CVSSv2 Score:
- Description:
module is not included
- CVE:
- Patch: skipped/CVE-2024-44946.patch
- From:
- CVE-2024-45026, CVSSv2 Score:
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46844, CVSSv2 Score:
- Description:
Architecture um is not supported
- CVE:
- Patch: skipped/CVE-2024-46844.patch
- From:
- CVE-2024-46781, CVSSv2 Score: 5.5
- Description:
nilfs2: fix missing cleanup on rollforward recovery error
- CVE: https://linux.oracle.com/cve/CVE-2024-46781.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46781-Add-BUILD_BUD_ON-for-nilfs-module.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44946, CVSSv2 Score: 5.5
- Description:
kcm: Serialise kcm_sendmsg() for the same socket.
- CVE: https://linux.oracle.com/cve/CVE-2024-44946.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44946-Add-BUILD_BUG_ON-for-kcm-module.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44988, CVSSv2 Score: 5.5
- Description:
net: dsa: mv88e6xxx: Fix out-of-bound access
- CVE: https://linux.oracle.com/cve/CVE-2024-44988.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44988-net-dsa-mv88e6xxx-fix-out-of-bound-access.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46675, CVSSv2 Score: 5.5
- Description:
usb: dwc3: core: Prevent USB core invalid event buffer address access
- CVE: https://linux.oracle.com/cve/CVE-2024-46675.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46675-usb-dwc3-core-prevent-usb-core-invalid-event-buffer-address-access.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43853, CVSSv2 Score: 5.5
- Description:
cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-43853.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43853-cgroup-cpuset-prevent-uaf-in-proc-cpuset-show.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45008, CVSSv2 Score: 5.5
- Description:
Input: MT - limit max slots
- CVE: https://linux.oracle.com/cve/CVE-2024-45008.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45008-input-mt-limit-max-slots.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45025, CVSSv2 Score: 5.5
- Description:
fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
- CVE: https://linux.oracle.com/cve/CVE-2024-45025.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45025-fix-bitmap-corruption-on-close-range-with-close-range-unshare.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46714, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Skip wbscl_set_scaler_filter if filter is null
- CVE: https://linux.oracle.com/cve/CVE-2024-46714.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46714-drm-amd-display-skip-wbscl-set-scaler-filter-if-filter-is-null.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46719, CVSSv2 Score: 5.5
- Description:
usb: typec: ucsi: Fix null pointer dereference in trace
- CVE: https://linux.oracle.com/cve/CVE-2024-46719.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46719-usb-typec-ucsi-fix-null-pointer-dereference-in-trace.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47667, CVSSv2 Score: 5.5
- Description:
PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)
- CVE: https://linux.oracle.com/cve/CVE-2024-47667.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47667-pci-keystone-add-workaround-for-errata-i2037-am65x-sr-1-0.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://linux.oracle.com/cve/CVE-2024-44987.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://linux.oracle.com/cve/CVE-2024-41011.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://linux.oracle.com/cve/CVE-2024-46800.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://linux.oracle.com/cve/CVE-2024-46798.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46759.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46758.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46757.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://linux.oracle.com/cve/CVE-2024-46744.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46828, CVSSv2 Score: 5.5
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://linux.oracle.com/cve/CVE-2024-46828.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45006, CVSSv2 Score: 5.5
- Description:
xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
- CVE: https://linux.oracle.com/cve/CVE-2024-45006.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45006-xhci-fix-panther-point-null-pointer-deref-at-full-speed-re-enumeration-5.4.17-2136.307.3.6.el8uek.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45016, CVSSv2 Score: 5.5
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://linux.oracle.com/cve/CVE-2024-45016.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46817, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
- CVE: https://linux.oracle.com/cve/CVE-2024-46817.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46817-drm-amd-display-stop-amdgpu-dm-initialize-when-stream-nums-greater-than-6.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46815, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
- CVE: https://linux.oracle.com/cve/CVE-2024-46815.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46815-drm-amd-display-check-num-valid-sets-before-accessing-reader-wm-sets.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://linux.oracle.com/cve/CVE-2024-43854.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46783, CVSSv2 Score: 5.5
- Description:
tcp_bpf: fix return value of tcp_bpf_sendmsg()
- CVE: https://linux.oracle.com/cve/CVE-2024-46783.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46783-tcp-bpf-fix-return-value-of-tcp-bpf-sendmsg.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46840, CVSSv2 Score: 5.5
- Description:
btrfs: clean up our handling of refs == 0 in snapshot delete
- CVE: https://linux.oracle.com/cve/CVE-2024-46840.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46840-btrfs-clean-up-our-handling-of-refs-0-in-snapshot-delete.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47668, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-47668.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47663, CVSSv2 Score: 5.5
- Description:
staging: iio: frequency: ad9834: Validate frequency parameter value
- CVE: https://linux.oracle.com/cve/CVE-2024-47663.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47663-staging-iio-frequency-ad9834-validate-frequency-parameter-value.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46679, CVSSv2 Score: 5.5
- Description:
ethtool: check device is present when getting link settings
- CVE: https://linux.oracle.com/cve/CVE-2024-46679.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46679-ethtool-check-device-is-present-when-getting-link-settings-206.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46755, CVSSv2 Score: 5.5
- Description:
wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
- CVE: https://linux.oracle.com/cve/CVE-2024-46755.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46755-wifi-mwifiex-do-not-return-unused-priv-in-mwifiex-get-priv-by-id.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46822, CVSSv2 Score: 5.5
- Description:
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
- CVE: https://linux.oracle.com/cve/CVE-2024-46822.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46822-arm64-acpi-harden-get-cpu-for-acpi-id-against-missing-cpu-entry.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-49958, CVSSv2 Score: 5.5
- Description:
ocfs2: reserve space for inline xattr before attaching reflink tree
- CVE: https://linux.oracle.com/cve/CVE-2024-49958.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-49958-ocfs2-reserve-space-for-inline-xattr-before-attaching-reflink-tree.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43884, CVSSv2 Score: 5.5
- Description:
Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-43884.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43884-bluetooth-mgmt-add-error-handling-to-pair-device.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://linux.oracle.com/cve/CVE-2024-41098.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43835, CVSSv2 Score: 5.5
- Description:
virtio_net: Fix napi_skb_cache_put warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43835.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43835-virtio-net-fix-napi-skb-cache-put-warning-204.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
- CVE: https://linux.oracle.com/cve/CVE-2023-31083.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2023-31083-bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag-in-HCIUARTGETPROTO.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45028, CVSSv2 Score: 5.5
- Description:
mmc: mmc_test: Fix NULL dereference on allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-45028.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45028-mmc-mmc-test-fix-null-dereference-on-allocation-failure.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46677, CVSSv2 Score: 5.5
- Description:
gtp: fix a potential NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46677.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46677-gtp-fix-a-potential-null-pointer-dereference.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46685, CVSSv2 Score: 5.5
- Description:
pinctrl: single: fix potential NULL dereference in pcs_get_function()
- CVE: https://linux.oracle.com/cve/CVE-2024-46685.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46685-pinctrl-single-fix-potential-null-dereference-in-pcs-get-function.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46739, CVSSv2 Score: 5.5
- Description:
uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
- CVE: https://linux.oracle.com/cve/CVE-2024-46739.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46739-uio-hv-generic-fix-kernel-null-pointer-dereference-in-hv-uio-rescind.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46745, CVSSv2 Score: 5.5
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://linux.oracle.com/cve/CVE-2024-46745.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46750, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-46750.patch
- From:
- CVE-2024-46761, CVSSv2 Score:
- Description:
Out of scope: CVE patch is for PCI Hotplug Driver for PowerPC PowerNV platform
- CVE:
- Patch: skipped/CVE-2024-46761.patch
- From:
- CVE-2024-46771, CVSSv2 Score: 5.5
- Description:
can: bcm: Remove proc entry when dev is unregistered.
