exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2024-9315-03

Red Hat Security Advisory 2024-9315-03
Posted Nov 13, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9315-03 - An update for kernel is now available for Red Hat Enterprise Linux 9. Issues addressed include buffer overflow, denial of service, double free, information leakage, integer overflow, memory leak, null pointer, out of bounds access, out of bounds read, remote file inclusion, and use-after-free vulnerabilities.

tags | advisory, remote, denial of service, overflow, kernel, vulnerability, memory leak, file inclusion
systems | linux, redhat
advisories | CVE-2019-25162
SHA-256 | 32308f49513c3b581bb9c141ba5087f4778c169dc1ab2498edc6b4de6282aef1

Red Hat Security Advisory 2024-9315-03

Change Mirror Download


The following advisory data is extracted from:

https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9315.json

Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.

- Packet Storm Staff




====================================================================
Red Hat Security Advisory

Synopsis: Moderate: kernel security update
Advisory ID: RHSA-2024:9315-03
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2024:9315
Issue date: 2024-11-13
Revision: 03
CVE Names: CVE-2019-25162
====================================================================

Summary:

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.




Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS) (CVE-2020-10135)

* kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340)

* kernel: use-after-free in cec_queue_msg_fh (CVE-2024-23848)

* kernel: stack overflow problem in Open vSwitch kernel module leading to DoS (CVE-2024-1151)

* kernel: crash due to a missing check for leb_size (CVE-2024-25739)

* kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach (CVE-2024-26591)

* kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)

* kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)

* kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS (CVE-2024-26589)

* kernel: iommu: Don't reserve 0-length IOVA region (CVE-2023-52455)

* kernel: bpf: fix check for attempt to corrupt spilled pointer (CVE-2023-52462)

* kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)

* kernel: PCI/ASPM: Fix deadlock when enabling ASPM (CVE-2024-26605)

* kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603)

* kernel: ext4: regenerate buddy after block freeing failed if under fc replay (CVE-2024-26601)

* kernel: out-of-bounds read in pci_dev_for_each_resource() (CVE-2023-52466)

* kernel:null pointer dereference in of_syscon_register() (CVE-2023-52467)

* kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857)

* kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function (CVE-2024-24858)

* kernel: use after free in i2c (CVE-2019-25162)

* kernel: NULL pointer dereference in zone registration error path (CVE-2023-52473)

* kernel: use-after-free in powermate_config_complete (CVE-2023-52475)

* kernel: x86/srso: Add SRSO mitigation for Hygon processors (CVE-2023-52482)

* kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477)

* kernel: NULL Pointer dereference bluetooth allows Overflow Buffers (CVE-2024-22099)

* kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)

* kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565)

* kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)

* kernel: ring-buffer: Do not attempt to read past \"commit\" (CVE-2023-52501)

* kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528)

* kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)

* kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)

* kernel: asix: fix uninit-value in asix_mdio_read() (CVE-2021-47101)

* kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations (CVE-2021-47098)

* kernel: powerpc/lib: Validate size for vector operations (CVE-2023-52606)

* kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)

* kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)

* kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() (CVE-2023-52585)

* kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code (CVE-2023-52498)

* kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)

* kernel: mm: migrate: fix getting incorrect page mapping during page migration (CVE-2023-52490)

* hw: arm64/sme: Always exit sme_alloc() early with existing storage (CVE-2024-26618)

* kernel: netfs, fscache: Prevent Oops in fscache_put_cache() (CVE-2024-26612)

* kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP (CVE-2024-26611)

* kernel: tcp: make sure init the accept_queue's spinlocks once (CVE-2024-26614)

* kernel: PM / devfreq: Fix buffer overflow in trans_stat_show (CVE-2023-52614)

* kernel: pstore/ram: Fix crash when setting number of cpus to an odd number (CVE-2023-52619)

* kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615)

* kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (CVE-2024-26641)

* kernel: nbd: always initialize struct msghdr completely (CVE-2024-26638)

* kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (CVE-2024-26631)

* kernel: tracing: Ensure visibility when inserting an element into tracing_map (CVE-2024-26645)

* kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface (CVE-2023-52625)

* kernel: drm/amd/display: Wake DMCUB before executing GPINT commands (CVE-2023-52624)

* kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)

* kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers (CVE-2023-52621)

* kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM (CVE-2024-26646)

* kernel: p2sb_bar() calls during PCI device probe (CVE-2024-26650)

* kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)

* kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 (CVE-2024-26660)

* kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (CVE-2024-26661)

* kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' (CVE-2024-26662)

* kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (CVE-2024-26663)

* kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)

* kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)

* kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD (CVE-2024-26670)

* kernel: drm/amdkfd: lock dependency warning with srcu (CVE-2023-52632)

* kernel: drm/amd/display: Fix disable_otg_wa logic (CVE-2023-52634)

* kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] (CVE-2023-52635)

* kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' (CVE-2024-26672)

* kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (CVE-2024-26674)

* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)

* kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section (CVE-2024-26678)

* kernel: inet: read sk->sk_family once in inet_recv_error() (CVE-2024-26679)

* kernel: net: atlantic: Fix DMA mapping for PTP hwts ring (CVE-2024-26680)

* kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (CVE-2023-52637)

* kernel: KVM: arm64: Fix circular locking dependency (CVE-2024-26691)

* kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats (CVE-2024-26686)

* kernel: drm/amd/display: Fix MST Null Ptr for RV (CVE-2024-26700)

* kernel: dpll: fix possible deadlock during netlink dump operation (CVE-2024-26725)

* kernel: nouveau: offload fence uevents work to workqueue (CVE-2024-26719)

* kernel: HID: i2c-hid-of: fix NULL-deref on failed power up (CVE-2024-26717)

* kernel: powerpc/kasan: Fix addr error caused by page alignment (CVE-2024-26712)

* kernel: mptcp: really cope with fastopen race (CVE-2024-26708)

* kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() (CVE-2024-26707)

* kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)

* kernel: drm/amd/display: fixed integer types and null check locations (CVE-2024-26767)

* kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (CVE-2024-26761)

* kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)

* kernel: md: Don't ignore suspended array in md_check_recovery() (CVE-2024-26758)

* kernel: md: Don't ignore read-only array in md_check_recovery() (CVE-2024-26757)

* kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (CVE-2024-26774)

* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)

* kernel: arp: Prevent overflow in arp_req_get(). (CVE-2024-26733)

* kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744)

* kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)

* kernel: net/sched: act_mirred: use the backlog for mirred ingress (CVE-2024-26740)

* kernel: dmaengine: idxd: Ensure safe user copy of completion record (CVE-2024-26746)

* kernel: net: veth: clear GRO when clearing XDP even when down (CVE-2024-26803)

* kernel: iommufd: Fix iopt_access_list_id overwrite bug (CVE-2024-26786)

* kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (CVE-2024-26785)

* kernel: mptcp: fix double-free on socket dismantle (CVE-2024-26782)

* kernel: vfio/pci: Create persistent INTx handler (CVE-2024-26812)

* kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ (CVE-2024-27437)

* kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check (CVE-2024-26815)

* kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185)

* kernel: nvme-fc: do not wait in vain when unloading module (CVE-2024-26846)

* kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)

* kernel: cachefiles: fix memory leak in cachefiles_add_cache() (CVE-2024-26840)

* kernel: RDMA/irdma: Fix KASAN issue with tasklet (CVE-2024-26838)

* kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload (CVE-2024-26837)

* kernel: netfilter: nf_tables: set dormant flag on hook register failure (CVE-2024-26835)

* kernel: iio: core: fix memleak in iio_device_register_sysfs (CVE-2023-52643)

* kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)

* kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)

* kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (CVE-2024-26903)

* kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901)

* kernel: md: fix kmemleak of rdev->serial (CVE-2024-26900)

* kernel: block: fix deadlock between bd_link_disk_holder and partition scan (CVE-2024-26899)

* kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (CVE-2024-26894)

* kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() (CVE-2024-26892)

* kernel: Bluetooth: btrtl: fix out of bounds memory access (CVE-2024-26890)

