- kernel-uek-5.4.17-2136.331.7.el7uek (oel7-uek6)
- 5.4.17-2136.337.5.1.el7uek
- 2024-12-21 09:37:40
- 2024-12-25 13:04:40
- K20241221_02
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: 5.15.0/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 5.15.0/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://linux.oracle.com/cve/CVE-2024-36971.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36971-net-fix-__dst_negative_advice-race.patch
- From: 5.4.17-2136.334.6
- CVE-2024-38583, CVSSv2 Score:
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-36015, CVSSv2 Score: 5.5
- Description:
ppdev: Add an error check in register_device
- CVE: https://linux.oracle.com/cve/CVE-2024-36015.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36015-ppdev-add-an-error-check-in-register-device-5.4.17-2136.333.5.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38582, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential hang in nilfs_detach_log_writer()
- CVE: https://linux.oracle.com/cve/CVE-2024-38582.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38582-nilfs2-fix-potential-hang-in-nilfs-detach-log-writer-5.4.17-2136.333.5.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39480, CVSSv2 Score: 7.8
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://linux.oracle.com/cve/CVE-2024-39480.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39480-kdb-Fix-buffer-overflow-during-tab-complete.patch
- From: 5.4.17-2136.334.6
- CVE-2024-38612, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix invalid unregister error path
- CVE: https://linux.oracle.com/cve/CVE-2024-38612.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38612-ipv6-sr-fix-invalid-unregister-error-path.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36016, CVSSv2 Score: 6.4
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://linux.oracle.com/cve/CVE-2024-36016.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38598, CVSSv2 Score: 5.5
- Description:
md: fix resync softlockup when bitmap size is less than array
- CVE: https://linux.oracle.com/cve/CVE-2024-38598.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38598-md-fix-resync-softlockup-when-bitmap-size-is-less-than-array.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://linux.oracle.com/cve/CVE-2024-38579.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38599, CVSSv2 Score: 5.5
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://linux.oracle.com/cve/CVE-2024-38599.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38567, CVSSv2 Score: 5.5
- Description:
wifi: carl9170: add a proper sanity check for endpoints
- CVE: https://linux.oracle.com/cve/CVE-2024-38567.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38567-wifi-carl9170-add-a-proper-sanity-check-for-endpoints.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38549, CVSSv2 Score: 5.5
- Description:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
- CVE: https://linux.oracle.com/cve/CVE-2024-38549.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38549-drm-mediatek-add-0-size-check-to-mtk-drm-gem-obj.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36014, CVSSv2 Score: 5.5
- Description:
drm/arm/malidp: fix a possible null pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-36014.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36014-drm-arm-malidp-fix-a-possible-null-pointer-dereference.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38633, CVSSv2 Score: 5.5
- Description:
serial: max3100: Update uart_driver_registered on driver
- CVE: https://linux.oracle.com/cve/CVE-2024-38633.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38633-serial-max3100-update-uart-driver-registered-on-driver.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://linux.oracle.com/cve/CVE-2024-36286.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38659, CVSSv2 Score: 5.5
- Description:
enic: Validate length of nl attributes in enic_set_vf_port
- CVE: https://linux.oracle.com/cve/CVE-2024-38659.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38659-enic-validate-length-of-nl-attributes-in-enic-set-vf-port.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38661, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38661.patch
- From:
- CVE-2024-35976, CVSSv2 Score: 5.5
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://linux.oracle.com/cve/CVE-2024-35976.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38552, CVSSv2 Score: 4.4
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://linux.oracle.com/cve/CVE-2024-38552.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38560, CVSSv2 Score: 5.1
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://linux.oracle.com/cve/CVE-2024-38560.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38596, CVSSv2 Score: 4.7
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-38596.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38596-af-unix-fix-data-races-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38637, CVSSv2 Score: 4.4
- Description:
greybus: lights: check return of get_channel_from_mode
- CVE: https://linux.oracle.com/cve/CVE-2024-38637.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38637-greybus-lights-check-return-of-get-channel-from-mode.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37353, CVSSv2 Score: 4.4
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://linux.oracle.com/cve/CVE-2024-37353.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when-request-irq.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38618, CVSSv2 Score: 4.4
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://linux.oracle.com/cve/CVE-2024-38618.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39503, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix race between namespace cleanup and gc
- CVE: https://linux.oracle.com/cve/CVE-2024-39503.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39503-netfilter-ipset-fix-race-between-namespace-cleanup-and-gc.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39503, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix race between namespace cleanup and gc
- CVE: https://linux.oracle.com/cve/CVE-2024-39503.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39503-netfilter-ipset-fix-race-between-namespace-cleanup-and-gc-kpatch.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://linux.oracle.com/cve/CVE-2024-37356.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://linux.oracle.com/cve/CVE-2024-37356.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha-kpatch.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38565, CVSSv2 Score: 5.5
- Description:
wifi: ar5523: enable proper endpoint verification
- CVE: https://linux.oracle.com/cve/CVE-2024-38565.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38565-wifi-ar5523-enable-proper-endpoint-verification.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38578, CVSSv2 Score: 5.5
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://linux.oracle.com/cve/CVE-2024-38578.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38601, CVSSv2 Score: 5.5
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://linux.oracle.com/cve/CVE-2024-38601.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38634, CVSSv2 Score: 5.5
- Description:
serial: max3100: Lock port->lock when calling
- CVE: https://linux.oracle.com/cve/CVE-2024-38634.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38634-serial-max3100-lock-port-lock-when-calling.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39276, CVSSv2 Score: 5.5
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in
- CVE: https://linux.oracle.com/cve/CVE-2024-39276.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39467, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on i_xattr_nid in
- CVE: https://linux.oracle.com/cve/CVE-2024-39467.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-39471.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39488, CVSSv2 Score:
- Description:
ARM related CVE.