- CVE: https://linux.oracle.com/cve/CVE-2024-46771.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46771-can-bcm-remove-proc-entry-when-dev-is-unregistered.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46829, CVSSv2 Score: 5.5
- Description:
rtmutex: Drop rt_mutex::wait_lock before scheduling
- CVE: https://linux.oracle.com/cve/CVE-2024-46829.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46829-rtmutex-Drop-rt_mutex-wait_lock-before-scheduling.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45003, CVSSv2 Score: 5.5
- Description:
vfs: Don't evict inode under the inode lru traversing context
- CVE: https://linux.oracle.com/cve/CVE-2024-45003.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45003-vfs-don-t-evict-inode-under-the-inode-lru-traversing-context.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46676, CVSSv2 Score: 5.5
- Description:
nfc: pn533: Add poll mod list filling check
- CVE: https://linux.oracle.com/cve/CVE-2024-46676.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46676-nfc-pn533-add-poll-mod-list-filling-check.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://linux.oracle.com/cve/CVE-2024-46780.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44947, CVSSv2 Score: 5.5
- Description:
fuse: Initialize beyond-EOF page contents before setting uptodate
- CVE: https://linux.oracle.com/cve/CVE-2024-44947.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44947-fuse-initialize-beyond-eof-page-contents-before-setting-uptodate.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45021, CVSSv2 Score:
- Description:
Patches a function that is sleepable due to a call to vfs_poll
- CVE:
- Patch: skipped/CVE-2024-45021.patch
- From:
- CVE-2024-44995, CVSSv2 Score: 5.5
- Description:
net: hns3: fix a deadlock problem when config TC during resetting
- CVE: https://linux.oracle.com/cve/CVE-2024-44995.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44995-net-hns3-fix-a-deadlock-problem-when-config-tc-during-resetting.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46721, CVSSv2 Score: 5.5
- Description:
apparmor: fix possible NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46721.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46721-apparmor-fix-possible-null-pointer-dereference.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47669, CVSSv2 Score: 5.5
- Description:
nilfs2: fix state management in error path of log writing function
- CVE: https://linux.oracle.com/cve/CVE-2024-47669.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47669-nilfs2-fix-state-management-in-error-path-of-log-writing-function.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46777, CVSSv2 Score: 5.5
- Description:
udf: Avoid excessive partition lengths
- CVE: https://linux.oracle.com/cve/CVE-2024-46777.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46777-udf-avoid-excessive-partition-lengths.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46737, CVSSv2 Score: 5.5
- Description:
nvmet-tcp: fix kernel crash if commands allocation fails
- CVE: https://linux.oracle.com/cve/CVE-2024-46737.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46737-nvmet-tcp-fix-kernel-crash-if-commands-allocation-fails.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-26951, CVSSv2 Score: 5.5
- Description:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
- CVE: https://linux.oracle.com/cve/CVE-2024-26951.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-26951-wireguard__netlink__check_for_dangling_peer_via_is.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-26885, CVSSv2 Score: 7.8
- Description:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
- CVE: https://linux.oracle.com/cve/CVE-2024-26885.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-26885-bpf-fix-devmap-hash-overflow-check-on-32-bit-arches.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://linux.oracle.com/cve/CVE-2024-47685.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-46849, CVSSv2 Score: 7.8
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://linux.oracle.com/cve/CVE-2024-46849.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49995, CVSSv2 Score: 7.8
- Description:
tipc: guard against string buffer overrun
- CVE: https://linux.oracle.com/cve/CVE-2024-49995.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49924, CVSSv2 Score: 7.8
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://linux.oracle.com/cve/CVE-2024-49924.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49882, CVSSv2 Score: 7.8
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://linux.oracle.com/cve/CVE-2024-49882.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50074, CVSSv2 Score: 7.8
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://linux.oracle.com/cve/CVE-2024-50074.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50262, CVSSv2 Score: 7.8
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-50262.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49894, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://linux.oracle.com/cve/CVE-2024-49894.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47701, CVSSv2 Score: 7.8
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://linux.oracle.com/cve/CVE-2024-47701.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47742, CVSSv2 Score: 7.8
- Description:
firmware_loader: Block path traversal
- CVE: https://linux.oracle.com/cve/CVE-2024-47742.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47742-firmware-loader-block-path-traversal-5.4.17-2102.204.4.4.el8uek.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49967, CVSSv2 Score: 7.8
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://linux.oracle.com/cve/CVE-2024-49967.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49883, CVSSv2 Score: 7.8
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://linux.oracle.com/cve/CVE-2024-49883.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50180, CVSSv2 Score: 7.8
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-50180.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50143, CVSSv2 Score: 7.8
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://linux.oracle.com/cve/CVE-2024-50143.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50131, CVSSv2 Score: 7.8
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://linux.oracle.com/cve/CVE-2024-50131.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-46853, CVSSv2 Score: 7.8
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://linux.oracle.com/cve/CVE-2024-46853.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50127, CVSSv2 Score: 7.8
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://linux.oracle.com/cve/CVE-2024-50127.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47670, CVSSv2 Score: 7.8
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-47670.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47698, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://linux.oracle.com/cve/CVE-2024-47698.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47697, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://linux.oracle.com/cve/CVE-2024-47697.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50007, CVSSv2 Score: 7.8
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://linux.oracle.com/cve/CVE-2024-50007.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49966, CVSSv2 Score: 7.8
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://linux.oracle.com/cve/CVE-2024-49966.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://linux.oracle.com/cve/CVE-2024-50151.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-53059, CVSSv2 Score: 7.8
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-53059.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://linux.oracle.com/cve/CVE-2024-53057.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50230, CVSSv2 Score: 7.8
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://linux.oracle.com/cve/CVE-2024-50230.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49997, CVSSv2 Score: 7.5
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://linux.oracle.com/cve/CVE-2024-49997.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure-5.4.17-2136.314.6.3.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47723, CVSSv2 Score: 7.1
- Description:
jfs: fix divide error in dbNextAG
- CVE: https://linux.oracle.com/cve/CVE-2024-47723.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47723-jfs-fix-divide-error-in-dbNextAG.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47723, CVSSv2 Score: 7.1
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-47723.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbnextag-and-dialloc-5.4.17-2136.316.7.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49900, CVSSv2 Score: 7.1
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-49900.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49860, CVSSv2 Score: 7.1
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://linux.oracle.com/cve/CVE-2024-49860.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50033, CVSSv2 Score: 7.1
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://linux.oracle.com/cve/CVE-2024-50033.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50035, CVSSv2 Score: 7.1
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://linux.oracle.com/cve/CVE-2024-50035.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47757, CVSSv2 Score: 7.1
