- kernel-uek-5.15.0-300.163.18.el8uek (oel8-uek7)
- 5.15.0-308.179.6.3.el8uek
- 2025-06-02 15:30:52
- 2025-06-04 07:41:53
- K20250602_01
- N/A
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://linux.oracle.com/errata/ELSA-2024-12713.html
- Patch: oel9-uek7/5.15.0-300.163.18.1.el9uek/vhost-scsi-null-ptr-dereference-in-vhost_scsi_get_req-uek7.patch
- From: 5.15.0-300.163.18.1
- CVE-2024-35801
- Description:
x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
- CVE: https://linux.oracle.com/cve/CVE-2024-35801.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-35801-x86-fpu-keep-xfd-state-in-sync-with-msr-ia32-xfd.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-35959
- Description:
net/mlx5e: Fix mlx5e_priv_init() cleanup flow
- CVE: https://linux.oracle.com/cve/CVE-2024-35959.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-35959-net-mlx5e-fix-mlx5e-priv-init-cleanup-flow.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-42269
- Description:
netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().
- CVE: https://linux.oracle.com/cve/CVE-2024-42269.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-42269-netfilter-iptables-fix-potential-null-ptr-deref-in-ip6table-nat-table-init.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-42270
- Description:
netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init().
- CVE: https://linux.oracle.com/cve/CVE-2024-42270.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-42270-netfilter-iptables-fix-null-ptr-deref-in-iptable-nat-table-init.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-47674
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-26681
- Description:
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-26681.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-26681-netdevsim-avoid-potential-loop-in-nsim-dev-trap-report-work.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-40940
- Description:
net/mlx5: Fix tainted pointer delete is case of flow rules creation fail
- CVE: https://linux.oracle.com/cve/CVE-2024-40940.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-40940-net-mlx5-fix-tainted-pointer-delete-is-case-of-flow-rules-creation-fail.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-26734
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26734.patch
- From:
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout.patch
- From: 5.15.0-301.163.5.2.el8uek
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel9-uek7/5.15.0-301.163.5.2.el9uek/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch.patch
- From: 5.15.0-301.163.5.2.el9uek
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46814
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://linux.oracle.com/cve/CVE-2024-46814.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46814-drm-amd-display-Check-msg_id-before-processing-transcation.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41011
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://linux.oracle.com/cve/CVE-2024-41011.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://linux.oracle.com/cve/CVE-2024-42284.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-46844
- Description:
um: line: always fill *error_out in setup_one_line()
- CVE: https://linux.oracle.com/cve/CVE-2024-46844.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46844-um-line-always-fill-error-out-in-setup-one-line.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46674
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://linux.oracle.com/cve/CVE-2024-46674.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46725.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-41070
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://linux.oracle.com/cve/CVE-2024-42301.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42313
- Description:
[PATCH 1/1] media: venus: fix use after free in vdec_close
- CVE: https://linux.oracle.com/cve/CVE-2024-42313.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec_close.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43858
- Description:
[PATCH 1/1] jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://linux.oracle.com/cve/CVE-2024-43858.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43858-jfs-Fix-array-index-out-of-bounds-in-diFree.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43873
- Description:
[PATCH 1/1] vhost/vsock: always initialize seqpacket_allow
- CVE: https://linux.oracle.com/cve/CVE-2024-43873.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket_allow.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43873
- Description:
[PATCH 1/1] vhost/vsock: always initialize seqpacket_allow
- CVE: https://linux.oracle.com/cve/CVE-2024-43873.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43873-kpatch.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44934
- Description:
[PATCH 1/1] net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://linux.oracle.com/cve/CVE-2024-44934.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44986
- Description:
[PATCH 1/1] ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://linux.oracle.com/cve/CVE-2024-44986.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44986-ipv6-fix-possible-UAF-in-ip6_finish_output2.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44987
- Description:
[PATCH 1/1] ipv6: prevent UAF in ip6_send_skb()
- CVE: https://linux.oracle.com/cve/CVE-2024-44987.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44987-ipv6-prevent-UAF-in-ip6_send_skb.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46740
- Description:
[PATCH 1/1] binder: fix UAF caused by offsets overwrite
- CVE: https://linux.oracle.com/cve/CVE-2024-46740.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46740-binder-fix-UAF-caused-by-offsets-overwrite.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46744
- Description:
[PATCH 1/1] Squashfs: sanity check symbolic link size
- CVE: https://linux.oracle.com/cve/CVE-2024-46744.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46744-Squashfs-sanity-check-symbolic-link-size.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46746
- Description:
[PATCH 1/1] HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://linux.oracle.com/cve/CVE-2024-46746.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46746-HID-amd_sfh-free-driver_data-after-destroying-hid-device.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46756
- Description:
[PATCH] hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46756.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46756-hwmon-w83627ehf-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42271
- Description:
[PATCH 1/1] net/iucv: fix use after free in iucv_sock_close()
- CVE: https://linux.oracle.com/cve/CVE-2024-42271.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv_sock_close.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42280
- Description:
[PATCH 1/1] mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://linux.oracle.com/cve/CVE-2024-42280.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42280-mISDN-Fix-a-use-after-free-in-hfcmulti_tx.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44998
- Description:
[PATCH 1/1] atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://linux.oracle.com/cve/CVE-2024-44998.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue_rx.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46757
- Description:
[PATCH] hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46757.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46757-hwmon-nct6775-core-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46758
- Description:
[PATCH] hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46758.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46758-hwmon-lm95234-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46759
- Description:
[PATCH 1/1] hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46759.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46759-hwmon-adc128d818-Fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46798
- Description:
[PATCH 1/1] ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://linux.oracle.com/cve/CVE-2024-46798.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46798-ASoC-dapm-Fix-UAF-for-snd_soc_pcm_runtime-object.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46800
- Description:
[PATCH] sch/netem: fix use after free in netem_dequeue
- CVE: https://linux.oracle.com/cve/CVE-2024-46800.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem_dequeue.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46818
- Description:
[PATCH 1/1] drm/amd/display: Check gpio_id before used as array index
- CVE: https://linux.oracle.com/cve/CVE-2024-46818.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46818-drm-amd-display-Check-gpio_id-before-used-as-array-index.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44946
- Description:
module is not included
- CVE:
- Patch: skipped/CVE-2024-44946.patch
- From:
- CVE-2024-44946
- Description:
kcm: Serialise kcm_sendmsg() for the same socket.
- CVE: https://linux.oracle.com/cve/CVE-2024-44946.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44946-Add-BUILD_BUG_ON-for-kcm-module.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44971
- Description:
[PATCH 1/1] net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register()
- CVE: https://linux.oracle.com/cve/CVE-2024-44971.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44971-net-dsa-bcm_sf2-Fix-a-possible-memory-leak-in-bcm_sf2_mdio_register.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44982
- Description:
[PATCH 1/1] drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
- CVE: https://linux.oracle.com/cve/CVE-2024-44982.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44982-drm-msm-dpu-cleanup-FB-if-dpu_format_populate_layout-fails.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44995
- Description:
[PATCH 1/1] net: hns3: fix a deadlock problem when config TC during resetting
- CVE: https://linux.oracle.com/cve/CVE-2024-44995.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44995-net-hns3-fix-a-deadlock-problem-when-config-TC-during-resetting.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-45003
- Description:
vfs: Don't evict inode under the inode lru traversing context
- CVE: https://linux.oracle.com/cve/CVE-2024-45003.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-45003-vfs-don-t-evict-inode-under-the-inode-lru-traversing-context.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-45006
- Description:
[PATCH 1/1] xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
- CVE: https://linux.oracle.com/cve/CVE-2024-45006.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-45006-xhci-Fix-Panther-point-NULL-pointer-deref-at-full-speed-re-enumeration.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-45028
- Description:
[PATCH 1/1] mmc: mmc_test: Fix NULL dereference on allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-45028.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-45028-mmc-mmc_test-Fix-NULL-dereference-on-allocation-failure.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46677
- Description:
[PATCH 1/1] gtp: fix a potential NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46677.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46677-gtp-fix-a-potential-NULL-pointer-dereference.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46714
- Description:
[PATCH 1/1] drm/amd/display: Skip wbscl_set_scaler_filter if filter is null
- CVE: https://linux.oracle.com/cve/CVE-2024-46714.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46714-drm-amd-display-Skip-wbscl_set_scaler_filter-if-filter-is-null.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46739