* kernel: Bluetooth: hci_core: Fix possible buffer overflow (CVE-2024-26889)

* kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() (CVE-2024-26882)

* kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)

* kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872)

* kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (CVE-2024-26870)

* kernel: hsr: Fix uninit-value access in hsr_get_node() (CVE-2024-26863)

* kernel: packet: annotate data-races around ignore_outgoing (CVE-2024-26862)

* kernel: wireguard: receive: annotate data-race around receiving_counter.counter (CVE-2024-26861)

* kernel: geneve: make sure to pull inner header in geneve_rx() (CVE-2024-26857)

* kernel: tracing/trigger: Fix to return error if failed to alloc snapshot (CVE-2024-26920)

* kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit (CVE-2024-26915)

* kernel: inet: inet_defrag: prevent sk release while still in use (CVE-2024-26921)

* kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly (CVE-2024-26922)

* kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924)

* kernel: ASoC: SOF: Add some bounds checking to firmware data (CVE-2024-26927)

* kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() (CVE-2024-26928)

* kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)

* kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (CVE-2024-26962)

* kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() (CVE-2024-26960)

* kernel: nfs: fix UAF in direct writes (CVE-2024-26958)

* kernel: net: esp: fix bad handling of pages from page_pool (CVE-2024-26953)

* kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list (CVE-2024-26951)

* kernel: wireguard: netlink: access device through ctx instead of peer (CVE-2024-26950)

* kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (CVE-2024-26940)

* kernel: drm/i915/vma: Fix UAF on destroy against retire race (CVE-2024-26939)

* kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (CVE-2024-26938)

* kernel: drm/i915/gt: Reset queue_priority_hint on parking (CVE-2024-26937)

* kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934)

* kernel: USB: core: Fix deadlock in port "disable" sysfs attribute (CVE-2024-26933)

* kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)

* kernel: netfilter: flowtable: incorrect pppoe tuple (CVE-2024-27015)

* kernel: net/mlx5e: Prevent deadlock while disabling aRFS (CVE-2024-27014)

* kernel: tun: limit printing rate when illegal packet received by tun dev (CVE-2024-27013)

* kernel: netfilter: nf_tables: restore set elements when delete set fails (CVE-2024-27012)

* kernel: netfilter: nf_tables: fix memleak in map from abort path (CVE-2024-27011)

* kernel: net/sched: Fix mirred deadlock on device recursion (CVE-2024-27010)

* kernel: clk: Get runtime PM before walking tree during disable_unused (CVE-2024-27004)

* kernel: clk: Get runtime PM before walking tree for clk_summary (CVE-2024-27003)

* kernel: KVM: x86/pmu: Disable support for adaptive PEBS (CVE-2024-26992)

* kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (CVE-2024-26990)

* kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() (CVE-2024-26989)

* kernel: init/main.c: Fix potential static_command_line memory overflow (CVE-2024-26988)

* kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled (CVE-2024-26987)

* kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)

* kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)

* kernel: powercap: intel_rapl: Fix a NULL pointer dereference (CVE-2024-26975)

* kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)

* kernel: nouveau: lock the client object tree. (CVE-2024-27062)

* kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (CVE-2024-27057)

* kernel: wifi: brcm80211: handle pmk_op allocation failure (CVE-2024-27048)

* kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (CVE-2024-27042)

* kernel: clk: Fix clk_core_get NULL dereference (CVE-2024-27038)

* kernel: nbd: null check for nla_nest_start (CVE-2024-27025)

* kernel: md: Fix missing release of 'active_io' for flush (CVE-2024-27023)

* kernel: iommu/vt-d: Fix NULL domain on device release (CVE-2024-27079)

* kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node (CVE-2023-52650)

* kernel: drm/vkms: Avoid reading beyond LUT array (CVE-2023-52649)

* kernel: pstore: inode: Only d_invalidate() is needed (CVE-2024-27389)

* kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)

* kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state (CVE-2023-52648)

* kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() (CVE-2022-48672)

* kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (CVE-2022-48703)

* kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit (CVE-2024-27395)

* kernel: io_uring: drop any code related to SCM_RIGHTS (CVE-2023-52656)

* kernel: dm-raid: really frozen sync_thread during suspend (CVE-2024-35794)

* kernel: md/md-bitmap: fix incorrect usage for sb_index (CVE-2024-35787)

* kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program (CVE-2024-27431)

* kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (CVE-2024-27414)

* kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410)

* kernel: mptcp: fix data races on remote_id (CVE-2024-27404)

* kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. (CVE-2024-27436)

* kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (CVE-2023-52659)

* kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs (CVE-2024-35795)

* kernel: wifi: mac80211: fix potential sta-link leak (CVE-2024-35838)

* kernel: net/mlx5e: fix a double-free in arfs_create_groups (CVE-2024-35835)

* kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails (CVE-2024-35831)

* kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (CVE-2024-35827)

* kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume (CVE-2024-35824)

* kernel: usb: udc: remove warning when queue disabled ep (CVE-2024-35822)

* kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (CVE-2024-35817)

* kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling (CVE-2024-35814)

* kernel: usb: cdc-wdm: close race between read and workqueue (CVE-2024-35812)

* kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory (CVE-2024-35810)

* kernel: PCI/PM: Drain runtime-idle callbacks before driver removal (CVE-2024-35809)

* kernel: md/dm-raid: don't call md_reap_sync_thread() directly (CVE-2024-35808)

* kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)

* kernel: dm snapshot: fix lockup in dm_exception_table_exit (CVE-2024-35805)

* kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)

* kernel: block: fix module reference leakage from bdev_open_by_dev error path (CVE-2024-35859)

* kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update (CVE-2024-35855)

* kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash (CVE-2024-35854)

* kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (CVE-2024-35853)

* kernel: irqchip/gic-v3-its: Prevent double free on error (CVE-2024-35847)

* kernel: iommu/vt-d: Use device rbtree in iopf reporting path (CVE-2024-35843)

* kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (CVE-2024-35840)

* kernel: calipso: fix memory leak in netlbl_calipso_add_pass() (CVE-2023-52698)

* kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL (CVE-2023-52697)

* kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init() (CVE-2023-52696)

* kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one() (CVE-2023-52690)

* kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels (CVE-2023-52689)

* kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686)

* kernel: ACPI: LPIT: Avoid u32 multiplication overflow (CVE-2023-52683)

* kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get() (CVE-2023-52680)

* kernel: of: Fix double free in of_parse_phandle_with_args_map (CVE-2023-52679)

* kernel: bpf: Guard stack limits against 32bit overflow (CVE-2023-52676)

* kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() (CVE-2023-52674)

* kernel: net: atlantic: eliminate double free in error handling logic (CVE-2023-52664)

* kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe() (CVE-2023-52663)

* kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (CVE-2023-52662)

* kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (CVE-2023-52661)

* kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)

* kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (CVE-2024-35928)

* kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (CVE-2024-35930)

* kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery (CVE-2024-35931)

* kernel: drm: Check output polling initialized before disabling (CVE-2024-35927)

* kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (CVE-2024-35913)

* kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks (CVE-2024-35912)

* kernel: tls: get psock ref after taking rxlock to avoid leak (CVE-2024-35908)

* kernel: bpf: Protect against int overflow for stack access size (CVE-2024-35905)

* kernel: selinux: avoid dereference of garbage after mount failure (CVE-2024-35904)

* kernel: netfilter: nf_tables: reject new basechain after table flag update (CVE-2024-35900)

* kernel: mptcp: prevent BPF accessing lowat from a subflow socket. (CVE-2024-35894)

* kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (CVE-2024-35892)

* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)

* kernel: ipv6: Fix infinite recursion in fib6_dump_done(). (CVE-2024-35886)

* kernel: io_uring/kbuf: hold io_buffer_list reference over mmap (CVE-2024-35880)

* kernel: of: module: prevent NULL pointer dereference in vsnprintf() (CVE-2024-35878)

* kernel: x86/mm/pat: fix VM_PAT handling in COW mappings (CVE-2024-35877)

* kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)

* kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios (CVE-2024-35872)

* kernel: smb: client: guarantee refcounted children from parent session (CVE-2024-35869)

* kernel: block: prevent division by zero in blk_rq_stat_sum() (CVE-2024-35925)

* kernel: smb: client: fix potential UAF in cifs_stats_proc_show() (CVE-2024-35867)

* kernel: usb: typec: ucsi: Limit read size on v1.2 (CVE-2024-35924)

* kernel: smb: client: fix potential UAF in cifs_dump_full_key() (CVE-2024-35866)

* kernel: io_uring: clear opcode specific data for an early failure (CVE-2024-35923)

* kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() (CVE-2024-35865)

* kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() (CVE-2024-35864)

* kernel: smb: client: fix potential UAF in is_valid_oplock_break() (CVE-2024-35863)

* kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() (CVE-2024-35862)

* kernel: randomize_kstack: Improve entropy diffusion (CVE-2024-35918)

* kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() (CVE-2024-35861)

* kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() (CVE-2024-35944)

* kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (CVE-2024-35942)

* kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939)

* kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB (CVE-2024-35938)

* kernel: wifi: rtw89: fix null pointer access when abort scan (CVE-2024-35946)

* kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue (CVE-2024-35991)

* kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS (CVE-2024-35983)

* kernel: raid1: fix use-after-free for original bio in raid1_write_request() (CVE-2024-35979)

* kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (CVE-2024-35976)

* kernel: geneve: fix header validation in geneve[6]_xmit_skb (CVE-2024-35973)

* kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959)

* kernel: iommu/vt-d: Fix WARN_ON in iommu probe path (CVE-2024-35957)

* kernel: scsi: sg: Avoid sg device teardown race (CVE-2024-35954)

* kernel: drm/ast: Fix soft lockup (CVE-2024-35952)

* kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex (CVE-2024-35950)

* kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage (CVE-2024-36006)

* kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses (CVE-2024-35995)

* kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI (CVE-2021-47429)

* kernel: powerpc/64s: fix program check interrupt emergency stack path (CVE-2021-47428)

* kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47386)

* kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384)

* kernel: lib/generic-radix-tree.c: Don't overflow in peek() (CVE-2021-47432)

* kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path (CVE-2023-52703)

* kernel: pstore/platform: Add check for kstrdup (CVE-2023-52869)

* kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size (CVE-2023-52762)

* kernel: nbd: fix uaf in nbd_open (CVE-2023-52837)

* kernel: mmc: sdio: fix possible resource leaks in some error paths (CVE-2023-52730)

* kernel: smb: client: fix potential deadlock when releasing mids (CVE-2023-52757)

* kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (CVE-2023-52819)

* kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls (CVE-2023-52788)

* kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET (CVE-2023-52813)

* kernel: drm/amdgpu: Fix potential null pointer derefernce (CVE-2023-52814)

* kernel: drm/radeon: possible buffer overflow (CVE-2023-52867)

* kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (CVE-2023-52817)

* kernel: spi: Fix null dereference on suspend (CVE-2023-52749)

* kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds (CVE-2023-52878)

* kernel: net/smc: avoid data corruption caused by decline (CVE-2023-52775)

* kernel: cpu/hotplug: Don't offline the last non-isolated CPU (CVE-2023-52831)

* kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (CVE-2023-52740)

* kernel: pwm: Fix double shift bug (CVE-2023-52756)

* kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811)

* kernel: atl1c: Work around the DMA RX overflow issue (CVE-2023-52834)

* kernel: perf: hisi: Fix use-after-free when register pmu fails (CVE-2023-52859)

* kernel: i2c: dev: copy userspace array safely (CVE-2023-52758)

* kernel: smb: client: fix use-after-free in smb2_query_info_compound() (CVE-2023-52751)

* kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (CVE-2023-52840)

* kernel: Bluetooth: btusb: Add date->evt_skb is NULL check (CVE-2023-52833)

* kernel: i2c: core: Run atomic i2c xfer when !preemptible (CVE-2023-52791)

* kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784)

* kernel: fbdev: Fix invalid page access after closing deferred I/O devices (CVE-2023-52731)

* kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() (CVE-2021-47457)

* kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline (CVE-2021-47454)

* kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells (CVE-2021-47497)

* kernel: usbnet: sanity check for maxpacket (CVE-2021-47495)

* kernel: igb: Fix string truncation warnings in igb_set_fw_version (CVE-2024-36010)

* kernel: aio: fix use-after-free due to missing POLLFREE handling (CVE-2021-47505)

* kernel: ppdev: Add an error check in register_device (CVE-2024-36015)

* kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (CVE-2024-36885)

* kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() (CVE-2024-36884)

* kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() (CVE-2024-36882)

* kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones (CVE-2024-36881)

* kernel: octeontx2-af: fix the double free in rvu_npc_freemem() (CVE-2024-36030)

* kernel: keys: Fix overwrite of key expiration on instantiation (CVE-2024-36031)

* kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() (CVE-2024-36028)

* kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload (CVE-2024-36022)

* kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (CVE-2024-36945)

* kernel: Reapply "drm/qxl: simplify qxl_fence_wait" (CVE-2024-36944)

* kernel: pinctrl: core: delete incorrect free in pinctrl_enable() (CVE-2024-36940)

* kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). (CVE-2024-36933)

* kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal (CVE-2024-36932)

* kernel: spi: fix null pointer dereference within spi_sync (CVE-2024-36930)

* kernel: ipv4: Fix uninit-value access in __ip_make_skb() (CVE-2024-36927)

* kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE (CVE-2024-36926)

* kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (CVE-2024-36920)

* kernel: block: fix overflow in blk_ioctl_discard() (CVE-2024-36917)

* kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (CVE-2024-36905)

* kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (CVE-2024-36902)

* kernel: USB: core: Fix access violation during port device removal (CVE-2024-36896)

* kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference (CVE-2024-36891)

* kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal (CVE-2024-36956)

* kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (CVE-2024-36955)

* kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). (CVE-2024-36939)

* kernel: ipv6: prevent NULL dereference in ip6_output() (CVE-2024-36901)

* kernel: thermal/debugfs: Fix two locking issues with thermal zone debug (CVE-2024-36961)

* kernel: drm/vmwgfx: Fix invalid reads in fence signaled events (CVE-2024-36960)

* kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() (CVE-2024-36967)

* kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command (CVE-2024-36977)

* kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (CVE-2024-36974)

* kernel: ALSA: timer: Set lower bound of start tick time (CVE-2024-38618)

* kernel: ALSA: core: Fix NULL module pointer assignment at card init (CVE-2024-38605)

* kernel: block: refine the EOF check in blkdev_iomap_begin (CVE-2024-38604)

* kernel: ALSA: Fix deadlocks with kctl removals at disconnection (CVE-2024-38600)

* kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598)

* kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (CVE-2024-38596)

* kernel: drm/amdgpu/mes: fix use-after-free issue (CVE-2024-38581)

* kernel: net/mlx5: Discard command completions in internal error (CVE-2024-38555)

* kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (CVE-2024-36477)

* kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (CVE-2024-38388)

* kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (CVE-2024-31076)

* kernel: soundwire: cadence: fix invalid PDI offset (CVE-2024-38635)

* kernel: vfio/pci: fix potential memory leak in vfio_intx_enable() (CVE-2024-38632)

* kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida (CVE-2024-38629)

* kernel: stm class: Fix a double free in stm_register_device() (CVE-2024-38627)

* kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (CVE-2024-39291)

* kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages (CVE-2024-39298)

* kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (CVE-2024-39276)

* kernel: drm/amdgpu: add error handle to avoid out-of-bounds (CVE-2024-39471)

* kernel: drm/i915/hwmon: Get rid of devm (CVE-2024-39479)

* kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (CVE-2024-39473)

* kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (CVE-2024-39474)

* kernel: efi/unaccepted: touch soft lockup during memory accept (CVE-2024-36936)

* kernel: drm/drm_file: Fix pid refcounting race (CVE-2024-39486)

* kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (CVE-2024-39488)

* kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (CVE-2024-39491)

* kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (CVE-2024-39497)

* kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (CVE-2024-39498)

* kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() (CVE-2024-39499)

* kernel: drivers: core: synchronize really_probe() and dev_uevent() (CVE-2024-39501)

* kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503)

* kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (CVE-2024-39508)

* kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (CVE-2024-40903)

* kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906)

* kernel: ionic: fix kernel panic in XDP_TX action (CVE-2024-40907)

* kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (CVE-2024-40913)

* kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (CVE-2024-40919)

* kernel: io_uring/rsrc: don't lock while !TASK_RUNNING (CVE-2024-40922)

* kernel: vmxnet3: disable rx data ring on dma allocation failure (CVE-2024-40923)

* kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924)

* kernel: block: fix request.queuelist usage in flush (CVE-2024-40925)

* kernel: wifi: cfg80211: validate HE operation element parsing (CVE-2024-40930)

* kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (CVE-2024-40940)

* kernel: iommu: Return right value in iommu_sva_bind_device() (CVE-2024-40945)

* kernel: mm/page_table_check: fix crash on ZONE_DEVICE (CVE-2024-40948)

* kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer (CVE-2024-40965)

* kernel: tty: add the option to have a tty reject a new ldisc (CVE-2024-40966)

* kernel: serial: imx: Introduce timeout when waiting on transmitter empty (CVE-2024-40967)

* kernel: drm/radeon: fix UBSAN warning in kv_dpm.c (CVE-2024-40988)

* kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown (CVE-2024-40989)

* kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (CVE-2024-40997)

* kernel: io_uring/sqpoll: work around a potential audit memory leak (CVE-2024-41001)

* kernel: net: hns3: fix kernel crash problem in concurrent scenario (CVE-2024-39507)

* kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (CVE-2024-40901)

* kernel: tcp: avoid too many retransmit packets (CVE-2024-41007)

* kernel: drm/amdgpu: change vm->task_info handling (CVE-2024-41008)

* kernel: vt_ioctl: fix array_index_nospec in vt_setactivate (CVE-2022-48804)

* kernel: bluetooth: race condition in sniff_{min,max}_interval_set() (CVE-2024-24859)

* kernel: filelock: Remove locks reliably when fcntl/close race is detected (CVE-2024-41012)

* kernel: filelock: Fix fcntl/close race recovery compat path (CVE-2024-41020)

* kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask (CVE-2024-41032)

* kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (CVE-2024-41038)

* kernel: firmware: cs_dsp: Fix overflow checking of wmfw header (CVE-2024-41039)

* kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)

* kernel: filelock: fix potential use-after-free in posix_lock_inode (CVE-2024-41049)

* kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (CVE-2024-41056)

* kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (CVE-2024-41057)

* kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (CVE-2024-41058)

* kernel: drm/radeon: check bo_va->bo is non-NULL before using it (CVE-2024-41060)

* kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (CVE-2024-41063)

* kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace (CVE-2024-41065)

* kernel: null_blk: fix validation of block size (CVE-2024-41077)

* kernel: nvmet: always initialize cqe.result (CVE-2024-41079)

* kernel: nvme-fabrics: use reserved tag for reg read/write command (CVE-2024-41082)

* kernel: cxl/region: Avoid null pointer dereference in region lookup (CVE-2024-41084)

* kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling (CVE-2024-41085)

* kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (CVE-2024-41089)

* kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092)

* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)

* kernel: drm/fbdev-dma: Only set smem_start is enable per module option (CVE-2024-41094)

* kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (CVE-2024-41095)

* kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070)

* kernel: nfsd: initialise nfsd_info.mutex early. (CVE-2024-42078)

* kernel: ftruncate: pass a signed offset (CVE-2024-42084)

* kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (CVE-2024-42090)

* kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (CVE-2024-42101)

* kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (CVE-2024-42114)

* kernel: drm/amdgpu: fix double free err_addr pointer warnings (CVE-2024-42123)

* kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible (CVE-2024-42124)

* kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (CVE-2024-42125)

* kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (CVE-2024-42132)

* kernel: Bluetooth: ISO: Check socket flag instead of hcon (CVE-2024-42141)

* kernel: tcp_metrics: validate source addr length (CVE-2024-42154)

* kernel: scsi: mpi3mr: Sanitise num_phys (CVE-2024-42159)

* kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (CVE-2024-42226)

* kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (CVE-2024-42228)

* kernel: firmware: cs_dsp: Validate payload length before processing block (CVE-2024-42237)

* kernel: firmware: cs_dsp: Return error if block header overflows file (CVE-2024-42238)

* kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation (CVE-2024-42240)

* kernel: Revert \"sched/fair: Make sure to try to detach at least one movable task\" (CVE-2024-42245)

* kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines (CVE-2024-42258)

* kernel: net/mlx5: Fix missing lock on sync reset reload (CVE-2024-42268)

* kernel: net/iucv: fix use after free in iucv_sock_close() (CVE-2024-42271)

* kernel: nvme-pci: add missing condition check for existence of mapped data (CVE-2024-42276)

* kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301)

* kernel: net: missing check virtio (CVE-2024-43817)

* kernel: nfs: pass explicit offset/count to trace events (CVE-2024-43826)

* kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() (CVE-2024-43830)

* kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CVE-2024-43842)

* kernel: dma: fix call order in dmam_free_coherent (CVE-2024-43856)

* kernel: s390/fpu: Re-add exception handling in load_fpu_state() (CVE-2024-43865)

* kernel: net/mlx5: Always drain health in shutdown callback (CVE-2024-43866)

* kernel: perf: Fix event leak upon exec and file release (CVE-2024-43869)

* kernel: perf: Fix event leak upon exit (CVE-2024-43870)

* kernel: wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (CVE-2024-43879)

* kernel: nommu: fix memory leak in do_mmap() error path (CVE-2023-52902)

* kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. (CVE-2022-48929)

* kernel: mm: list_lru: fix UAF for memory cgroup (CVE-2024-43888)

* kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892)

* kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (CVE-2024-43911)

* kernel: fuse: Initialize beyond-EOF page contents before setting uptodate (CVE-2024-44947)

* kernel: usb: gadget: core: Check for unset descriptor (CVE-2024-44960)

* kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption (CVE-2024-44965)

* kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970)

* kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (CVE-2024-44984)

* kernel: KVM: s390: fix validity interception issue when gisa is switched off (CVE-2024-45005)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.


Solution:

https://access.redhat.com/articles/11258



CVEs:

CVE-2019-25162

References:

