CVE-2025-31335
Severity: moderate
Released on: 28/03/2025
Advisory:
Bugzilla: 2355681
Bugzilla Description: opensaml-core: Signature Forgery in OpenSAML
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-347
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2025-2901
Severity: moderate
Released on: 28/03/2025
Advisory:
Bugzilla: 2355685
Bugzilla Description: org.jboss.hal-hal-parent: Stored Cross-Site Scripting (XSS) in JBoss EAP Management Console
CVSS Score:
CVSSv3 Score: 4.6
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2024-12905
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355460
Bugzilla Description: tar-fs: link following and path traversal via maliciously crafted tar file
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: (CWE-22|CWE-59)
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,OpenShift Serverless,Red Hat Developer Hub,Red Hat Fuse 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2025-2857
Severity:
Released on: 27/03/2025
Advisory:
Bugzilla: 2355327
Bugzilla Description: firefox: Firefox IPC sandbox escape on windows
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21871
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355333
Bugzilla Description: kernel: tee: optee: Fix supplicant wait loop
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-31181
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355338
Bugzilla Description: gnuplot: gnuplot segmentation fault on X11_graphics
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-31180
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355339
Bugzilla Description: gnuplot: gnuplot segmentation fault on CANVAS_text
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-31179
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355340
Bugzilla Description: gnuplot: gnuplot segmentation fault on xstrftime
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-31178
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355341
Bugzilla Description: gnuplot: gnuplot segmentation fault on GetAnnotateString
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-31177
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355342
Bugzilla Description: gnuplot: gnuplot heap-buffer overflow on utf8_copy_one
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-122
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-31176
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355343
Bugzilla Description: gnuplot: gnuplot segmentation fault on plot3d_points
CVSS Score:
CVSSv3 Score: 6.2
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,
Full Details
CVE document


CVE-2025-21885
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355396
Bugzilla Description: kernel: RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21890
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355397
Bugzilla Description: kernel: idpf: fix checksums set in idpf_rx_rsc()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21884
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355399
Bugzilla Description: kernel: net: better track kernel sockets lifetime
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21887
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355405
Bugzilla Description: kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21888
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355410
Bugzilla Description: kernel: RDMA/mlx5: Fix a WARN during dereg_mr for DM type
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21876
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355411
Bugzilla Description: kernel: iommu/vt-d: Fix suspicious RCU usage
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21892
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355412
Bugzilla Description: kernel: RDMA/mlx5: Fix the recovery flow of the UMR QP
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21883
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355415
Bugzilla Description: kernel: ice: Fix deinitializing VF in error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21881
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355422
Bugzilla Description: kernel: uprobes: Reject the shared zeropage in uprobe_write_opcode()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52988
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355431
Bugzilla Description: kernel: ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53006
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355432
Bugzilla Description: kernel: cifs: Fix oops due to uncleared server->smbd_conn in reconnect
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52973
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355433
Bugzilla Description: kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53020
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355434
Bugzilla Description: kernel: l2tp: close all race conditions in l2tp_tunnel_register()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49747
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355435
Bugzilla Description: kernel: erofs/zmap.c: Fix incorrect offset calculation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53033
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355437
Bugzilla Description: kernel: netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52996
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355438
Bugzilla Description: kernel: ipv4: prevent potential spectre v1 gadget in fib_metrics_match()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52928
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355443
Bugzilla Description: kernel: bpf: Skip invalid kfunc call in backtrack_insn
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53002
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355447
Bugzilla Description: kernel: drm/i915: Fix a memory leak with reused mmap_offset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52979
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355448
Bugzilla Description: kernel: squashfs: harden sanity check in squashfs_read_xattr_id_table
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49761
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355449
Bugzilla Description: kernel: btrfs: always report error in run_one_delayed_ref()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52935
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355450
Bugzilla Description: kernel: mm/khugepaged: fix ->anon_vma race
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53016
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355451
Bugzilla Description: kernel: Bluetooth: Fix possible deadlock in rfcomm_sk_state_change
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53005
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355452
Bugzilla Description: kernel: trace_events_hist: add check for return value of 'create_hist_field'
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49752
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355453
Bugzilla Description: kernel: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52931
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355455
Bugzilla Description: kernel: drm/i915: Avoid potential vm use-after-free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53026
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355457
Bugzilla Description: kernel: RDMA/core: Fix ib block iterator counter overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53024
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355458
Bugzilla Description: kernel: bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49749
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355462
Bugzilla Description: kernel: i2c: designware: use casting of u64 in clock multiplication to avoid overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52934
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355463
Bugzilla Description: kernel: mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49738
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355467
Bugzilla Description: kernel: f2fs: fix to do sanity check on i_extra_isize in is_alive()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52974
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355469
Bugzilla Description: kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52932
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355470
Bugzilla Description: kernel: mm/swapfile: add cond_resched() in get_swap_pages()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53030
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355471
Bugzilla Description: kernel: octeontx2-pf: Avoid use of GFP_KERNEL in atomic context
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52984
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355472
Bugzilla Description: kernel: net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52930
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355474
Bugzilla Description: kernel: drm/i915: Fix potential bit_17 double-free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52933
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355476
Bugzilla Description: kernel: Squashfs: fix handling and sanity checking of xattr_ids count
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52990
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355477
Bugzilla Description: kernel: s390: workaround invalid gcc-11 out of bounds read warning
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49756
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355478
Bugzilla Description: kernel: phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49750
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355480
Bugzilla Description: kernel: cpufreq: CPPC: Add u64 casts to avoid overflowing
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52980
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355481
Bugzilla Description: kernel: block: ublk: extending queue_size to fix overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52941
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355482
Bugzilla Description: kernel: can: isotp: split tx timer into transmission and timeout
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53021
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355484
Bugzilla Description: kernel: net/sched: sch_taprio: fix possible use-after-free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52999
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355485
Bugzilla Description: kernel: net: fix UaF in netns ops registration error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49748
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355486
Bugzilla Description: kernel: perf/x86/amd: fix potential integer overflow on shift of a int
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52992
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355487
Bugzilla Description: kernel: bpf: Skip task with pid=1 in send_signal_common()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52940
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355488
Bugzilla Description: kernel: mm: multi-gen LRU: fix crash during cgroup migration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52986
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355490
Bugzilla Description: kernel: bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52993
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355492
Bugzilla Description: kernel: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53017
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355494
Bugzilla Description: kernel: Bluetooth: hci_sync: fix memory leak in hci_update_adv_data()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52985
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355496
Bugzilla Description: kernel: arm64: dts: imx8mm-verdin: Do not power down eth-phy
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49759
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355497
Bugzilla Description: kernel: VMCI: Use threaded irqs instead of tasklets
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52942
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355498
Bugzilla Description: kernel: cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53007
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355499
Bugzilla Description: kernel: tracing: Make sure trace_printk() can output as soon as it can be used
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53022
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355501
Bugzilla Description: kernel: net: enetc: avoid deadlock in enetc_tx_onestep_tstamp()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49741
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355503
Bugzilla Description: kernel: fbdev: smscufx: fix error handling code in ufx_usb_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52994
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355509
Bugzilla Description: kernel: acpi: Fix suspend with Xen PV
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53000
Severity: important
Released on: 27/03/2025
Advisory:
Bugzilla: 2355510
Bugzilla Description: kernel: netlink: prevent potential spectre v1 gadgets
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53018
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355511
Bugzilla Description: kernel: Bluetooth: hci_conn: Fix memory leaks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52937
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355512
Bugzilla Description: kernel: HV: hv_balloon: fix memory leak with using debugfs_lookup()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49755
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355513
Bugzilla Description: kernel: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52976
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355514
Bugzilla Description: kernel: efi: fix potential NULL deref in efi_mem_reserve_persistent
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49739
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355515
Bugzilla Description: kernel: gfs2: Always check inode size of inline inodes
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52938
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355518
Bugzilla Description: kernel: usb: typec: ucsi: Don't attempt to resume the ports before they exist
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52936
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355520
Bugzilla Description: kernel: kernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52982
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355522
Bugzilla Description: kernel: fscache: Use wait_on_bit() to wait for the freeing of relinquished volume
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52995
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355523
Bugzilla Description: kernel: riscv/kprobe: Fix instruction simulation of JALR
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53012
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355531
Bugzilla Description: kernel: thermal: core: call put_device() only after device_register() fails
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49740
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355532
Bugzilla Description: kernel: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-53023
Severity: moderate
Released on: 27/03/2025
Advisory:
Bugzilla: 2355533
Bugzilla Description: kernel: net: nfc: Fix use-after-free in local_cleanup()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49742
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355535
Bugzilla Description: kernel: f2fs: initialize locks earlier in f2fs_fill_super()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52977
Severity: low
Released on: 27/03/2025
Advisory:
Bugzilla: 2355538
Bugzilla Description: kernel: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-30219
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354973
Bugzilla Description: rabbitmq: RabbitMQ has XSS Vulnerability in an Error Message in Management UI
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-79
Affected Packages:
Package States: Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2025-2756
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354802
Bugzilla Description: assimp: Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2754
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354790
Bugzilla Description: assimp: Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2753
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354791
Bugzilla Description: assimp: Open Asset Import Library Assimp LWS File LWSLoader.cpp MergeScenes out-of-bounds
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: (CWE-119|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2724
Severity: low
Released on: 25/03/2025
Advisory:
Bugzilla: 2354667
Bugzilla Description: libgsf: GNOME libgsf sorting_key_copy out-of-bounds
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-119|CWE-125)
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2723
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354668
Bugzilla Description: libgsf: GNOME libgsf gsf_property_settings_collec heap-based overflow
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27835
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354947
Bugzilla Description: Ghostscript: Buffer overflow when converting glyphs to unicode
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27834
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354948
Bugzilla Description: Ghostscript: Buffer overflow caused by an oversized Type 4 function in a PDF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27832
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354949
Bugzilla Description: Ghostscript: NPDL device: Compression buffer overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27836
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354952
Bugzilla Description: Ghostscript: device: Print buffer overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27830
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354953
Bugzilla Description: Ghostscript: Buffer overflow during serialization of DollarBlend in font
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27833
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354954
Bugzilla Description: Ghostscript: Buffer overflow with long TTF font name
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27837
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354961
Bugzilla Description: Ghostscript: Access to arbitrary files through truncated path with invalid UTF-8
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27831
Severity: moderate
Released on: 25/03/2025
Advisory:
Bugzilla: 2354963
Bugzilla Description: Ghostscript: Text buffer overflow with long characters
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2877
Severity: important
Released on: 25/03/2025
Advisory:
Bugzilla: 2355540
Bugzilla Description: event-driven-ansible: exposure inventory passwords in plain text when starting a rulebook activation with verbosity set to debug in EDA
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1295
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2025-2783
Severity:
Released on: 25/03/2025
Advisory:
Bugzilla: 2355557
Bugzilla Description: mojo: chromium: chromium Mojo on Windows
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-2720
Severity: low
Released on: 24/03/2025
Advisory:
Bugzilla: 2354658
Bugzilla Description: libgsf: GNOME libgsf gsf_base64_encode_simple uninitialized variable
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: (CWE-453|CWE-457)
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-24514
Severity:
Released on: 24/03/2025
Advisory:
Bugzilla: 2354659
Bugzilla Description: ingress-nginx: ingress-nginx controller - configuration injection via unsanitized auth-url annotation
CVSS Score:
Vector:
CWE: CWE-20
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-24513
Severity:
Released on: 24/03/2025
Advisory:
Bugzilla: 2354660
Bugzilla Description: ingress-nginx: ingress-nginx controller - auth secret file path traversal vulnerability
CVSS Score:
Vector:
CWE: CWE-20
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-1098
Severity:
Released on: 24/03/2025
Advisory:
Bugzilla: 2354662
Bugzilla Description: ingress-nginx: ingress-nginx controller - configuration injection via unsanitized mirror annotations
CVSS Score:
Vector:
CWE: CWE-20
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-1097
Severity:
Released on: 24/03/2025
Advisory:
Bugzilla: 2354657
Bugzilla Description: ingress-nginx: ingress-nginx controller - configuration injection via unsanitized auth-tls-match-cn annotation
CVSS Score:
Vector:
CWE: CWE-20
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-1974
Severity:
Released on: 24/03/2025
Advisory:
Bugzilla: 2354661
Bugzilla Description: ingress-nginx: ingress-nginx admission controller RCE escalation
CVSS Score:
Vector:
CWE: CWE-653
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-30163
Severity: low
Released on: 24/03/2025
Advisory:
Bugzilla: 2354605
Bugzilla Description: cilium: Node based network policies may incorrectly allow workload traffic
CVSS Score:
CVSSv3 Score: 3.4
Vector:
CWE: CWE-863
Affected Packages:
Package States: Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Power monitoring for Red Hat OpenShift,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2025-30162
Severity: low
Released on: 24/03/2025
Advisory:
Bugzilla: 2354604
Bugzilla Description: cilium: East-west traffic not subject to egress policy enforcement for requests via Gateway API load balancers
CVSS Score:
CVSSv3 Score: 3.2
Vector:
CWE: CWE-863
Affected Packages:
Package States: Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Power monitoring for Red Hat OpenShift,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,
Full Details
CVE document


CVE-2025-22223
Severity: moderate
Released on: 24/03/2025
Advisory:
Bugzilla: 2354599
Bugzilla Description: spring-security: authorization bypass via incorrectly locating method security annotations on parameterized types or methods
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-290
Affected Packages:
Package States: A-MQ Clients 2,OpenShift Developer Tools and Services,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,streams for Apache Kafka,
Full Details
CVE document


CVE-2025-30208
Severity: moderate
Released on: 24/03/2025
Advisory:
Bugzilla: 2354598
Bugzilla Description: vite: Vite bypasses server.fs.deny when using `?raw??`
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-200|CWE-284)
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,
Full Details
CVE document


CVE-2025-30472
Severity: moderate
Released on: 22/03/2025
Advisory:
Bugzilla: 2354229
Bugzilla Description: corosync: Stack buffer overflow from 'orf_token_endian_convert'
CVSS Score:
CVSSv3 Score: 6.6
Vector:
CWE: CWE-121
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-30204
Severity: important
Released on: 21/03/2025
Advisory: RHSA-2025:3344,
Bugzilla: 2354195
Bugzilla Description: golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-405
Affected Packages: grafana-0:10.2.6-9.el9_5,
Package States: Assisted Installer for Red Hat OpenShift Container Platform,Assisted Installer for Red Hat OpenShift Container Platform,Assisted Installer for Red Hat OpenShift Container Platform,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Cryostat 3,Cryostat 4,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Containers,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Multicluster Global Hub,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Connectivity Link,Red Hat Connectivity Link,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat OpenShift Update Service,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat Quay 3,Red Hat Quay 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2025-29927
Severity: critical
Released on: 21/03/2025
Advisory:
Bugzilla: 2354069
Bugzilla Description: nextjs: Authorization Bypass in Next.js Middleware
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-285
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,
Full Details
CVE document