- CVE:
- Patch: skipped/CVE-2024-39488.patch
- From:
- CVE-2024-33621, CVSSv2 Score: 4.4
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://linux.oracle.com/cve/CVE-2024-33621.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix gss_free_in_token_pages()
- CVE: https://linux.oracle.com/cve/CVE-2024-36288.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36288-sunrpc-fix-gss_free_in_token_pages.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
- CVE: https://linux.oracle.com/cve/CVE-2024-36288.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36288-sunrpc-fix-loop-termination-condition-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://linux.oracle.com/cve/CVE-2024-36270.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled-on-the.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://linux.oracle.com/cve/CVE-2024-38558.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38559, CVSSv2 Score: 4.4
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://linux.oracle.com/cve/CVE-2024-38559.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38635, CVSSv2 Score:
- Description:
soundwire: Skipped as code which CVE fixes doesn't exists in older releaes
- CVE:
- Patch: skipped/CVE-2024-38635.patch
- From:
- CVE-2024-39301, CVSSv2 Score: 5.5
- Description:
net/9p: fix uninit-value in p9_client_rpc()
- CVE: https://linux.oracle.com/cve/CVE-2024-39301.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39301-net-9p-fix-uninit-value-in-p9-client-rpc.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38615, CVSSv2 Score: 5.5
- Description:
cpufreq: exit() callback is optional
- CVE: https://linux.oracle.com/cve/CVE-2024-38615.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38613, CVSSv2 Score:
- Description:
Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38613.patch
- From:
- CVE-2024-38589, CVSSv2 Score: 5.5
- Description:
netrom: fix possible dead-lock in nr_rt_ioctl()
- CVE: https://linux.oracle.com/cve/CVE-2024-38589.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38589-netrom-fix-possible-dead-lock-in-nr-rt-ioctl.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38627, CVSSv2 Score: 5.5
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-38627.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39292, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-38621, CVSSv2 Score: 5.5
- Description:
media: stk1160: fix bounds checking in stk1160_copy_video()
- CVE: https://linux.oracle.com/cve/CVE-2024-38621.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38621-media-stk1160-fix-bounds-checking-in-stk1160-copy-video.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39489, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix memleak in seg6_hmac_init_algo
- CVE: https://linux.oracle.com/cve/CVE-2024-39489.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39489-ipv6-sr-fix-memleak-in-seg6-hmac-init-algo.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38780, CVSSv2 Score: 5.5
- Description:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
- CVE: https://linux.oracle.com/cve/CVE-2024-38780.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38780-dma-buf-sw-sync-don-t-enable-irq-from-sync-print-obj.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-40958, CVSSv2 Score: 7.8
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://linux.oracle.com/cve/CVE-2024-40958.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41049, CVSSv2 Score: 7.8
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://linux.oracle.com/cve/CVE-2024-41049.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2023-52628, CVSSv2 Score: 7.0
- Description:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
- CVE: https://linux.oracle.com/cve/CVE-2023-52628.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2023-52628-netfilter-nftables-exthdr-fix-4-byte-stack-oob-write.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42094, CVSSv2 Score: 7.8
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42094.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39487, CVSSv2 Score: 7.1
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://linux.oracle.com/cve/CVE-2024-39487.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41046, CVSSv2 Score: 7.8
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://linux.oracle.com/cve/CVE-2024-41046.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach-5.4.17-2136.334.6.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42104, CVSSv2 Score: 7.8
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://linux.oracle.com/cve/CVE-2024-42104.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2022-3567, CVSSv2 Score: 6.4
- Description:
ipv6: annotate some data-races around sk->sk_prot
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2022-3567-ipv6-annotate-some-data-races-around-sk-sk_prot.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2022-3567, CVSSv2 Score: 6.4
- Description:
ipv6: Fix data races around sk->sk_prot.
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2022-3567-ipv6-fix-data-races-around-sk-sk_prot.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2022-3566, CVSSv2 Score: 7.1
- Description:
tcp: Fix data races around icsk->icsk_af_ops.