- Description:
[PATCH 1/1] uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
- CVE: https://linux.oracle.com/cve/CVE-2024-46739.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46739-uio_hv_generic-Fix-kernel-NULL-pointer-dereference-in-hv_uio_rescind.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-38577
- Description:
[PATCH 1/1] rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-38577.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-38577-rcu-tasks-Fix-show_rcu_tasks_trace_gp_kthread-buffer-overflow.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-42285
- Description:
[PATCH 1/1] RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://linux.oracle.com/cve/CVE-2024-42285.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-42285-RDMA-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44985
- Description:
[PATCH 1/1] ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-44985.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44985-ipv6-prevent-possible-UAF-in-ip6_xmit.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46673
- Description:
[PATCH 1/1] scsi: aacraid: Fix double-free on probe failure
- CVE: https://linux.oracle.com/cve/CVE-2024-46673.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46673-scsi-aacraid-Fix-double-free-on-probe-failure.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46722
- Description:
[PATCH 1/1] drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46722.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46722-drm-amdgpu-fix-mc_data-out-of-bounds-read-warning.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46724
- Description:
[PATCH 1/1] drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://linux.oracle.com/cve/CVE-2024-46724.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46724-drm-amdgpu-Fix-out-of-bounds-read-of-df_v1_7_channel_number.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-46782
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://linux.oracle.com/cve/CVE-2024-46782.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46782-ila-call-nf-unregister-net-hooks-sooner-kpatch.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-43839
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://linux.oracle.com/cve/CVE-2024-43839.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-43839-bna-adjust-name-buf-size-of-bna_tcb-and-bna_ccb-structures.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44983
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://linux.oracle.com/cve/CVE-2024-44983.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44983-netfilter-flowtable-validate-vlan-header.patch
- From: 5.15.0-302.167.6.1.el9uek
- CVE-2024-46804
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://linux.oracle.com/cve/CVE-2024-46804.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-46804-drm-amd-display-Add-array-index-check-for-hdcp-ddc-access.patch
- From: 5.15.0-302.167.6.1.el9uek
- CVE-2024-44958
- Description:
[PATCH] sched/smt: Fix unbalance sched_smt_present dec/inc
- CVE: https://linux.oracle.com/cve/CVE-2024-44958.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44958-sched-smt-Fix-unbalance-sched_smt_present-dec-inc.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-44958
- Description:
[PATCH] sched/core: Fix unbalance set_rq_online/offline() in sched_cpu_deactivate()
- CVE: https://linux.oracle.com/cve/CVE-2024-44958.html
- Patch: oel9-uek7/5.15.0-302.167.6.el9uek/CVE-2024-44958-sched-core-fix-unbalance-set_rq_online-offline-in-sched_cpu_deactivate.patch
- From: 5.15.0-302.167.6.el9uek
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://linux.oracle.com/cve/CVE-2024-49966.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://linux.oracle.com/cve/CVE-2024-49930.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://linux.oracle.com/cve/CVE-2024-49995.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://linux.oracle.com/cve/CVE-2024-49924.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://linux.oracle.com/cve/CVE-2024-49983.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://linux.oracle.com/cve/CVE-2024-50151.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-53059.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50257
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://linux.oracle.com/cve/CVE-2024-50257.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://linux.oracle.com/cve/CVE-2024-50230.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-38384
- Description:
Issue was backported and fixed in the same 5.15.0-303.168.3.el9uek, previous kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-38384.patch
- From:
- CVE-2024-39463
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://linux.oracle.com/cve/CVE-2024-39463.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46852
- Description:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
- CVE: https://linux.oracle.com/cve/CVE-2024-46852.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-46852-dma-buf-heaps-Fix-off-by-one-in-CMA-heap-fault-handler.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://linux.oracle.com/cve/CVE-2024-47685.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47685-netfilter-nf_reject_ipv6-fix-nf_reject_ip6_tcphdr_put.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://linux.oracle.com/cve/CVE-2024-47698.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://linux.oracle.com/cve/CVE-2024-49982.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://linux.oracle.com/cve/CVE-2024-50007.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50007-ALSA-asihpi-Fix-potential-OOB-array-access.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://linux.oracle.com/cve/CVE-2024-50143.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50143-udf-fix-uninit-value-use-in-udf_get_fileshortad.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-50262.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50262-bpf-Fix-out-of-bounds-write-in-trie_get_next_key.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://linux.oracle.com/cve/CVE-2024-53057.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-53057-net-sched-stop-qdisc_tree_reduce_backlog-on-TC_H_ROOT.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47695