CVE-2025-27612
Severity: moderate
Released on: 21/03/2025
Advisory:
Bugzilla: 2354067
Bugzilla Description: libcontainer: Libcontainer is affected by capabilities elevation
CVSS Score:
CVSSv3 Score: 5.9
Vector:
CWE: CWE-276
Affected Packages:
Package States: Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-2592
Severity: moderate
Released on: 21/03/2025
Advisory:
Bugzilla: 2354071
Bugzilla Description: assimp: Open Asset Import Library Assimp CSMLoader.cpp InternReadFile heap-based overflow
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2584
Severity: moderate
Released on: 21/03/2025
Advisory:
Bugzilla: 2354027
Bugzilla Description: wabt: WebAssembly wabt binary-reader-interp.cc GetReturnCallDropKeepCount heap-based overflow
CVSS Score:
CVSSv3 Score: 5.0
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-30346
Severity: moderate
Released on: 21/03/2025
Advisory:
Bugzilla: 2354008
Bugzilla Description: varnish: Client-Side Desynchronization in Varnish Cache
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-444
Affected Packages:
Package States: Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-29923
Severity: low
Released on: 20/03/2025
Advisory:
Bugzilla: 2353925
Bugzilla Description: github.com/redis/go-redis: go-redis allows potential out of order responses when `CLIENT SETINFO` times out during connection establishment
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-20
Affected Packages:
Package States: Multiarch Tuning Operator,Red Hat Trusted Profile Analyzer,
Full Details
CVE document


CVE-2024-7598
Severity: low
Released on: 20/03/2025
Advisory:
Bugzilla: 2353913
Bugzilla Description: kube-apiserver: Network restriction bypass via race condition during namespace termination
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2024-7804
Severity: low
Released on: 20/03/2025
Advisory:
Bugzilla: 2353598
Bugzilla Description: pytorch: Deserialization of Untrusted Data in pytorch/pytorch
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-502
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2025-0313
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353632
Bugzilla Description: ollama: Improper Validation of Array Index in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-129
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2024-8063
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353551
Bugzilla Description: ollama: Divide by Zero in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2024-11040
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353624
Bugzilla Description: vllm: Denial of Service in vllm-project/vllm
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2025-0312
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353640
Bugzilla Description: ollama: NULL Pointer Dereference in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2024-11041
Severity: low
Released on: 20/03/2025
Advisory:
Bugzilla: 2353718
Bugzilla Description: vllm: Remote Code Execution in vllm-project/vllm
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-502
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2024-12886
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353630
Bugzilla Description: ollama: Out-Of-Memory (OOM) Vulnerability in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2025-0317
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353587
Bugzilla Description: ollama: Divide By Zero in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2024-6827
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353700
Bugzilla Description: gunicorn: HTTP Request Smuggling in benoitc/gunicorn
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-444
Affected Packages:
Package States: OpenShift Serverless,Red Hat Discovery,Red Hat Quay 3,
Full Details
CVE document


CVE-2025-0315
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353633
Bugzilla Description: ollama: Allocation of Resources Without Limits or Throttling in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2024-12911
Severity: moderate
Released on: 20/03/2025
Advisory:
Bugzilla: 2353719
Bugzilla Description: llama-index: SQL Injection in run-llama/llama_index
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-379
Affected Packages:
Package States: OpenShift Lightspeed,
Full Details
CVE document


CVE-2024-9053
Severity: low
Released on: 20/03/2025
Advisory:
Bugzilla: 2353703
Bugzilla Description: vllm: Remote Code Execution in vllm-project/vllm
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-78
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2024-9052
Severity: low
Released on: 20/03/2025
Advisory:
Bugzilla: 2353764
Bugzilla Description: vllm: Remote Code Execution by Pickle Deserialization in vllm-project/vllm
CVSS Score:
CVSSv3 Score: 2.6
Vector:
CWE: CWE-502
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2024-8020
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353669
Bugzilla Description: pytorch-lightning: Denial of Service in lightning-ai/pytorch-lightning
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2024-7773
Severity: critical
Released on: 20/03/2025
Advisory:
Bugzilla: 2353591
Bugzilla Description: ollama: Remote Code Execution via ZipSlip in ollama/ollama
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2024-12910
Severity: moderate
Released on: 20/03/2025
Advisory:
Bugzilla: 2353537
Bugzilla Description: llama-index: Denial of Service in run-llama/llama_index
CVSS Score:
CVSSv3 Score: 4.2
Vector:
CWE: CWE-400
Affected Packages:
Package States: OpenShift Lightspeed,
Full Details
CVE document


CVE-2024-12704
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353770
Bugzilla Description: llama-index: Denial of Service (DoS) in run-llama/llama_index
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-755
Affected Packages:
Package States: OpenShift Lightspeed,
Full Details
CVE document


CVE-2024-9880
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353639
Bugzilla Description: pandas: Command Injection in pandas-dev/pandas
CVSS Score:
CVSSv3 Score: 8.4
Vector:
CWE: CWE-94
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Ansible Automation Platform 2,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2024-10940
Severity: moderate
Released on: 20/03/2025
Advisory:
Bugzilla: 2353815
Bugzilla Description: langchain-core: Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-497
Affected Packages:
Package States: OpenShift Lightspeed,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2024-12055
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353572
Bugzilla Description: ollama: DoS using malicious gguf model file in ollama/ollama
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,
Full Details
CVE document


CVE-2025-22228
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353507
Bugzilla Description: spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-863
Affected Packages:
Package States: A-MQ Clients 2,OpenShift Developer Tools and Services,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,streams for Apache Kafka,
Full Details
CVE document


CVE-2025-2559
Severity: moderate
Released on: 20/03/2025
Advisory:
Bugzilla: 2353868
Bugzilla Description: org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Build of Keycloak,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2024-44192
Severity: important
Released on: 20/03/2025
Advisory:
Bugzilla: 2353871
Bugzilla Description: webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-54467
Severity: moderate
Released on: 20/03/2025
Advisory:
Bugzilla: 2353872
Bugzilla Description: webkitgtk: A malicious website may exfiltrate data cross-origin
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-200
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-7631
Severity: moderate
Released on: 19/03/2025
Advisory:
Bugzilla: 2296053
Bugzilla Description: openshift-console: OpenShift Console: Path traversal
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-22
Affected Packages:
Package States: Red Hat OpenShift Container Platform 3.11,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2024-25132
Severity: moderate
Released on: 19/03/2025
Advisory:
Bugzilla: 2260371
Bugzilla Description: openshift-dedicated: hive: hibernation controller denial of service
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-400
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-30153
Severity: important
Released on: 19/03/2025
Advisory:
Bugzilla: 2353383
Bugzilla Description: github.com/getkin/kin-openapi/openapi3filter: Improper Handling of Highly Compressed Data (Data Amplification) in github.com/getkin/kin-openapi/openapi3filter
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-409
Affected Packages:
Package States: Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-29783
Severity: critical
Released on: 19/03/2025
Advisory:
Bugzilla: 2353374
Bugzilla Description: vllm: vLLM Allows Remote Code Execution via Mooncake Integration
CVSS Score:
CVSSv3 Score: 10.0
Vector:
CWE: CWE-502
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2025-29770
Severity: moderate
Released on: 19/03/2025
Advisory:
Bugzilla: 2353368
Bugzilla Description: vllm: vLLM denial of service via outlines unbounded cache on disk
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2025-30258
Severity: low
Released on: 19/03/2025
Advisory:
Bugzilla: 2353427
Bugzilla Description: gnupg: verification DoS due to a malicious subkey in the keyring
CVSS Score:
CVSSv3 Score: 2.7
Vector:
CWE: CWE-754
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2487
Severity: moderate
Released on: 18/03/2025
Advisory:
Bugzilla: 2353071
Bugzilla Description: 389-ds-base: null pointer dereference leads to denial of service
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Directory Server 11,Red Hat Directory Server 12,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-29781
Severity: moderate
Released on: 17/03/2025
Advisory:
Bugzilla: 2353041
Bugzilla Description: baremetal-operator/apis: Bare Metal Operator (BMO) can expose any secret from other namespaces via BMCEventSubscription CRD
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: (CWE-200|CWE-653)
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform,Assisted Installer for Red Hat OpenShift Container Platform,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,
Full Details
CVE document


CVE-2024-40635
Severity: moderate
Released on: 17/03/2025
Advisory:
Bugzilla: 2353043
Bugzilla Description: containerd: containerd has an integer overflow in User ID handling
CVSS Score:
CVSSv3 Score: 4.6
Vector:
CWE: CWE-190
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Deployment Validation Operator,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Network Observability Operator,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Lightspeed,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Developer Hub,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat OpenShift Virtualization 4,Red Hat Trusted Application Pipeline,
Full Details
CVE document


CVE-2025-2241
Severity: important
Released on: 17/03/2025
Advisory:
Bugzilla: 2351350
Bugzilla Description: hive: Exposure of VCenter Credentials via ClusterProvision in Hive / MCE / ACM
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-922
Affected Packages:
Package States: Multicluster Engine for Kubernetes,Red Hat Advanced Cluster Management for Kubernetes 2,
Full Details
CVE document


CVE-2025-29786
Severity: important
Released on: 17/03/2025
Advisory: RHSA-2025:3335,
Bugzilla: 2352914
Bugzilla Description: github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: opentelemetry-collector-0:0.107.0-8.el9_5,
Package States: Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Deployment Validation Operator,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,
Full Details
CVE document


CVE-2025-2368
Severity: moderate
Released on: 17/03/2025
Advisory:
Bugzilla: 2352871
Bugzilla Description: wabt: WebAssembly wabt Malformed File binary-reader-interp.cc OnExport heap-based overflow
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2357
Severity: moderate
Released on: 17/03/2025
Advisory:
Bugzilla: 2352832
Bugzilla Description: DCMTK: DCMTK dcmjpls JPEG-LS Decoder memory corruption
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2025-2310
Severity: moderate
Released on: 14/03/2025
Advisory:
Bugzilla: 2352651
Bugzilla Description: HDF5: HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-119|CWE-122)
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2025-29775
Severity: important
Released on: 14/03/2025
Advisory: RHSA-2025:3374,
Bugzilla: 2352600
Bugzilla Description: xml-crypto: xml-crypto Vulnerable to XML Signature Verification Bypass via DigestValue Comment
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-347
Affected Packages: registry.redhat.io/rhdh/rhdh-hub-rhel9:sha256:56bfbb2328f42e91d0462e142f3434e5d771737defbc07d8a21dbdf50e468665,
Package States: OpenShift Serverless,
Full Details
CVE document


CVE-2025-29774
Severity: important
Released on: 14/03/2025
Advisory:
Bugzilla: 2352596
Bugzilla Description: xml-crypto: xml-crypto Vulnerable to XML Signature Verification Bypass via Multiple SignedInfo References
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-347
Affected Packages:
Package States: OpenShift Serverless,Red Hat Developer Hub,
Full Details
CVE document


CVE-2025-24855
Severity: important
Released on: 14/03/2025
Advisory: RHSA-2025:3107,
Bugzilla: 2352483
Bugzilla Description: libxslt: Use-After-Free in libxslt numbers.c
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-416
Affected Packages: libxslt-0:1.1.34-9.el9_5.1,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2024-55549
Severity: important
Released on: 14/03/2025
Advisory:
Bugzilla: 2352484
Bugzilla Description: libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList)
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2023-52927
Severity: moderate
Released on: 14/03/2025
Advisory:
Bugzilla: 2352567
Bugzilla Description: kernel: netfilter: allow exp not to be removed in nf_ct_find_expectation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2157
Severity: low
Released on: 13/03/2025
Advisory:
Bugzilla: 2351092
Bugzilla Description: foreman: Disclosure of Executed Commands and Outputs in Foreman / Red Hat Satellite
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-922
Affected Packages:
Package States: Red Hat Satellite 6,
Full Details
CVE document


CVE-2025-29768
Severity: moderate
Released on: 13/03/2025
Advisory:
Bugzilla: 2352418
Bugzilla Description: vim: Vim vulnerable to potential data loss with zip.vim and special crafted zip files
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-88
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2024-8176
Severity: moderate
Released on: 13/03/2025
Advisory:
Bugzilla: 2310137
Bugzilla Description: libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-674
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Core Services,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-1767
Severity: moderate
Released on: 13/03/2025
Advisory:
Bugzilla: 2351269
Bugzilla Description: kubelet: GitRepo Volume Inadvertent Local Repository Access
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-280
Affected Packages:
Package States: Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Discovery,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2025-22870
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351766
Bugzilla Description: golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: Assisted Installer for Red Hat OpenShift Container Platform,Assisted Installer for Red Hat OpenShift Container Platform,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Cryostat 3,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Fence Agents Remediation Operator,Fence Agents Remediation Operator,Kube Descheduler Operator,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,NBDE Tang Server,NBDE Tang Server,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Network Observability Operator,Node HealthCheck Operator,Node HealthCheck Operator,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift Dev Workspaces Operator,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Quay 3,Red Hat Quay 3,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Storage 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Web Terminal,Self Node Remediation Operator,Self Node Remediation Operator,
Full Details
CVE document


CVE-2025-27407
Severity: important
Released on: 12/03/2025
Advisory:
Bugzilla: 2351767
Bugzilla Description: graphql-ruby: Remote code execution when loading a crafted GraphQL schema
CVSS Score:
CVSSv3 Score: 8.5
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat Satellite 6,
Full Details
CVE document