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://linux.oracle.com/cve/CVE-2024-47757.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs-btree-check-delete.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-46854, CVSSv2 Score: 7.1
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://linux.oracle.com/cve/CVE-2024-46854.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50234, CVSSv2 Score: 7.0
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://linux.oracle.com/cve/CVE-2024-50234.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49981, CVSSv2 Score: 7.0
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2024-49981.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 5.4.17-2136.338.4.1.el7uek
- CVE-2024-50228, CVSSv2 Score:
- Description:
Vendor reverted in d1aa0c04294 as it causes deadlocks
- CVE:
- Patch: skipped/CVE-2024-50228.patch
- From:
- CVE-2024-49903, CVSSv2 Score: 7.0
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://linux.oracle.com/cve/CVE-2024-49903.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50059, CVSSv2 Score: 7.0
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2024-50059.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47747, CVSSv2 Score: 7.0
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://linux.oracle.com/cve/CVE-2024-47747.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 5.4.17-2136.338.4.1.el7uek
- CVE-2023-6270 CVE-2024-26898, CVSSv2 Score: 7.0
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-6270
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2023-6270-CVE-2024-26898-aoe-fix-the-potential-use-after-free-problem-in-aoecmd_cfg_pkts.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49982, CVSSv2 Score: 7.8
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://linux.oracle.com/cve/CVE-2024-49982.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47696, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency-5.4.17-2136.301.1.4.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47696, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency-kpatch-5.4.17-2136.301.1.4.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47692, CVSSv2 Score: 6.5
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://linux.oracle.com/cve/CVE-2024-47692.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47692-nfsd-return-einval-when-namelen-is-0.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47692, CVSSv2 Score: 6.5
- Description:
nfsd: enforce upper limit for namelen in __cld_pipe_inprogress_downcall()
- CVE: https://linux.oracle.com/cve/CVE-2024-47692.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47692-nfsd-enforce-upper-limit-for-namelen-in-__cld_pipe_inprogress_downcall.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50251, CVSSv2 Score: 6.2
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://linux.oracle.com/cve/CVE-2024-50251.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-44931, CVSSv2 Score: 5.5
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://linux.oracle.com/cve/CVE-2024-44931.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47709, CVSSv2 Score: 5.5
- Description:
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
- CVE: https://linux.oracle.com/cve/CVE-2024-47709.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47709-can-bcm-clear-bo-bcm-proc-read-after-remove-proc-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47737, CVSSv2 Score: 5.5
- Description:
nfsd: call cache_put if xdr_reserve_space returns NULL
- CVE: https://linux.oracle.com/cve/CVE-2024-47737.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47737-nfsd-call-cache-put-if-xdr-reserve-space-returns-null.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49985, CVSSv2 Score: 5.5
- Description:
i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
- CVE: https://linux.oracle.com/cve/CVE-2024-49985.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49985-i2c-stm32f7-do-not-prepare-unprepare-clock-during-runtime-suspend-resume.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50117, CVSSv2 Score: 5.5
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://linux.oracle.com/cve/CVE-2024-50117.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50117, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://linux.oracle.com/cve/CVE-2024-50117.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50117-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49877, CVSSv2 Score: 5.5
- Description:
ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate
- CVE: https://linux.oracle.com/cve/CVE-2024-49877.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49877-ocfs2-fix-possible-null-ptr-deref-in-ocfs2-set-buffer-uptodate.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49957, CVSSv2 Score: 5.5
- Description:
ocfs2: fix null-ptr-deref when journal load failed.
- CVE: https://linux.oracle.com/cve/CVE-2024-49957.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49957-ocfs2-fix-null-ptr-deref-when-journal-load-failed.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50006, CVSSv2 Score: 5.5
- Description:
ext4: fix i_data_sem unlock order in ext4_ind_migrate()
- CVE: https://linux.oracle.com/cve/CVE-2024-50006.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50006-ext4-fix-i-data-sem-unlock-order-in-ext4-ind-migrate.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-41016, CVSSv2 Score: 5.5
- Description:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41016.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2-xattr-find-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47749, CVSSv2 Score: 5.5
- Description:
RDMA/cxgb4: Added NULL check for lookup_atid
- CVE: https://linux.oracle.com/cve/CVE-2024-47749.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47749-rdma-cxgb4-added-null-check-for-lookup-atid.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49878, CVSSv2 Score: 5.5
- Description:
resource: fix region_intersects() vs add_memory_driver_managed()
- CVE: https://linux.oracle.com/cve/CVE-2024-49878.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49878-resource-fix-region-intersects-vs-add-memory-driver-managed.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49879, CVSSv2 Score: 5.5
- Description:
drm: omapdrm: Add missing check for alloc_ordered_workqueue
- CVE: https://linux.oracle.com/cve/CVE-2024-49879.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49879-drm-omapdrm-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49938, CVSSv2 Score: 5.5
- Description:
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
- CVE: https://linux.oracle.com/cve/CVE-2024-49938.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49938-wifi-ath9k-htc-use-skb-set-length-for-resetting-urb-before-resubmit-5.4.17-2136.316.7.el8uek.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49952, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prevent nf_skb_duplicated corruption
- CVE: https://linux.oracle.com/cve/CVE-2024-49952.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49952-netfilter-nf-tables-prevent-nf-skb-duplicated-corruption.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50008, CVSSv2 Score: 5.5
- Description:
wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
- CVE: https://linux.oracle.com/cve/CVE-2024-50008.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50008-wifi-mwifiex-fix-memcpy-field-spanning-write-warning-in-mwifiex-cmd-802-11-scan-ext.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50218, CVSSv2 Score: 5.5
- Description:
ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-50218.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50218-ocfs2-pass-u64-to-ocfs2-truncate-inline-maybe-overflow.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50233, CVSSv2 Score: 5.5
- Description:
staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
- CVE: https://linux.oracle.com/cve/CVE-2024-50233.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50233-staging-iio-frequency-ad9832-fix-division-by-zero-in-ad9832-calc-freqreg.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50167, CVSSv2 Score: 5.5
- Description:
be2net: fix potential memory leak in be_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-50167.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50167-be2net-fix-potential-memory-leak-in-be-xmit.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50171, CVSSv2 Score: 5.5
- Description:
net: systemport: fix potential memory leak in bcm_sysport_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-50171.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50171-net-systemport-fix-potential-memory-leak-in-bcm-sysport-xmit.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50195, CVSSv2 Score: 5.5
- Description:
posix-clock: Fix missing timespec64 check in pc_clock_settime()
- CVE: https://linux.oracle.com/cve/CVE-2024-50195.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50195-posix-clock-Fix-missing-timespec64-check-in-pc_clock_settime.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50210, CVSSv2 Score: 5.5
- Description:
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
- CVE: https://linux.oracle.com/cve/CVE-2024-50210.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50210-posix-clock-posix-clock-fix-unbalanced-locking-in-pc-clock-settime.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-26921, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2024-49867, CVSSv2 Score: 5.5
- Description:
btrfs: wait for fixup workers before stopping cleaner kthread during umount