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-47695.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49969
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://linux.oracle.com/cve/CVE-2024-49969.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://linux.oracle.com/cve/CVE-2024-49967.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://linux.oracle.com/cve/CVE-2024-49884.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-50180.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50209
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://linux.oracle.com/cve/CVE-2024-50209.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://linux.oracle.com/cve/CVE-2024-50154.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://linux.oracle.com/cve/CVE-2024-50127.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46859
- Description:
platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
- CVE: https://linux.oracle.com/cve/CVE-2024-46859.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-46859-platform-x86-panasonic-laptop-fix-sinf-array-out-of-bounds-accesses.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46859
- Description:
platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
- CVE: https://linux.oracle.com/cve/CVE-2024-46859.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-46859-platform-x86-panasonic-laptop-fix-sinf-array-out-of-bounds-accesses-kpatch.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency-kpatch.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-47670.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://linux.oracle.com/cve/CVE-2024-49889.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://linux.oracle.com/cve/CVE-2024-49883.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://linux.oracle.com/cve/CVE-2024-49882.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://linux.oracle.com/cve/CVE-2024-50074.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://linux.oracle.com/cve/CVE-2024-50131.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://linux.oracle.com/cve/CVE-2024-49894.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49895
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://linux.oracle.com/cve/CVE-2024-49895.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-49852
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://linux.oracle.com/cve/CVE-2024-49852.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-47748.html
- Patch: oel9-uek7/5.15.0-303.171.5.2.el9uek/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 5.15.0-303.171.5.2.el9uek
- CVE-2024-46770
- Description:
The patch doesn't fix the vunlnerability
- CVE:
- Patch: skipped/CVE-2024-46770.patch
- From:
- CVE-2024-50261
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://linux.oracle.com/cve/CVE-2024-50261.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://linux.oracle.com/cve/CVE-2024-50301.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Async COPY result needs to return a write verifier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-nfsd-async-copy-result-needs-to-return-a-write-verifier_new-kpatch.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Limit the number of concurrent async COPY operations
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Limit-the-number-of-concurrent-async-COPY-operations-kpatch-301.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Initialize struct nfsd4_copy earlier
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Initialize-struct-nfsd4_copy-earlier.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-49974
- Description:
NFSD: Never decrement pending_async_copies on error
- CVE: https://linux.oracle.com/cve/CVE-2024-49974.html
- Patch: oel9-uek7/5.15.0-304.171.4.3.el9uek/CVE-2024-49974-NFSD-Never-decrement-pending_async_copies-on-error.patch
- From: 5.15.0-304.171.4.3.el9uek
- CVE-2024-53227
- Description:
Patch affects __init
- CVE:
- Patch: skipped/CVE-2024-53227.patch
- From:
- CVE-2024-49950
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-49950.patch
- From:
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://linux.oracle.com/cve/CVE-2024-53104.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53165
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://linux.oracle.com/cve/CVE-2024-56581.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56606.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56614.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56615.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-42138
- Description:
mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
- CVE: https://linux.oracle.com/cve/CVE-2024-42138.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-42138-mlxsw-core-linecards-fix-double-memory-deallocation-in-case-of-invalid-ini-file.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://linux.oracle.com/cve/CVE-2024-50264.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://linux.oracle.com/cve/CVE-2024-53156.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44949
- Description:
Architecture PARISC is not supported
- CVE:
- Patch: skipped/CVE-2024-44949.patch
- From:
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://linux.oracle.com/cve/CVE-2024-56642.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56661