CVE-2025-29891
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351685
Bugzilla Description: camel-http: org.apache.camel: Apache Camel: Camel Message Header Injection through request parameters
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-164
Affected Packages:
Package States: Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2025-27788
Severity: important
Released on: 12/03/2025
Advisory:
Bugzilla: 2351856
Bugzilla Description: json: Ruby JSON Parser has Out-of-bounds Read
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2025-24912
Severity: low
Released on: 12/03/2025
Advisory:
Bugzilla: 2351487
Bugzilla Description: hostapd: RADIUS Packet Processing Flaw in hostapd
CVSS Score:
CVSSv3 Score: 3.7
Vector:
CWE: CWE-826
Affected Packages:
Package States: Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-2240
Severity: important
Released on: 12/03/2025
Advisory:
Bugzilla: 2351452
Bugzilla Description: smallrye-fault-tolerance: SmallRye Fault Tolerance
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1325
Affected Packages:
Package States: Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apicurio Registry 2,Red Hat build of Quarkus,Red Hat build of Quarkus,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2024-58087
Severity: important
Released on: 12/03/2025
Advisory:
Bugzilla: 2351471
Bugzilla Description: kernel: ksmbd: fix racy issue from session lookup and expire
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21857
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351605
Bugzilla Description: kernel: net/sched: cls_api: fix error handling causing NULL dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21851
Severity: low
Released on: 12/03/2025
Advisory:
Bugzilla: 2351606
Bugzilla Description: kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel
CVSS Score:
CVSSv3 Score: 2.3
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58089
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351607
Bugzilla Description: kernel: btrfs: fix double accounting race when btrfs_run_delalloc_range() failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21855
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351608
Bugzilla Description: kernel: ibmvnic: Don't reference skb after sending to VIOS
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21856
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351609
Bugzilla Description: kernel: s390/ism: add release function for struct device
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21850
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351611
Bugzilla Description: kernel: nvmet: Fix crash when a namespace is disabled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-835
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21844
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351612
Bugzilla Description: kernel: smb: client: Add check for next_buffer in receive_encrypted_standard()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21853
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351613
Bugzilla Description: kernel: bpf: avoid holding freeze_mutex during mmap operation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21852
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351614
Bugzilla Description: kernel: net: Add rx_skb of kfree_skb to raw_tp_null_args[].
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21847
Severity: low
Released on: 12/03/2025
Advisory:
Bugzilla: 2351616
Bugzilla Description: kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21845
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351617
Bugzilla Description: kernel: mtd: spi-nor: sst: Fix SST write failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21864
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351618
Bugzilla Description: kernel: tcp: drop secpath at the same time as we currently drop dst
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58088
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351620
Bugzilla Description: kernel: bpf: Fix deadlock when freeing cgroup storage
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21849
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351621
Bugzilla Description: kernel: drm/i915/gt: Use spin_lock_irqsave() in interruptible context
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21860
Severity: low
Released on: 12/03/2025
Advisory:
Bugzilla: 2351622
Bugzilla Description: kernel: mm/zswap: fix inconsistency when zswap_store_page() fails
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21866
Severity: low
Released on: 12/03/2025
Advisory:
Bugzilla: 2351623
Bugzilla Description: kernel: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21846
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351624
Bugzilla Description: kernel: acct: perform last write from workqueue
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21861
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351625
Bugzilla Description: kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21862
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351626
Bugzilla Description: kernel: drop_monitor: fix incorrect initialization order
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21859
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351628
Bugzilla Description: kernel: USB: gadget: f_midi: f_midi_complete to call queue_work
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21863
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351629
Bugzilla Description: kernel: io_uring: prevent opcode speculation
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21854
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351631
Bugzilla Description: kernel: sockmap, vsock: For connectible sockets allow only connected
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21848
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351633
Bugzilla Description: kernel: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-395
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21865
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351635
Bugzilla Description: kernel: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-25975
Severity: moderate
Released on: 12/03/2025
Advisory:
Bugzilla: 2351765
Bugzilla Description: parse-git-config: Prototype Pollution Vulneralbility in parse-git-config
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1321
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,
Full Details
CVE document


CVE-2025-24070
Severity: important
Released on: 11/03/2025
Advisory: RHSA-2025:2670, RHSA-2025:2669, RHSA-2025:2667, RHSA-2025:2668, RHSA-2025:2666,
Bugzilla: 2349733
Bugzilla Description: dotnet: Privilege Escalation Vulnerability in .NET SignInManager.RefreshSignInAsync Method
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-269
Affected Packages: dotnet8.0-0:8.0.114-1.el9_5,dotnet8.0-0:8.0.114-1.el9_4,dotnet9.0-0:9.0.104-1.el9_5,dotnet9.0-0:9.0.104-1.el8_10,dotnet8.0-0:8.0.114-1.el8_10,
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27363
Severity: important
Released on: 11/03/2025
Advisory:
Bugzilla: 2351357
Bugzilla Description: freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat build of OpenJDK 11,Red Hat build of OpenJDK 17,Red Hat build of OpenJDK 21,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-1550
Severity: important
Released on: 11/03/2025
Advisory:
Bugzilla: 2351304
Bugzilla Description: keras: Arbitrary Code Execution via Crafted Keras Config for Model Loading
CVSS Score:
CVSSv3 Score: 8.2
Vector:
CWE: CWE-94
Affected Packages:
Package States: Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),
Full Details
CVE document


CVE-2025-24201
Severity: important
Released on: 11/03/2025
Advisory: RHSA-2025:3002, RHSA-2025:3034, RHSA-2025:3001, RHSA-2025:3000, RHSA-2025:2997, RHSA-2025:2998, RHSA-2025:2863, RHSA-2025:2864, RHSA-2025:3005,
Bugzilla: 2351802
Bugzilla Description: webkitgtk: out-of-bounds write vulnerability
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-787
Affected Packages: webkit2gtk3-0:2.46.6-2.el8_4,webkit2gtk3-0:2.46.6-2.el9_4,webkit2gtk3-0:2.46.6-2.el8_6,webkit2gtk3-0:2.46.6-2.el9_5,webkit2gtk3-0:2.46.6-2.el9_0,webkit2gtk3-0:2.46.6-2.el8_2,webkit2gtk3-0:2.46.6-2.el9_2,webkit2gtk3-0:2.46.6-2.el8_8,webkit2gtk3-0:2.46.6-2.el8_10,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,
Full Details
CVE document


CVE-2025-27610
Severity: important
Released on: 10/03/2025
Advisory:
Bugzilla: 2351231
Bugzilla Description: rack: rubygem-rack: Local File Inclusion in Rack::Static
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-23
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Storage 3,
Full Details
CVE document


CVE-2025-26695
Severity: low
Released on: 10/03/2025
Advisory:
Bugzilla: 2351146
Bugzilla Description: thunderbird: Downloading of OpenPGP keys from WKD used incorrect padding
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-203
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-26696
Severity: moderate
Released on: 10/03/2025
Advisory:
Bugzilla: 2351157
Bugzilla Description: thunderbird: Crafted email message incorrectly shown as being encrypted
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-451
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-24813
Severity: moderate
Released on: 10/03/2025
Advisory:
Bugzilla: 2351129
Bugzilla Description: tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
CVSS Score:
CVSSv3 Score: 8.6
Vector:
CWE: (CWE-44|CWE-502)
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat JBoss Web Server 5,Red Hat JBoss Web Server 6,
Full Details
CVE document


CVE-2025-27636
Severity: moderate
Released on: 10/03/2025
Advisory: RHSA-2025:3091,
Bugzilla: 2350682
Bugzilla Description: camel-http: org.apache.camel: bypass of header filters via specially crafted response
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-644
Affected Packages: org.apache.camel/camel-http,org.apache.camel/camel-http-base,
Package States: Red Hat build of Apache Camel 4 for Quarkus 3,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat build of Apache Camel for Spring Boot 4,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat Integration Camel K 1,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2025-25977
Severity: moderate
Released on: 10/03/2025
Advisory:
Bugzilla: 2351128
Bugzilla Description: canvg: Prototype Pollution Vulneralbility
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-1321
Affected Packages:
Package States: Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,
Full Details
CVE document


CVE-2023-52968
Severity: moderate
Released on: 08/03/2025
Advisory:
Bugzilla: 2350915
Bugzilla Description: mariadb: Crash in MariaDB Due to Improper Handling of Derived Tables
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-696
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52969
Severity: moderate
Released on: 08/03/2025
Advisory:
Bugzilla: 2350916
Bugzilla Description: mariadb: MariaDB Server Crash Due to Empty Backtrace Log
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-1038
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52971
Severity: moderate
Released on: 08/03/2025
Advisory:
Bugzilla: 2350917
Bugzilla Description: mariadb: MariaDB Server Crash
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-1038
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2023-52970
Severity: moderate
Released on: 08/03/2025
Advisory:
Bugzilla: 2350918
Bugzilla Description: mariadb: MariaDB Server Crash via Item_direct_view_ref
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-1038
Affected Packages:
Package States: Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27607
Severity: important
Released on: 07/03/2025
Advisory:
Bugzilla: 2350638
Bugzilla Description: python-json-logger: Python JSON Logger has a Potential RCE via missing `msgspec-python313-pre` dependency
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-829
Affected Packages:
Package States: Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,
Full Details
CVE document


CVE-2025-27152
Severity: moderate
Released on: 07/03/2025
Advisory:
Bugzilla: 2350618
Bugzilla Description: axios: Possible SSRF and Credential Leakage via Absolute URL in axios Requests
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-918
Affected Packages:
Package States: Cryostat 3,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Network Observability Operator,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat build of Apache Camel - HawtIO 4,Red Hat build of Apicurio Registry 2,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Discovery,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Fuse 7,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat Process Automation 7,Red Hat Quay 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,streams for Apache Kafka 2,
Full Details
CVE document


CVE-2025-21840
Severity: low
Released on: 07/03/2025
Advisory:
Bugzilla: 2350581
Bugzilla Description: kernel: thermal/netlink: Prevent userspace segmentation fault by adjusting UAPI header
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21838
Severity: moderate
Released on: 07/03/2025
Advisory:
Bugzilla: 2350582
Bugzilla Description: kernel: usb: gadget: core: flush gadget workqueue after device removal
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21835
Severity: moderate
Released on: 07/03/2025
Advisory:
Bugzilla: 2350583
Bugzilla Description: kernel: usb: gadget: f_midi: fix MIDI Streaming descriptor lengths
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21836
Severity: moderate
Released on: 07/03/2025
Advisory:
Bugzilla: 2350584
Bugzilla Description: kernel: io_uring/kbuf: reallocate buf lists on upgrade
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21839
Severity: moderate
Released on: 07/03/2025
Advisory:
Bugzilla: 2350585
Bugzilla Description: kernel: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21843
Severity: moderate
Released on: 07/03/2025
Advisory:
Bugzilla: 2350586
Bugzilla Description: kernel: drm/panthor: avoid garbage value in panthor_ioctl_dev_query()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21842
Severity: low
Released on: 07/03/2025
Advisory:
Bugzilla: 2350587
Bugzilla Description: kernel: amdkfd: properly free gang_ctx_bo when failed to init user queue
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21841
Severity: low
Released on: 07/03/2025
Advisory:
Bugzilla: 2350588
Bugzilla Description: kernel: cpufreq/amd-pstate: Fix cpufreq_policy ref counting
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21837
Severity: important
Released on: 07/03/2025
Advisory:
Bugzilla: 2350589
Bugzilla Description: kernel: io_uring/uring_cmd: unconditionally copy SQEs at prep time
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-25294
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350421
Bugzilla Description: envoyproxy/gateway: Envoy Gateway Log Injection Vulnerability
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-117
Affected Packages:
Package States: Red Hat Connectivity Link,Red Hat Connectivity Link,
Full Details
CVE document


CVE-2025-26699
Severity: moderate
Released on: 06/03/2025
Advisory: RHSA-2025:3162, RHSA-2025:3160,
Bugzilla: 2348993
Bugzilla Description: django: Potential denial-of-service vulnerability in django.utils.text.wrap()
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-400
Affected Packages: python3.11-django-0:4.2.20-1.el8ap,ansible-automation-platform-25/lightspeed-rhel8:2.5.250318-2,python3.11-django-0:4.2.20-1.el9ap,
Package States: Red Hat Ansible Automation Platform 1.2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Discovery,
Full Details
CVE document


CVE-2025-1979
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350231
Bugzilla Description: ray: Insertion of Sensitive Information into Log File
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-532
Affected Packages:
Package States: Red Hat Enterprise Linux AI (RHEL AI),
Full Details
CVE document


CVE-2024-58070
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350348
Bugzilla Description: kernel: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58058
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350349
Bugzilla Description: kernel: ubifs: skip dumping tnc tree when zroot is null
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58055
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350350
Bugzilla Description: kernel: usb: gadget: f_tcm: Don't free command immediately
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58065
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350351
Bugzilla Description: kernel: clk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58052
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350352
Bugzilla Description: kernel: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58073
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350353
Bugzilla Description: kernel: drm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58064
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350354
Bugzilla Description: kernel: wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58054
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350357
Bugzilla Description: kernel: staging: media: max96712: fix kernel oops when removing module
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58056
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350358
Bugzilla Description: kernel: remoteproc: core: Fix ida_free call while not allocated
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58067
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350361
Bugzilla Description: kernel: clk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58066
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350362
Bugzilla Description: kernel: clk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58072
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350363
Bugzilla Description: kernel: wifi: rtlwifi: remove unused check_buddy_priv
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58069
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350364
Bugzilla Description: kernel: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58059
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350365
Bugzilla Description: kernel: media: uvcvideo: Fix deadlock during uvc_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58063
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350366
Bugzilla Description: kernel: wifi: rtlwifi: fix memory leaks and invalid access at probe error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58068
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350367
Bugzilla Description: kernel: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-395
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58053
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350369
Bugzilla Description: kernel: rxrpc: Fix handling of received connection abort
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58071
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350370
Bugzilla Description: kernel: team: prevent adding a device which is already a team device lower
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-413
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58060
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350371
Bugzilla Description: kernel: bpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58061
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350373
Bugzilla Description: kernel: wifi: mac80211: prohibit deactivating all links
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58062
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350374
Bugzilla Description: kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58057
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350375
Bugzilla Description: kernel: idpf: convert workqueues to unbound
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58051
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350376
Bugzilla Description: kernel: ipmi: ipmb: Add check devm_kasprintf() returned value
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58076
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350382
Bugzilla Description: kernel: clk: qcom: gcc-sm6350: Add missing parent_map for two clocks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58079
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350383
Bugzilla Description: kernel: media: uvcvideo: Fix crash during unbind if gpio unit is in use
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21831
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350385
Bugzilla Description: kernel: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21828
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350386
Bugzilla Description: kernel: wifi: mac80211: don't flush non-uploaded STAs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58074
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350387
Bugzilla Description: kernel: drm/i915: Grab intel_display from the encoder to avoid potential oopsies
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58083
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350388
Bugzilla Description: kernel: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21833
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350390
Bugzilla Description: kernel: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58080
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350391
Bugzilla Description: kernel: clk: qcom: dispcc-sm6350: Add missing parent_map for a clock
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21826
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350392
Bugzilla Description: kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58086
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350393
Bugzilla Description: kernel: drm/v3d: Stop active perfmon if it is being destroyed
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58085
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350394
Bugzilla Description: kernel: tomoyo: don't emit warning in tomoyo_write_control()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21827
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350395
Bugzilla Description: kernel: Bluetooth: btusb: mediatek: Add locks for usb_driver_claim_interface()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-413
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58077
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350396
Bugzilla Description: kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58075
Severity: moderate
Released on: 06/03/2025
Advisory:
Bugzilla: 2350397
Bugzilla Description: kernel: crypto: tegra - do not transfer req when tegra init fails
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21834
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350398
Bugzilla Description: kernel: seccomp: passthrough uretprobe systemcall without filtering
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58078
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350399
Bugzilla Description: kernel: misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21829
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350400
Bugzilla Description: kernel: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21832
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350402
Bugzilla Description: kernel: block: don't revert iter for -EIOCBQUEUED
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-252
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58082
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350403
Bugzilla Description: kernel: media: nuvoton: Fix an error check in npcm_video_ece_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58084
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350404
Bugzilla Description: kernel: firmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21830
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350405
Bugzilla Description: kernel: landlock: Handle weird files
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21825
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350406
Bugzilla Description: kernel: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58081
Severity: low
Released on: 06/03/2025
Advisory:
Bugzilla: 2350408
Bugzilla Description: kernel: clk: mmp2: call pm_genpd_init() only after genpd.name is set
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27624
Severity: moderate
Released on: 05/03/2025
Advisory:
Bugzilla: 2350208
Bugzilla Description: jenkins: CSRF vulnerability in jenkins
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-352
Affected Packages:
Package States: OpenShift Developer Tools and Services,Red Hat Developer Hub,
Full Details
CVE document


