- kernel-5.14.0-427.33.1.el9_4 (oel9)
- 5.14.0-427.42.1.el9_4
- 2024-11-24 10:37:32
- 2024-11-26 16:37:40
- K20241124_03
- CVE-2024-36979, CVSSv2 Score: 7.8
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-36979
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36979-net-bridge-mst-fix-vlan-use-after-free.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36979 CVE-2024-40920, CVSSv2 Score: 7.8
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-36979
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36979-CVE-2024-40920-net-bridge-mst-fix-suspicious-rcu-usage-in-br_mst_se.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36979 CVE-2024-40921, CVSSv2 Score: 7.8
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-36979
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36979-CVE-2024-40921-net-bridge-mst-pass-vlan-group-directly-to-br_mst_vl.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26630, CVSSv2 Score: 7.1
- Description:
mm: cachestat: fix folio read-after-free in cache walk
- CVE: https://access.redhat.com/security/cve/CVE-2024-26630
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-26630-mm-cachestat-fix-folio-read-after-free-in-cache-walk.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41096, CVSSv2 Score: 7.8
- Description:
PCI/MSI: Fix UAF in msi_capability_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-41096
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41096-PCI-MSI-Fix-UAF-in-msi_capability_init.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41073, CVSSv2 Score: 7.8
- Description:
nvme: avoid double free special payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-41073
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41073-vme-avoid-double-free-special-payload.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41040, CVSSv2 Score: 7.0
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://access.redhat.com/security/cve/CVE-2024-41040
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41040-net-sched-Fix-UAF-when-resolving-a-clash.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52801, CVSSv2 Score: 9.1
- Description:
iommufd: Fix missing update of domains_itree after splitting iopt_area
- CVE: https://access.redhat.com/security/cve/CVE-2023-52801
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52801-iommufd-Fix-missing-update-of-domains_itree-after-s.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35797, CVSSv2 Score: 5.5
- Description:
mm: cachestat: fix two shmem bugs
- CVE: https://access.redhat.com/security/cve/CVE-2024-35797
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35797-mm-cachestat-fix-two-shmem-bugs.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26629, CVSSv2 Score: 5.5
- Description:
nfsd: fix RELEASE_LOCKOWNER
- CVE: https://access.redhat.com/security/cve/CVE-2024-26629
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-26629-nfsd-fix-RELEASE_LOCKOWNER.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26946, CVSSv2 Score: 5.5
- Description:
kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address
- CVE: https://access.redhat.com/security/cve/CVE-2024-26946
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-26946-kprobes-x86-use-copy-from-kernel-nofault-to.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36000, CVSSv2 Score: 5.5
- Description:
mm/hugetlb: fix missing hugetlb_lock for resv
- CVE: https://access.redhat.com/security/cve/CVE-2024-36000
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36000-mm-hugetlb-fix-missing-hugetlb_lock-for-resv-unchar.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36019, CVSSv2 Score: 5.5
- Description:
regmap: maple: Fix cache corruption in
- CVE: https://access.redhat.com/security/cve/CVE-2024-36019
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36019-regmap-maple-fix-cache-corruption-in.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-26720, CVSSv2 Score:
- Description:
This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata
- CVE:
- Patch: skipped/CVE-2024-26720.patch
- From:
- CVE-2023-52463, CVSSv2 Score: 5.5
- Description:
efivarfs: force RO when remounting if SetVariable
- CVE: https://access.redhat.com/security/cve/CVE-2023-52463
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52463-efivarfs-force-RO-when-remounting-if-SetVariable-is-not-supported.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52463, CVSSv2 Score: 5.5
- Description:
efivarfs: force RO when remounting if SetVariable
- CVE: https://access.redhat.com/security/cve/CVE-2023-52463
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2023-52463-efivarfs-force-RO-when-remounting-if-SetVariable-is-not-supported-kpatch.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35791, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Flush pages under kvm->lock to fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2024-35791
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35791-kvm-svm-flush-pages-under-kvm-lock-to-fix-uaf.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-36883, CVSSv2 Score: 5.5
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36883
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38559, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Ensure the copied buf is NUL
- CVE: https://access.redhat.com/security/cve/CVE-2024-38559
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-40927, CVSSv2 Score: 5.5
- Description:
xhci: Handle TD clearing for multiple streams
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-40927-xhci-handle-td-clearing-for-multiple-streams.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-40936, CVSSv2 Score: 5.5
- Description:
cxl/region: Fix memregion leaks in devm_cxl_add_region()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40936
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-40936-cxl-region-fix-memregion-leaks-in.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed
- CVE: https://access.redhat.com/security/cve/CVE-2024-41044
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-41055, CVSSv2 Score:
- Description:
Fix for skipped CVE-2023-52489 that modifies structure mem_section_usage only used at boot time
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-42082, CVSSv2 Score: 5.5
- Description:
xdp: Remove WARN() from __xdp_reg_mem_model()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42082
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42082-xdp-remove-warn-from-xdp-reg-mem-model.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42096
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-42102, CVSSv2 Score:
- Description:
Reverts CVE-2024-26720, which we don't use.