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://linux.oracle.com/cve/CVE-2024-56661.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56661-tipc-fix-null-deref-in-cleanup-bearer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://linux.oracle.com/cve/CVE-2024-53061.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50121
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://linux.oracle.com/cve/CVE-2024-50121.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://linux.oracle.com/cve/CVE-2024-50267.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://linux.oracle.com/cve/CVE-2024-53150.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50275
- Description:
Irrelevant for x64 kernels
- CVE:
- Patch: skipped/CVE-2024-50275.patch
- From:
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-50036.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release-kpatch.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://linux.oracle.com/cve/CVE-2024-56650.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://linux.oracle.com/cve/CVE-2024-56627.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://linux.oracle.com/cve/CVE-2024-56662.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://linux.oracle.com/cve/CVE-2024-53155.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53099
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://linux.oracle.com/cve/CVE-2024-53099.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-50268.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50279.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://linux.oracle.com/cve/CVE-2024-38538.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes-301.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://linux.oracle.com/cve/CVE-2024-53141.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53171
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://linux.oracle.com/cve/CVE-2024-53171.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://linux.oracle.com/cve/CVE-2024-56704.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56602.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://linux.oracle.com/cve/CVE-2024-56596.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://linux.oracle.com/cve/CVE-2024-47730.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://linux.oracle.com/cve/CVE-2024-39494.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://linux.oracle.com/cve/CVE-2024-56626.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759
- Description:
btrfs: rename and export __btrfs_cow_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-rename-and-export-__btrfs_cow_block.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://linux.oracle.com/cve/CVE-2024-56759.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53240
- Description:
xen/netfront: fix crash when removing device
- CVE: https://linux.oracle.com/cve/CVE-2024-53240.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53240-xen-netfront-fix-crash-when-removing-device.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-50302.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-40939
- Description:
net: wwan: iosm: Fix tainted pointer delete is case of region creation fail
- CVE: https://linux.oracle.com/cve/CVE-2024-40939.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-40939-net-wwan-iosm-fix-tainted-pointer-delete-is-case-of-region-creation-fail.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56597
- Description:
jfs: fix shift-out-of-bounds in dbSplit
- CVE: https://linux.oracle.com/cve/CVE-2024-56597.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56597-jfs-fix-shift-out-of-bounds-in-dbsplit.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-56532
- Description:
ALSA: us122l: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56532.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56532-alsa-us122l-use-snd-card-free-when-closed-at-disconnection.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://linux.oracle.com/cve/CVE-2024-53112.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://linux.oracle.com/cve/CVE-2024-53173.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://linux.oracle.com/cve/CVE-2024-56640.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue-304.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create-continuation.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56601.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56600.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://linux.oracle.com/cve/CVE-2024-56595.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44940
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://linux.oracle.com/cve/CVE-2024-44940.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol-5.15.0-301.163.5.2.el9uek.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-40906
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://linux.oracle.com/cve/CVE-2024-40906.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://linux.oracle.com/cve/CVE-2024-49996.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://linux.oracle.com/cve/CVE-2024-50055.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://linux.oracle.com/cve/CVE-2024-50269.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-50282
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-53096
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://linux.oracle.com/cve/CVE-2024-53096.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53096-mm-resolve-faulty-mmap-region-error-path-behaviour.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-53103.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53237
- Description:
driver core: Introduce device_find_any_child() helper
- CVE: https://linux.oracle.com/cve/CVE-2024-53237.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-53237-driver-core-introduce-device_find_any_child-helper.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://linux.oracle.com/cve/CVE-2024-56598.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56603.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-56708.html