CVE-2025-27625
Severity: moderate
Released on: 05/03/2025
Advisory:
Bugzilla: 2350210
Bugzilla Description: jenkins: Open redirect vulnerability
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-601
Affected Packages:
Package States: OpenShift Developer Tools and Services,Red Hat Developer Hub,
Full Details
CVE document


CVE-2025-27623
Severity: moderate
Released on: 05/03/2025
Advisory:
Bugzilla: 2350209
Bugzilla Description: jenkins: Encrypted values of secrets stored in view configuration revealed to users with View/Read permission
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-523
Affected Packages:
Package States: OpenShift Developer Tools and Services,Red Hat Developer Hub,
Full Details
CVE document


CVE-2025-27622
Severity: moderate
Released on: 05/03/2025
Advisory:
Bugzilla: 2350211
Bugzilla Description: jenkins: Encrypted values of secrets stored in agent configuration revealed to users with Agent/Extended Read permission
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-319
Affected Packages:
Package States: OpenShift Developer Tools and Services,Red Hat Developer Hub,
Full Details
CVE document


CVE-2025-27516
Severity: important
Released on: 05/03/2025
Advisory: RHSA-2025:3124, RHSA-2025:3113, RHSA-2025:3123, RHSA-2025:3111, RHSA-2025:3162, RHSA-2025:3371, RHSA-2025:3160, RHSA-2025:3017, RHSA-2025:2688, RHSA-2025:2664,
Bugzilla: 2350190
Bugzilla Description: jinja2: Jinja sandbox breakout through attr filter selecting format method
CVSS Score:
CVSSv3 Score: 7.3
Vector:
CWE: CWE-1336
Affected Packages: python3.11-jinja2-0:3.1.6-1.el8ap,python3.11-jinja2-0:3.1.6-1.el9ap,ansible-automation-platform/ee-minimal-rhel8:2.16.14-11,fence-agents-0:4.10.0-20.el9_0.21,python3x-jinja2-0:3.1.6-1.el8ap,python-jinja2-0:3.1.6-1.el9ap,automation-controller-0:4.6.10-1.el9ap,automation-controller-0:4.6.10-1.el8ap,fence-agents-0:4.10.0-62.el9_4.11,fence-agents-0:4.10.0-76.el9_5.6,fence-agents-0:4.10.0-43.el9_2.12,ansible-automation-platform/ee-minimal-rhel9:2.16.14-12,automation-controller-0:4.5.20-1.el9ap,automation-controller-0:4.5.20-1.el8ap,ansible-automation-platform-25/lightspeed-rhel8:2.5.250318-2,ansible-automation-platform-24/lightspeed-rhel8:2.4.250225-5,openstack-ansible-core-0:2.14.2-4.7.el9ost,
Package States: OpenShift Serverless,Red Hat Ansible Automation Platform 2,Red Hat Ansible Automation Platform 2,Red Hat Developer Hub,Red Hat Discovery,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat Enterprise Linux AI (RHEL AI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Quay 3,
Full Details
CVE document


CVE-2024-36347
Severity: important
Released on: 05/03/2025
Advisory:
Bugzilla: 2336412
Bugzilla Description: kernel: hw:amd: Improper signature verification in AMD CPU ROM microcode patch loader
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1080
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:3267, RHSA-2025:3265, RHSA-2025:2868, RHSA-2025:3269, RHSA-2025:3169,
Bugzilla: 2349906
Bugzilla Description: libreoffice: Macro URL arbitrary script execution
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-20
Affected Packages: libreoffice-1:6.4.7.2-18.el8_4,libreoffice-1:6.4.7.2-18.el8_6,libreoffice-1:6.0.6.1-23.el8_2,libreoffice-1:6.4.7.2-19.el8_10,libreoffice-1:6.4.7.2-18.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27111
Severity: moderate
Released on: 04/03/2025
Advisory:
Bugzilla: 2349810
Bugzilla Description: rack: rubygem-rack: Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: (CWE-117|CWE-93)
Affected Packages:
Package States: Logging Subsystem for Red Hat OpenShift,Red Hat 3scale API Management Platform 2,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Satellite 6,Red Hat Storage 3,
Full Details
CVE document


CVE-2025-1943
Severity: important
Released on: 04/03/2025
Advisory:
Bugzilla: 2349789
Bugzilla Description: firefox: thunderbird: Memory safety bugs fixed in Firefox 136 and Thunderbird 136
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1938
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:2708, RHSA-2025:2959, RHSA-2025:2957, RHSA-2025:2958, RHSA-2025:2900, RHSA-2025:3009, RHSA-2025:2359, RHSA-2025:2899, RHSA-2025:2699, RHSA-2025:2479, RHSA-2025:2960, RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:3036, RHSA-2025:2486, RHSA-2025:3013, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480,
Bugzilla: 2349793
Bugzilla Description: firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_10,thunderbird-0:128.8.0-2.el8_6,thunderbird-0:128.8.0-2.el9_5,thunderbird-0:128.8.0-2.el9_4,thunderbird-0:128.8.0-2.el8_4,thunderbird-0:128.8.0-2.el8_10,thunderbird-0:128.8.0-2.el9_2,thunderbird-0:128.8.0-2.el8_2,thunderbird-0:128.8.0-2.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,thunderbird-0:128.8.0-2.el8_8,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1937
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:2708, RHSA-2025:2959, RHSA-2025:2957, RHSA-2025:2958, RHSA-2025:2900, RHSA-2025:3009, RHSA-2025:2359, RHSA-2025:2899, RHSA-2025:2699, RHSA-2025:2479, RHSA-2025:2960, RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:3036, RHSA-2025:2486, RHSA-2025:3013, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480,
Bugzilla: 2349795
Bugzilla Description: firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8
CVSS Score:
CVSSv3 Score: 8.8
Vector:
CWE: CWE-120
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_10,thunderbird-0:128.8.0-2.el8_6,thunderbird-0:128.8.0-2.el9_5,thunderbird-0:128.8.0-2.el9_4,thunderbird-0:128.8.0-2.el8_4,thunderbird-0:128.8.0-2.el8_10,thunderbird-0:128.8.0-2.el9_2,thunderbird-0:128.8.0-2.el8_2,thunderbird-0:128.8.0-2.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,thunderbird-0:128.8.0-2.el8_8,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1936
Severity: low
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349797
Bugzilla Description: firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-754
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1941
Severity: moderate
Released on: 04/03/2025
Advisory:
Bugzilla: 2349785
Bugzilla Description: firefox: Lock screen setting bypass in Firefox Focus for Android
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-306
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1942
Severity: moderate
Released on: 04/03/2025
Advisory:
Bugzilla: 2349791
Bugzilla Description: firefox: Disclosure of uninitialized memory when .toUpperCase() causes string to get longer
CVSS Score:
CVSSv3 Score: 6.3
Vector:
CWE: CWE-824
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1935
Severity: low
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349792
Bugzilla Description: firefox: Clickjacking the registerProtocolHandler info-bar Reporter
CVSS Score:
CVSSv3 Score: 4.3
Vector:
CWE: CWE-1021
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1940
Severity: moderate
Released on: 04/03/2025
Advisory:
Bugzilla: 2349788
Bugzilla Description: firefox: Android Intent confirmation prompt tapjacking using Select options
CVSS Score:
CVSSv3 Score: 5.4
Vector:
CWE: CWE-451
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1934
Severity: moderate
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349790
Bugzilla Description: firefox: Unexpected GC during RegExp bailout processing
CVSS Score:
CVSSv3 Score: 6.5
Vector:
CWE: CWE-460
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1931
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349786
Bugzilla Description: firefox: Use-after-free in WebTransportChild
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-416
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1933
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349794
Bugzilla Description: firefox: JIT corruption of WASM i32 return values on 64-bit CPUs
CVSS Score:
CVSSv3 Score: 7.6
Vector:
CWE: CWE-843
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1932
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349796
Bugzilla Description: firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-125
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1930
Severity: important
Released on: 04/03/2025
Advisory: RHSA-2025:2452, RHSA-2025:2485, RHSA-2025:2486, RHSA-2025:2708, RHSA-2025:2484, RHSA-2025:2481, RHSA-2025:2480, RHSA-2025:2359, RHSA-2025:2699, RHSA-2025:2479,
Bugzilla: 2349787
Bugzilla Description: firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process
CVSS Score:
CVSSv3 Score: 8.3
Vector:
CWE: CWE-416
Affected Packages: firefox-0:128.8.0-1.el9_2,firefox-0:128.8.0-1.el8_2,firefox-0:128.8.0-1.el9_0,firefox-0:128.8.0-1.el8_6,firefox-0:128.8.0-1.el9_5,firefox-0:128.8.0-1.el9_4,firefox-0:128.8.0-1.el8_4,firefox-0:128.8.0-1.el8_10,firefox-0:128.8.0-1.el7_9,firefox-0:128.8.0-1.el8_8,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1939
Severity: important
Released on: 04/03/2025
Advisory:
Bugzilla: 2349798
Bugzilla Description: firefox: Tapjacking in Android Custom Tabs using transition animations
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-1021
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27423
Severity: moderate
Released on: 03/03/2025
Advisory:
Bugzilla: 2349561
Bugzilla Description: vim: Improper Input Validation in Vim
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-77
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2025-1866
Severity: important
Released on: 03/03/2025
Advisory:
Bugzilla: 2349439
Bugzilla Description: libwebsockets: Undefined Behavior Due to Out-of-Bounds Pointer Arithmetic in libwebsockets
CVSS Score:
CVSSv3 Score: 8.0
Vector:
CWE: CWE-119
Affected Packages:
Package States: A-MQ Interconnect 1,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat Satellite 6,
Full Details
CVE document


CVE-2025-23368
Severity: important
Released on: 03/03/2025
Advisory:
Bugzilla: 2337621
Bugzilla Description: org.wildfly.core:wildfly-elytron-integration: Wildfly Elytron Brute Force Attack via CLI
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-307
Affected Packages:
Package States: Red Hat Build of Keycloak,Red Hat Data Grid 8,Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat JBoss Data Grid 7,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Red Hat Single Sign-On 7,
Full Details
CVE document


CVE-2024-53382
Severity: moderate
Released on: 03/03/2025
Advisory:
Bugzilla: 2349390
Bugzilla Description: prismjs: DOM Clobbering vulnerability within the Prism library's prism-autoloader plugin
CVSS Score:
CVSSv3 Score: 4.9
Vector:
CWE: CWE-94
Affected Packages:
Package States: Migration Toolkit for Virtualization,OpenShift Pipelines,OpenShift Pipelines,OpenShift Pipelines,OpenShift Serverless,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat build of Apicurio Registry 2,Red Hat Ceph Storage 6,Red Hat Ceph Storage 7,Red Hat Ceph Storage 8,Red Hat Data Grid 8,Red Hat Developer Hub,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux AI (RHEL AI),Red Hat Fuse 7,Red Hat Integration Camel K 1,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat Storage 3,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2025-27220
Severity: moderate
Released on: 03/03/2025
Advisory:
Bugzilla: 2349696
Bugzilla Description: CGI: ReDoS in CGI::Util#escapeElement.
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-1333
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27219
Severity: moderate
Released on: 03/03/2025
Advisory:
Bugzilla: 2349699
Bugzilla Description: CGI: Denial of Service in CGI::Cookie.parse
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-770
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-27221
Severity: low
Released on: 03/03/2025
Advisory:
Bugzilla: 2349700
Bugzilla Description: uri: userinfo leakage in URI#join, URI#merge and URI#+
CVSS Score:
CVSSv3 Score: 3.2
Vector:
CWE: CWE-212
Affected Packages:
Package States: Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-25724
Severity: moderate
Released on: 02/03/2025
Advisory:
Bugzilla: 2349221
Bugzilla Description: libarchive: Buffer Overflow vulnerability in libarchive
CVSS Score:
CVSSv3 Score: 4.0
Vector:
CWE: CWE-252
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat OpenShift Container Platform 4,
Full Details
CVE document


CVE-2022-49733
Severity: low
Released on: 02/03/2025
Advisory:
Bugzilla: 2349258
Bugzilla Description: kernel: ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-1801
Severity: important
Released on: 01/03/2025
Advisory: RHSA-2025:1954,
Bugzilla: 2349081
Bugzilla Description: aap-gateway: aap-gateway privilege escalation
CVSS Score:
CVSSv3 Score: 8.1
Vector:
CWE: CWE-362
Affected Packages: automation-gateway-0:2.5.20250305-1.el9ap,automation-gateway-0:2.5.20250305-1.el8ap,
Package States:
Full Details
CVE document


CVE-2025-27414
Severity: important
Released on: 28/02/2025
Advisory:
Bugzilla: 2349095
Bugzilla Description: minio: MinIO SFTP authentication bypass due to improperly trusted SSH key
CVSS Score:
CVSSv3 Score: 7.4
Vector:
CWE: CWE-287
Affected Packages:
Package States:
Full Details
CVE document


