- kernel-uek-4.1.12-124.68.3.el7uek (oel7-uek4)
- 4.1.12-124.87.2.2.el7uek
- 2024-07-29 14:17:50
- 2024-08-05 07:01:25
- K20240729_09
- CVE-2022-3629, CVSSv2 Score: 3.3
- Description:
vsock: Fix memory leak in vsock_connect()
- CVE: https://linux.oracle.com/cve/CVE-2022-3629.html
- Patch: 4.1.12/CVE-2022-3629-vsock-fix-memory-leak-in-vsock_connect.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Tighten matching on DCC message
- CVE: https://access.redhat.com/security/cve/CVE-2022-2663
- Patch: 4.19.0/CVE-2022-2663-netfilter-nf_conntrack_irc-tighten-matching-on-DCC-message.patch
- From: 4.19.260-1
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-3565.html
- Patch: 4.1.12/CVE-2022-3565-kpatch.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
- Patch: 4.14.0/CVE-2022-40768-scsi-stex-properly-zero-out-the-passthrough-command-structure.patch
- From: 4.14.296-222.539
- CVE-2019-19377, CVSSv2 Score: 7.8
- Description:
btrfs: Don't submit any btree write bio if the fs has errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.1.12/CVE-2019-19377-btrfs-Dont-submit-any-btree-write-bio-if-the-fs-has-errors.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2021-20292, CVSSv2 Score: 6.7
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20292
- Patch: debian9/4.9.272-1/CVE-2021-20292-drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch
- From: 4.9.272-1
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
packet: in recvmsg msg_name return at least sizeof sockaddr_ll
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-packet-in-recvmsg-msg_name-return-at-least-sizeof-sockaddr_ll.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: oel7-uek4/4.1.12-124.69.5.1.el7uek/CVE-2022-4378.patch
- From: 4.1.12-124.69.5.1.el7uek
- CVE-2022-43750, CVSSv2 Score: 7.8
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: 4.14.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.19.15
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: keep backlog updated with qlen
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0005-sch_sfb-keep-backlog-updated-with-qlen.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Don't assume the skb is still around after enqueueing to child
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0010-sch_sfb-Don-t-assume-the-skb-is-still-around-after-e.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Also store skb len before calling child enqueue
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0020-sch_sfb-Also-store-skb-len-before-calling-child-enqu.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Fix forged IP logic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-2663
- Patch: 4.14.0/CVE-2022-2663-netfilter-nf_conntrack_irc-Fix-forged-IP-logic.patch
- From: 4.14.293
- CVE-2022-3594, CVSSv2 Score: 7.5
- Description:
r8152: Rate limit overflow messages
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
- Patch: 4.14.0/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: 4.14.296-222.539
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
- Patch: 4.14.0/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.19.12
- CVE-2022-3524, CVSSv2 Score: 5.5
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options().
- CVE: https://linux.oracle.com/cve/CVE-2022-3524.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-3524-tcp-udp-fix-memory-leak-in-ipv6-renew-options.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: remove unneeded variable in l2cap_stream_rx
- CVE: https://linux.oracle.com/cve/CVE-2022-3564.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/0001-CVE-2022-3564-Bluetooth-remove-unneeded-variable-in-l2cap_stream_r.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://linux.oracle.com/cve/CVE-2022-3564.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/0002-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Introduce proper defines for PSM ranges
- CVE: https://linux.oracle.com/cve/CVE-2022-42896.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42896-Bluetooth-L2CAP-Introduce-proper-defines-for-PSM-ran.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://linux.oracle.com/cve/CVE-2022-42896.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42895, CVSSv2 Score: 6.5
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://linux.oracle.com/cve/CVE-2022-42895.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitializ.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in
- CVE: https://linux.oracle.com/cve/CVE-2022-3628.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls
- CVE: https://linux.oracle.com/cve/CVE-2022-4662.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-4662.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls-kpatch.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-2873-i2c-ismt-Fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-41858, CVSSv2 Score: 7.1S
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-41858-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-45934-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://linux.oracle.com/cve/CVE-2023-0394.html