- CVE: https://linux.oracle.com/cve/CVE-2024-49867.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49867-btrfs-wait-for-fixup-workers-before-stopping-cleaner-kthread-during-umount.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50082, CVSSv2 Score: 5.5
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://linux.oracle.com/cve/CVE-2024-50082.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race-5.4.17-2136.321.4.1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50142, CVSSv2 Score: 5.5
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://linux.oracle.com/cve/CVE-2024-50142.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50229, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential deadlock with newly created symlinks
- CVE: https://linux.oracle.com/cve/CVE-2024-50229.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50229-nilfs2-fix-potential-deadlock-with-newly-created-symlinks.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50039, CVSSv2 Score: 5.5
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://linux.oracle.com/cve/CVE-2024-50039.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50039-net-sched-accept-tca-stab-only-for-root-qdisc.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50039, CVSSv2 Score: 5.5
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://linux.oracle.com/cve/CVE-2024-50039.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50039-net-sched-accept-tca-stab-only-for-root-qdisc-kpatch.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47672, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
- CVE: https://linux.oracle.com/cve/CVE-2024-47672.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47672-wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmware-is-dead.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49851, CVSSv2 Score: 5.5
- Description:
tpm: Clean up TPM space after command failure
- CVE: https://linux.oracle.com/cve/CVE-2024-49851.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49851-tpm-clean-up-tpm-space-after-command-failure.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47756, CVSSv2 Score: 5.5
- Description:
PCI: keystone: Fix if-statement expression in ks_pcie_quirk()
- CVE: https://linux.oracle.com/cve/CVE-2024-47756.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47756-pci-keystone-fix-if-statement-expression-in-ks-pcie-quirk.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50179, CVSSv2 Score: 5.5
- Description:
ceph: remove the incorrect Fw reference check when dirtying pages
- CVE: https://linux.oracle.com/cve/CVE-2024-50179.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50179-ceph-remove-the-incorrect-fw-reference-check-when-dirtying-pages.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49948, CVSSv2 Score: 5.5
- Description:
net: add more sanity checks to qdisc_pkt_len_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-49948.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49948-net-add-more-sanity-checks-to-qdisc-pkt-len-init.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2023-52799, CVSSv2 Score: 5.5
- Description:
jfs: fix array-index-out-of-bounds in dbFindLeaf
- CVE: https://nvd.nist.gov/vuln/detail/cve-2023-52799
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2023-52799-jfs-fix-array-index-out-of-bounds-in-dbFindLeaf-323.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49902, CVSSv2 Score: 5.5
- Description:
jfs: check if leafidx greater than num leaves per dmap tree
- CVE: https://linux.oracle.com/cve/CVE-2024-49902.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49902-jfs-check-if-leafidx-greater-than-num-leaves-per-dmap-tree.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49965, CVSSv2 Score: 5.5
- Description:
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
- CVE: https://linux.oracle.com/cve/CVE-2024-49965.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49965-ocfs2-remove-unreasonable-unlock-in-ocfs2-read-blocks.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50199, CVSSv2 Score: 5.5
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://linux.oracle.com/cve/CVE-2024-50199.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49896, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check stream before comparing them
- CVE: https://linux.oracle.com/cve/CVE-2024-49896.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49896-drm-amd-display-check-stream-before-comparing-them.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50202, CVSSv2 Score: 5.5
- Description:
nilfs2: propagate directory read errors from nilfs_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-50202.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50202-nilfs2-propagate-directory-read-errors-from-nilfs-find-entry-5.4.17-2136.334.6.1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47699, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()
- CVE: https://linux.oracle.com/cve/CVE-2024-47699.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47699-nilfs2-fix-potential-null-ptr-deref-in-nilfs-btree-insert-5.4.17-2136.331.7.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49962, CVSSv2 Score: 5.5
- Description:
ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
- CVE: https://linux.oracle.com/cve/CVE-2024-49962.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49962-acpica-check-null-return-of-acpi-allocate-zeroed-in-acpi-db-convert-to-package.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49955, CVSSv2 Score: 5.5
- Description:
ACPI: battery: Fix possible crash when unregistering a battery hook
- CVE: https://linux.oracle.com/cve/CVE-2024-49955.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49955-acpi-battery-fix-possible-crash-when-unregistering-a-battery-hook.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50045, CVSSv2 Score: 5.5
- Description:
netfilter: br_netfilter: fix panic with metadata_dst skb
- CVE: https://linux.oracle.com/cve/CVE-2024-50045.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50045-netfilter-br-netfilter-fix-panic-with-metadata-dst-skb.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50096, CVSSv2 Score: 5.5
- Description:
nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error
- CVE: https://linux.oracle.com/cve/CVE-2024-50096.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50096-nouveau-dmem-fix-vulnerability-in-migrate-to-ram-upon-copy-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-40953, CVSSv2 Score: 5.5
- Description:
KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
- CVE: https://linux.oracle.com/cve/CVE-2024-40953.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-40953-kvm-fix-a-data-race-on-last-boosted-vcpu-in-kvm-vcpu-on-spin.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50194, CVSSv2 Score:
- Description:
Out of scope as the patch is for arm64 arch only, x86_64 not affected
- CVE:
- Patch: skipped/CVE-2024-50194.patch
- From:
- CVE-2024-53060, CVSSv2 Score:
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-53060.patch
- From:
- CVE-2024-26734, CVSSv2 Score:
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26734.patch
- From:
- CVE-2024-49944, CVSSv2 Score: 5.5
- Description:
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
- CVE: https://linux.oracle.com/cve/CVE-2024-49944.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49944-sctp-set-sk-state-back-to-closed-if-autobind-fails-in-sctp-listen-start.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49944, CVSSv2 Score: 5.5
- Description:
sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start
- CVE: https://linux.oracle.com/cve/CVE-2024-49944.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49944-sctp-ensure-sk_state-is-set-to-CLOSED-if-hashing-fails-in-sctp_listen_start.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50024, CVSSv2 Score: 5.5
- Description:
net: Fix an unsafe loop on the list
- CVE: https://linux.oracle.com/cve/CVE-2024-50024.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50116, CVSSv2 Score: 5.5
- Description:
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
- CVE: https://linux.oracle.com/cve/CVE-2024-50116.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50116-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-buffer-delay-flag.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50168, CVSSv2 Score: 5.5
- Description:
net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
- CVE: https://linux.oracle.com/cve/CVE-2024-50168.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50168-net-sun3-82586-fix-potential-memory-leak-in-sun3-82586-send-packet.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50236, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://linux.oracle.com/cve/CVE-2024-50236.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47671, CVSSv2 Score: 5.5
- Description:
USB: usbtmc: prevent kernel-usb-infoleak
- CVE: https://linux.oracle.com/cve/CVE-2024-47671.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47671-usb-usbtmc-prevent-kernel-usb-infoleak.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49892, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Initialize get_bytes_per_element's default to 1
- CVE: https://linux.oracle.com/cve/CVE-2024-49892.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49892-drm-amd-display-initialize-get-bytes-per-element-s-default-to-1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50044, CVSSv2 Score: 5.5
- Description:
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
