|
1 | 1 | = RHEL 9 platform RPM updates |
2 | | -link:https://access.redhat.com/security/cve/CVE-2023-52439[CVE-2023-52439]:: |
3 | | -A flaw was found in the Linux kernel’s uio subsystem. A use-after-free memory flaw in the uio_open functionality allows a local user to crash or escalate their privileges on the system. |
| 2 | +link:https://access.redhat.com/security/cve/CVE-2024-37371[CVE-2024-37371]:: |
| 3 | +A vulnerability was found in Kerberos. This flaw is due to an issue with message token handling. |
4 | 4 |
|
5 | | -link:https://access.redhat.com/security/cve/CVE-2023-52884[CVE-2023-52884]:: |
6 | | -In the Linux kernel, the following vulnerability has been resolved: |
7 | | -Input: cyapa - add missing input core locking to suspend/resume functions |
| 5 | +link:https://access.redhat.com/security/cve/CVE-2024-37370[CVE-2024-37370]:: |
| 6 | +A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens. |
8 | 7 |
|
9 | | -link:https://access.redhat.com/security/cve/CVE-2024-26739[CVE-2024-26739]:: |
10 | | -A use-after-free flaw was found in net/sched/act_mirred.c in the Linux kernel. This may result in a crash. |
11 | | - |
12 | | -link:https://access.redhat.com/security/cve/CVE-2024-26929[CVE-2024-26929]:: |
13 | | -In the Linux kernel, the following vulnerability has been resolved: |
14 | | -scsi: qla2xxx: Fix double free of fcport |
15 | | - |
16 | | -link:https://access.redhat.com/security/cve/CVE-2024-26930[CVE-2024-26930]:: |
17 | | -A vulnerability was found in the Linux kernel. A potential double-free in the pointer ha->vp_map exists in the Linux kernel in drivers/scsi/qla2xxx/qla_os.c. |
18 | | - |
19 | | -link:https://access.redhat.com/security/cve/CVE-2024-26931[CVE-2024-26931]:: |
20 | | -In the Linux kernel, the following vulnerability has been resolved: |
21 | | -scsi: qla2xxx: Fix command flush on cable pull |
22 | | - |
23 | | -link:https://access.redhat.com/security/cve/CVE-2024-26947[CVE-2024-26947]:: |
24 | | -A flaw was found in the Linux kernel’s ARM memory management functionality, where certain memory layouts cause a kernel panic. This flaw allows an attacker who can specify or alter memory layouts to cause a denial of service. |
25 | | - |
26 | | -link:https://access.redhat.com/security/cve/CVE-2024-26991[CVE-2024-26991]:: |
27 | | -A flaw was found in the Linux Kernel. A lpage_info overflow can occur when checking attributes. This may lead to a crash. |
28 | | - |
29 | | -link:https://access.redhat.com/security/cve/CVE-2024-27022[CVE-2024-27022]:: |
30 | | -In the Linux kernel, the following vulnerability has been resolved: |
31 | | -fork: defer linking file vma until vma is fully initialized |
32 | | - |
33 | | -link:https://access.redhat.com/security/cve/CVE-2024-35895[CVE-2024-35895]:: |
34 | | -In the Linux kernel, the following vulnerability has been resolved: |
35 | | -bpf, sockmap: Prevent lock inversion deadlock in map delete elem |
36 | | - |
37 | | -link:https://access.redhat.com/security/cve/CVE-2024-36016[CVE-2024-36016]:: |
38 | | -In the Linux kernel, the following vulnerability has been resolved: |
39 | | -tty: n_gsm: fix possible out-of-bounds in gsm0_receive() |
40 | | - |
41 | | -link:https://access.redhat.com/security/cve/CVE-2024-36899[CVE-2024-36899]:: |
42 | | -In the Linux kernel, the following vulnerability has been resolved: |
43 | | -gpiolib: cdev: Fix use after free in lineinfo_changed_notify |
44 | | - |
45 | | -link:https://access.redhat.com/security/cve/CVE-2024-38562[CVE-2024-38562]:: |
46 | | -In the Linux kernel, the following vulnerability has been resolved: |
47 | | -wifi: nl80211: Avoid address calculations via out of bounds array indexing |
48 | | - |
49 | | -link:https://access.redhat.com/security/cve/CVE-2024-38570[CVE-2024-38570]:: |
50 | | -In the Linux kernel, the following vulnerability has been resolved: |
51 | | -gfs2: Fix potential glock use-after-free on unmount |
52 | | - |
53 | | -link:https://access.redhat.com/security/cve/CVE-2024-38573[CVE-2024-38573]:: |
54 | | -A NULL pointer dereference flaw was found in cppc_cpufreq_get_rate() in the Linux kernel. This issue may result in a crash. |
55 | | - |
56 | | -link:https://access.redhat.com/security/cve/CVE-2024-38601[CVE-2024-38601]:: |
57 | | -In the Linux kernel, the following vulnerability has been resolved: |
58 | | -ring-buffer: Fix a race between readers and resize checks |
59 | | - |
60 | | -link:https://access.redhat.com/security/cve/CVE-2024-38615[CVE-2024-38615]:: |
61 | | -In the Linux kernel, the following vulnerability has been resolved: |
62 | | -cpufreq: exit() callback is optional |
| 8 | +link:https://access.redhat.com/security/cve/CVE-2024-6923[CVE-2024-6923]:: |
| 9 | +A vulnerability was found in the email module that uses Python language. The email module doesn't properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity. |
63 | 10 |
|
64 | 11 | link:https://access.redhat.com/security/cve/CVE-2024-39331[CVE-2024-39331]:: |
65 | 12 | A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments. |
66 | 13 |
|
67 | | -link:https://access.redhat.com/security/cve/CVE-2024-40984[CVE-2024-40984]:: |
68 | | -In the Linux kernel, the following vulnerability has been resolved: |
69 | | -ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." |
70 | | - |
71 | | -link:https://access.redhat.com/security/cve/CVE-2024-41071[CVE-2024-41071]:: |
72 | | -An out-of-bounds buffer overflow has been found in the Linux kernel’s mac80211 subsystem when scanning for SSIDs. Address calculation using out-of-bounds array indexing could result in an attacker crafting an exploit, resulting in the complete compromise of a system. |
73 | | - |
74 | | -link:https://access.redhat.com/security/cve/CVE-2024-42225[CVE-2024-42225]:: |
75 | | -A potential flaw was found in the Linux kernel’s MediaTek WiFi, where it was reusing uninitialized data. This flaw allows a local user to gain unauthorized access to some data potentially. |
76 | | - |
77 | | -link:https://access.redhat.com/security/cve/CVE-2024-42246[CVE-2024-42246]:: |
78 | | -In the Linux kernel, the following vulnerability has been resolved: |
79 | | -net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket |
80 | | - |
81 | 14 | link:https://access.redhat.com/security/cve/CVE-2024-45490[CVE-2024-45490]:: |
82 | 15 | A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function. |
83 | 16 |
|
|
0 commit comments