- Patch: oel9-uek7/5.15.0-305.176.4.el9uek/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://linux.oracle.com/cve/CVE-2024-56672.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://linux.oracle.com/cve/CVE-2024-56631.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53162
- Description:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
- CVE: https://linux.oracle.com/cve/CVE-2024-53162.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53162-crypto-qat-qat-4xxx-fix-off-by-one-in-uof-get-name.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://linux.oracle.com/cve/CVE-2024-36899.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47687
- Description:
vdpa/mlx5: Fix invalid mr resource destroy
- CVE: https://linux.oracle.com/cve/CVE-2024-47687.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47687-vdpa-mlx5-fix-invalid-mr-resource-destroy-5.15.0-304.171.4.3.el9uek.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-47707.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://linux.oracle.com/cve/CVE-2024-53124.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-57804
- Description:
scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs
- CVE: https://linux.oracle.com/cve/CVE-2024-57804.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-57804-scsi-mpi3mr-fix-corrupt-config-pages-phy-state-is-switched-in-sysfs.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53110
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-53110
- Description:
vp_vdpa: fix id_table array not null terminated error
- CVE: https://linux.oracle.com/cve/CVE-2024-53110.html
- Patch: oel9-uek7/5.15.0-306.177.4.el9uek/CVE-2024-53110-vp-vdpa-fix-id-table-array-not-null-terminated-error-kpatch.patch
- From: 5.15.0-306.177.4.el9uek
- CVE-2024-56760
- Description:
PCI/MSI: Handle lack of irqdomain gracefully
- CVE: https://linux.oracle.com/cve/CVE-2024-56760.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56760-pci-msi-handle-lack-of-irqdomain-gracefully.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-53213
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://linux.oracle.com/cve/CVE-2024-53213.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-50155
- Description:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-50155.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-50155-netdevsim-use-cond-resched-in-nsim-dev-trap-report-work.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-41079
- Description:
nvmet-auth: complete a request only after freeing the dhchap pointers
- CVE: https://linux.oracle.com/cve/CVE-2024-41079.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-41079-nvmet-auth-complete-a-request-only-after-freeing-the-dhchap-pointers.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-41079
- Description:
nvmet: always initialize cqe.result
- CVE: https://linux.oracle.com/cve/CVE-2024-41079.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-41079-nvmet-always-initialize-cqe-result.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-35972
- Description:
bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-35972.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-35972-bnxt-en-fix-possible-memory-leak-in-bnxt-rdma-aux-device-init.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-40919
- Description:
bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
- CVE: https://linux.oracle.com/cve/CVE-2024-40919.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-40919-bnxt-en-adjust-logging-of-firmware-messages-in-case-of-released-token-in-hwrm-send.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-53209
- Description:
bnxt_en: Fix receive ring space parameters when XDP is active
- CVE: https://linux.oracle.com/cve/CVE-2024-53209.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-53209-bnxt-en-fix-receive-ring-space-parameters-when-xdp-is-active.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56656
- Description:
bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips
- CVE: https://linux.oracle.com/cve/CVE-2024-56656.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56656-bnxt-en-fix-aggregation-id-mask-to-prevent-oops-on-5760x-chips.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56660
- Description:
net/mlx5: DR, prevent potential error pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-56660.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-56660-net-mlx5-dr-prevent-potential-error-pointer-dereference.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-50215
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://linux.oracle.com/cve/CVE-2024-50215.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-46842
- Description:
scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
- CVE: https://linux.oracle.com/cve/CVE-2024-46842.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-46842-scsi-lpfc-Handle-mailbox-timeouts-in-lpfc_get_sfp_info.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-44984
- Description:
bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
- CVE: https://linux.oracle.com/cve/CVE-2024-44984.html
- Patch: oel9-uek7/5.15.0-307.178.5.el9uek/CVE-2024-44984-bnxt_en-Fix-double-DMA-unmapping-for-XDP_REDIRECT.patch
- From: 5.15.0-307.178.5.el9uek
- CVE-2024-56583
- Description:
sched/deadline: Fix warning in migrate_enable for boosted tasks
- CVE: https://linux.oracle.com/cve/CVE-2024-56583.html
- Patch: oel9-uek7/5.15.0-308.179.6.el9uek/CVE-2024-56583-sched-deadline-fix-warning-in-migrate-enable-for-boosted-tasks.patch
- From: 5.15.0-308.179.6.el9uek
- CVE-2024-28956
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-28956.patch
- From:
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A