- CVE: https://linux.oracle.com/cve/CVE-2024-50044.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50044-bluetooth-rfcomm-fix-possible-deadlock-in-rfcomm-sk-state-change.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-53097, CVSSv2 Score:
- Description:
Kernel is not vulnerable
- CVE:
- Patch: skipped/CVE-2024-53097.patch
- From:
- CVE-2024-42229, CVSSv2 Score: 4.1
- Description:
crypto: aead,cipher - zeroize key buffer after use
- CVE: https://linux.oracle.com/cve/CVE-2024-42229.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-42229-crypto-aead-cipher-zeroize-key-buffer-after-use.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49868, CVSSv2 Score: 5.5
- Description:
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
- CVE: https://linux.oracle.com/cve/CVE-2024-49868.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49868-btrfs-fix-a-null-pointer-dereference-when-failed-to-start-a-new-trasacntion.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50184, CVSSv2 Score: 5.5
- Description:
virtio_pmem: Check device status before requesting flush
- CVE: https://linux.oracle.com/cve/CVE-2024-50184.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50184-virtio-pmem-check-device-status-before-requesting-flush.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50148, CVSSv2 Score: 5.5
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister
- CVE: https://linux.oracle.com/cve/CVE-2024-50148.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50148, CVSSv2 Score: 5.5
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-50148.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister-kpatch.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49963, CVSSv2 Score:
- Description:
Out of scope as the patch is for arm64 arch only, x86_64 not affected
- CVE:
- Patch: skipped/CVE-2024-49963.patch
- From:
- CVE-2024-50134, CVSSv2 Score: 5.5
- Description:
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
- CVE: https://linux.oracle.com/cve/CVE-2024-50134.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50134-drm-vboxvideo-replace-fake-vla-at-end-of-vbva_mouse_pointer_shape-with-real-vla.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47679, CVSSv2 Score: 5.5
- Description:
vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://linux.oracle.com/cve/CVE-2024-47679.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47679-vfs-fix-race-between-evice_inodes-and-find_inode-iput.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47684, CVSSv2 Score: 5.5
- Description:
tcp: check skb is non-NULL in tcp_rto_delta_us()
- CVE: https://linux.oracle.com/cve/CVE-2024-47684.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47684-tcp-check-skb-is-non-NULL-in-tcp_rto_delta_us.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47712, CVSSv2 Score: 5.5
- Description:
wifi: wilc1000: fix declarations ordering
- CVE: https://linux.oracle.com/cve/CVE-2024-47712.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47712-wifi-wilc1000-fix-declarations-ordering.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-27053, CVSSv2 Score: 5.5
- Description:
wifi: wilc1000: fix RCU usage in connect path
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27053
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47712-wifi-wilc1000-fix-RCU-usage-in-connect-path.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47712, CVSSv2 Score: 5.5
- Description:
wifi: wilc1000: fix ies_len type in connect path
- CVE: https://linux.oracle.com/cve/CVE-2024-47712.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47712-wifi-wilc1000-fix-ies_len-type-in-connect-path.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47712, CVSSv2 Score: 5.5
- Description:
wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param
- CVE: https://linux.oracle.com/cve/CVE-2024-47712.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47712-wifi-wilc1000-fix-potential-RCU-dereference-issue-in-wilc_parse_join_bss_param.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47713, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
- CVE: https://linux.oracle.com/cve/CVE-2024-47713.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47713-wifi-mac80211-use-two-phase-skb-reclamation-in-ieee80211_do_stop.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47740, CVSSv2 Score: 5.5
- Description:
f2fs: Require FMODE_WRITE for atomic write ioctls
- CVE: https://linux.oracle.com/cve/CVE-2024-47740.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47740-f2fs-Require-FMODE_WRITE-for-atomic-write-ioctls.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50205, CVSSv2 Score: 5.5
- Description:
ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
- CVE: https://linux.oracle.com/cve/CVE-2024-50205.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50205-ALSA-firewire-lib-Avoid-division-by-zero-in-apply_constraint_to_size.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50237, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://linux.oracle.com/cve/CVE-2024-50237.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-.get_txpower.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50089, CVSSv2 Score:
- Description:
This CVE was rejected and fix reverted.
- CVE:
- Patch: skipped/CVE-2024-50089.patch
- From:
- CVE-2024-50099, CVSSv2 Score: 5.5
- Description:
arm64: probes: Remove broken LDR (literal) uprobe support
- CVE: https://linux.oracle.com/cve/CVE-2024-50099.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50099-arm64-probes-Remove-broken-LDR-literal-uprobe-suppor.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47710, CVSSv2 Score: 5.5
- Description:
sock_map: Add a cond_resched() in sock_hash_free()
- CVE: https://linux.oracle.com/cve/CVE-2024-47710.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47710-sock_map-Add-a-cond_resched-in-sock_hash_free.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49959, CVSSv2 Score: 5.5
- Description:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
- CVE: https://linux.oracle.com/cve/CVE-2024-49959.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49959-jbd2-stop-waiting-for-space-when-jbd2-cleanup-journal-tail-returns-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49973, CVSSv2 Score: 5.5
- Description:
r8169: add tally counter fields added with RTL8125
- CVE: https://linux.oracle.com/cve/CVE-2024-49973.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49973-r8169-add-tally-counter-fields-added-with-RTL8125.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49973, CVSSv2 Score: 5.5
- Description:
r8169: add tally counter fields added with RTL8125
- CVE: https://linux.oracle.com/cve/CVE-2024-49973.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49973-r8169-add-tally-counter-fields-added-with-RTL8125-kpatch.patch
- From: 5.4.17-2136.338.4.1.el8uek
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 5.4.17/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A
- CVE-2024-38538, CVSSv2 Score: 7.1
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://linux.oracle.com/cve/CVE-2024-38538.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes-5.4.17-2136.307.3.6.el8uek.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50279, CVSSv2 Score: 7.1
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50279.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50301, CVSSv2 Score: 7.1
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://linux.oracle.com/cve/CVE-2024-50301.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53150, CVSSv2 Score: 7.1
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://linux.oracle.com/cve/CVE-2024-53150.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56650, CVSSv2 Score: 7.1
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://linux.oracle.com/cve/CVE-2024-56650.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53155, CVSSv2 Score: 7.1
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://linux.oracle.com/cve/CVE-2024-53155.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://linux.oracle.com/cve/CVE-2024-53061.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://linux.oracle.com/cve/CVE-2024-53104.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50269, CVSSv2 Score: 7.8
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://linux.oracle.com/cve/CVE-2024-50269.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50267, CVSSv2 Score: 7.8
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://linux.oracle.com/cve/CVE-2024-50267.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53103, CVSSv2 Score: 7.8
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-53103.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50264, CVSSv2 Score: 7.8
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://linux.oracle.com/cve/CVE-2024-50264.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://linux.oracle.com/cve/CVE-2024-49996.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53141, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://linux.oracle.com/cve/CVE-2024-53141.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50282, CVSSv2 Score:
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-53156, CVSSv2 Score: 7.8
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://linux.oracle.com/cve/CVE-2024-53156.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://linux.oracle.com/cve/CVE-2024-53173.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56704, CVSSv2 Score: 7.8
- Description:
9p/xen: fix release of IRQ