- CVE: https://linux.oracle.com/cve/CVE-2022-3566.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2022-3566-tcp-Fix-data-races-around-icsk-icsk_af_ops.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39469, CVSSv2 Score: 5.5
- Description:
nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors
- CVE: https://linux.oracle.com/cve/CVE-2024-39469.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39469-nilfs2-fix-nilfs-empty-dir-misjudgment-and-long-loop-on-5.4.17-2136.334.6.1.el8uek.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39499, CVSSv2 Score: 5.5
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://linux.oracle.com/cve/CVE-2024-39499.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39506, CVSSv2 Score: 5.5
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://linux.oracle.com/cve/CVE-2024-39506.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://linux.oracle.com/cve/CVE-2024-40904.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40932, CVSSv2 Score: 5.5
- Description:
drm/exynos/vidi: fix memory leak in .get_modes()
- CVE: https://linux.oracle.com/cve/CVE-2024-40932.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40932-drm-exynos-vidi-fix-memory-leak-in-get-modes.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://linux.oracle.com/cve/CVE-2024-40960.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40988, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40988.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41035, CVSSv2 Score: 5.5
- Description:
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
- CVE: https://linux.oracle.com/cve/CVE-2024-41035.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41035-usb-core-fix-duplicate-endpoint-bug-by-clearing-reserved.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41097, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://linux.oracle.com/cve/CVE-2024-41097.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42076, CVSSv2 Score: 5.5
- Description:
net: can: j1939: Initialize unused data in j1939_send_one()
- CVE: https://linux.oracle.com/cve/CVE-2024-42076.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42076-net-can-j1939-initialize-unused-data-in-j1939-send-one.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40943, CVSSv2 Score: 5.5
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://linux.oracle.com/cve/CVE-2024-40943.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40995, CVSSv2 Score: 5.5
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-40995.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://linux.oracle.com/cve/CVE-2024-41044.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42089, CVSSv2 Score: 5.5
- Description:
ASoC: fsl-asoc-card: set priv->pdev before using it
- CVE: https://linux.oracle.com/cve/CVE-2024-42089.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42089-asoc-fsl-asoc-card-set-priv-pdev-before-using-it.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
net: tcp: fix unexcepted socket die when snd_wnd is 0
- CVE: https://linux.oracle.com/cve/CVE-2024-41007.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41007-net-tcp-fix-unexcepted-socket-die-when-snd_wnd-is-0.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: use signed arithmetic in tcp_rtx_probe0_timed_out()
- CVE: https://linux.oracle.com/cve/CVE-2024-41007.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41007-tcp-use-signed-arithmetic-in-tcp_rtx_probe0_timed_out.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: avoid too many retransmit packets
- CVE: https://linux.oracle.com/cve/CVE-2024-41007.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41007-tcp-avoid-too-many-retransmit-packets.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://linux.oracle.com/cve/CVE-2024-42096.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40978, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://linux.oracle.com/cve/CVE-2024-40978.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42106, CVSSv2 Score: 5.5
- Description:
inet_diag: Initialize pad field in struct inet_diag_req_v2
- CVE: https://linux.oracle.com/cve/CVE-2024-42106.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42106-inet-diag-initialize-pad-field-in-struct-inet-diag-req-v2.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40987, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40987.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40987-drm-amdgpu-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-36894, CVSSv2 Score:
- Description:
USB composite function controllers related patch
- CVE:
- Patch: skipped/CVE-2024-36894.patch
- From:
- CVE-2024-36974, CVSSv2 Score: 6.1
- Description:
net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://linux.oracle.com/cve/CVE-2024-36974.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-36974-net-sched-taprio-always-validate-tca-taprio-attr-priomap.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://linux.oracle.com/cve/CVE-2024-39501.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
driver core: Fix uevent_show() vs driver detach race
- CVE: https://linux.oracle.com/cve/CVE-2024-39501.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39501-driver-core-fix-uevent_show-vs-driver-detach-race.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39505, CVSSv2 Score:
- Description:
ARM related patch
- CVE:
- Patch: skipped/CVE-2024-39505.patch
- From:
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://linux.oracle.com/cve/CVE-2024-40959.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41034, CVSSv2 Score:
- Description:
nilfs2 related patch
- CVE:
- Patch: skipped/CVE-2024-41034.patch
- From:
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://linux.oracle.com/cve/CVE-2024-41041.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42097, CVSSv2 Score: 5.5
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://linux.oracle.com/cve/CVE-2024-42097.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42105, CVSSv2 Score:
- Description:
nilfs2 related patch
- CVE:
- Patch: skipped/CVE-2024-42105.patch
- From:
- CVE-2024-42223, CVSSv2 Score: 5.5
- Description:
media: dvb-frontends: tda10048: Fix integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-42223.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42223-media-dvb-frontends-tda10048-fix-integer-overflow.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40934, CVSSv2 Score: 5.5
- Description:
HID: logitech-dj: Fix memory leak in
- CVE: https://linux.oracle.com/cve/CVE-2024-40934.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40934-hid-logitech-dj-fix-memory-leak-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40945, CVSSv2 Score: 5.5
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-40945.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41022, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://linux.oracle.com/cve/CVE-2024-41022.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41022-drm-amdgpu-fix-signedness-bug-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41095, CVSSv2 Score: 5.5
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-41095.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41095-drm-nouveau-dispnv04-fix-null-pointer-dereference-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42087, CVSSv2 Score: 5.5
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
- CVE: https://linux.oracle.com/cve/CVE-2024-42087.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42101, CVSSv2 Score: 5.5
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42101.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42119, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Skip finding free audio for unknown engine_id
- CVE: https://linux.oracle.com/cve/CVE-2024-42119.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42119-drm-amd-display-skip-finding-free-audio-for-unknown.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-37078, CVSSv2 Score:
- Description:
nilfs2 is not enabled
- CVE:
- Patch: skipped/CVE-2024-37078.patch
- From:
- CVE-2024-39509, CVSSv2 Score: 5.5
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://linux.oracle.com/cve/CVE-2024-39509.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40901, CVSSv2 Score: 5.5
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://linux.oracle.com/cve/CVE-2024-40901.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://linux.oracle.com/cve/CVE-2024-40912.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40912-wifi-mac80211-fix-deadlock-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40941, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://linux.oracle.com/cve/CVE-2024-40941.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40942, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://linux.oracle.com/cve/CVE-2024-40942.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40968, CVSSv2 Score:
- Description:
MIPS related CVE.
- CVE:
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40993, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix suspicious rcu_dereference_protected()
- CVE: https://linux.oracle.com/cve/CVE-2024-40993.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40993-netfilter-ipset-fix-suspicious-rcu-dereference-protected.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42084, CVSSv2 Score: 5.5
- Description:
ftruncate: pass a signed offset
- CVE: https://linux.oracle.com/cve/CVE-2024-42084.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42127, CVSSv2 Score: 5.5
- Description:
drm/lima: fix shared irq handling on driver remove
- CVE: https://linux.oracle.com/cve/CVE-2024-42127.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42127-drm-lima-fix-shared-irq-handling-on-driver-remove.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42157, CVSSv2 Score:
- Description:
s390 architecture related CVE.