https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1832397
https://bugzilla.redhat.com/show_bug.cgi?id=2257406
https://bugzilla.redhat.com/show_bug.cgi?id=2260038
https://bugzilla.redhat.com/show_bug.cgi?id=2262241
https://bugzilla.redhat.com/show_bug.cgi?id=2263879
https://bugzilla.redhat.com/show_bug.cgi?id=2265648
https://bugzilla.redhat.com/show_bug.cgi?id=2265650
https://bugzilla.redhat.com/show_bug.cgi?id=2265654
https://bugzilla.redhat.com/show_bug.cgi?id=2265657
https://bugzilla.redhat.com/show_bug.cgi?id=2265793
https://bugzilla.redhat.com/show_bug.cgi?id=2265798
https://bugzilla.redhat.com/show_bug.cgi?id=2265800
https://bugzilla.redhat.com/show_bug.cgi?id=2265831
https://bugzilla.redhat.com/show_bug.cgi?id=2265833
https://bugzilla.redhat.com/show_bug.cgi?id=2265836
https://bugzilla.redhat.com/show_bug.cgi?id=2266210
https://bugzilla.redhat.com/show_bug.cgi?id=2266212
https://bugzilla.redhat.com/show_bug.cgi?id=2266247
https://bugzilla.redhat.com/show_bug.cgi?id=2266249
https://bugzilla.redhat.com/show_bug.cgi?id=2266296
https://bugzilla.redhat.com/show_bug.cgi?id=2266363
https://bugzilla.redhat.com/show_bug.cgi?id=2266916
https://bugzilla.redhat.com/show_bug.cgi?id=2267028
https://bugzilla.redhat.com/show_bug.cgi?id=2267038
https://bugzilla.redhat.com/show_bug.cgi?id=2267701
https://bugzilla.redhat.com/show_bug.cgi?id=2267705
https://bugzilla.redhat.com/show_bug.cgi?id=2267724
https://bugzilla.redhat.com/show_bug.cgi?id=2267730
https://bugzilla.redhat.com/show_bug.cgi?id=2267782
https://bugzilla.redhat.com/show_bug.cgi?id=2267789
https://bugzilla.redhat.com/show_bug.cgi?id=2267797
https://bugzilla.redhat.com/show_bug.cgi?id=2267804
https://bugzilla.redhat.com/show_bug.cgi?id=2267916
https://bugzilla.redhat.com/show_bug.cgi?id=2267920
https://bugzilla.redhat.com/show_bug.cgi?id=2268293
https://bugzilla.redhat.com/show_bug.cgi?id=2268315
https://bugzilla.redhat.com/show_bug.cgi?id=2268317
https://bugzilla.redhat.com/show_bug.cgi?id=2268335
https://bugzilla.redhat.com/show_bug.cgi?id=2269063
https://bugzilla.redhat.com/show_bug.cgi?id=2269183
https://bugzilla.redhat.com/show_bug.cgi?id=2269187
https://bugzilla.redhat.com/show_bug.cgi?id=2269192
https://bugzilla.redhat.com/show_bug.cgi?id=2269201
https://bugzilla.redhat.com/show_bug.cgi?id=2269203
https://bugzilla.redhat.com/show_bug.cgi?id=2269211
https://bugzilla.redhat.com/show_bug.cgi?id=2270071
https://bugzilla.redhat.com/show_bug.cgi?id=2270084
https://bugzilla.redhat.com/show_bug.cgi?id=2270093
https://bugzilla.redhat.com/show_bug.cgi?id=2270097
https://bugzilla.redhat.com/show_bug.cgi?id=2270103
https://bugzilla.redhat.com/show_bug.cgi?id=2270133
https://bugzilla.redhat.com/show_bug.cgi?id=2271648
https://bugzilla.redhat.com/show_bug.cgi?id=2271682
https://bugzilla.redhat.com/show_bug.cgi?id=2271684
https://bugzilla.redhat.com/show_bug.cgi?id=2271688
https://bugzilla.redhat.com/show_bug.cgi?id=2271690
https://bugzilla.redhat.com/show_bug.cgi?id=2271788
https://bugzilla.redhat.com/show_bug.cgi?id=2271795
https://bugzilla.redhat.com/show_bug.cgi?id=2272692
https://bugzilla.redhat.com/show_bug.cgi?id=2272782
https://bugzilla.redhat.com/show_bug.cgi?id=2272784
https://bugzilla.redhat.com/show_bug.cgi?id=2272786
https://bugzilla.redhat.com/show_bug.cgi?id=2272788
https://bugzilla.redhat.com/show_bug.cgi?id=2272791
https://bugzilla.redhat.com/show_bug.cgi?id=2272795
https://bugzilla.redhat.com/show_bug.cgi?id=2272800
https://bugzilla.redhat.com/show_bug.cgi?id=2272804
https://bugzilla.redhat.com/show_bug.cgi?id=2272806
https://bugzilla.redhat.com/show_bug.cgi?id=2272808
https://bugzilla.redhat.com/show_bug.cgi?id=2272814
https://bugzilla.redhat.com/show_bug.cgi?id=2272818
https://bugzilla.redhat.com/show_bug.cgi?id=2272829
https://bugzilla.redhat.com/show_bug.cgi?id=2272836
https://bugzilla.redhat.com/show_bug.cgi?id=2272839
https://bugzilla.redhat.com/show_bug.cgi?id=2272842
https://bugzilla.redhat.com/show_bug.cgi?id=2273085
https://bugzilla.redhat.com/show_bug.cgi?id=2273098
https://bugzilla.redhat.com/show_bug.cgi?id=2273109
https://bugzilla.redhat.com/show_bug.cgi?id=2273113
https://bugzilla.redhat.com/show_bug.cgi?id=2273130
https://bugzilla.redhat.com/show_bug.cgi?id=2273143
https://bugzilla.redhat.com/show_bug.cgi?id=2273148
https://bugzilla.redhat.com/show_bug.cgi?id=2273158
https://bugzilla.redhat.com/show_bug.cgi?id=2273166
https://bugzilla.redhat.com/show_bug.cgi?id=2273168
https://bugzilla.redhat.com/show_bug.cgi?id=2273174
https://bugzilla.redhat.com/show_bug.cgi?id=2273185
https://bugzilla.redhat.com/show_bug.cgi?id=2273200
https://bugzilla.redhat.com/show_bug.cgi?id=2273204
https://bugzilla.redhat.com/show_bug.cgi?id=2273206
https://bugzilla.redhat.com/show_bug.cgi?id=2273208
https://bugzilla.redhat.com/show_bug.cgi?id=2273234
https://bugzilla.redhat.com/show_bug.cgi?id=2273242
https://bugzilla.redhat.com/show_bug.cgi?id=2273247
https://bugzilla.redhat.com/show_bug.cgi?id=2273260
https://bugzilla.redhat.com/show_bug.cgi?id=2273262
https://bugzilla.redhat.com/show_bug.cgi?id=2273268
https://bugzilla.redhat.com/show_bug.cgi?id=2273408
https://bugzilla.redhat.com/show_bug.cgi?id=2273425
https://bugzilla.redhat.com/show_bug.cgi?id=2273459
https://bugzilla.redhat.com/show_bug.cgi?id=2273461
https://bugzilla.redhat.com/show_bug.cgi?id=2273468
https://bugzilla.redhat.com/show_bug.cgi?id=2273650
https://bugzilla.redhat.com/show_bug.cgi?id=2273657
https://bugzilla.redhat.com/show_bug.cgi?id=2274478
https://bugzilla.redhat.com/show_bug.cgi?id=2274624
https://bugzilla.redhat.com/show_bug.cgi?id=2275558
https://bugzilla.redhat.com/show_bug.cgi?id=2275565
https://bugzilla.redhat.com/show_bug.cgi?id=2275573
https://bugzilla.redhat.com/show_bug.cgi?id=2275578
https://bugzilla.redhat.com/show_bug.cgi?id=2275580
https://bugzilla.redhat.com/show_bug.cgi?id=2275584
https://bugzilla.redhat.com/show_bug.cgi?id=2275624
https://bugzilla.redhat.com/show_bug.cgi?id=2275633
https://bugzilla.redhat.com/show_bug.cgi?id=2275635
https://bugzilla.redhat.com/show_bug.cgi?id=2275641
https://bugzilla.redhat.com/show_bug.cgi?id=2275645
https://bugzilla.redhat.com/show_bug.cgi?id=2275647