- CVE: https://linux.oracle.com/cve/CVE-2024-56704.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53165, CVSSv2 Score:
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56606, CVSSv2 Score: 7.8
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56606.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56605-Bluetooth-L2CAP-handle-NULL-sock-pointer-in-l2cap_sock_alloc.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56601.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56615, CVSSv2 Score: 7.8
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56615.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53142, CVSSv2 Score:
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53227, CVSSv2 Score: 7.8
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://linux.oracle.com/cve/CVE-2024-53227.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53171, CVSSv2 Score: 7.8
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://linux.oracle.com/cve/CVE-2024-53171.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56603, CVSSv2 Score: 7.8
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56603.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://linux.oracle.com/cve/CVE-2024-56596.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56595, CVSSv2 Score: 7.8
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://linux.oracle.com/cve/CVE-2024-56595.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56598, CVSSv2 Score: 7.8
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://linux.oracle.com/cve/CVE-2024-56598.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56602.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56600.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56581, CVSSv2 Score: 7.8
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://linux.oracle.com/cve/CVE-2024-56581.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release-kpatch.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53240, CVSSv2 Score: 6.8
- Description:
xen/netfront: fix crash when removing device
- CVE: https://linux.oracle.com/cve/CVE-2024-53240.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53240-xen-netfront-fix-crash-when-removing-device.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50302, CVSSv2 Score: 6.1
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-50302.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53101, CVSSv2 Score: 5.5
- Description:
fs: Fix uninitialized value issue in from_kuid and from_kgid
- CVE: https://linux.oracle.com/cve/CVE-2024-53101.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53101-fs-fix-uninitialized-value-issue-in-from-kuid-and-from-kgid.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53131, CVSSv2 Score: 5.5
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53131.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50287, CVSSv2 Score: 5.5
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-50287.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50290, CVSSv2 Score: 5.5
- Description:
media: cx24116: prevent overflows on SNR calculus
- CVE: https://linux.oracle.com/cve/CVE-2024-50290.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50290-media-cx24116-prevent-overflows-on-snr-calculus.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50273, CVSSv2 Score: 5.5
- Description:
btrfs: reinitialize delayed ref list after deleting it from the list
- CVE: https://linux.oracle.com/cve/CVE-2024-50273.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50273-btrfs-reinitialize-delayed-ref-list-after-deleting-it-from-the-list.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50299, CVSSv2 Score: 5.5
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://linux.oracle.com/cve/CVE-2024-50299.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53063, CVSSv2 Score: 5.5
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://linux.oracle.com/cve/CVE-2024-53063.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access-5.4.17-2136.321.4.1.el8uek.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53066, CVSSv2 Score: 5.5
- Description:
nfs: Fix KMSAN warning in decode_getfattr_attrs()
- CVE: https://linux.oracle.com/cve/CVE-2024-53066.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53066-nfs-fix-kmsan-warning-in-decode-getfattr-attrs.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53112, CVSSv2 Score: 5.5
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://linux.oracle.com/cve/CVE-2024-53112.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53130, CVSSv2 Score: 5.5
- Description:
nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53130.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53130-nilfs2-fix-null-ptr-deref-in-block-dirty-buffer-tracepoint.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53217, CVSSv2 Score: 5.5
- Description:
nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53217-nfsd-under-NFSv4.1-fix-double-svc_xprt_put-on-rpc_create-failure.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53217, CVSSv2 Score: 5.5
- Description:
NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53217-nfsd-prevent-null-dereference-in-nfsd4-process-cb-update.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53217, CVSSv2 Score: 5.5
- Description:
nfsd: restore callback functionality for NFSv4.0
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53217-nfsd-restore-callback-functionality-for-NFSv4.0.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56567, CVSSv2 Score: 5.5
- Description:
ad7780: fix division by zero in ad7780_write_raw()
- CVE: https://linux.oracle.com/cve/CVE-2024-56567.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56567-ad7780-fix-division-by-zero-in-ad7780-write-raw.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56670, CVSSv2 Score: 5.5
- Description:
usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-56670.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56670-usb-gadget-u_serial-Fix-the-issue-that-gs_start_io-crashed.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56558, CVSSv2 Score: 5.5
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://linux.oracle.com/cve/CVE-2024-56558.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc_export_show.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56572, CVSSv2 Score: 5.5
- Description:
media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal()
- CVE: https://linux.oracle.com/cve/CVE-2024-56572.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56572-media-platform-allegro-dvt-Fix-possible-memory-leak-in-allocate_buffers_internal.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56574, CVSSv2 Score: 5.5
- Description:
media: ts2020: fix null-ptr-deref in ts2020_probe()
- CVE: https://linux.oracle.com/cve/CVE-2024-56574.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56574-media-ts2020-fix-null-ptr-deref-in-ts2020_probe.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56633, CVSSv2 Score: 5.5
- Description:
bpf, sockmap: Fix more uncharged while msg has more_data
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56633-01-bpf-sockmap-Fix-more-uncharged-while-msg-has-more_data-302.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56633, CVSSv2 Score: 5.5
- Description:
bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56633-02-bpf-sockmap-Fix-the-sk-sk_forward_alloc-warning-of-sk_stream_kill_queues-302.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56633, CVSSv2 Score: 5.5
- Description:
tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56633-tcp_bpf-Fix-the-sk_mem_uncharge-logic-in-tcp_bpf_sendmsg-302.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56629, CVSSv2 Score: 5.5
- Description:
HID: wacom: fix when get product name maybe null pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-56629.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56629-HID-wacom-fix-when-get-product-name-maybe-null-pointer-307.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56630, CVSSv2 Score: 5.5
- Description:
ocfs2: free inode when ocfs2_get_init_inode() fails
- CVE: https://linux.oracle.com/cve/CVE-2024-56630.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56630-ocfs2-free-inode-when-ocfs2_get_init_inode-fails-329.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53157, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://linux.oracle.com/cve/CVE-2024-53157.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53157-firmware-arm_scpi-Check-the-DVFS-OPP-count-returned-by-the-firmware.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53172, CVSSv2 Score: 5.5
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://linux.oracle.com/cve/CVE-2024-53172.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53172-ubi-fastmap-Fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53181, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53148, CVSSv2 Score: 5.5
- Description:
comedi: Flush partial mappings in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-53148.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53148-comedi-flush-partial-mappings-in-error-case.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53183, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53214, CVSSv2 Score: 5.5
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://linux.oracle.com/cve/CVE-2024-53214.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-PCIe-extended-capability.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56586, CVSSv2 Score: 5.5
- Description:
f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.