- CVE:
- Patch: skipped/CVE-2024-42157.patch
- From:
- CVE-2024-40905, CVSSv2 Score: 5.5
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://linux.oracle.com/cve/CVE-2024-40905.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40905-ipv6-fix-possible-race-in-fib6-drop-pcpu-from.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42070, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store
- CVE: https://linux.oracle.com/cve/CVE-2024-42070.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42070-netfilter-nf-tables-fully-validate-nft-data-value-on-store.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40963, CVSSv2 Score:
- Description:
Out of scope as the patch is for MIPS arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40963.patch
- From:
- CVE-2024-40974, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-42145, CVSSv2 Score: 5.5
- Description:
IB/core: Implement a limit on UMAD receive List
- CVE: https://linux.oracle.com/cve/CVE-2024-42145.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42145-ib-core-implement-a-limit-on-umad-receive-list.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42145, CVSSv2 Score: 5.5
- Description:
IB/core: Implement a limit on UMAD receive List (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2024-42145.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42145-ib-core-implement-a-limit-on-umad-receive-list-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-36978, CVSSv2 Score: 7.8
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://linux.oracle.com/cve/CVE-2024-36978.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40902, CVSSv2 Score: 7.8
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://linux.oracle.com/cve/CVE-2024-40902.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39495, CVSSv2 Score: 7.8
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://linux.oracle.com/cve/CVE-2024-39495.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42093, CVSSv2 Score: 7.8
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42093.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41087, CVSSv2 Score: 7.8
- Description:
ata: libata-core: Fix double free on error
- CVE: https://linux.oracle.com/cve/CVE-2024-41087.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42224, CVSSv2 Score: 7.8
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://linux.oracle.com/cve/CVE-2024-42224.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42148, CVSSv2 Score: 7.8
- Description:
bnx2x: Fix multiple UBSAN array-index-out-of-bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-42148.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42148-bnx2x-fix-multiple-ubsan-array-index-out-of-bounds-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40961, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-40961.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6-nh-init.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-40981, CVSSv2 Score: 5.5
- Description:
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
- CVE: https://linux.oracle.com/cve/CVE-2024-40981.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40981-batman-adv-bypass-empty-buckets-in-batadv-purge-orig-ref.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-41089, CVSSv2 Score: 5.5
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in
- CVE: https://linux.oracle.com/cve/CVE-2024-41089.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42092, CVSSv2 Score: 5.5
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://linux.oracle.com/cve/CVE-2024-42092.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42115, CVSSv2 Score: 5.5
- Description:
jffs2: Fix potential illegal address access in
- CVE: https://linux.oracle.com/cve/CVE-2024-42115.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42115-jffs2-fix-potential-illegal-address-access-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-39502, CVSSv2 Score:
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-39502.patch
- From:
- CVE-2024-41006, CVSSv2 Score: 5.5
- Description:
netrom: Fix a memory leak in nr_heartbeat_expiry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41006.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-41006-netrom-fix-a-memory-leak-in-nr-heartbeat-expiry.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42236, CVSSv2 Score: 5.5
- Description:
usb: gadget: configfs: Prevent OOB read/write in
- CVE: https://linux.oracle.com/cve/CVE-2024-42236.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42090, CVSSv2 Score: 5.5
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling
- CVE: https://linux.oracle.com/cve/CVE-2024-42090.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42086, CVSSv2 Score: 5.5
- Description:
iio: chemical: bme680: Fix overflows in compensate()
- CVE: https://linux.oracle.com/cve/CVE-2024-42086.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42086-iio-chemical-bme680-fix-overflows-in-compensate.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42124, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://linux.oracle.com/cve/CVE-2024-42124.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42143, CVSSv2 Score: 5.5
- Description:
orangefs: fix out-of-bounds fsid access
- CVE: https://linux.oracle.com/cve/CVE-2024-42143.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42143-orangefs-fix-out-of-bounds-fsid-access.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-36484, CVSSv2 Score:
- Description:
Patches a sleepable function, there is a small but non-zero risk of livepatching failure
- CVE:
- Patch: skipped/CVE-2024-36484.patch
- From:
- CVE-2024-40980, CVSSv2 Score: 5.5
- Description:
drop_monitor: replace spin_lock by raw_spin_lock
- CVE: https://linux.oracle.com/cve/CVE-2024-40980.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-40980-drop-monitor-replace-spin-lock-by-raw-spin-lock.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42153, CVSSv2 Score: 5.5
- Description:
i2c: pnx: Fix potential deadlock warning from
- CVE: https://linux.oracle.com/cve/CVE-2024-42153.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42153-i2c-pnx-fix-potential-deadlock-warning-from.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42153, CVSSv2 Score: 5.5
- Description:
i2c: pnx: Fix potential deadlock warning from
- CVE: https://linux.oracle.com/cve/CVE-2024-42153.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42153-i2c-pnx-fix-potential-deadlock-warning-from-kpatch.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-42232, CVSSv2 Score: 5.5
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://linux.oracle.com/cve/CVE-2024-42232.html
- Patch: oel8-uek6/5.4.17-2136.335.4.el8uek/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 5.4.17-2136.335.4.el8uek
- CVE-2024-49863, CVSSv2 Score: 5.5
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://linux.oracle.com/cve/CVE-2024-49863.html
- Patch: oel8-uek6/5.4.17-2136.335.4.1.el8uek/CVE-2024-49863-vhost-scsi-null-ptr-dereference-in-vhost_scsi_get_req-uek6.patch
- From: 5.4.17-2136.335.4.1.el8uek
- CVE-2024-42287, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Complete command early within lock
- CVE: https://linux.oracle.com/cve/CVE-2024-42287.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42287-scsi-qla2xxx-complete-command-early-within-lock.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44954, CVSSv2 Score: 5.5
- Description:
ALSA: line6: Fix racy access to midibuf
- CVE: https://linux.oracle.com/cve/CVE-2024-44954.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44954-alsa-line6-fix-racy-access-to-midibuf.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41070, CVSSv2 Score: 7.8
- Description:
KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
- CVE: https://linux.oracle.com/cve/CVE-2024-41070.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41070-kvm-ppc-book3s-hv-prevent-uaf-in-kvm-spapr-tce-attach-iommu-group.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://linux.oracle.com/cve/CVE-2024-42301.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41059, CVSSv2 Score: 7.1
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://linux.oracle.com/cve/CVE-2024-41059.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://linux.oracle.com/cve/CVE-2024-42313.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42285, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://linux.oracle.com/cve/CVE-2024-42285.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://linux.oracle.com/cve/CVE-2024-43858.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://linux.oracle.com/cve/CVE-2024-42284.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://linux.oracle.com/cve/CVE-2024-42280.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42271, CVSSv2 Score: 7.8