- Patch: oel6-uek4/4.1.12-124.73.1.el6uek/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_pus.patch
- From: 4.1.12-124.73.1
- CVE-2019-5489, CVSSv2 Score: 5.5
- Description:
mm/mincore.c: make mincore() more conservative
- CVE: https://linux.oracle.com/cve/CVE-2019-5489.html
- Patch: oel6-uek4/4.1.12-124.73.1.el6uek/CVE-2019-5489-mm-mincore.c-make-mincore-more-conservative.patch
- From: 4.1.12-124.73.1
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://linux.oracle.com/cve/CVE-2023-1073.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1073-HID-check-empty-report_list-in-hid_validate_values.patch
- From: 4.1.12-124.73.2
- CVE-2023-1095, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fix null deref due to zeroed list head
- CVE: https://linux.oracle.com/cve/CVE-2023-1095.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1095-netfilter-nf_tables-fix-null-deref-due-to-zeroed-lis.patch
- From: 4.1.12-124.73.2
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://linux.oracle.com/cve/CVE-2023-1074.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-a-gi.patch
- From: 4.1.12-124.73.2
- CVE-2020-0404, CVSSv2 Score: 5.5
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
- CVE: https://linux.oracle.com/cve/CVE-2020-0404.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-mal.patch
- From: 4.1.12-124.73.2
- CVE-2022-4095, CVSSv2 Score: 7.8
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://linux.oracle.com/cve/CVE-2022-4095.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2022-4095-staging-rtl8712-rtl8712_cmd.c-fixed-comparison-to-null.patch
- From: 4.1.12-124.74.2
- CVE-2022-4095, CVSSv2 Score: 7.8
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://linux.oracle.com/cve/CVE-2022-4095.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2022-4095-staging-rtl8712-fix-use-after-free-bugs.patch
- From: 4.1.12-124.74.2
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it to userspace
- CVE: https://linux.oracle.com/cve/CVE-2023-1513.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-before-sending-it-to-userspace.patch
- From: 4.1.12-124.74.2
- CVE-2023-23559, CVSSv2 Score: 7.8
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://linux.oracle.com/cve/CVE-2023-23559.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_query_oid.patch
- From: 4.1.12-124.74.2
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://linux.oracle.com/cve/CVE-2023-26545.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 4.1.12-124.74.2
- CVE-2023-28772, CVSSv2 Score: 6.7
- Description:
seq_buf: Fix overflow in seq_buf_putmem_hex()
- CVE: https://linux.oracle.com/cve/CVE-2023-28772.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-28772-seq_buf-Fix-overflow-in-seq_buf_putmem_hex.patch
- From: 4.1.12-124.74.2
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://linux.oracle.com/cve/CVE-2023-0458.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-0458-patch-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-2248, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://linux.oracle.com/cve/CVE-2023-2248.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-2248-patch-net-sched-sch-qfq-prevent-slab-out-of-bounds-in.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-1670, CVSSv2 Score: 7.8
- Description:
xirc2ps_cs: Fix use after free bug in xirc2ps_detach
- CVE: https://linux.oracle.com/cve/CVE-2023-1670.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-1670-patch-xirc2ps-cs-fix-use-after-free-bug-in-xirc2ps-detach.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://linux.oracle.com/cve/CVE-2023-23454.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-23454-patch-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-28328, CVSSv2 Score: 5.5
- Description:
media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
- CVE: https://linux.oracle.com/cve/CVE-2023-28328.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-28328-patch-media-dvb-usb-az6027-fix-null-ptr-deref-in.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://linux.oracle.com/cve/CVE-2023-2162.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2022-3169, CVSSv2 Score: 5.5
- Description:
nvme: restrict management ioctls to admin
- CVE: https://linux.oracle.com/cve/CVE-2022-3169.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2022-3169-patch-nvme-restrict-management-ioctls-to-admin.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2022-3434, CVSSv2 Score:
- Description:
Erroneous CVE record that is not about linux kernel, most likely a typo. Should be CVE-2022-3424
- CVE:
- Patch: skipped/CVE-2022-3434.patch
- From:
- CVE-2023-34256, CVSSv2 Score: 5.5
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://linux.oracle.com/cve/CVE-2023-34256.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-34256-ext4-avoid-a-potential-slab-out-of-bounds-in-ext4_group_desc_csum.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2022-1679, CVSSv2 Score: 7.8
- Description:
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://linux.oracle.com/cve/CVE-2022-1679.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2022-20141, CVSSv2 Score: 7.0