- CVE:
- Patch: skipped/CVE-2024-42102.patch
- From:
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://access.redhat.com/security/cve/CVE-2024-42131
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35875, CVSSv2 Score: 5.5
- Description:
x86/coco: Require seeding RNG with RDRAND on CoCo
- CVE: https://access.redhat.com/security/cve/CVE-2024-35875
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35875-x86-coco-Require-seeding-RNG-with-RDRAND-on-CoCo-systems.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-35875, CVSSv2 Score: 5.5
- Description:
x86/coco: Require seeding RNG with RDRAND on CoCo
- CVE: https://access.redhat.com/security/cve/CVE-2024-35875
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-35875-x86-coco-Require-seeding-RNG-with-RDRAND-on-CoCo-systems-kpatch.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel9/5.14.0-427.35.1.el9_4/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 5.14.0-427.35.1.el9_4
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26929, CVSSv2 Score: 7.8
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://access.redhat.com/security/cve/CVE-2024-26929
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26929-scsi-qla2xxx-fix-double-free-of-fcport.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26930, CVSSv2 Score: 7.8
- Description:
scsi: qla2xxx: Fix double free of the ha->vp_map pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-26930
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26930-scsi-qla2xxx-fix-double-free-of-the-ha-vp-map-pointer.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-27022, CVSSv2 Score: 7.8
- Description:
fork: defer linking file vma until vma is fully initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-27022
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-27022-fork-defer-linking-file-vma-until-vma-is-fully-initialized.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38562, CVSSv2 Score: 7.8
- Description:
wifi: nl80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-38562
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38562-wifi-nl80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-41071, CVSSv2 Score: 7.8
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36016, CVSSv2 Score: 7.7
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36016
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38573, CVSSv2 Score: 7.5
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-38573
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-42225, CVSSv2 Score: 7.5
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-42225
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38615, CVSSv2 Score: 5.5
- Description:
cpufreq: exit() callback is optional
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36899, CVSSv2 Score: 5.5
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://access.redhat.com/security/cve/CVE-2024-36899
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-35895, CVSSv2 Score: 5.5
- Description:
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
- CVE: https://access.redhat.com/security/cve/CVE-2024-35895
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-35895-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26931, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix command flush on cable pull
- CVE: https://access.redhat.com/security/cve/CVE-2024-26931
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26931-scsi-qla2xxx-fix-command-flush-on-cable-pull.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-38601, CVSSv2 Score: 5.5
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://access.redhat.com/security/cve/CVE-2024-38601
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2023-52884, CVSSv2 Score: 5.5
- Description:
Input: cyapa - add missing input core locking to suspend/resume functions
- CVE: https://access.redhat.com/security/cve/CVE-2023-52884
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2023-52884-input-cyapa-add-missing-input-core-locking-to-suspend-resume-functions.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26947, CVSSv2 Score:
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2024-26947.patch
- From:
- CVE-2024-40984, CVSSv2 Score: 5.5
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
- CVE: https://access.redhat.com/security/cve/CVE-2024-40984
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-40984-acpica-revert-acpica-avoid-info-mapping-multiple-bars-your-kernel-is-fine.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26991, CVSSv2 Score: 5.5
- Description:
KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes
- CVE: https://access.redhat.com/security/cve/CVE-2024-26991
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26991-kvm-x86-mmu-x86-don-t-overflow-lpage-info-when-checking-attributes.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-42246, CVSSv2 Score: 5.5
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://access.redhat.com/security/cve/CVE-2024-42246
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26739, CVSSv2 Score: 5.5
- Description:
net/sched: act_mirred: Create function tcf_mirred_to_dev and improve readability
- CVE: https://access.redhat.com/security/cve/CVE-2024-26739
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26739-net-sched-act_mirred-Create-function-tcf_mirred_to_.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-26739, CVSSv2 Score: 5.5
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://access.redhat.com/security/cve/CVE-2024-26739
- Patch: rhel9/5.14.0-427.37.1.el9_4/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 5.14.0-427.37.1.el9_4
- CVE-2024-36978, CVSSv2 Score: 7.8
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36978
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in-multiq-tune.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-42284
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2021-47385, CVSSv2 Score: 5.5
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2021-47385-hwmon-w83792d-fix-null-pointer-dereference-by-removing-unnecessary-structure-field.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2021-47385, CVSSv2 Score: 5.5
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2021-47385-hwmon-w83792d-fix-null-pointer-dereference-by-removing-unnecessary-structure-field-kpatch.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-35989, CVSSv2 Score: 5.5
- Description:
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
- CVE: https://access.redhat.com/security/cve/CVE-2024-35989
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-35989-dmaengine-idxd-fix-oops-during-rmmod-on-single-cpu-platforms.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40959
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-42079, CVSSv2 Score: 5.5
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://access.redhat.com/security/cve/CVE-2024-42079
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2023-28746, CVSSv2 Score:
- Description:
RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.