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://linux.oracle.com/cve/CVE-2024-42271.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://linux.oracle.com/cve/CVE-2024-43882.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://linux.oracle.com/cve/CVE-2024-46738.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41072, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://linux.oracle.com/cve/CVE-2024-41072.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42297, CVSSv2 Score: 5.5
- Description:
f2fs: fix to don't dirty inode for readonly filesystem
- CVE: https://linux.oracle.com/cve/CVE-2024-42297.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42297-f2fs-fix-to-don-t-dirty-inode-for-readonly-filesystem.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42292, CVSSv2 Score: 5.5
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://linux.oracle.com/cve/CVE-2024-42292.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43856, CVSSv2 Score: 5.5
- Description:
dma: fix call order in dmam_free_coherent
- CVE: https://linux.oracle.com/cve/CVE-2024-43856.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43856-dma-fix-call-order-in-dmam-free-coherent.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://linux.oracle.com/cve/CVE-2024-42131.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43867, CVSSv2 Score: 5.5
- Description:
drm/nouveau: prime: fix refcount underflow
- CVE: https://linux.oracle.com/cve/CVE-2024-43867.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43867-drm-nouveau-prime-fix-refcount-underflow.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44969, CVSSv2 Score:
- Description:
s390 arch not supported.
- CVE:
- Patch: skipped/CVE-2024-44969.patch
- From:
- CVE-2024-43894, CVSSv2 Score: 5.5
- Description:
drm/client: fix null pointer dereference in drm_client_modeset_probe
- CVE: https://linux.oracle.com/cve/CVE-2024-43894.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43894-drm-client-fix-null-pointer-dereference-in-drm-client-modeset-probe.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43890, CVSSv2 Score: 5.5
- Description:
tracing: Fix overflow in get_free_elt()
- CVE: https://linux.oracle.com/cve/CVE-2024-43890.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43890-tracing-fix-overflow-in-get-free-elt.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44944, CVSSv2 Score: 5.5
- Description:
netfilter: ctnetlink: use helper function to calculate expect ID
- CVE: https://linux.oracle.com/cve/CVE-2024-44944.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44944-netfilter-ctnetlink-use-helper-function-to-calculate-expect-id.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42289, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: During vport delete send async logout explicitly
- CVE: https://linux.oracle.com/cve/CVE-2024-42289.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42289-scsi-qla2xxx-during-vport-delete-send-async-logout-explicitly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43880.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43880.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning-kpatch.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43846, CVSSv2 Score: 5.5
- Description:
lib: objagg: Fix general protection fault
- CVE: https://linux.oracle.com/cve/CVE-2024-43846.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43846-lib-objagg-fix-general-protection-fault.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://linux.oracle.com/cve/CVE-2024-42265.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42283, CVSSv2 Score: 5.5
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://linux.oracle.com/cve/CVE-2024-42283.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41068, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-43830, CVSSv2 Score: 5.5
- Description:
leds: trigger: Unregister sysfs attributes before calling deactivate()
- CVE: https://linux.oracle.com/cve/CVE-2024-43830.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43830-leds-trigger-unregister-sysfs-attributes-before-calling-deactivate.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41015, CVSSv2 Score: 5.5
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41015.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://linux.oracle.com/cve/CVE-2024-41012.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41012-filelock-Remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41020, CVSSv2 Score: 5.5
- Description:
filelock: Fix fcntl/close race recovery compat path
- CVE: https://linux.oracle.com/cve/CVE-2024-41020.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41020-filelock-fix-fcntl-close-race-recovery-compat-path.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Correct the filelock owner in fcntl_setlk/fcntl_setlk64
- CVE: https://linux.oracle.com/cve/CVE-2024-41012.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41020-filelock-Correct-the-filelock-owner-in-fcntl_setlk-fcntl_setlk64.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42286, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: validate nvme_local_port correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-42286.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42286-scsi-qla2xxx-validate-nvme-local-port-correctly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42305, CVSSv2 Score: 5.5
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://linux.oracle.com/cve/CVE-2024-42305.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42308, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check for NULL pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-42308.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42308-drm-amd-display-check-for-null-pointer.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42309, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42309.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42309-drm-gma500-fix-null-pointer-dereference-in-psb-intel-lvds-get-modes.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43893, CVSSv2 Score: 5.5
- Description:
serial: core: check uartclk for zero to avoid divide by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-43893.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43893-serial-core-check-uartclk-for-zero-to-avoid-divide-by-zero.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43908, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix the null pointer dereference to ras_manager
- CVE: https://linux.oracle.com/cve/CVE-2024-43908.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43908-drm-amdgpu-fix-the-null-pointer-dereference-to-ras-manager.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44968, CVSSv2 Score:
- Description:
This CVE was introduced and fixed in the same kernel verison
- CVE:
- Patch: skipped/CVE-2024-44968.patch
- From:
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://linux.oracle.com/cve/CVE-2024-43871.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43883, CVSSv2 Score: 5.5
- Description:
usb: vhci-hcd: Do not drop references before new references are gained
- CVE: https://linux.oracle.com/cve/CVE-2024-43883.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43883-usb-vhci-hcd-do-not-drop-references-before-new-references-are-gained.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44935, CVSSv2 Score: 5.5
- Description:
sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE: https://linux.oracle.com/cve/CVE-2024-44935.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44935-sctp-fix-null-ptr-deref-in-reuseport-add-sock.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44948, CVSSv2 Score: 5.5
- Description:
x86/mtrr: Check if fixed MTRRs exist before saving them
- CVE: https://linux.oracle.com/cve/CVE-2024-44948.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44948-x86-mtrr-check-if-fixed-mtrrs-exist-before-saving-them.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42288, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix for possible memory corruption
- CVE: https://linux.oracle.com/cve/CVE-2024-42288.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42288-scsi-qla2xxx-fix-for-possible-memory-corruption.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43829, CVSSv2 Score: 5.5