https://bugzilla.redhat.com/show_bug.cgi?id=2275650
https://bugzilla.redhat.com/show_bug.cgi?id=2275661
https://bugzilla.redhat.com/show_bug.cgi?id=2275666
https://bugzilla.redhat.com/show_bug.cgi?id=2275670
https://bugzilla.redhat.com/show_bug.cgi?id=2275672
https://bugzilla.redhat.com/show_bug.cgi?id=2275686
https://bugzilla.redhat.com/show_bug.cgi?id=2275694
https://bugzilla.redhat.com/show_bug.cgi?id=2275707
https://bugzilla.redhat.com/show_bug.cgi?id=2275711
https://bugzilla.redhat.com/show_bug.cgi?id=2275725
https://bugzilla.redhat.com/show_bug.cgi?id=2275727
https://bugzilla.redhat.com/show_bug.cgi?id=2275729
https://bugzilla.redhat.com/show_bug.cgi?id=2275737
https://bugzilla.redhat.com/show_bug.cgi?id=2275775
https://bugzilla.redhat.com/show_bug.cgi?id=2275790
https://bugzilla.redhat.com/show_bug.cgi?id=2275928
https://bugzilla.redhat.com/show_bug.cgi?id=2276665
https://bugzilla.redhat.com/show_bug.cgi?id=2277168
https://bugzilla.redhat.com/show_bug.cgi?id=2277844
https://bugzilla.redhat.com/show_bug.cgi?id=2277937
https://bugzilla.redhat.com/show_bug.cgi?id=2278169
https://bugzilla.redhat.com/show_bug.cgi?id=2278174
https://bugzilla.redhat.com/show_bug.cgi?id=2278178
https://bugzilla.redhat.com/show_bug.cgi?id=2278182
https://bugzilla.redhat.com/show_bug.cgi?id=2278193
https://bugzilla.redhat.com/show_bug.cgi?id=2278197
https://bugzilla.redhat.com/show_bug.cgi?id=2278200
https://bugzilla.redhat.com/show_bug.cgi?id=2278218
https://bugzilla.redhat.com/show_bug.cgi?id=2278220
https://bugzilla.redhat.com/show_bug.cgi?id=2278229
https://bugzilla.redhat.com/show_bug.cgi?id=2278231
https://bugzilla.redhat.com/show_bug.cgi?id=2278237
https://bugzilla.redhat.com/show_bug.cgi?id=2278240
https://bugzilla.redhat.com/show_bug.cgi?id=2278262
https://bugzilla.redhat.com/show_bug.cgi?id=2278266
https://bugzilla.redhat.com/show_bug.cgi?id=2278268
https://bugzilla.redhat.com/show_bug.cgi?id=2278270
https://bugzilla.redhat.com/show_bug.cgi?id=2278275
https://bugzilla.redhat.com/show_bug.cgi?id=2278277
https://bugzilla.redhat.com/show_bug.cgi?id=2278279
https://bugzilla.redhat.com/show_bug.cgi?id=2278291
https://bugzilla.redhat.com/show_bug.cgi?id=2278293
https://bugzilla.redhat.com/show_bug.cgi?id=2278316
https://bugzilla.redhat.com/show_bug.cgi?id=2278320
https://bugzilla.redhat.com/show_bug.cgi?id=2278322
https://bugzilla.redhat.com/show_bug.cgi?id=2278324
https://bugzilla.redhat.com/show_bug.cgi?id=2278327
https://bugzilla.redhat.com/show_bug.cgi?id=2278333
https://bugzilla.redhat.com/show_bug.cgi?id=2278350
https://bugzilla.redhat.com/show_bug.cgi?id=2278352
https://bugzilla.redhat.com/show_bug.cgi?id=2278356
https://bugzilla.redhat.com/show_bug.cgi?id=2278387
https://bugzilla.redhat.com/show_bug.cgi?id=2278406
https://bugzilla.redhat.com/show_bug.cgi?id=2278431
https://bugzilla.redhat.com/show_bug.cgi?id=2278447
https://bugzilla.redhat.com/show_bug.cgi?id=2278456
https://bugzilla.redhat.com/show_bug.cgi?id=2278484
https://bugzilla.redhat.com/show_bug.cgi?id=2278488
https://bugzilla.redhat.com/show_bug.cgi?id=2278492
https://bugzilla.redhat.com/show_bug.cgi?id=2278522
https://bugzilla.redhat.com/show_bug.cgi?id=2278524
https://bugzilla.redhat.com/show_bug.cgi?id=2278532
https://bugzilla.redhat.com/show_bug.cgi?id=2278537
https://bugzilla.redhat.com/show_bug.cgi?id=2278539
https://bugzilla.redhat.com/show_bug.cgi?id=2278939
https://bugzilla.redhat.com/show_bug.cgi?id=2278960
https://bugzilla.redhat.com/show_bug.cgi?id=2280440
https://bugzilla.redhat.com/show_bug.cgi?id=2280444
https://bugzilla.redhat.com/show_bug.cgi?id=2281045
https://bugzilla.redhat.com/show_bug.cgi?id=2281061
https://bugzilla.redhat.com/show_bug.cgi?id=2281069
https://bugzilla.redhat.com/show_bug.cgi?id=2281103
https://bugzilla.redhat.com/show_bug.cgi?id=2281113
https://bugzilla.redhat.com/show_bug.cgi?id=2281125
https://bugzilla.redhat.com/show_bug.cgi?id=2281141
https://bugzilla.redhat.com/show_bug.cgi?id=2281145
https://bugzilla.redhat.com/show_bug.cgi?id=2281155
https://bugzilla.redhat.com/show_bug.cgi?id=2281157
https://bugzilla.redhat.com/show_bug.cgi?id=2281165
https://bugzilla.redhat.com/show_bug.cgi?id=2281173
https://bugzilla.redhat.com/show_bug.cgi?id=2281183
https://bugzilla.redhat.com/show_bug.cgi?id=2281189
https://bugzilla.redhat.com/show_bug.cgi?id=2281192
https://bugzilla.redhat.com/show_bug.cgi?id=2281202
https://bugzilla.redhat.com/show_bug.cgi?id=2281207
https://bugzilla.redhat.com/show_bug.cgi?id=2281211
https://bugzilla.redhat.com/show_bug.cgi?id=2281215
https://bugzilla.redhat.com/show_bug.cgi?id=2281217
https://bugzilla.redhat.com/show_bug.cgi?id=2281219
https://bugzilla.redhat.com/show_bug.cgi?id=2281221
https://bugzilla.redhat.com/show_bug.cgi?id=2281225
https://bugzilla.redhat.com/show_bug.cgi?id=2281235
https://bugzilla.redhat.com/show_bug.cgi?id=2281243
https://bugzilla.redhat.com/show_bug.cgi?id=2281251
https://bugzilla.redhat.com/show_bug.cgi?id=2281253
https://bugzilla.redhat.com/show_bug.cgi?id=2281255
https://bugzilla.redhat.com/show_bug.cgi?id=2281268
https://bugzilla.redhat.com/show_bug.cgi?id=2281276
https://bugzilla.redhat.com/show_bug.cgi?id=2281282
https://bugzilla.redhat.com/show_bug.cgi?id=2281286
https://bugzilla.redhat.com/show_bug.cgi?id=2281288
https://bugzilla.redhat.com/show_bug.cgi?id=2281290
https://bugzilla.redhat.com/show_bug.cgi?id=2281303
https://bugzilla.redhat.com/show_bug.cgi?id=2281305
https://bugzilla.redhat.com/show_bug.cgi?id=2281311
https://bugzilla.redhat.com/show_bug.cgi?id=2281317
https://bugzilla.redhat.com/show_bug.cgi?id=2281324
https://bugzilla.redhat.com/show_bug.cgi?id=2281326
https://bugzilla.redhat.com/show_bug.cgi?id=2281332
https://bugzilla.redhat.com/show_bug.cgi?id=2281336
https://bugzilla.redhat.com/show_bug.cgi?id=2281356
https://bugzilla.redhat.com/show_bug.cgi?id=2281358
https://bugzilla.redhat.com/show_bug.cgi?id=2281360
https://bugzilla.redhat.com/show_bug.cgi?id=2281362
https://bugzilla.redhat.com/show_bug.cgi?id=2281510
https://bugzilla.redhat.com/show_bug.cgi?id=2281517
https://bugzilla.redhat.com/show_bug.cgi?id=2281519
https://bugzilla.redhat.com/show_bug.cgi?id=2281523