- CVE: https://linux.oracle.com/cve/CVE-2024-56586.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56586-f2fs-fix-f2fs_bug_on-when-uninstalling-filesystem-call-f2fs_evict_inode.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56597, CVSSv2 Score: 5.5
- Description:
jfs: fix shift-out-of-bounds in dbSplit
- CVE: https://linux.oracle.com/cve/CVE-2024-56597.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56597-jfs-fix-shift-out-of-bounds-in-dbSplit.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56688, CVSSv2 Score: 5.5
- Description:
sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
- CVE: https://linux.oracle.com/cve/CVE-2024-56688.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56688-sunrpc-clear-XPRT_SOCK_UPD_TIMEOUT-when-reset-transport.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56747, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56747.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56747-scsi-qedi-fix-a-possible-memory-leak-in-qedi_alloc_and_init_sb.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56748, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56748.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56748-scsi-qedf-Fix-a-possible-memory-leak-in-qedf_alloc_and_init_sb.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56637, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Hold module reference while requesting a module
- CVE: https://linux.oracle.com/cve/CVE-2024-56637.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56637-netfilter-ipset-Hold-module-reference-while-requesting-a-module.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56739, CVSSv2 Score: 5.5
- Description:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-56739.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56739-rtc-check-if-__rtc_read_time-was-successful-in-rtc_timer_do_work.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53145, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53184, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53198, CVSSv2 Score: 5.5
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://linux.oracle.com/cve/CVE-2024-53198.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53198-xen-Fix-the-issue-of-resource-not-being-properly-released-in-xenbus_dev_probe.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56746, CVSSv2 Score: 5.5
- Description:
fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()
- CVE: https://linux.oracle.com/cve/CVE-2024-56746.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56746-fbdev-sh7760fb-Fix-a-possible-memory-leak-in-sh7760fb_alloc_mem.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56532, CVSSv2 Score: 5.5
- Description:
ALSA: us122l: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56532.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56532-ALSA-us122l-Use-snd_card_free_when_closed()-at-disconnection.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://linux.oracle.com/cve/CVE-2024-56548.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53174, CVSSv2 Score: 7.8
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://linux.oracle.com/cve/CVE-2024-53174.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53197, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://linux.oracle.com/cve/CVE-2024-53197.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53146, CVSSv2 Score: 5.5
- Description:
NFSD: Prevent a potential integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-53146.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53146-nfsd-prevent-a-potential-integer-overflow.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56576, CVSSv2 Score: 5.5
- Description:
media: i2c: tc358743: Fix crash in the probe error path when using polling
- CVE: https://linux.oracle.com/cve/CVE-2024-56576.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56576-media-i2c-tc358743-fix-crash-in-the-probe-error-path-when-using-polling.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56569, CVSSv2 Score: 5.5
- Description:
ftrace: Fix regression with module command in stack_trace_filter
- CVE: https://linux.oracle.com/cve/CVE-2024-56569.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56569-ftrace-fix-regression-with-module-command-in-stack-trace-filter.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56634, CVSSv2 Score: 5.5
- Description:
gpio: grgpio: Add NULL check in grgpio_probe
- CVE: https://linux.oracle.com/cve/CVE-2024-56634.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56634-gpio-grgpio-add-null-check-in-grgpio-probe.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56593, CVSSv2 Score: 5.5
- Description:
wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw()
- CVE: https://linux.oracle.com/cve/CVE-2024-56593.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56593-wifi-brcmfmac-fix-oops-due-to-null-pointer-dereference-in-brcmf-sdiod-sglist-rw.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56570, CVSSv2 Score: 5.5
- Description:
ovl: Filter invalid inodes with missing lookup function
- CVE: https://linux.oracle.com/cve/CVE-2024-56570.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56570-ovl-filter-invalid-inodes-with-missing-lookup-function.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56700, CVSSv2 Score: 5.5
- Description:
media: wl128x: Fix atomicity violation in fmc_send_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-56700.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56700-media-wl128x-Fix-atomicity-violation-in-fmc_send_cmd.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56587, CVSSv2 Score: 5.5
- Description:
leds: class: Protect brightness_show() with led_cdev->led_access mutex
- CVE: https://linux.oracle.com/cve/CVE-2024-56587.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56587-leds-class-Protect-brightness_show-with-led_cdev-led.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56594, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: set the right AMDGPU sg segment limitation
- CVE: https://linux.oracle.com/cve/CVE-2024-56594.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56594-drm-amdgpu-set-the-right-AMDGPU-sg-segment-limitatio.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56643, CVSSv2 Score: 5.5
- Description:
dccp: Fix memory leak in dccp_feat_change_recv
- CVE: https://linux.oracle.com/cve/CVE-2024-56643.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56643-dccp-Fix-memory-leak-in-dccp_feat_change_recv.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56681, CVSSv2 Score: 5.5
- Description:
crypto: bcm - add error check in the ahash_hmac_init function
- CVE: https://linux.oracle.com/cve/CVE-2024-56681.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56681-crypto-bcm-add-error-check-in-the-ahash_hmac_init-fu.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53161, CVSSv2 Score: 5.5
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-53161.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53161-EDAC-bluefield-Fix-potential-integer-overflow.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56562, CVSSv2 Score: 5.5
- Description:
i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
- CVE: https://linux.oracle.com/cve/CVE-2024-56562.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56562-i3c-master-Fix-miss-free-init_dyn_addr-at-i3c_master.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53158, CVSSv2 Score: 5.5
- Description:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
- CVE: https://linux.oracle.com/cve/CVE-2024-53158.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53158-soc-qcom-geni-se-fix-array-underflow-in-geni_se_clk_.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56659, CVSSv2 Score: 5.5
- Description:
net: lapb: increase LAPB_HEADER_LEN
- CVE: https://linux.oracle.com/cve/CVE-2024-56659.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56659-net-lapb-increase-LAPB_HEADER_LEN.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56539, CVSSv2 Score:
- Description:
The patch only fixes warning, no functional changes.