- Description:
drm/qxl: Add check for drm_cvt_mode
- CVE: https://linux.oracle.com/cve/CVE-2024-43829.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43829-drm-qxl-add-check-for-drm-cvt-mode.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43861, CVSSv2 Score: 5.5
- Description:
net: usb: qmi_wwan: fix memory leak for not ip packets
- CVE: https://linux.oracle.com/cve/CVE-2024-43861.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43861-net-usb-qmi-wwan-fix-memory-leak-for-not-ip-packets.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43914, CVSSv2 Score: 5.5
- Description:
md/raid5: avoid BUG_ON() while continue reshape after reassembling
- CVE: https://linux.oracle.com/cve/CVE-2024-43914.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43914-md-raid5-avoid-bug-on-while-continue-reshape-after-reassembling.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44960, CVSSv2 Score: 5.5
- Description:
usb: gadget: core: Check for unset descriptor
- CVE: https://linux.oracle.com/cve/CVE-2024-44960.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44960-usb-gadget-core-check-for-unset-descriptor.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44965, CVSSv2 Score: 5.5
- Description:
x86/mm: Fix pti_clone_pgtable() alignment assumption
- CVE: https://linux.oracle.com/cve/CVE-2024-44965.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44965-x86-mm-fix-pti-clone-pgtable-alignment-assumption.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43860, CVSSv2 Score: 5.5
- Description:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
- CVE: https://linux.oracle.com/cve/CVE-2024-43860.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43860-remoteproc-imx-rproc-skip-over-memory-region-when-node-value-is-null-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42295, CVSSv2 Score: 5.5
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-42295.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42304, CVSSv2 Score: 5.5
- Description:
ext4: make sure the first directory block is not a hole
- CVE: https://linux.oracle.com/cve/CVE-2024-42304.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42304-ext4-make-sure-the-first-directory-block-is-not-a-hole.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41017, CVSSv2 Score: 5.5
- Description:
jfs: don't walk off the end of ealist
- CVE: https://linux.oracle.com/cve/CVE-2024-41017.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42310, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42310.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42310-drm-gma500-fix-null-pointer-dereference-in-cdv-intel-lvds-get-modes.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://linux.oracle.com/cve/CVE-2024-41042.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42281, CVSSv2 Score: 5.5
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://linux.oracle.com/cve/CVE-2024-42281.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43879, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()
- CVE: https://linux.oracle.com/cve/CVE-2024-43879.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43879-wifi-cfg80211-handle-2x996-ru-allocation-in-cfg80211-calculate-bitrate-he.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43839, CVSSv2 Score: 5.5
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://linux.oracle.com/cve/CVE-2024-43839.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43839-bna-adjust-name-buf-size-of-bna_tcb-and-bna_ccb-structures.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41081, CVSSv2 Score: 5.5
- Description:
ila: block BH in ila_output()
- CVE: https://linux.oracle.com/cve/CVE-2024-41081.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41065, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41064, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41063, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-41063.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42311, CVSSv2 Score: 5.5
- Description:
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
- CVE: https://linux.oracle.com/cve/CVE-2024-42311.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42311-hfs-fix-to-initialize-fields-of-hfs-inode-info-after-hfs-alloc-inode.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42276, CVSSv2 Score: 5.5
- Description:
nvme-pci: add missing condition check for existence of mapped data
- CVE: https://linux.oracle.com/cve/CVE-2024-42276.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42276-nvme-pci-add-missing-condition-check-for-existence-of-mapped-data.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42259, CVSSv2 Score: 5.5
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://linux.oracle.com/cve/CVE-2024-42259.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43841, CVSSv2 Score: 5.5
- Description:
wifi: virt_wifi: avoid reporting connection success with wrong SSID
- CVE: https://linux.oracle.com/cve/CVE-2024-43841.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43841, CVSSv2 Score: 5.5
- Description:
wifi: virt_wifi: avoid reporting connection success with wrong SSID
- CVE: https://linux.oracle.com/cve/CVE-2024-43841.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID-kpatch.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-26734, CVSSv2 Score:
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26734.patch
- From:
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: clarify a confusing comment for remap_pfn_range()
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-clarify-a-confusing-comment-for-remap_pfn_range.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: fix ambiguous comments for better code readability
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-fix-ambiguous-comments-for-better-code-readability.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm/memory.c: make remap_pfn_range() reject unaligned addr
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-memory.c-make-remap_pfn_range-reject-unaligned-addr.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: add remap_pfn_range_notrack
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-add-remap_pfn_range_notrack.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-46740, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://linux.oracle.com/cve/CVE-2024-46740.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46740-binder-fix-uaf-caused-by-offsets-overwrite.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://linux.oracle.com/cve/CVE-2024-44998.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-44999.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://linux.oracle.com/cve/CVE-2024-42228.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46674, CVSSv2 Score: 7.8
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://linux.oracle.com/cve/CVE-2024-46674.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://linux.oracle.com/cve/CVE-2024-46673.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://linux.oracle.com/cve/CVE-2024-46818.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46723.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46722.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46782, CVSSv2 Score: 7.8
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://linux.oracle.com/cve/CVE-2024-46782.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46782-ila-call-nf-unregister-net-hooks-sooner-kpatch.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46756.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://linux.oracle.com/cve/CVE-2024-46747.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://linux.oracle.com/cve/CVE-2024-46743.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46781, CVSSv2 Score:
- Description:
nilfs2 module is not included
- CVE:
- Patch: skipped/CVE-2024-46781.patch
- From:
- CVE-2024-44946, CVSSv2 Score:
- Description:
module is not included
- CVE:
- Patch: skipped/CVE-2024-44946.patch
- From:
- CVE-2024-45026, CVSSv2 Score:
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46844, CVSSv2 Score:
- Description:
Architecture um is not supported
- CVE:
- Patch: skipped/CVE-2024-46844.patch
- From:
- CVE-2024-46781, CVSSv2 Score: 5.5
- Description:
nilfs2: fix missing cleanup on rollforward recovery error
- CVE: https://linux.oracle.com/cve/CVE-2024-46781.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46781-Add-BUILD_BUD_ON-for-nilfs-module.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44946, CVSSv2 Score: 5.5
- Description:
kcm: Serialise kcm_sendmsg() for the same socket.