https://bugzilla.redhat.com/show_bug.cgi?id=2281526
https://bugzilla.redhat.com/show_bug.cgi?id=2281634
https://bugzilla.redhat.com/show_bug.cgi?id=2281636
https://bugzilla.redhat.com/show_bug.cgi?id=2281645
https://bugzilla.redhat.com/show_bug.cgi?id=2281651
https://bugzilla.redhat.com/show_bug.cgi?id=2281655
https://bugzilla.redhat.com/show_bug.cgi?id=2281664
https://bugzilla.redhat.com/show_bug.cgi?id=2281679
https://bugzilla.redhat.com/show_bug.cgi?id=2281684
https://bugzilla.redhat.com/show_bug.cgi?id=2281693
https://bugzilla.redhat.com/show_bug.cgi?id=2281697
https://bugzilla.redhat.com/show_bug.cgi?id=2281713
https://bugzilla.redhat.com/show_bug.cgi?id=2281718
https://bugzilla.redhat.com/show_bug.cgi?id=2281720
https://bugzilla.redhat.com/show_bug.cgi?id=2281725
https://bugzilla.redhat.com/show_bug.cgi?id=2281736
https://bugzilla.redhat.com/show_bug.cgi?id=2281742
https://bugzilla.redhat.com/show_bug.cgi?id=2281752
https://bugzilla.redhat.com/show_bug.cgi?id=2281754
https://bugzilla.redhat.com/show_bug.cgi?id=2281758
https://bugzilla.redhat.com/show_bug.cgi?id=2281760
https://bugzilla.redhat.com/show_bug.cgi?id=2281762
https://bugzilla.redhat.com/show_bug.cgi?id=2281763
https://bugzilla.redhat.com/show_bug.cgi?id=2281769
https://bugzilla.redhat.com/show_bug.cgi?id=2281773
https://bugzilla.redhat.com/show_bug.cgi?id=2281781
https://bugzilla.redhat.com/show_bug.cgi?id=2281783
https://bugzilla.redhat.com/show_bug.cgi?id=2281786
https://bugzilla.redhat.com/show_bug.cgi?id=2281807
https://bugzilla.redhat.com/show_bug.cgi?id=2281811
https://bugzilla.redhat.com/show_bug.cgi?id=2281817
https://bugzilla.redhat.com/show_bug.cgi?id=2281819
https://bugzilla.redhat.com/show_bug.cgi?id=2281833
https://bugzilla.redhat.com/show_bug.cgi?id=2281843
https://bugzilla.redhat.com/show_bug.cgi?id=2281863
https://bugzilla.redhat.com/show_bug.cgi?id=2281872
https://bugzilla.redhat.com/show_bug.cgi?id=2281884
https://bugzilla.redhat.com/show_bug.cgi?id=2281891
https://bugzilla.redhat.com/show_bug.cgi?id=2281923
https://bugzilla.redhat.com/show_bug.cgi?id=2281927
https://bugzilla.redhat.com/show_bug.cgi?id=2281933
https://bugzilla.redhat.com/show_bug.cgi?id=2281938
https://bugzilla.redhat.com/show_bug.cgi?id=2281942
https://bugzilla.redhat.com/show_bug.cgi?id=2281989
https://bugzilla.redhat.com/show_bug.cgi?id=2282088
https://bugzilla.redhat.com/show_bug.cgi?id=2282302
https://bugzilla.redhat.com/show_bug.cgi?id=2282304
https://bugzilla.redhat.com/show_bug.cgi?id=2282354
https://bugzilla.redhat.com/show_bug.cgi?id=2282356
https://bugzilla.redhat.com/show_bug.cgi?id=2282366
https://bugzilla.redhat.com/show_bug.cgi?id=2282612
https://bugzilla.redhat.com/show_bug.cgi?id=2282622
https://bugzilla.redhat.com/show_bug.cgi?id=2282623
https://bugzilla.redhat.com/show_bug.cgi?id=2282637
https://bugzilla.redhat.com/show_bug.cgi?id=2282640
https://bugzilla.redhat.com/show_bug.cgi?id=2282641
https://bugzilla.redhat.com/show_bug.cgi?id=2282646
https://bugzilla.redhat.com/show_bug.cgi?id=2282652
https://bugzilla.redhat.com/show_bug.cgi?id=2282653
https://bugzilla.redhat.com/show_bug.cgi?id=2282655
https://bugzilla.redhat.com/show_bug.cgi?id=2282670
https://bugzilla.redhat.com/show_bug.cgi?id=2282676
https://bugzilla.redhat.com/show_bug.cgi?id=2282679
https://bugzilla.redhat.com/show_bug.cgi?id=2282680
https://bugzilla.redhat.com/show_bug.cgi?id=2282690
https://bugzilla.redhat.com/show_bug.cgi?id=2282740
https://bugzilla.redhat.com/show_bug.cgi?id=2282741
https://bugzilla.redhat.com/show_bug.cgi?id=2282742
https://bugzilla.redhat.com/show_bug.cgi?id=2282743
https://bugzilla.redhat.com/show_bug.cgi?id=2282744
https://bugzilla.redhat.com/show_bug.cgi?id=2282745
https://bugzilla.redhat.com/show_bug.cgi?id=2282746
https://bugzilla.redhat.com/show_bug.cgi?id=2282748
https://bugzilla.redhat.com/show_bug.cgi?id=2282757
https://bugzilla.redhat.com/show_bug.cgi?id=2282762
https://bugzilla.redhat.com/show_bug.cgi?id=2282763
https://bugzilla.redhat.com/show_bug.cgi?id=2282772
https://bugzilla.redhat.com/show_bug.cgi?id=2282787
https://bugzilla.redhat.com/show_bug.cgi?id=2282901
https://bugzilla.redhat.com/show_bug.cgi?id=2282904
https://bugzilla.redhat.com/show_bug.cgi?id=2282918
https://bugzilla.redhat.com/show_bug.cgi?id=2282920
https://bugzilla.redhat.com/show_bug.cgi?id=2282950
https://bugzilla.redhat.com/show_bug.cgi?id=2283448
https://bugzilla.redhat.com/show_bug.cgi?id=2283786
https://bugzilla.redhat.com/show_bug.cgi?id=2284265
https://bugzilla.redhat.com/show_bug.cgi?id=2284269
https://bugzilla.redhat.com/show_bug.cgi?id=2284273
https://bugzilla.redhat.com/show_bug.cgi?id=2284277
https://bugzilla.redhat.com/show_bug.cgi?id=2284295
https://bugzilla.redhat.com/show_bug.cgi?id=2284410
https://bugzilla.redhat.com/show_bug.cgi?id=2284413
https://bugzilla.redhat.com/show_bug.cgi?id=2284427
https://bugzilla.redhat.com/show_bug.cgi?id=2284465
https://bugzilla.redhat.com/show_bug.cgi?id=2284468
https://bugzilla.redhat.com/show_bug.cgi?id=2284477
https://bugzilla.redhat.com/show_bug.cgi?id=2284488
https://bugzilla.redhat.com/show_bug.cgi?id=2284490
https://bugzilla.redhat.com/show_bug.cgi?id=2284494
https://bugzilla.redhat.com/show_bug.cgi?id=2284500
https://bugzilla.redhat.com/show_bug.cgi?id=2284502
https://bugzilla.redhat.com/show_bug.cgi?id=2284515
https://bugzilla.redhat.com/show_bug.cgi?id=2284519
https://bugzilla.redhat.com/show_bug.cgi?id=2284539
https://bugzilla.redhat.com/show_bug.cgi?id=2284545
https://bugzilla.redhat.com/show_bug.cgi?id=2284556
https://bugzilla.redhat.com/show_bug.cgi?id=2284567
https://bugzilla.redhat.com/show_bug.cgi?id=2284583
https://bugzilla.redhat.com/show_bug.cgi?id=2284586
https://bugzilla.redhat.com/show_bug.cgi?id=2284628
https://bugzilla.redhat.com/show_bug.cgi?id=2284634
https://bugzilla.redhat.com/show_bug.cgi?id=2290407
https://bugzilla.redhat.com/show_bug.cgi?id=2290408
https://bugzilla.redhat.com/show_bug.cgi?id=2292329
https://bugzilla.redhat.com/show_bug.cgi?id=2293000
https://bugzilla.redhat.com/show_bug.cgi?id=2293003
https://bugzilla.redhat.com/show_bug.cgi?id=2293329
https://bugzilla.redhat.com/show_bug.cgi?id=2293359
