|
1 | | -CVE-2024-34156 |
2 | | -CVE-2023-28746 |
3 | | -CVE-2024-27403 |
4 | | -CVE-2023-52658 |
5 | | -CVE-2024-35989 |
6 | | -CVE-2021-47385 |
7 | | -CVE-2024-36889 |
8 | | -CVE-2024-36978 |
9 | | -CVE-2024-38556 |
10 | | -CVE-2024-39483 |
11 | | -CVE-2024-39502 |
12 | | -CVE-2024-40959 |
13 | | -CVE-2024-42079 |
14 | | -CVE-2024-42272 |
15 | | -CVE-2024-42284 |
16 | | -CVE-2024-9355 |
| 1 | +# CVE number, Errata details, Bugzilla |
| 2 | +CVE-2021-47385, kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field, https://bugzilla.redhat.com/show_bug.cgi?id=2282355 |
| 3 | +CVE-2023-28746, kernel: Local information disclosure on Intel(R) Atom(R) processors, https://bugzilla.redhat.com/show_bug.cgi?id=2270700 |
| 4 | +CVE-2023-52658, kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency", https://bugzilla.redhat.com/show_bug.cgi?id=2281149 |
| 5 | +CVE-2024-27403, kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow, https://bugzilla.redhat.com/show_bug.cgi?id=2281127 |
| 6 | +CVE-2024-34156, encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion, https://bugzilla.redhat.com/show_bug.cgi?id=2310528 |
| 7 | +CVE-2024-35989, kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms, https://bugzilla.redhat.com/show_bug.cgi?id=2281847 |
| 8 | +CVE-2024-36889, kernel: mptcp: ensure snd_nxt is properly initialized on connect, https://bugzilla.redhat.com/show_bug.cgi?id=2284571 |
| 9 | +CVE-2024-36978, kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune(), https://bugzilla.redhat.com/show_bug.cgi?id=2293078 |
| 10 | +CVE-2024-38556, kernel: net/mlx5: Add a timeout to acquire the command queue semaphore, https://bugzilla.redhat.com/show_bug.cgi?id=2293443 |
| 11 | +CVE-2024-39483, kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked, https://bugzilla.redhat.com/show_bug.cgi?id=2295921 |
| 12 | +CVE-2024-39502, kernel: ionic: fix use after netif_napi_del(), https://bugzilla.redhat.com/show_bug.cgi?id=2297474 |
| 13 | +CVE-2024-40959, kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr(), https://bugzilla.redhat.com/show_bug.cgi?id=2297543 |
| 14 | +CVE-2024-42079, kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush, https://bugzilla.redhat.com/show_bug.cgi?id=2300517 |
| 15 | +CVE-2024-42272, kernel: sched: act_ct: take care of padding in struct zones_ht_key, https://bugzilla.redhat.com/show_bug.cgi?id=2305417 |
| 16 | +CVE-2024-42284, kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error, https://bugzilla.redhat.com/show_bug.cgi?id=2305429 |
| 17 | +CVE-2024-6232, python: cpython: tarfile: ReDos via excessive backtracking while parsing header values, https://bugzilla.redhat.com/show_bug.cgi?id=2309426 |
| 18 | +CVE-2024-9355, Golang FIPS OpenSSL: zeroed buffer, https://bugzilla.redhat.com/show_bug.cgi?id=2315719 |
0 commit comments