- CVE:
- Patch: skipped/CVE-2024-56539.patch
- From:
- CVE-2024-56724, CVSSv2 Score: 5.5
- Description:
mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device
- CVE: https://linux.oracle.com/cve/CVE-2024-56724.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56724-mfd-intel_soc_pmic_bxtwc-Use-IRQ-domain-for-TMU-device.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56723, CVSSv2 Score: 5.5
- Description:
mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device
- CVE: https://linux.oracle.com/cve/CVE-2024-56723.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56723-mfd-intel_soc_pmic_bxtwc-Use-IRQ-domain-for-PMIC-devices.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-38588, CVSSv2 Score: 7.8
- Description:
ftrace: Fix possible use-after-free issue in ftrace_location()
- CVE: https://linux.oracle.com/cve/CVE-2024-38588.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-38588-ftrace-Check-if-pages-were-allocated-before-calling-free_pages.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-38588, CVSSv2 Score: 7.8
- Description:
ftrace: Fix possible use-after-free issue in ftrace_location()
- CVE: https://linux.oracle.com/cve/CVE-2024-38588.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-38588-ftrace-Fix-possible-warning-on-checking-all-pages-used-in-ftrace_process_locs.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-38588, CVSSv2 Score: 7.8
- Description:
ftrace: Fix possible use-after-free issue in ftrace_location()
- CVE: https://linux.oracle.com/cve/CVE-2024-38588.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-38588-ftrace-fix-possible-use-after-free-issue-in-ftrace-location-323.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53164, CVSSv2 Score: 5.5
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://linux.oracle.com/cve/CVE-2024-53164.html
- Patch: oel8-uek6/5.4.17-2136.341.3.1.el8uek/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.4.17-2136.341.3.1.el8uek
- CVE-2024-56769, CVSSv2 Score: 5.5
- Description:
media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg
- CVE: https://linux.oracle.com/cve/CVE-2024-56769.html
- Patch: oel8-uek6/5.4.17-2136.341.3.1.el8uek/CVE-2024-56769-media-dvb-frontends-dib3000mb-fix-uninit-value-in-dib3000-write-reg.patch
- From: 5.4.17-2136.341.3.1.el8uek
- CVE-2024-56767, CVSSv2 Score: 5.5
- Description:
dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset
- CVE: https://linux.oracle.com/cve/CVE-2024-56767.html
- Patch: oel8-uek6/5.4.17-2136.341.3.1.el8uek/CVE-2024-56767-dmaengine-at-xdmac-avoid-null-prt-deref-in-at-xdmac-prep-dma-memset.patch
- From: 5.4.17-2136.341.3.1.el8uek
- CVE-2024-57892, CVSSv2 Score: 7.8
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://linux.oracle.com/cve/CVE-2024-57892.html
- Patch: oel8-uek6/5.4.17-2136.341.3.3.el8uek/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.4.17-2136.341.3.3.el8uek
- CVE-2024-39494, CVSSv2 Score: 7.8
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://linux.oracle.com/cve/CVE-2024-39494.html
- Patch: oel8-uek6/5.4.17-2136.341.3.3.el8uek/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name-5.4.17-2136.327.2.el8uek.patch
- From: 5.4.17-2136.341.3.3.el8uek
- CVE-2024-36929, CVSSv2 Score: 5.5
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://linux.oracle.com/cve/CVE-2024-36929.html
- Patch: oel8-uek6/5.4.17-2136.343.5.1.el8uek/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist-gso-skbs.patch
- From: 5.4.17-2136.343.5.1.el8uek
- CVE-2024-38555, CVSSv2 Score: 7.8
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://linux.oracle.com/cve/CVE-2024-38555.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-21956, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Assign normalized_pix_clk when color depth = 14
- CVE: https://linux.oracle.com/cve/CVE-2025-21956.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-21956-drm-amd-display-assign-normalized-pix-clk-when-color-depth-14.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-21957, CVSSv2 Score: 5.5
- Description:
scsi: qla1280: Fix kernel oops when debug level > 2
- CVE: https://linux.oracle.com/cve/CVE-2025-21957.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-21957-scsi-qla1280-fix-kernel-oops-when-debug-level-2.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-21993, CVSSv2 Score: 7.1
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://linux.oracle.com/cve/CVE-2025-21993.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22004, CVSSv2 Score: 7.8
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://linux.oracle.com/cve/CVE-2025-22004.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-37937, CVSSv2 Score: 7.0
- Description:
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- CVE: https://linux.oracle.com/cve/CVE-2025-37937.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-37937-objtool-media-dib8000-prevent-divide-by-zero-in-dib8000-set-dds.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22007, CVSSv2 Score: 5.5
- Description:
Bluetooth: Fix error code in chan_alloc_skb_cb()
- CVE: https://linux.oracle.com/cve/CVE-2025-22007.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22007-bluetooth-fix-error-code-in-chan-alloc-skb-cb.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22005, CVSSv2 Score: 5.5
- Description:
ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
- CVE: https://linux.oracle.com/cve/CVE-2025-22005.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22005-ipv6-fix-memleak-of-nhc-pcpu-rth-output-in-fib-check-nh-v6-gw.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-21996, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
- CVE: https://linux.oracle.com/cve/CVE-2025-21996.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-21996-drm-radeon-fix-uninitialized-size-issue-in-radeon-vce-cs-parse.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22018, CVSSv2 Score: 5.5
- Description:
atm: Fix NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2025-22018.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22018-atm-fix-null-pointer-dereference.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22021, CVSSv2 Score: 5.5
- Description:
netfilter: socket: Lookup orig tuple for IPv6 SNAT
- CVE: https://linux.oracle.com/cve/CVE-2025-22021.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22021-netfilter-socket-lookup-orig-tuple-for-ipv6-snat.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-23136, CVSSv2 Score: 5.5
- Description:
thermal: int340x: Add NULL check for adev
- CVE: https://linux.oracle.com/cve/CVE-2025-23136.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-23136-thermal-int340x-add-null-check-for-adev.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22086, CVSSv2 Score: 5.5
- Description:
RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
- CVE: https://linux.oracle.com/cve/CVE-2025-22086.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22086-rdma-mlx5-fix-mlx5-poll-one-cur-qp-update-flow.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22079, CVSSv2 Score: 5.5
- Description:
ocfs2: validate l_tree_depth to avoid out-of-bounds access
- CVE: https://linux.oracle.com/cve/CVE-2025-22079.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22079-ocfs2-validate-l-tree-depth-to-avoid-out-of-bounds-access.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22073, CVSSv2 Score:
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-22073.patch
- From:
- CVE-2025-22071, CVSSv2 Score:
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-22071.patch
- From:
- CVE-2025-22063, CVSSv2 Score: 5.5
- Description:
netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets
- CVE: https://linux.oracle.com/cve/CVE-2025-22063.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22063-netlabel-fix-null-pointer-exception-caused-by-calipso-on-ipv4-sockets.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-38637, CVSSv2 Score: 5.5
- Description:
net_sched: skbprio: Remove overly strict queue assertions
- CVE: https://linux.oracle.com/cve/CVE-2025-38637.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-38637-net-sched-skbprio-remove-overly-strict-queue-assertions.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22045, CVSSv2 Score:
- Description:
Low score CVE with no well understood impact.
- CVE:
- Patch: skipped/CVE-2025-22045.patch
- From:
- CVE-2025-21959, CVSSv2 Score: 5.5
- Description:
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
- CVE: https://linux.oracle.com/cve/CVE-2025-21959.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-21959-netfilter-nf-conncount-fully-initialize-struct-nf-conncount-tuple-in-insert-tree-5.4.17-2136.336.5.3.2.el8uek.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2025-22020, CVSSv2 Score: 7.8
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://linux.oracle.com/cve/CVE-2025-22020.html
- Patch: oel8-uek6/5.4.17-2136.344.4.1.el8uek/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.4.17-2136.344.4.1.el8uek
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 5.4.17/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 5.4.17-2136.307.3.2.el8uek