https://bugzilla.redhat.com/show_bug.cgi?id=2293361
https://bugzilla.redhat.com/show_bug.cgi?id=2293365
https://bugzilla.redhat.com/show_bug.cgi?id=2293367
https://bugzilla.redhat.com/show_bug.cgi?id=2293371
https://bugzilla.redhat.com/show_bug.cgi?id=2293408
https://bugzilla.redhat.com/show_bug.cgi?id=2293444
https://bugzilla.redhat.com/show_bug.cgi?id=2293639
https://bugzilla.redhat.com/show_bug.cgi?id=2293656
https://bugzilla.redhat.com/show_bug.cgi?id=2293684
https://bugzilla.redhat.com/show_bug.cgi?id=2293693
https://bugzilla.redhat.com/show_bug.cgi?id=2293696
https://bugzilla.redhat.com/show_bug.cgi?id=2293698
https://bugzilla.redhat.com/show_bug.cgi?id=2293700
https://bugzilla.redhat.com/show_bug.cgi?id=2294223
https://bugzilla.redhat.com/show_bug.cgi?id=2294268
https://bugzilla.redhat.com/show_bug.cgi?id=2294274
https://bugzilla.redhat.com/show_bug.cgi?id=2294313
https://bugzilla.redhat.com/show_bug.cgi?id=2296059
https://bugzilla.redhat.com/show_bug.cgi?id=2296064
https://bugzilla.redhat.com/show_bug.cgi?id=2296066
https://bugzilla.redhat.com/show_bug.cgi?id=2296278
https://bugzilla.redhat.com/show_bug.cgi?id=2296383
https://bugzilla.redhat.com/show_bug.cgi?id=2297057
https://bugzilla.redhat.com/show_bug.cgi?id=2297061
https://bugzilla.redhat.com/show_bug.cgi?id=2297469
https://bugzilla.redhat.com/show_bug.cgi?id=2297470
https://bugzilla.redhat.com/show_bug.cgi?id=2297471
https://bugzilla.redhat.com/show_bug.cgi?id=2297473
https://bugzilla.redhat.com/show_bug.cgi?id=2297475
https://bugzilla.redhat.com/show_bug.cgi?id=2297480
https://bugzilla.redhat.com/show_bug.cgi?id=2297487
https://bugzilla.redhat.com/show_bug.cgi?id=2297490
https://bugzilla.redhat.com/show_bug.cgi?id=2297491
https://bugzilla.redhat.com/show_bug.cgi?id=2297497
https://bugzilla.redhat.com/show_bug.cgi?id=2297503
https://bugzilla.redhat.com/show_bug.cgi?id=2297506
https://bugzilla.redhat.com/show_bug.cgi?id=2297507
https://bugzilla.redhat.com/show_bug.cgi?id=2297508
https://bugzilla.redhat.com/show_bug.cgi?id=2297509
https://bugzilla.redhat.com/show_bug.cgi?id=2297514
https://bugzilla.redhat.com/show_bug.cgi?id=2297524
https://bugzilla.redhat.com/show_bug.cgi?id=2297529
https://bugzilla.redhat.com/show_bug.cgi?id=2297532
https://bugzilla.redhat.com/show_bug.cgi?id=2297549
https://bugzilla.redhat.com/show_bug.cgi?id=2297550
https://bugzilla.redhat.com/show_bug.cgi?id=2297551
https://bugzilla.redhat.com/show_bug.cgi?id=2297572
https://bugzilla.redhat.com/show_bug.cgi?id=2297573
https://bugzilla.redhat.com/show_bug.cgi?id=2297581
https://bugzilla.redhat.com/show_bug.cgi?id=2297585
https://bugzilla.redhat.com/show_bug.cgi?id=2297702
https://bugzilla.redhat.com/show_bug.cgi?id=2297706
https://bugzilla.redhat.com/show_bug.cgi?id=2297909
https://bugzilla.redhat.com/show_bug.cgi?id=2298079
https://bugzilla.redhat.com/show_bug.cgi?id=2298140
https://bugzilla.redhat.com/show_bug.cgi?id=2298817
https://bugzilla.redhat.com/show_bug.cgi?id=2299452
https://bugzilla.redhat.com/show_bug.cgi?id=2300363
https://bugzilla.redhat.com/show_bug.cgi?id=2300398
https://bugzilla.redhat.com/show_bug.cgi?id=2300407
https://bugzilla.redhat.com/show_bug.cgi?id=2300408
https://bugzilla.redhat.com/show_bug.cgi?id=2300412
https://bugzilla.redhat.com/show_bug.cgi?id=2300422
https://bugzilla.redhat.com/show_bug.cgi?id=2300430
https://bugzilla.redhat.com/show_bug.cgi?id=2300431
https://bugzilla.redhat.com/show_bug.cgi?id=2300432
https://bugzilla.redhat.com/show_bug.cgi?id=2300434
https://bugzilla.redhat.com/show_bug.cgi?id=2300438
https://bugzilla.redhat.com/show_bug.cgi?id=2300440
https://bugzilla.redhat.com/show_bug.cgi?id=2300454
https://bugzilla.redhat.com/show_bug.cgi?id=2300456
https://bugzilla.redhat.com/show_bug.cgi?id=2300459
https://bugzilla.redhat.com/show_bug.cgi?id=2300480
https://bugzilla.redhat.com/show_bug.cgi?id=2300481
https://bugzilla.redhat.com/show_bug.cgi?id=2300486
https://bugzilla.redhat.com/show_bug.cgi?id=2300487
https://bugzilla.redhat.com/show_bug.cgi?id=2300488
https://bugzilla.redhat.com/show_bug.cgi?id=2300489
https://bugzilla.redhat.com/show_bug.cgi?id=2300490
https://bugzilla.redhat.com/show_bug.cgi?id=2300508
https://bugzilla.redhat.com/show_bug.cgi?id=2300516
https://bugzilla.redhat.com/show_bug.cgi?id=2300533
https://bugzilla.redhat.com/show_bug.cgi?id=2300552
https://bugzilla.redhat.com/show_bug.cgi?id=2301464
https://bugzilla.redhat.com/show_bug.cgi?id=2301477
https://bugzilla.redhat.com/show_bug.cgi?id=2301488
https://bugzilla.redhat.com/show_bug.cgi?id=2301489
https://bugzilla.redhat.com/show_bug.cgi?id=2301490
https://bugzilla.redhat.com/show_bug.cgi?id=2301497
https://bugzilla.redhat.com/show_bug.cgi?id=2301506
https://bugzilla.redhat.com/show_bug.cgi?id=2301522
https://bugzilla.redhat.com/show_bug.cgi?id=2301530
https://bugzilla.redhat.com/show_bug.cgi?id=2301544
https://bugzilla.redhat.com/show_bug.cgi?id=2303077
https://bugzilla.redhat.com/show_bug.cgi?id=2304187
https://bugzilla.redhat.com/show_bug.cgi?id=2306363
https://bugzilla.redhat.com/show_bug.cgi?id=2307861
https://bugzilla.redhat.com/show_bug.cgi?id=2307865
https://bugzilla.redhat.com/show_bug.cgi?id=2307884
https://bugzilla.redhat.com/show_bug.cgi?id=2309273
https://bugzilla.redhat.com/show_bug.cgi?id=2309791
https://bugzilla.redhat.com/show_bug.cgi?id=2309796
https://bugzilla.redhat.com/show_bug.cgi?id=2309801
https://bugzilla.redhat.com/show_bug.cgi?id=2309847
https://bugzilla.redhat.com/show_bug.cgi?id=2309868
https://issues.redhat.com/browse/RHEL-17714
https://issues.redhat.com/browse/RHEL-23575
https://issues.redhat.com/browse/RHEL-26081
https://issues.redhat.com/browse/RHEL-29437
https://issues.redhat.com/browse/RHEL-31876
https://issues.redhat.com/browse/RHEL-32199
https://issues.redhat.com/browse/RHEL-35853
https://issues.redhat.com/browse/RHEL-36182
https://issues.redhat.com/browse/RHEL-36224
https://issues.redhat.com/browse/RHEL-45158
https://issues.redhat.com/browse/RHEL-7990
https://issues.redhat.com/browse/RHEL-9096
https://issues.redhat.com/browse/RHEL-9148
https://issues.redhat.com/browse/RHEL-9429

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close