- kernel-uek-5.15.0-202.135.2.el9uek (oel9-uek7)
- 5.15.0-209.161.7.1.el9uek
- 2024-08-16 12:02:19
- 2024-08-19 13:02:36
- K20240816_03
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://linux.oracle.com/cve/CVE-2020-26555.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2020-26555-Bluetooth-hci_event-Ignore-NULL-link-key.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: Reject connection with the device which has same BD_ADDR
- CVE: https://linux.oracle.com/cve/CVE-2020-26555.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2020-26555-Bluetooth-Reject-connection-with-the-device-which-ha.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-25775, CVSSv2 Score: 5.6
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://linux.oracle.com/cve/CVE-2023-25775.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-25775, CVSSv2 Score: 5.6
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://linux.oracle.com/cve/CVE-2023-25775.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-35827, CVSSv2 Score: 6.4
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://linux.oracle.com/cve/CVE-2023-35827.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-35827-ravb-Fix-use-after-free-issue-in-ravb_tx_timeout_wor.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-46813, CVSSv2 Score: 7
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://linux.oracle.com/cve/CVE-2023-46813.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-46813-x86-sev-Disable-MMIO-emulation-from-user-mode.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-46813, CVSSv2 Score: 7
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://linux.oracle.com/cve/CVE-2023-46813.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-46813-x86-sev-Check-IOBM-for-IOIO-exceptions-from-user-spa.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-46813, CVSSv2 Score: 7
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://linux.oracle.com/cve/CVE-2023-46813.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-46813-x86-sev-Check-for-user-space-IOIO-pointing-to-kernel.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2023-6111, CVSSv2 Score:
- Description:
Patch already exists in 5.15 kernels.
- CVE:
- Patch: skipped/CVE-2023-6111.patch
- From:
- CVE-2023-6622, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: bail out on mismatching dynset and set expressions
- CVE: https://linux.oracle.com/cve/CVE-2023-6622.html
- Patch: oel8-uek7/5.15.0-203.146.5.1.el8uek/CVE-2023-6622-netfilter-nf_tables-bail-out-on-mismatching-dynset-a.patch
- From: 5.15.0-203.146.5.1.el8uek
- CVE-2024-1085, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://linux.oracle.com/cve/CVE-2024-1085.html
- Patch: oel9-uek7/5.15.0-204.147.6.2.el9uek/CVE-2024-1085-netfilter-nf_tables-check-if-catch-all-set-element-is-active-in-next-generation.patch
- From: 5.15.0-204.147.6.2
- CVE-2024-1086, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel9-uek7/5.15.0-204.147.6.3.el9uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
- From: 5.15.0-204.147.6.3
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- N/A, CVSSv2 Score: N/A
- Description:
kpatch: entry: add asm headers
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-entry-add-asm-headers.patch
- From: N/A
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-uek.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: 5.15.0/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 5.15.0/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2