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://linux.oracle.com/cve/CVE-2022-20141.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://linux.oracle.com/cve/CVE-2023-1118.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-1118-media-rc-Fix-use-after-free-bugs-caused-by-ene_tx_irqsim.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-2269, CVSSv2 Score: 4.4
- Description:
fix nested locking in table_clear() to remove deadlock concern
- CVE: https://linux.oracle.com/cve/CVE-2023-2269.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove-deadlock-concern.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-3159, CVSSv2 Score: 6.7
- Description:
firewire: fix potential uaf in outbound_phy_packet_callback()
- CVE: https://linux.oracle.com/cve/CVE-2023-3159.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-3159-firewire-fix-potential-uaf-in-outbound_phy_packet_callback.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2022-3424, CVSSv2 Score: 7.8
- Description:
misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os
- CVE: https://linux.oracle.com/cve/CVE-2022-3424.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_context_option-gru_fault-and-gru_handle_user_call_os.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://linux.oracle.com/cve/CVE-2023-3090.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-3090-ipvlan-Fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-1380, CVSSv2 Score: 7.1
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://linux.oracle.com/cve/CVE-2023-1380.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-1380-wifi-brcmfmac-slab-out-of-bounds-read-in-brcmf_get_assoc_ies.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-35824, CVSSv2 Score: 6.4
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2023-35824.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove-due-to-race-condition.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-3141, CVSSv2 Score: 6.4
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2023-3141.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race-condition.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://linux.oracle.com/cve/CVE-2023-3161.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-3161-fbcon-Check-font-dimension-limits.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb_frontend: fix locking issues at dvb_frontend_get_event()
- CVE: https://linux.oracle.com/cve/CVE-2023-31084.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-31084-media-dvb_frontend-fix-locking-issues-at-dvb_frontend_get_event.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://linux.oracle.com/cve/CVE-2023-31084.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-31084-media-dvb-core-Fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2022-41218, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://linux.oracle.com/cve/CVE-2022-41218.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: validate registers coming from userspace
- CVE: https://linux.oracle.com/cve/CVE-2022-1015.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2022-1015-netfilter-nf_tables-validate-registers-coming-from-userspace.patch
- From: 4.1.12-124.78.2
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: validate registers coming from userspace
- CVE: https://linux.oracle.com/cve/CVE-2022-1015.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2022-1015-netfilter-nf_tables-validate-registers-coming-from-userspace-kpatch.patch
- From: 4.1.12-124.78.2
- CVE-2023-3567, CVSSv2 Score: 6.6
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://linux.oracle.com/cve/CVE-2023-3567.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs_read-to-avoid-UAF.patch
- From: 4.1.12-124.78.2
- CVE-2023-3106, CVSSv2 Score: 7.8
- Description:
xfrm: fix crash in XFRM_MSG_GETSA netlink handler
- CVE: https://linux.oracle.com/cve/CVE-2023-3106.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2023-3106-xfrm-fix-crash-in-XFRM_MSG_GETSA-netlink-handler.patch
- From: 4.1.12-124.78.2
- CVE-2023-22024, CVSSv2 Score: 5.5
- Description:
rds: Fix lack of reentrancy for connection reset with dst addr zero
- CVE: https://linux.oracle.com/cve/CVE-2023-22024.html
- Patch: oel7-uek4/4.1.12-124.78.4.1.el7uek/CVE-2023-22024-rds-Fix-lack-of-reentrancy-for-connection-reset-with-dst-addr-zero.patch
- From: 4.1.12-124.78.4.1.el7uek
- CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://linux.oracle.com/cve/CVE-2023-4206.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-4206-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://linux.oracle.com/cve/CVE-2023-3611.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-3772, CVSSv2 Score: 5.5
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://linux.oracle.com/cve/CVE-2023-3772.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-3772-patch-xfrm-add-null-check-in-xfrm-update-ae-params.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-4459, CVSSv2 Score: 6.5
- Description:
net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()
- CVE: https://linux.oracle.com/cve/CVE-2023-4459.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-4459-patch-net-vmxnet3-fix-possible-null-pointer-dereference-in.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-4387, CVSSv2 Score: 7.1