CVE-2025-1795
Severity: low
Released on: 28/02/2025
Advisory:
Bugzilla: 2349061
Bugzilla Description: python: Mishandling of comma during folding and unicode-encoding of email headers
CVSS Score:
CVSSv3 Score: 3.1
Vector:
CWE: CWE-168
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-12225
Severity: important
Released on: 28/02/2025
Advisory:
Bugzilla: 2330484
Bugzilla Description: io.quarkus:quarkus-security-webauthn: Quarkus WebAuthn Unexpected Authentication Bypass
CVSS Score:
CVSSv3 Score: 9.1
Vector:
CWE: CWE-288
Affected Packages:
Package States: Red Hat build of Quarkus,
Full Details
CVE document


CVE-2025-1686
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348665
Bugzilla Description: io.pebbletemplates:pebble: Path Traversal Vulnerability in Pebble Templates
CVSS Score:
CVSSv3 Score: 6.8
Vector:
CWE: CWE-73
Affected Packages:
Package States: Red Hat build of Apache Camel for Spring Boot 4,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 8,Red Hat JBoss Enterprise Application Platform Expansion Pack,
Full Details
CVE document


CVE-2025-21775
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348508
Bugzilla Description: kernel: can: ctucanfd: handle skb allocation failure
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21760
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348509
Bugzilla Description: kernel: ndisc: extend RCU protection in ndisc_send_skb()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21770
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348510
Bugzilla Description: kernel: iommu: Fix potential memory leak in iopf_queue_remove_device()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21783
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348511
Bugzilla Description: kernel: gpiolib: Fix crash on error in gpiochip_get_ngpios()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57974
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348512
Bugzilla Description: kernel: udp: Deal with race between UDP socket address change and rehash
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58002
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348513
Bugzilla Description: kernel: media: uvcvideo: Remove dangling pointers
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21757
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348514
Bugzilla Description: kernel: net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21746
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348515
Bugzilla Description: kernel: Input: synaptics - fix crash when enabling pass-through port
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21727
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348516
Bugzilla Description: kernel: padata: fix UAF in padata_reorder
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21731
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348517
Bugzilla Description: kernel: nbd: don't allow reconnect after disconnect
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21778
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348518
Bugzilla Description: kernel: tracing: Do not allow mmap() of persistent ring buffer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21708
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348519
Bugzilla Description: kernel: net: usb: rtl8150: enable basic endpoint checking
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21722
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348520
Bugzilla Description: kernel: nilfs2: do not force clear folio if buffer is referenced
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58019
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348521
Bugzilla Description: kernel: nvkm/gsp: correctly advance the read pointer of GSP message queue
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21732
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348522
Bugzilla Description: kernel: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21795
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348523
Bugzilla Description: kernel: NFSD: fix hang in nfsd4_shutdown_callback
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21736
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348524
Bugzilla Description: kernel: nilfs2: fix possible int overflows in nilfs_fiemap()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57983
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348525
Bugzilla Description: kernel: mailbox: th1520: Fix memory corruption due to incorrect array size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58009
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348526
Bugzilla Description: kernel: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21718
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348527
Bugzilla Description: kernel: net: rose: fix timer races against user threads
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21728
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348528
Bugzilla Description: kernel: bpf: Send signals asynchronously if !preemptible
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21763
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348529
Bugzilla Description: kernel: neighbour: use RCU protection in __neigh_notify()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57852
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348530
Bugzilla Description: kernel: firmware: qcom: scm: smc: Handle missing SCM device
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21758
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348531
Bugzilla Description: kernel: ipv6: mcast: add RCU protection to mld_newpack()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57999
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348532
Bugzilla Description: kernel: powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58016
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348533
Bugzilla Description: kernel: safesetid: check size of policy writes
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21789
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348534
Bugzilla Description: kernel: LoongArch: csum: Fix OoB access in IP checksum code for negative lengths
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-52559
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348535
Bugzilla Description: kernel: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57991
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348536
Bugzilla Description: kernel: wifi: rtw89: chan: fix soft lockup in rtw89_entity_recalc_mgnt_roles()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58021
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348537
Bugzilla Description: kernel: HID: winwing: Add NULL check in winwing_init_led()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-52560
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348538
Bugzilla Description: kernel: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21768
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348539
Bugzilla Description: kernel: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21735
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348540
Bugzilla Description: kernel: NFC: nci: Add bounds checking in nci_hci_create_pipe()
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-54456
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348541
Bugzilla Description: kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21747
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348542
Bugzilla Description: kernel: drm/ast: astdp: Fix timeout for enabling video signal
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57987
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348543
Bugzilla Description: kernel: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21715
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348544
Bugzilla Description: kernel: net: davicom: fix UAF in dm9000_drv_remove
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58001
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348545
Bugzilla Description: kernel: ocfs2: handle a symlink read error correctly
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-54458
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348546
Bugzilla Description: kernel: scsi: ufs: bsg: Set bsg_queue to NULL after removal
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58014
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348547
Bugzilla Description: kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21754
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348548
Bugzilla Description: kernel: btrfs: fix assertion failure when splitting ordered extent after transaction abort
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21709
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348549
Bugzilla Description: kernel: kernel: be more careful about dup_mmap() failures and uprobe registering
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57988
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348550
Bugzilla Description: kernel: Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21733
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348551
Bugzilla Description: kernel: tracing/osnoise: Fix resetting of tracepoints
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21711
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348552
Bugzilla Description: kernel: net/rose: prevent integer overflows in rose_setsockopt()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21767
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348553
Bugzilla Description: kernel: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21714
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348554
Bugzilla Description: kernel: RDMA/mlx5: Fix implicit ODP use after free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21792
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348555
Bugzilla Description: kernel: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-49570
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348556
Bugzilla Description: kernel: drm/xe/tracing: Fix a potential TP_printk UAF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57997
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348557
Bugzilla Description: kernel: wifi: wcn36xx: fix channel survey memory allocation size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58010
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348558
Bugzilla Description: kernel: binfmt_flat: Fix integer overflow bug on 32 bit systems
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58018
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348559
Bugzilla Description: kernel: nvkm: correctly calculate the available space of the GSP cmdq buffer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21725
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348560
Bugzilla Description: kernel: smb: client: fix oops due to unset link speed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58004
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348561
Bugzilla Description: kernel: media: intel/ipu6: remove cpu latency qos request on error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57979
Severity: moderate
Released on: 27/02/2025
Advisory: RHSA-2025:2474, RHSA-2025:2473,
Bugzilla: 2348562
Bugzilla Description: kernel: pps: Fix a use-after-free
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE:
Affected Packages: kernel-rt-0:4.18.0-553.44.1.rt7.385.el8_10,kernel-0:4.18.0-553.44.1.el8_10,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21721
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348563
Bugzilla Description: kernel: nilfs2: handle errors that nilfs_prepare_chunk() may return
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21706
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348564
Bugzilla Description: kernel: mptcp: pm: only set fullmesh for subflow endp
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58007
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348565
Bugzilla Description: kernel: soc: qcom: socinfo: Avoid out of bounds read of serial number
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57993
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348566
Bugzilla Description: kernel: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21742
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348567
Bugzilla Description: kernel: usbnet: ipheth: use static NDP16 location in URB
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21713
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348568
Bugzilla Description: kernel: powerpc/pseries/iommu: Don't unset window if it was never set
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21734
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348569
Bugzilla Description: kernel: misc: fastrpc: Fix copy buffer page size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21719
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348570
Bugzilla Description: kernel: ipmr: do not call mr_mfc_uses_dev() for unres entries
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21755
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348571
Bugzilla Description: kernel: vsock: Orphan socket after transport release
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21743
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348572
Bugzilla Description: kernel: usbnet: ipheth: fix possible overflow in DPE length check
CVSS Score:
CVSSv3 Score: 6.0
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21729
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348573
Bugzilla Description: kernel: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57989
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348574
Bugzilla Description: kernel: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21764
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348575
Bugzilla Description: kernel: ndisc: use RCU protection in ndisc_alloc_skb()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21749
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348576
Bugzilla Description: kernel: net: rose: lock the socket in rose_bind()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58015
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348577
Bugzilla Description: kernel: wifi: ath12k: Fix for out-of bound access error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57998
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348578
Bugzilla Description: kernel: OPP: add index check to assert to avoid buffer overflow in _read_freq()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21748
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348579
Bugzilla Description: kernel: ksmbd: fix integer overflows on 32 bit systems
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21780
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348580
Bugzilla Description: kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-120
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57995
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348581
Bugzilla Description: kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21716
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348582
Bugzilla Description: kernel: vxlan: Fix uninit-value in vxlan_vnifilter_dump()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58011
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348583
Bugzilla Description: kernel: platform/x86: int3472: Check for adev == NULL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21796
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348584
Bugzilla Description: kernel: nfsd: clear acl_access/acl_default after releasing them
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21739
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348585
Bugzilla Description: kernel: scsi: ufs: core: Fix use-after free in init error and remove paths
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57975
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348586
Bugzilla Description: kernel: btrfs: do proper folio cleanup when run_delalloc_nocow() failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21786
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348587
Bugzilla Description: kernel: workqueue: Put the pwq after detaching the rescuer from the pool
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21717
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348588
Bugzilla Description: kernel: net/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58003
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348589
Bugzilla Description: kernel: media: i2c: ds90ub9x3: Fix extra fwnode_handle_put()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58005
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348590
Bugzilla Description: kernel: tpm: Change to kvalloc() in eventlog/acpi.c
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57996
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348591
Bugzilla Description: kernel: net_sched: sch_sfq: don't allow 1 packet limit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-129
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58013
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348592
Bugzilla Description: kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21777
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348593
Bugzilla Description: kernel: ring-buffer: Validate the persistent meta data subbuf array
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21793
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348594
Bugzilla Description: kernel: spi: sn-f-ospi: Fix division by zero
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21738
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348595
Bugzilla Description: kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21759
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348596
Bugzilla Description: kernel: ipv6: mcast: extend RCU protection in igmp6_send()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57986
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348597
Bugzilla Description: kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21794
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348598
Bugzilla Description: kernel: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-119
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57980
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348599
Bugzilla Description: kernel: media: uvcvideo: Fix double free in error path
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21726
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348600
Bugzilla Description: kernel: padata: avoid UAF for reorder_work
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21791
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348601
Bugzilla Description: kernel: vrf: use RCU protection in l3mdev_l3_out()
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58020
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348602
Bugzilla Description: kernel: HID: multitouch: Add NULL check in mt_input_configured
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57984
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348603
Bugzilla Description: kernel: i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-52557
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348604
Bugzilla Description: kernel: drm: zynqmp_dp: Fix integer overflow in zynqmp_dp_rate_get()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57973
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348605
Bugzilla Description: kernel: rdma/cxgb4: Prevent potential integer overflow on 32bit
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21723
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348606
Bugzilla Description: kernel: scsi: mpi3mr: Fix possible crash when setting up bsg fails
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21710
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348607
Bugzilla Description: kernel: tcp: correct handling of extreme memory squeeze
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58008
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348608
Bugzilla Description: kernel: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21756
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348609
Bugzilla Description: kernel: vsock: Keep the binding until socket destruction
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21769
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348610
Bugzilla Description: kernel: ptp: vmclock: Add .owner to vmclock_miscdev_fops
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-99
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21788
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348611
Bugzilla Description: kernel: net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21761
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348612
Bugzilla Description: kernel: openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21779
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348613
Bugzilla Description: kernel: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21772
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348614
Bugzilla Description: kernel: partitions: mac: fix handling of bogus partition table
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21787
