ELSA-2024-12169 -- Oracle kernel_bpftool_perf_python3-perfID: oval:org.secpod.oval:def:1507338 | Date: (C)2024-02-28 (M)2024-04-29 |
Class: PATCH | Family: unix |
[4.18.0-513.18.0.1.el8_9.OL8] - drivers: net: slip: fix NPD bug in sl_tx_timeout {CVE-2022-41858} - nfp: fix use-after-free in area_cache_get {CVE-2022-3545} - HID: check empty report_list in hid_validate_values {CVE-2023-1073} - Fix double fget in vhost_net_set_backend {CVE-2023-1838} - can: af_can: fix NULL pointer dereference in can_rcv_filter {CVE-2023-2166} - net: sched: sch_qfq: Fix UAF in qfq_dequeue {CVE-2023-4921} - perf: Disallow mis-matched inherited group reads {CVE-2023-5717} - perf/core: Fix potential NULL deref {CVE-2023-5717} - nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length {CVE-2023-6536 CVE-2023-6535 CVE-2023-6356} - nvmet-tcp: fix a crash in nvmet_req_complete {CVE-2023-6536 CVE-2023-6535 CVE-2023-6356} - nvmet-tcp: remove boilerplate code {CVE-2023-6536 CVE-2023-6535 CVE-2023-6356} - nvmet-tcp: Fix the H2C expected PDU len calculation {CVE-2023-6536 CVE-2023-6535 CVE-2023-6356} - smb: client: fix potential OOB in cifs_dump_detail {CVE-2023-6610} - smb: client: fix potential OOB in smb2_dump_detail {CVE-2023-6610} - smb: client: fix OOB in smbCalcSize {CVE-2023-6606} - net: tls, update curr on splice as well {CVE-2024-0646} - netfilter: nft_set_pipapo: skip inactive elements during set walk {CVE-2023-6817} - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283} - igb: set max size RX buffer when store bad packet is enabled {CVE-2023-45871}
Product: |
kernel |
bpftool |
perf |
python3-perf |