- CVE: https://linux.oracle.com/cve/CVE-2024-44946.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44946-Add-BUILD_BUG_ON-for-kcm-module.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44988, CVSSv2 Score: 5.5
- Description:
net: dsa: mv88e6xxx: Fix out-of-bound access
- CVE: https://linux.oracle.com/cve/CVE-2024-44988.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44988-net-dsa-mv88e6xxx-fix-out-of-bound-access.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46675, CVSSv2 Score: 5.5
- Description:
usb: dwc3: core: Prevent USB core invalid event buffer address access
- CVE: https://linux.oracle.com/cve/CVE-2024-46675.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46675-usb-dwc3-core-prevent-usb-core-invalid-event-buffer-address-access.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43853, CVSSv2 Score: 5.5
- Description:
cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-43853.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43853-cgroup-cpuset-prevent-uaf-in-proc-cpuset-show.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45008, CVSSv2 Score: 5.5
- Description:
Input: MT - limit max slots
- CVE: https://linux.oracle.com/cve/CVE-2024-45008.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45008-input-mt-limit-max-slots.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45025, CVSSv2 Score: 5.5
- Description:
fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
- CVE: https://linux.oracle.com/cve/CVE-2024-45025.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45025-fix-bitmap-corruption-on-close-range-with-close-range-unshare.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46714, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Skip wbscl_set_scaler_filter if filter is null
- CVE: https://linux.oracle.com/cve/CVE-2024-46714.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46714-drm-amd-display-skip-wbscl-set-scaler-filter-if-filter-is-null.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46719, CVSSv2 Score: 5.5
- Description:
usb: typec: ucsi: Fix null pointer dereference in trace
- CVE: https://linux.oracle.com/cve/CVE-2024-46719.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46719-usb-typec-ucsi-fix-null-pointer-dereference-in-trace.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47667, CVSSv2 Score: 5.5
- Description:
PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)
- CVE: https://linux.oracle.com/cve/CVE-2024-47667.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47667-pci-keystone-add-workaround-for-errata-i2037-am65x-sr-1-0.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://linux.oracle.com/cve/CVE-2024-44987.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://linux.oracle.com/cve/CVE-2024-41011.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://linux.oracle.com/cve/CVE-2024-46800.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://linux.oracle.com/cve/CVE-2024-46798.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46759.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46758.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46757.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://linux.oracle.com/cve/CVE-2024-46744.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46828, CVSSv2 Score: 5.5
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://linux.oracle.com/cve/CVE-2024-46828.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45006, CVSSv2 Score: 5.5
- Description:
xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
- CVE: https://linux.oracle.com/cve/CVE-2024-45006.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45006-xhci-fix-panther-point-null-pointer-deref-at-full-speed-re-enumeration.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-36028, CVSSv2 Score: 5.5
- Description:
mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio()
- CVE: https://linux.oracle.com/cve/CVE-2024-36028.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-36028-mm-hugetlb-fix-debug-locks-warn-on-1-when-dissolve-free-hugetlb-folio.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45016, CVSSv2 Score: 5.5
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://linux.oracle.com/cve/CVE-2024-45016.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46817, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
- CVE: https://linux.oracle.com/cve/CVE-2024-46817.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46817-drm-amd-display-stop-amdgpu-dm-initialize-when-stream-nums-greater-than-6.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46815, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
- CVE: https://linux.oracle.com/cve/CVE-2024-46815.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46815-drm-amd-display-check-num-valid-sets-before-accessing-reader-wm-sets.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://linux.oracle.com/cve/CVE-2024-43854.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46783, CVSSv2 Score: 5.5
- Description:
tcp_bpf: fix return value of tcp_bpf_sendmsg()
- CVE: https://linux.oracle.com/cve/CVE-2024-46783.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46783-tcp-bpf-fix-return-value-of-tcp-bpf-sendmsg.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46840, CVSSv2 Score: 5.5
- Description:
btrfs: clean up our handling of refs == 0 in snapshot delete
- CVE: https://linux.oracle.com/cve/CVE-2024-46840.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46840-btrfs-clean-up-our-handling-of-refs-0-in-snapshot-delete.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47668, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-47668.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47663, CVSSv2 Score: 5.5
- Description:
staging: iio: frequency: ad9834: Validate frequency parameter value
- CVE: https://linux.oracle.com/cve/CVE-2024-47663.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47663-staging-iio-frequency-ad9834-validate-frequency-parameter-value.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46679, CVSSv2 Score: 5.5
- Description:
ethtool: check device is present when getting link settings
- CVE: https://linux.oracle.com/cve/CVE-2024-46679.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46679-ethtool-check-device-is-present-when-getting-link-settings.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46755, CVSSv2 Score: 5.5
- Description:
wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