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348615
Bugzilla Description: kernel: team: better TEAM_OPTION_TYPE_STRING validation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21797
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348616
Bugzilla Description: kernel: HID: corsair-void: Add missing delayed work cancel for headset status
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21771
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348617
Bugzilla Description: kernel: sched_ext: Fix incorrect autogroup migration detection
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57953
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348618
Bugzilla Description: kernel: rtc: tps6594: Fix integer overflow on 32bit systems
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21730
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348619
Bugzilla Description: kernel: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57981
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348620
Bugzilla Description: kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57977
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348621
Bugzilla Description: kernel: memcg: fix soft lockup in the OOM process
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57978
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348622
Bugzilla Description: kernel: media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57994
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348623
Bugzilla Description: kernel: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57985
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348624
Bugzilla Description: kernel: firmware: qcom: scm: Cleanup global '__scm' on probe failures
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21790
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348625
Bugzilla Description: kernel: vxlan: check vxlan_vnigroup_init() return value
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21712
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348626
Bugzilla Description: kernel: md/md-bitmap: Synchronize bitmap_get_stats() with bitmap lifetime
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21773
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348627
Bugzilla Description: kernel: can: etas_es58x: fix potential NULL pointer dereference on udev->serial
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21740
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348628
Bugzilla Description: kernel: KVM: x86/mmu: Ensure NX huge page recovery thread is alive before waking
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21741
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348629
Bugzilla Description: kernel: usbnet: ipheth: fix DPE OoB read
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21785
Severity: moderate
Released on: 27/02/2025
Advisory: RHSA-2025:3209, RHSA-2025:3208, RHSA-2025:3207, RHSA-2025:3216, RHSA-2025:3128, RHSA-2025:3127, RHSA-2025:3215, RHSA-2025:3214, RHSA-2025:3213, RHSA-2025:3212, RHSA-2025:3211, RHSA-2025:3264, RHSA-2025:3260,
Bugzilla: 2348630
Bugzilla Description: kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-787
Affected Packages: kernel-rt-0:5.14.0-70.126.1.rt21.198.el9_0,kernel-0:5.14.0-503.34.1.el9_5,kernel-rt-0:5.14.0-284.110.1.rt14.395.el9_2,kernel-0:4.18.0-193.148.1.el8_2,kernel-rt-0:4.18.0-305.152.1.rt7.229.el8_4,kernel-0:5.14.0-70.126.1.el9_0,kernel-0:5.14.0-427.61.1.el9_4,kernel-0:4.18.0-305.152.1.el8_4,kernel-0:4.18.0-372.142.1.el8_6,kernel-0:4.18.0-477.94.1.el8_8,kernel-rt-0:4.18.0-553.46.1.rt7.387.el8_10,kernel-0:5.14.0-284.110.1.el9_2,kernel-0:4.18.0-553.46.1.el8_10,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21752
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348631
Bugzilla Description: kernel: btrfs: don't use btrfs_set_item_key_safe on RAID stripe-extents
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21766
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348632
Bugzilla Description: kernel: ipv4: use RCU protection in __ip_rt_update_pmtu()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21782
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348633
Bugzilla Description: kernel: orangefs: fix a oob in orangefs_debug_write
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57990
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348634
Bugzilla Description: kernel: wifi: mt76: mt7925: fix off by one in mt7925_load_clc()
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-193
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21705
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348635
Bugzilla Description: kernel: mptcp: handle fastopen disconnect correctly
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21784
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348636
Bugzilla Description: kernel: drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57976
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348637
Bugzilla Description: kernel: btrfs: do proper folio cleanup when cow_file_range() failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57834
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348638
Bugzilla Description: kernel: media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58000
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348639
Bugzilla Description: kernel: io_uring: prevent reg-wait speculations
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57982
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348640
Bugzilla Description: kernel: xfrm: state: fix out-of-bounds read during lookup
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21753
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348641
Bugzilla Description: kernel: btrfs: fix use-after-free when attempting to join an aborted transaction
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21774
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348642
Bugzilla Description: kernel: can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58017
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348643
Bugzilla Description: kernel: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21707
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348644
Bugzilla Description: kernel: mptcp: consolidate suboption status
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21765
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348645
Bugzilla Description: kernel: ipv6: use RCU protection in ip6_default_advmss()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21751
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348646
Bugzilla Description: kernel: net/mlx5: HWS, change error flow on matcher disconnect
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58006
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348647
Bugzilla Description: kernel: PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21744
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348648
Bugzilla Description: kernel: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21724
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348649
Bugzilla Description: kernel: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58012
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348650
Bugzilla Description: kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21776
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348651
Bugzilla Description: kernel: USB: hub: Ignore non-compliant devices with too many configs or interfaces
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21737
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348652
Bugzilla Description: kernel: ceph: fix memory leak in ceph_mds_auth_match()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-57992
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348653
Bugzilla Description: kernel: wifi: wilc1000: unregister wiphy only if it has been registered
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21745
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348654
Bugzilla Description: kernel: blk-cgroup: Fix class @block_class's subsystem refcount leakage
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21762
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348655
Bugzilla Description: kernel: arp: use RCU protection in arp_xmit()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21750
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348656
Bugzilla Description: kernel: wifi: brcmfmac: Check the return value of of_property_read_string_index()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21720
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348657
Bugzilla Description: kernel: xfrm: delete intermediate secpath entry in packet offload mode
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21781
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348658
Bugzilla Description: kernel: batman-adv: fix panic during interface removal
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21819
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348884
Bugzilla Description: kernel: Revert "drm/amd/display: Use HW lock mgr for PSR1"
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58022
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348885
Bugzilla Description: kernel: mailbox: th1520: Fix a NULL vs IS_ERR() bug
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21800
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348886
Bugzilla Description: kernel: net/mlx5: HWS, fix definer's HWS_SET32 macro for negative offset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21811
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348887
Bugzilla Description: kernel: nilfs2: protect access to buffers with no active references
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21824
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348888
Bugzilla Description: kernel: gpu: host1x: Fix a use of uninitialized mutex
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21809
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348889
Bugzilla Description: kernel: rxrpc, afs: Fix peer hash locking vs RCU callback
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58034
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348890
Bugzilla Description: kernel: memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21807
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348891
Bugzilla Description: kernel: block: fix queue freeze vs limits lock order in sysfs store methods
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21801
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348892
Bugzilla Description: kernel: net: ravb: Fix missing rtnl lock in suspend/resume path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21804
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348893
Bugzilla Description: kernel: PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21805
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348895
Bugzilla Description: kernel: RDMA/rtrs: Add missing deinit() call
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21798
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348896
Bugzilla Description: kernel: firewire: test: Fix potential null dereference in firewire kunit test
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21813
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348897
Bugzilla Description: kernel: timers/migration: Fix off-by-one root mis-connection
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21808
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348898
Bugzilla Description: kernel: net: xdp: Disallow attaching device-bound programs in generic mode
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21817
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348899
Bugzilla Description: kernel: block: mark GFP_NOIO around sysfs ->store()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21823
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348900
Bugzilla Description: kernel: batman-adv: Drop unmanaged ELP metric worker
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21806
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348901
Bugzilla Description: kernel: net: let net.core.dev_weight always be non-zero
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21815
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348902
Bugzilla Description: kernel: mm/compaction: fix UBSAN shift-out-of-bounds warning
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21821
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348903
Bugzilla Description: kernel: fbdev: omap: use threaded IRQ for LCD DMA
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21810
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348904
Bugzilla Description: kernel: driver core: class: Fix wild pointer dereferences in API class_dev_iter_next()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21802
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348905
Bugzilla Description: kernel: net: hns3: fix oops when unload drivers paralleling
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-413
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2024-58042
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348906
Bugzilla Description: kernel: rhashtable: Fix potential deadlock by moving schedule_work outside lock
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21822
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348907
Bugzilla Description: kernel: ptp: vmclock: Set driver data before its usage
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21818
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348908
Bugzilla Description: kernel: x86/xen: fix xen_hypercall_hvm() to not clobber %rbx
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21816
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348909
Bugzilla Description: kernel: hrtimers: Force migrate away hrtimers queued after CPUHP_AP_HRTIMERS_DYING
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-664
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21812
Severity: important
Released on: 27/02/2025
Advisory:
Bugzilla: 2348910
Bugzilla Description: kernel: ax25: rcu protect dev->ax25_ptr
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21803
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348911
Bugzilla Description: kernel: LoongArch: Fix warnings during S3 suspend
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-662
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21799
Severity: low
Released on: 27/02/2025
Advisory:
Bugzilla: 2348914
Bugzilla Description: kernel: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-20
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21820
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348916
Bugzilla Description: kernel: tty: xilinx_uartps: split sysrq handling
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-833
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-21814
Severity: moderate
Released on: 27/02/2025
Advisory:
Bugzilla: 2348917
Bugzilla Description: kernel: ptp: Ensure info->enable callback is always set
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2025-22868
Severity: important
Released on: 26/02/2025
Advisory: RHSA-2025:3053, RHSA-2025:3051, RHSA-2025:3172, RHSA-2025:2526, RHSA-2025:2567, RHSA-2025:3335,
Bugzilla: 2348366
Bugzilla Description: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-1286
Affected Packages: gatekeeper/gatekeeper-operator-bundle:v3.15.4-1,advanced-cluster-security/rhacs-rhel8-operator:4.6.3-2,gatekeeper/gatekeeper-rhel9:v3.17.2-5,advanced-cluster-security/rhacs-central-db-rhel8:4.5.7-2,advanced-cluster-security/rhacs-roxctl-rhel8:4.6.3-2,advanced-cluster-security/rhacs-scanner-db-rhel8:4.5.7-2,advanced-cluster-security/rhacs-scanner-rhel8:4.6.3-2,advanced-cluster-security/rhacs-scanner-v4-db-rhel8:4.6.3-2,advanced-cluster-security/rhacs-collector-slim-rhel8:4.6.3-2,gatekeeper/gatekeeper-rhel9-operator:v3.15.4-1,advanced-cluster-security/rhacs-main-rhel8:4.6.3-2,advanced-cluster-security/rhacs-roxctl-rhel8:4.5.7-2,gatekeeper/gatekeeper-rhel9:v3.15.1-30,advanced-cluster-security/rhacs-scanner-db-rhel8:4.6.3-2,advanced-cluster-security/rhacs-main-rhel8:4.5.7-2,advanced-cluster-security/rhacs-scanner-rhel8:4.5.7-2,advanced-cluster-security/rhacs-scanner-v4-db-rhel8:4.5.7-2,advanced-cluster-security/rhacs-scanner-slim-rhel8:4.5.7-2,advanced-cluster-security/rhacs-operator-bundle:4.6.3-3,opentelemetry-collector-0:0.107.0-8.el9_5,rhacs-scanner-db-slim-container-4.6.3-2,advanced-cluster-security/rhacs-scanner-db-slim-rhel8:4.5.7-2,advanced-cluster-security/rhacs-collector-slim-rhel8:4.5.7-2,rhacm2/volsync-rhel9:v0.12.1-2,advanced-cluster-security/rhacs-scanner-slim-rhel8:4.6.3-2,advanced-cluster-security/rhacs-central-db-rhel8:4.6.3-2,advanced-cluster-security/rhacs-scanner-v4-rhel8:4.6.3-3,advanced-cluster-security/rhacs-collector-rhel8:4.5.7-2,advanced-cluster-security/rhacs-rhel8-operator:4.5.7-2,advanced-cluster-security/rhacs-operator-bundle:4.5.7-2,gatekeeper/gatekeeper-operator-bundle:v3.17.2-2,gatekeeper/gatekeeper-rhel9-operator:v3.17.2-4,advanced-cluster-security/rhacs-scanner-v4-rhel8:4.5.7-2,advanced-cluster-security/rhacs-collector-rhel8:4.6.3-2,rhacm2/volsync-operator-bundle:v0.12.1-2,
Package States: cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Cryostat 3,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Custom Metric Autoscaler operator for Red Hat Openshift,Logging Subsystem for Red Hat OpenShift,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Applications 7,Migration Toolkit for Containers,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Migration Toolkit for Virtualization,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Node Maintenance Operator,Node Maintenance Operator,Node Maintenance Operator,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,OpenShift Service Mesh 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat 3scale API Management Platform 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Ansible Automation Platform 1.2,Red Hat Ansible Automation Platform 1.2,Red Hat Ceph Storage 5,Red Hat Ceph Storage 6,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Ceph Storage 8,Red Hat Connectivity Link,Red Hat Connectivity Link,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Cluster Manager CLI,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift distributed tracing 3,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat Quay 3,Red Hat Quay 3,Red Hat Service Interconnect 1,Red Hat Storage 3,Red Hat Storage 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2025-22869
Severity: important
Released on: 26/02/2025
Advisory: RHSA-2025:3336, RHSA-2025:3268, RHSA-2025:3266, RHSA-2025:3210, RHSA-2025:3165, RHSA-2025:3175, RHSA-2025:3186, RHSA-2025:3053, RHSA-2025:3185, RHSA-2025:3052, RHSA-2025:3184, RHSA-2025:3051, RHSA-2025:3172,
Bugzilla: 2348367
Bugzilla Description: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
CVSS Score:
CVSSv3 Score: 7.5
Vector:
CWE: CWE-770
Affected Packages: gatekeeper/gatekeeper-rhel9:v3.15.1-30,gvisor-tap-vsock-6:0.7.3-5.el9_4.1,gatekeeper/gatekeeper-rhel9-operator:v3.18.0-1,gatekeeper/gatekeeper-operator-bundle:v3.15.4-1,podman-4:5.2.2-15.el9_5,podman-2:4.4.1-22.el9_2.1,gatekeeper/gatekeeper-rhel9:v3.17.2-5,podman-4:4.9.4-18.el9_4,container-tools:rhel8-8060020250324151101.3b538bd8,container-tools:rhel8-8080020250322062858.0f77c1b7,gatekeeper/gatekeeper-operator-bundle:v3.18.0-1,rhacm2/volsync-rhel9:v0.12.1-2,container-tools:rhel8-8040020250321185531.c0c392d5,container-tools:rhel8-8100020250317163430.afee755d,gatekeeper/gatekeeper-rhel9:v3.18.2-1,gatekeeper/gatekeeper-operator-bundle:v3.17.2-2,gatekeeper/gatekeeper-rhel9-operator:v3.17.2-4,gatekeeper/gatekeeper-rhel9-operator:v3.15.4-1,rhacm2/volsync-operator-bundle:v0.12.1-2,podman-2:4.2.0-6.el9_0.3,
Package States: Assisted Installer for Red Hat OpenShift Container Platform,Assisted Installer for Red Hat OpenShift Container Platform,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,Builds for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,cert-manager Operator for Red Hat OpenShift,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,Multicluster Engine for Kubernetes,OpenShift API for Data Protection,OpenShift API for Data Protection,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Developer Tools and Services,OpenShift Pipelines,OpenShift Serverless,OpenShift Serverless,OpenShift Serverless,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Management for Kubernetes 2,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Advanced Cluster Security 4,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift AI (RHOAI),Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat OpenShift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift Dev Spaces,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift GitOps,Red Hat OpenShift on AWS,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat Openshift Sandboxed Containers,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenShift Virtualization 4,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 16.2,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 17.1,Red Hat OpenStack Platform 18.0,Red Hat OpenStack Platform 18.0,Red Hat Quay 3,Red Hat Storage 3,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,Red Hat Trusted Artifact Signer,
Full Details
CVE document