- Description:
net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()
- CVE: https://linux.oracle.com/cve/CVE-2023-4387.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-4387-patch-net-vmxnet3-fix-possible-use-after-free-bugs-in.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-3776, CVSSv2 Score: 7
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://linux.oracle.com/cve/CVE-2023-3776.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://linux.oracle.com/cve/CVE-2023-35001.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-35001-patch-netfilter-nf-tables-prevent-oob-access-in.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: fix use-after-free in ext4_xattr_set_entry
- CVE: https://linux.oracle.com/cve/CVE-2023-2513.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-2513-patch-ext4-fix-use-after-free-in-ext4-xattr-set-entry.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
- CVE: https://linux.oracle.com/cve/CVE-2023-2513.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-2513-patch-ext4-add-ext4-inode-has-xattr-space-macro-in-xattr-h.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://linux.oracle.com/cve/CVE-2022-34918.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2022-34918-patch-netfilter-nf-tables-stricter-validation-of-element-data.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2021-33098, CVSSv2 Score: 5.5
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://linux.oracle.com/cve/CVE-2021-33098.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2021-33098-ixgbe-fix-large-MTU-request-from-VF.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://linux.oracle.com/cve/CVE-2023-42752.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-42752-igmp-limit-igmpv3_newpack-packet-size-to-IP_MAX_MTU.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-1077, CVSSv2 Score: 7.0
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://linux.oracle.com/cve/CVE-2023-1077.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 4.1.12-124.82.2.el7uek
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://linux.oracle.com/cve/CVE-2023-4921.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://linux.oracle.com/cve/CVE-2023-4921.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-7192, CVSSv2 Score: 5.5
- Description:
netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()
- CVE: https://linux.oracle.com/cve/CVE-2023-7192.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2023-7192-netfilter-ctnetlink-fix-possible-refcount-leak-in-ctnetlink_create_conntrack.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2022-48619, CVSSv2 Score: 6.2
- Description:
Input: add bounds checking to input_set_capability()
- CVE: https://linux.oracle.com/cve/CVE-2022-48619.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2022-48619-Input-add-bounds-checking-to-input_set_capability.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2024-0775, CVSSv2 Score: 6.7
- Description:
ext4: improve error recovery code paths in __ext4_remount()
- CVE: https://linux.oracle.com/cve/CVE-2024-0775.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2024-0775-ext4-improve-error-recovery-code-paths-in-__ext4_remount.patch
- From: 4.1.12-124.83.2.el6uek
- CVE-2021-34981, CVSSv2 Score: 7.5
- Description:
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
- CVE: https://linux.oracle.com/cve/CVE-2021-34981.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2021-34981-Bluetooth-cmtp-fix-file-refcount-when-cmtp_attach_device-fails.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2023-51780, CVSSv2 Score: 7.0
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://linux.oracle.com/cve/CVE-2023-51780.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2023-51780-atm-Fix-Use-After-Free-in-do_vcc_ioctl.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel6-uek4/4.1.12-124.84.2.el6uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
- From: 4.1.12-124.84.2.el6uek
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://linux.oracle.com/cve/CVE-2023-45863.html
- Patch: oel6-uek4/4.1.12-124.84.2.el6uek/CVE-2023-45863-kobject-Fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 4.1.12-124.84.2.el6uek
- CVE-2023-39194, CVSSv2 Score: 3.2
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://linux.oracle.com/cve/CVE-2023-39194.html
- Patch: oel6-uek4/4.1.12-124.84.2.el6uek/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
- From: 4.1.12-124.84.2.el6uek
- CVE-2023-1989, CVSSv2 Score: 7.0
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work
- CVE: https://linux.oracle.com/cve/CVE-2023-1989.html
- Patch: oel7-uek4/4.1.12-124.85.1.el7uek/CVE-2023-1989-Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_remove-due-to-unfinished-work.patch
- From: 4.1.12-124.85.1.el7uek
- CVE-2024-41090 CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
net/mlx5e: drop shorter ethernet frames
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 4.1.12/CVE-2024-41090_CVE-2024-41091.patch
- From: 4.1.12-124.87.2.2