- CVE:
- Patch: skipped/CVE-2023-28746.patch
- From:
- CVE-2023-52658, CVSSv2 Score: 5.5
- Description:
Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"
- CVE: https://access.redhat.com/security/cve/CVE-2023-52658
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2023-52658-revert-net-mlx5-block-entering-switchdev-mode-with-ns-inconsistency.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-27403, CVSSv2 Score: 5.5
- Description:
netfilter: nft_flow_offload: reset dst in route object after setting up flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-27403
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-27403-netfilter-nft-flow-offload-reset-dst-in-route-object-after-setting-up-flow.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-36889, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-36889
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on-connect.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-39483, CVSSv2 Score: 5.5
- Description:
KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
- CVE: https://access.redhat.com/security/cve/CVE-2024-39483
- Patch: rhel9/5.14.0-427.40.1.el9_4/CVE-2024-39483-kvm-svm-warn-on-vnmi-nmi-window-iff-nmis-are-outright-masked.patch
- From: 5.14.0-427.40.1.el9_4
- CVE-2024-39502, CVSSv2 Score:
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-39502.patch
- From:
- CVE-2024-45018, CVSSv2 Score: 5.5
- Description:
netfilter: flowtable: initialise extack before use
- CVE: https://access.redhat.com/security/cve/CVE-2024-45018
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-45018-netfilter-flowtable-initialise-extack-before-use.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41005, CVSSv2 Score: 5.5
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://access.redhat.com/security/cve/CVE-2024-41005
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26923-af_unix-Fix-garbage-collector-racing-against-connec.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41013, CVSSv2 Score: 5.5
- Description:
xfs: don't walk off the end of a directory data block
- CVE: https://access.redhat.com/security/cve/CVE-2024-41013
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41013-xfs-don-t-walk-off-the-end-of-a-directory-data-block.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-41014, CVSSv2 Score: 5.5
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40995, CVSSv2 Score: 5.5
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40995
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in-tcf-idr-check-alloc.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://access.redhat.com/security/cve/CVE-2024-43854
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40960
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40972, CVSSv2 Score: 5.5
- Description:
ext4: fold quota accounting into ext4_xattr_inode_lookup_create()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40972
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40972-ext4-fold-quota-accounting-into-ext4-xattr-inode-lookup-create.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40972, CVSSv2 Score: 5.5
- Description:
ext4: do not create EA inode under buffer lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-40972
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40972-ext4-do-not-create-ea-inode-under-buffer-lock.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40998, CVSSv2 Score: 5.5
- Description:
ext4: turn quotas off if mount failed after enabling quotas
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40998-ext4-turn-quotas-off-if-mount-failed-after-enabling-quotas.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40998, CVSSv2 Score: 5.5
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40977, CVSSv2 Score: 5.5
- Description:
wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-40977
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40977-wifi-mt76-mt7921s-fix-potential-hung-tasks-during-chip-recovery.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2021-47383, CVSSv2 Score: 5.5
- Description:
tty: Fix out-of-bound vmalloc access in imageblit
- CVE: https://access.redhat.com/security/cve/CVE-2021-47383
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2021-47383-tty-fix-out-of-bound-vmalloc-access-in-imageblit.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26640, CVSSv2 Score: 5.5
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://www.cve.org/CVERecord?id=CVE-CVE-2024-26640
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26826, CVSSv2 Score: 5.5
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26826
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26935, CVSSv2 Score: 5.5
- Description:
scsi: core: Fix unremoved procfs host directory regression
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26935-scsi-core-fix-unremoved-procfs-host-directory-regression.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26961, CVSSv2 Score: 5.5
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-26961, CVSSv2 Score: 5.5
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new-kpatch.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-36244, CVSSv2 Score: 5.5
- Description:
net/sched: taprio: extend minimum interval restriction to entire cycle too
- CVE: https://access.redhat.com/security/cve/CVE-2024-36244
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-36244-net-sched-taprio-extend-minimum-interval-restriction-to-entire.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39472, CVSSv2 Score: 5.5
- Description:
xfs: fix log recovery buffer allocation for the
- CVE: https://access.redhat.com/security/cve/CVE-2024-39472
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-lega.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39504, CVSSv2 Score: 5.5
- Description:
netfilter: nft_inner: validate mandatory meta and payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-39504
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39504-netfilter-nft_inner-validate-mandatory-meta.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-39504, CVSSv2 Score: 5.5
- Description:
netfilter: nft_inner: validate mandatory meta and payload
- CVE: https://access.redhat.com/security/cve/CVE-2024-39504
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-39504-netfilter-nft_inner-validate-mandatory-payload.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://access.redhat.com/security/cve/CVE-2024-40904
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-40931, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_una is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-40931
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-40931-mptcp-ensure-snd_una-is-properly-initialized-on-con.patch
- From: 5.14.0-427.42.1.el9_4
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: rhel9/5.14.0-427.42.1.el9_4/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file.patch
- From: 5.14.0-427.42.1.el9_4
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: rhel9/5.14.0-427.42.1.el9_4/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry.patch
- From: 5.14.0-427.42.1.el9_4