CVE-2022-49077
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347642
Bugzilla Description: kernel: mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49710
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347643
Bugzilla Description: kernel: dm mirror log: round up region bitmap size to BITS_PER_LONG
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49080
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347644
Bugzilla Description: kernel: mm/mempolicy: fix mpol_new leak in shared_policy_replace
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49655
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347645
Bugzilla Description: kernel: fscache: Fix invalidation/lookup race
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49150
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347646
Bugzilla Description: kernel: rtc: gamecube: Fix refcount leak in gamecube_rtc_read_offset_from_sram
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49715
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347647
Bugzilla Description: kernel: irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49571
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347648
Bugzilla Description: kernel: tcp: Fix data-races around sysctl_tcp_max_reordering.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49651
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347649
Bugzilla Description: kernel: srcu: Tighten cleanup_srcu_struct() GP checks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49316
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347650
Bugzilla Description: kernel: NFSv4: Don't hold the layoutget locks across multiple RPC calls
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49439
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347651
Bugzilla Description: kernel: powerpc/fsl_rio: Fix refcount leak in fsl_rio_setup
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49141
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347652
Bugzilla Description: kernel: net: dsa: felix: fix possible NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49207
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347653
Bugzilla Description: kernel: bpf, sockmap: Fix memleak in sk_psock_queue_msg
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49215
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347654
Bugzilla Description: kernel: xsk: Fix race at socket teardown
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49298
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347655
Bugzilla Description: kernel: staging: rtl8712: fix uninit-value in r871xu_drv_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49635
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347656
Bugzilla Description: kernel: drm/i915/selftests: fix subtraction overflow bug
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49388
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347657
Bugzilla Description: kernel: ubi: ubi_create_volume: Fix use-after-free when volume creation failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49300
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347658
Bugzilla Description: kernel: nbd: fix race between nbd_alloc_config() and module removal
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49442
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347659
Bugzilla Description: kernel: drivers/base/node.c: fix compaction sysfs file leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49323
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347660
Bugzilla Description: kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49539
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347661
Bugzilla Description: kernel: rtw89: ser: fix CAM leaks occurring in L2 reset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49407
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347662
Bugzilla Description: kernel: dlm: fix plock invalid read
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49106
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347663
Bugzilla Description: kernel: staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49167
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347664
Bugzilla Description: kernel: btrfs: do not double complete bio on errors during compressed reads
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49118
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347665
Bugzilla Description: kernel: scsi: hisi_sas: Free irq vectors in order for v3 HW
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49416
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347666
Bugzilla Description: kernel: wifi: mac80211: fix use-after-free in chanctx code
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49235
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347667
Bugzilla Description: kernel: ath9k_htc: fix uninit value bugs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49305
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347668
Bugzilla Description: kernel: drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49628
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347669
Bugzilla Description: kernel: net: stmmac: fix leaks in probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49049
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347670
Bugzilla Description: kernel: mm/secretmem: fix panic when growing a memfd_secret
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49580
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347671
Bugzilla Description: kernel: ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49695
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347672
Bugzilla Description: kernel: igb: fix a use-after-free issue in igb_clean_tx_ring
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49160
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347673
Bugzilla Description: kernel: scsi: qla2xxx: Fix crash during module load unload test
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49448
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347674
Bugzilla Description: kernel: soc: bcm: Check for NULL return of devm_kzalloc()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49210
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347675
Bugzilla Description: kernel: MIPS: pgalloc: fix memory leak caused by pgd_free()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49247
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347676
Bugzilla Description: kernel: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49192
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347677
Bugzilla Description: kernel: drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49591
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347678
Bugzilla Description: kernel: net: dsa: microchip: ksz_common: Fix refcount leak bug
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49378
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347679
Bugzilla Description: kernel: sfc: fix considering that all channels have TX queues
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49342
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347680
Bugzilla Description: kernel: net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49146
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347681
Bugzilla Description: kernel: virtio: use virtio_device_ready() in virtio_device_restore()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49413
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347682
Bugzilla Description: kernel: bfq: Update cgroup information before merging bio
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49319
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347683
Bugzilla Description: kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49708
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347684
Bugzilla Description: kernel: ext4: fix bug_on ext4_mb_use_inode_pa
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49517
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347685
Bugzilla Description: kernel: ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49116
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347686
Bugzilla Description: kernel: Bluetooth: use memset avoid memory leaks
CVSS Score:
CVSSv3 Score: 5.7
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49084
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347687
Bugzilla Description: kernel: qede: confirm skb is allocated before using
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49727
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347688
Bugzilla Description: kernel: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49277
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347689
Bugzilla Description: kernel: jffs2: fix memory leak in jffs2_do_mount_fs
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49361
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347690
Bugzilla Description: kernel: f2fs: fix to do sanity check for inline inode
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49540
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347691
Bugzilla Description: kernel: rcu-tasks: Fix race in schedule and flush work
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49564
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347692
Bugzilla Description: kernel: crypto: qat - add param check for DH
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49200
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347693
Bugzilla Description: kernel: Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49344
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347694
Bugzilla Description: kernel: af_unix: Fix a data-race in unix_dgram_peer_wake_me().
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49264
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347695
Bugzilla Description: kernel: exec: Force single empty string when argv is empty
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49425
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347696
Bugzilla Description: kernel: f2fs: fix dereference of stale list iterator after loop body
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47653
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347697
Bugzilla Description: kernel: media: davinci: vpif: fix use-after-free on driver unbind
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49450
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347698
Bugzilla Description: kernel: rxrpc: Fix listen() setting the bar too high for the prealloc rings
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49582
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347699
Bugzilla Description: kernel: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49688
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347700
Bugzilla Description: kernel: afs: Fix dynamic root getattr
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49296
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347701
Bugzilla Description: kernel: ceph: fix possible deadlock when holding Fwb to get inline_data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49306
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347702
Bugzilla Description: kernel: usb: dwc3: host: Stop setting the ACPI companion
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49127
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347703
Bugzilla Description: kernel: ref_tracker: implement use-after-free detection
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49466
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347704
Bugzilla Description: kernel: regulator: scmi: Fix refcount leak in scmi_regulator_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49256
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347705
Bugzilla Description: kernel: watch_queue: Actually free the watch
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47640
Severity: important
Released on: 26/02/2025
Advisory:
Bugzilla: 2347706
Bugzilla Description: kernel: powerpc/kasan: Fix early region not updated correctly
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49657
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347707
Bugzilla Description: kernel: usbnet: fix memory leak in error case
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49711
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347708
Bugzilla Description: kernel: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49636
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347709
Bugzilla Description: kernel: vlan: fix memory leak in vlan_newlink()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49504
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347710
Bugzilla Description: kernel: scsi: lpfc: Inhibit aborts if external loopback plug is inserted
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49604
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347711
Bugzilla Description: kernel: ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49568
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347712
Bugzilla Description: kernel: KVM: Don't null dereference ops->destroy
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49578
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347713
Bugzilla Description: kernel: ip: Fix data-races around sysctl_ip_prot_sock.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49531
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347714
Bugzilla Description: kernel: loop: implement ->free_disk
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49338
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347715
Bugzilla Description: kernel: net/mlx5e: CT: Fix cleanup of CT before cleanup of TC ct rules
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49658
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347716
Bugzilla Description: kernel: bpf: Fix insufficient bounds propagation from adjust_scalar_min_max_vals
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49322
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347717
Bugzilla Description: kernel: tracing: Fix sleeping function called from invalid context on RT kernel
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47650
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347718
Bugzilla Description: kernel: ASoC: soc-compress: prevent the potentially use of null pointer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49221
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347719
Bugzilla Description: kernel: drm/msm/dp: populate connector of struct dp_panel
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49423
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347720
Bugzilla Description: kernel: rtla: Avoid record NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49369
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347721
Bugzilla Description: kernel: amt: fix possible memory leak in amt_rcv()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49682
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347722
Bugzilla Description: kernel: xtensa: Fix refcount leak bug in time.c
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49280
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347723
Bugzilla Description: kernel: NFSD: prevent underflow in nfssvc_decode_writeargs()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49374
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347724
Bugzilla Description: kernel: tipc: check attribute length for bearer name
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47652
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347725
Bugzilla Description: kernel: video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49612
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347726
Bugzilla Description: kernel: power: supply: core: Fix boundary conditions in interpolation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49290
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347727
Bugzilla Description: kernel: mac80211: fix potential double free on mesh join
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49679
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347728
Bugzilla Description: kernel: ARM: Fix refcount leak in axxia_boot_secondary
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49148
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347729
Bugzilla Description: kernel: watch_queue: Free the page array when watch_queue is dismantled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49109
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347730
Bugzilla Description: kernel: ceph: fix inode reference leakage in ceph_get_snapdir()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49375
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347731
Bugzilla Description: kernel: rtc: mt6397: check return value after calling platform_get_resource()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49119
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347732
Bugzilla Description: kernel: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49222
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347733
Bugzilla Description: kernel: drm/bridge: anx7625: Fix overflow issue on reading EDID
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49267
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347734
Bugzilla Description: kernel: mmc: core: use sysfs_emit() instead of sprintf()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49115
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347735
Bugzilla Description: kernel: PCI: endpoint: Fix misused goto label
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49258
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347736
Bugzilla Description: kernel: crypto: ccree - Fix use after free in cc_cipher_exit()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49168
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347737
Bugzilla Description: kernel: btrfs: do not clean up repair bio if submit fails
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49618
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347738
Bugzilla Description: kernel: pinctrl: aspeed: Fix potential NULL dereference in aspeed_pinmux_set_mux()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49081
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347739
Bugzilla Description: kernel: highmem: fix checks in __kmap_local_sched_{in,out}
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49608
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347740
Bugzilla Description: kernel: pinctrl: ralink: Check for null return of devm_kcalloc
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49382
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347741
Bugzilla Description: kernel: soc: rockchip: Fix refcount leak in rockchip_grf_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49332
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347742
Bugzilla Description: kernel: scsi: lpfc: Address NULL pointer dereference after starget_to_rport()
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49183
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347743
Bugzilla Description: kernel: net/sched: act_ct: fix ref leak when switching zones
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49507
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347744
Bugzilla Description: kernel: regulator: da9121: Fix uninit-value in da9121_assign_chip_model()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49716
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347745
Bugzilla Description: kernel: irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49511
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347746
Bugzilla Description: kernel: fbdev: defio: fix the pagelist corruption
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47638
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347747
Bugzilla Description: kernel: ubifs: rename_whiteout: Fix double free for whiteout_ui->data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49392
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347748
Bugzilla Description: kernel: serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49723
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347749
Bugzilla Description: kernel: drm/i915/reset: Fix error_state_read ptr + offset use
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49686
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347750
Bugzilla Description: kernel: usb: gadget: uvc: fix list double add in uvcg_video_pump
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49261
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347751
Bugzilla Description: kernel: drm/i915/gem: add missing boundary check in vm_access
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49230
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347752
Bugzilla Description: kernel: mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49432
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347753
Bugzilla Description: kernel: powerpc/xics: fix refcount leak in icp_opal_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49317
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347754
Bugzilla Description: kernel: f2fs: avoid infinite loop to flush node pages
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49110
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347755
Bugzilla Description: kernel: netfilter: conntrack: revisit gc autotuning
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49137
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347756
Bugzilla Description: kernel: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49334
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347757
Bugzilla Description: kernel: mm/huge_memory: Fix xarray node memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49483
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347758
Bugzilla Description: kernel: drm/msm/disp/dpu1: avoid clearing hw interrupts if hw_intr is null during drm uninit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49672
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347759
Bugzilla Description: kernel: net: tun: unlink NAPI from device on destruction
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49313
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347760
Bugzilla Description: kernel: drivers: usb: host: Fix deadlock in oxu_bus_suspend()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49408
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347761
Bugzilla Description: kernel: ext4: fix memory leak in parse_apply_sb_mount_options()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49495
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347762
Bugzilla Description: kernel: drm/msm/hdmi: check return value after calling platform_get_resource_byname()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49333
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347763
Bugzilla Description: kernel: net/mlx5: E-Switch, pair only capable devices
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49584
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347764
Bugzilla Description: kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47635
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347765
Bugzilla Description: kernel: ubifs: Fix to add refcount once page is set private
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49386
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347766
Bugzilla Description: kernel: net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49663
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347767
Bugzilla Description: kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47633
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347768
Bugzilla Description: kernel: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49590
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347769
Bugzilla Description: kernel: igmp: Fix data-races around sysctl_igmp_llm_reports.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49086
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347770
Bugzilla Description: kernel: net: openvswitch: fix leak of nested actions
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49422
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347771
Bugzilla Description: kernel: dmaengine: idxd: Fix the error handling path in idxd_cdev_register()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49227
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347772
Bugzilla Description: kernel: igc: avoid kernel warning when changing RX ring parameters
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49692
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347773
Bugzilla Description: kernel: net: phy: at803x: fix NULL pointer dereference on AR9331 PHY
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49570
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347774
Bugzilla Description: kernel: gpio: gpio-xilinx: Fix integer overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-190
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49429
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347775
Bugzilla Description: kernel: RDMA/hfi1: Prevent panic when SDMA is disabled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49465
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347776
Bugzilla Description: kernel: blk-throttle: Set BIO_THROTTLED when bio has been throttled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49101
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347777
Bugzilla Description: kernel: xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49112
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347778
Bugzilla Description: kernel: mt76: fix monitor mode crash with sdio driver
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49565
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347779
Bugzilla Description: kernel: perf/x86/intel/lbr: Fix unchecked MSR access error on HSW
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49694
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347780
Bugzilla Description: kernel: block: disable the elevator int del_gendisk
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49353
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347781
Bugzilla Description: kernel: powerpc/papr_scm: don't requests stats with '0' sized stats buffer
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49232
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347782
Bugzilla Description: kernel: drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49156
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347783
Bugzilla Description: kernel: scsi: qla2xxx: Fix scheduling while atomic
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49234
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347785
Bugzilla Description: kernel: net: dsa: Avoid cross-chip syncing of VLAN filtering
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49071
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347786
Bugzilla Description: kernel: drm/panel: ili9341: fix optional regulator handling
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49562
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347787
Bugzilla Description: kernel: KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47637
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347788
Bugzilla Description: kernel: ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49121
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347789
Bugzilla Description: kernel: scsi: pm8001: Fix tag leaks on error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49558
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347790
Bugzilla Description: kernel: netfilter: nf_tables: double hook unregistration in netns path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49528
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347791
Bugzilla Description: kernel: media: i2c: dw9714: Disable the regulator when the driver fails to probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49673
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347792
Bugzilla Description: kernel: dm raid: fix KASAN warning in raid5_add_disks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49393
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347793
Bugzilla Description: kernel: misc: fastrpc: fix list iterator in fastrpc_req_mem_unmap_impl
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49075
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347794
Bugzilla Description: kernel: btrfs: fix qgroup reserve overflow the qgroup limit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49275
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347795
Bugzilla Description: kernel: can: m_can: m_can_tx_handler(): fix use after free of skb
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49389
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347796
Bugzilla Description: kernel: usb: usbip: fix a refcount leak in stub_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49402
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347797
Bugzilla Description: kernel: ftrace: Clean up hash direct_functions on register failures
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47647
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347798
Bugzilla Description: kernel: clk: qcom: ipq8074: fix PCI-E clock oops
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49569
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347799
Bugzilla Description: kernel: spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49284
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347800
Bugzilla Description: kernel: coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49585
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347801
Bugzilla Description: kernel: tcp: Fix data-races around sysctl_tcp_fastopen_blackhole_timeout.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49712
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347802