- CVE: https://linux.oracle.com/cve/CVE-2024-46755.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46755-wifi-mwifiex-do-not-return-unused-priv-in-mwifiex-get-priv-by-id.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46822, CVSSv2 Score: 5.5
- Description:
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
- CVE: https://linux.oracle.com/cve/CVE-2024-46822.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46822-arm64-acpi-harden-get-cpu-for-acpi-id-against-missing-cpu-entry.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-49958, CVSSv2 Score: 5.5
- Description:
ocfs2: reserve space for inline xattr before attaching reflink tree
- CVE: https://linux.oracle.com/cve/CVE-2024-49958.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-49958-ocfs2-reserve-space-for-inline-xattr-before-attaching-reflink-tree.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43884, CVSSv2 Score: 5.5
- Description:
Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-43884.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43884-bluetooth-mgmt-add-error-handling-to-pair-device.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://linux.oracle.com/cve/CVE-2024-41098.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43835, CVSSv2 Score: 5.5
- Description:
virtio_net: Fix napi_skb_cache_put warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43835.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43835-virtio-net-fix-napi-skb-cache-put-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
- CVE: https://linux.oracle.com/cve/CVE-2023-31083.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2023-31083-bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag-in-HCIUARTGETPROTO.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45028, CVSSv2 Score: 5.5
- Description:
mmc: mmc_test: Fix NULL dereference on allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-45028.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45028-mmc-mmc-test-fix-null-dereference-on-allocation-failure.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46677, CVSSv2 Score: 5.5
- Description:
gtp: fix a potential NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46677.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46677-gtp-fix-a-potential-null-pointer-dereference.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46685, CVSSv2 Score: 5.5
- Description:
pinctrl: single: fix potential NULL dereference in pcs_get_function()
- CVE: https://linux.oracle.com/cve/CVE-2024-46685.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46685-pinctrl-single-fix-potential-null-dereference-in-pcs-get-function.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46739, CVSSv2 Score: 5.5
- Description:
uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
- CVE: https://linux.oracle.com/cve/CVE-2024-46739.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46739-uio-hv-generic-fix-kernel-null-pointer-dereference-in-hv-uio-rescind.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46745, CVSSv2 Score: 5.5
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://linux.oracle.com/cve/CVE-2024-46745.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46750, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-46750.patch
- From:
- CVE-2024-46761, CVSSv2 Score:
- Description:
Out of scope: CVE patch is for PCI Hotplug Driver for PowerPC PowerNV platform
- CVE:
- Patch: skipped/CVE-2024-46761.patch
- From:
- CVE-2024-46771, CVSSv2 Score: 5.5
- Description:
can: bcm: Remove proc entry when dev is unregistered.
- CVE: https://linux.oracle.com/cve/CVE-2024-46771.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46771-can-bcm-remove-proc-entry-when-dev-is-unregistered.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45003, CVSSv2 Score: 5.5
- Description:
vfs: Don't evict inode under the inode lru traversing context
- CVE: https://linux.oracle.com/cve/CVE-2024-45003.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45003-vfs-don-t-evict-inode-under-the-inode-lru-traversing-context.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46676, CVSSv2 Score: 5.5
- Description:
nfc: pn533: Add poll mod list filling check
- CVE: https://linux.oracle.com/cve/CVE-2024-46676.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46676-nfc-pn533-add-poll-mod-list-filling-check.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://linux.oracle.com/cve/CVE-2024-46780.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44947, CVSSv2 Score: 5.5
- Description:
fuse: Initialize beyond-EOF page contents before setting uptodate
- CVE: https://linux.oracle.com/cve/CVE-2024-44947.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44947-fuse-initialize-beyond-eof-page-contents-before-setting-uptodate.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45021, CVSSv2 Score:
- Description:
Patches a function that is sleepable due to a call to vfs_poll
- CVE:
- Patch: skipped/CVE-2024-45021.patch
- From:
- CVE-2024-44995, CVSSv2 Score: 5.5
- Description:
net: hns3: fix a deadlock problem when config TC during resetting
- CVE: https://linux.oracle.com/cve/CVE-2024-44995.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44995-net-hns3-fix-a-deadlock-problem-when-config-tc-during-resetting.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46721, CVSSv2 Score: 5.5
- Description:
apparmor: fix possible NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46721.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46721-apparmor-fix-possible-null-pointer-dereference.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47669, CVSSv2 Score: 5.5
- Description:
nilfs2: fix state management in error path of log writing function
- CVE: https://linux.oracle.com/cve/CVE-2024-47669.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47669-nilfs2-fix-state-management-in-error-path-of-log-writing-function.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46777, CVSSv2 Score: 5.5
- Description:
udf: Avoid excessive partition lengths
- CVE: https://linux.oracle.com/cve/CVE-2024-46777.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46777-udf-avoid-excessive-partition-lengths.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46737, CVSSv2 Score: 5.5
- Description:
nvmet-tcp: fix kernel crash if commands allocation fails
- CVE: https://linux.oracle.com/cve/CVE-2024-46737.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46737-nvmet-tcp-fix-kernel-crash-if-commands-allocation-fails.patch
- From: 5.4.17-2136.337.5.el8uek
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 5.4.17/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A