Bugzilla Description: kernel: usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49592
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347803
Bugzilla Description: kernel: net: stmmac: fix dma queue left shift overflow issue
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49426
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347804
Bugzilla Description: kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47660
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347805
Bugzilla Description: kernel: fs/ntfs3: Fix some memory leaks in an error handling path of 'log_replay()'
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49199
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347806
Bugzilla Description: kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
CVSS Score:
CVSSv3 Score: 5.3
Vector:
CWE: CWE-191
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49437
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347807
Bugzilla Description: kernel: powerpc/xive: Fix refcount leak in xive_spapr_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49362
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347808
Bugzilla Description: kernel: NFSD: Fix potential use-after-free in nfsd_file_put()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49255
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347809
Bugzilla Description: kernel: f2fs: fix missing free nid in f2fs_handle_failed_inode
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49499
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347810
Bugzilla Description: kernel: drm/msm: Fix null pointer dereferences without iommu
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49246
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347811
Bugzilla Description: kernel: ASoC: atmel: Fix error handling in snd_proto_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49048
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347812
Bugzilla Description: kernel: ipv6: fix panic when forwarding a pkt with no in6 dev
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49093
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347813
Bugzilla Description: kernel: skbuff: fix coalescing for page_pool fragment recycling
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49503
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347814
Bugzilla Description: kernel: ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49461
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347815
Bugzilla Description: kernel: amt: fix memory leak for advertisement message
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49314
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347816
Bugzilla Description: kernel: tty: Fix a possible resource leak in icom_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49659
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347817
Bugzilla Description: kernel: can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49079
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347818
Bugzilla Description: kernel: btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49430
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347819
Bugzilla Description: kernel: Input: gpio-keys - cancel delayed work only in case of GPIO
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49128
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347820
Bugzilla Description: kernel: drm/bridge: Add missing pm_runtime_put_sync
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49347
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347821
Bugzilla Description: kernel: ext4: fix bug_on in ext4_writepages
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49244
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347822
Bugzilla Description: kernel: ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49283
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347823
Bugzilla Description: kernel: firmware: sysfb: fix platform-device leak in error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49131
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347824
Bugzilla Description: kernel: ath11k: fix kernel panic during unload/load ath11k modules
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-459
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49730
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347825
Bugzilla Description: kernel: scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49113
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347826
Bugzilla Description: kernel: powerpc/secvar: fix refcount leak in format_show()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49598
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347827
Bugzilla Description: kernel: tcp: Fix data-races around sysctl_tcp_mtu_probing.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49401
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347828
Bugzilla Description: kernel: mm/page_owner: use strscpy() instead of strlcpy()
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-787
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49652
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347829
Bugzilla Description: kernel: dmaengine: ti: Fix refcount leak in ti_dra7_xbar_route_allocate
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49394
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347830
Bugzilla Description: kernel: blk-iolatency: Fix inflight count imbalances and IO hangs on offline
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49522
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347831
Bugzilla Description: kernel: mmc: jz4740: Apply DMA engine limits to maximum segment size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49070
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347832
Bugzilla Description: kernel: fbdev: Fix unregistering of framebuffers without device
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49293
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347833
Bugzilla Description: kernel: netfilter: nf_tables: initialize registers in nft_do_chain()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49124
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347834
Bugzilla Description: kernel: x86/mce: Work around an erratum on fast string copy instructions
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49512
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347835
Bugzilla Description: kernel: mtd: rawnand: denali: Use managed device resources
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49203
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347836
Bugzilla Description: kernel: drm/amd/display: Fix double free during GPU reset on DC streams
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49717
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347837
Bugzilla Description: kernel: irqchip/apple-aic: Fix refcount leak in build_fiq_affinity
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49052
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347838
Bugzilla Description: kernel: mm: fix unexpected zeroed page mapping with zram swap
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49129
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347839
Bugzilla Description: kernel: mt76: mt7921: fix crash when startup fails.
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49473
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347840
Bugzilla Description: kernel: ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_*
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49302
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347841
Bugzilla Description: kernel: USB: host: isp116x: check return value after calling platform_get_resource()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49291
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347842
Bugzilla Description: kernel: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49447
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347843
Bugzilla Description: kernel: ARM: hisi: Add missing of_node_put after of_find_compatible_node
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49551
Severity: important
Released on: 26/02/2025
Advisory:
Bugzilla: 2347844
Bugzilla Description: kernel: usb: isp1760: Fix out-of-bounds array access
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49706
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347845
Bugzilla Description: kernel: zonefs: fix zonefs_iomap_begin() for reads
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49420
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347846
Bugzilla Description: kernel: net: annotate races around sk->sk_bound_dev_if
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49536
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347847
Bugzilla Description: kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47642
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347848
Bugzilla Description: kernel: video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49107
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347849
Bugzilla Description: kernel: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49662
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347850
Bugzilla Description: kernel: ipv6: fix lockdep splat in in6_dump_addrs()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49696
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347851
Bugzilla Description: kernel: tipc: fix use-after-free Read in tipc_named_reinit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49410
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347852
Bugzilla Description: kernel: tracing: Fix potential double free in create_var_ref()
CVSS Score:
CVSSv3 Score: 4.1
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49656
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347853
Bugzilla Description: kernel: ARM: meson: Fix refcount leak in meson_smp_prepare_cpus
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49345
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347854
Bugzilla Description: kernel: net: xfrm: unexport __init-annotated xfrm4_protocol_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49159
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347855
Bugzilla Description: kernel: scsi: qla2xxx: Implement ref count for SRB
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49484
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347856
Bugzilla Description: kernel: mt76: mt7915: fix possible NULL pointer dereference in mt7915_mac_fill_rx_vector
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49542
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347857
Bugzilla Description: kernel: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49120
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347858
Bugzilla Description: kernel: scsi: pm8001: Fix task leak in pm8001_send_abort_all()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49627
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347859
Bugzilla Description: kernel: ima: Fix potential memory leak in ima_init_crypto()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49281
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347860
Bugzilla Description: kernel: cifs: fix handlecache and multiuser
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49411
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347861
Bugzilla Description: kernel: bfq: Make sure bfqg for which we are queueing requests is online
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49327
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347862
Bugzilla Description: kernel: bcache: avoid journal no-space deadlock by reserving 1 journal bucket
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-667
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49341
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347863
Bugzilla Description: kernel: bpf, arm64: Clear prog->jited_len along prog->jited
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49405
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347864
Bugzilla Description: kernel: staging: r8188eu: prevent ->Ssid overflow in rtw_wx_set_scan()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49616
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347865
Bugzilla Description: kernel: ASoC: rt7*-sdw: harden jack_detect_handler
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49224
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347866
Bugzilla Description: kernel: power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49301
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347867
Bugzilla Description: kernel: staging: rtl8712: fix uninit-value in usb_read8() and friends
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49486
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347868
Bugzilla Description: kernel: ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49489
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347869
Bugzilla Description: kernel: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49211
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347870
Bugzilla Description: kernel: mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49548
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347871
Bugzilla Description: kernel: bpf: Fix potential array overflow in bpf_trampoline_get_progs()
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-129
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49253
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347872
Bugzilla Description: kernel: media: usb: go7007: s2250-board: fix leak in probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49331
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347873
Bugzilla Description: kernel: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49271
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347874
Bugzilla Description: kernel: cifs: prevent bad output lengths in smb2_ioctl_query_info()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49366
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347875
Bugzilla Description: kernel: ksmbd: fix reference count leak in smb_check_perm_dacl()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49359
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347876
Bugzilla Description: kernel: drm/panfrost: Job should reference MMU not file_priv
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49288
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347877
Bugzilla Description: kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49462
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347878
Bugzilla Description: kernel: drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49515
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347879
Bugzilla Description: kernel: ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49678
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347880
Bugzilla Description: kernel: soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49321
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347881
Bugzilla Description: kernel: xprtrdma: treat all calls not a bcall when bc_serv is NULL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49613
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347882
Bugzilla Description: kernel: serial: 8250: Fix PM usage_count for console handover
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49099
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347883
Bugzilla Description: kernel: Drivers: hv: vmbus: Fix initialization of device object in vmbus_device_register()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49324
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347884
Bugzilla Description: kernel: mips: cpc: Fix refcount leak in mips_cpc_default_phys_base
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49045
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347885
Bugzilla Description: kernel: ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49530
Severity: important
Released on: 26/02/2025
Advisory:
Bugzilla: 2347886
Bugzilla Description: kernel: drm/amd/pm: fix double free in si_parse_power_table()
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49185
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347887
Bugzilla Description: kernel: pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49068
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347888
Bugzilla Description: kernel: btrfs: release correct delalloc amount in direct IO write path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49309
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347889
Bugzilla Description: kernel: drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49384
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347890
Bugzilla Description: kernel: md: fix double free of io_acct_set bioset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49421
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347891
Bugzilla Description: kernel: video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49445
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347892
Bugzilla Description: kernel: pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49143
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347893
Bugzilla Description: kernel: nbd: fix possible overflow on 'first_minor' in nbd_dev_add()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49488
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347894
Bugzilla Description: kernel: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49352
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347895
Bugzilla Description: kernel: ext4: fix warning in ext4_handle_inode_extension
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49184
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347896
Bugzilla Description: kernel: net: sparx5: switchdev: fix possible NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49335
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347897
Bugzilla Description: kernel: drm/amdgpu/cs: make commands with 0 chunks illegal behaviour.
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49142
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347898
Bugzilla Description: kernel: net: preserve skb_end_offset() in skb_unclone_keeptruesize()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49395
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347899
Bugzilla Description: kernel: um: Fix out-of-bounds read in LDT setup
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49242
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347900
Bugzilla Description: kernel: ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49624
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347901
Bugzilla Description: kernel: net: atlantic: remove aq_nic_deinit() when resume
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49149
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347902
Bugzilla Description: kernel: rxrpc: Fix call timer start racing with call destruction
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49456
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347903
Bugzilla Description: kernel: bonding: fix missed rcu protection
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49059
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347904
Bugzilla Description: kernel: nfc: nci: add flush_workqueue to prevent uaf
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49318
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347905
Bugzilla Description: kernel: f2fs: remove WARN_ON in f2fs_is_valid_blkaddr
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49198
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347906
Bugzilla Description: kernel: mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49690
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347907
Bugzilla Description: kernel: net/tls: fix tls_sk_proto_close executed repeatedly
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49535
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347908
Bugzilla Description: kernel: scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49278
Severity: important
Released on: 26/02/2025
Advisory:
Bugzilla: 2347909
Bugzilla Description: kernel: remoteproc: Fix count check in rproc_coredump_write()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49396
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347910
Bugzilla Description: kernel: phy: qcom-qmp: fix reset-controller leak on probe errors
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47634
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347911
Bugzilla Description: kernel: ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
CVSS Score:
CVSSv3 Score: 6.4
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49064
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347912
Bugzilla Description: kernel: cachefiles: unmark inode in use in error path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49492
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347913
Bugzilla Description: kernel: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49171
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347914
Bugzilla Description: kernel: ext4: don't BUG if someone dirty pages without asking ext4 first
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49575
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347915
Bugzilla Description: kernel: tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49138
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347916
Bugzilla Description: kernel: Bluetooth: hci_event: Ignore multiple conn complete events
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49365
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347917
Bugzilla Description: kernel: drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49351
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347918
Bugzilla Description: kernel: net: altera: Fix refcount leak in altera_tse_mdio_create
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49670
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347919
Bugzilla Description: kernel: linux/dim: Fix divide by 0 in RDMA DIM
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-369
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47631
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347920
Bugzilla Description: kernel: ARM: davinci: da850-evm: Avoid NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49134
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347921
Bugzilla Description: kernel: mlxsw: spectrum: Guard against invalid local ports
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49195
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347922
Bugzilla Description: kernel: net: dsa: fix panic on shutdown if multi-chip tree failed to probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49520
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347923
Bugzilla Description: kernel: arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49197
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347924
Bugzilla Description: kernel: af_netlink: Fix shift out of bounds in group mask calculation
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49056
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347925
Bugzilla Description: kernel: io_uring: abort file assignment prior to assigning creds
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49610
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347926
Bugzilla Description: kernel: KVM: VMX: Prevent RSB underflow before vmenter
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49661
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347927
Bugzilla Description: kernel: can: gs_usb: gs_usb_open/close(): fix memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49260
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347928
Bugzilla Description: kernel: crypto: hisilicon/sec - fix the aead software fallback for engine
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49377
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347929
Bugzilla Description: kernel: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49534
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347930
Bugzilla Description: kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49125
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347931
Bugzilla Description: kernel: drm/sprd: fix potential NULL dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49214
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347932
Bugzilla Description: kernel: powerpc/64s: Don't use DSISR for SLB faults
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49144
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347933
Bugzilla Description: kernel: io_uring: fix memory leak of uid in files registration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49600
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347934
Bugzilla Description: kernel: ip: Fix a data-race around sysctl_ip_autobind_reuse.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49178
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347935
Bugzilla Description: kernel: memstick/mspro_block: fix handling of read-only devices
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49521
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347936
Bugzilla Description: kernel: scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49533
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347937
Bugzilla Description: kernel: ath11k: Change max no of active probe SSID and BSSID to fw capability
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49697
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347938
Bugzilla Description: kernel: bpf: Fix request_sock leak in sk lookup helpers
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49358
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347939
Bugzilla Description: kernel: netfilter: nf_tables: memleak flow rule from commit path
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49451
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347940
Bugzilla Description: kernel: firmware: arm_scmi: Fix list protocols enumeration in the base protocol
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49602
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347941
Bugzilla Description: kernel: ip: Fix a data-race around sysctl_fwmark_reflect.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49419
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347942
Bugzilla Description: kernel: video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49566
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347943
Bugzilla Description: kernel: crypto: qat - fix memory leak in RSA
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49576
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347944
Bugzilla Description: kernel: ipv4: Fix data-races around sysctl_fib_multipath_hash_fields.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-567
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49505
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347945
Bugzilla Description: kernel: NFC: NULL out the dev->rfkill to prevent UAF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49538
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347946
Bugzilla Description: kernel: ALSA: jack: Access input_dev under mutex
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49552
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347947
Bugzilla Description: kernel: bpf: Fix combination of jit blinding and pointers to bpf subprogs.
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49726
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347948
Bugzilla Description: kernel: clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49403
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347949
Bugzilla Description: kernel: lib/string_helpers: fix not adding strarray to device's resource list
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49360
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347950
Bugzilla Description: kernel: f2fs: fix to do sanity check on total_data_blocks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49681
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347951
Bugzilla Description: kernel: xtensa: xtfpga: Fix refcount leak bug in setup
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49111
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347952
Bugzilla Description: kernel: Bluetooth: Fix use after free in hci_send_acl
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49076
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347953
Bugzilla Description: kernel: RDMA/hfi1: Fix use-after-free bug for mm struct
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49641
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347954
Bugzilla Description: kernel: sysctl: Fix data races in proc_douintvec().
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49249
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347955
Bugzilla Description: kernel: ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49615
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347956
Bugzilla Description: kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49133
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347957
Bugzilla Description: kernel: drm/amdkfd: svm range restore work deadlock when process exit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49286
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347958
Bugzilla Description: kernel: tpm: use try_get_ops() in tpm-space.c
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49096
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347959
Bugzilla Description: kernel: net: sfc: add missing xdp queue reinitialization
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49216
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347960
Bugzilla Description: kernel: drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49567
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347961
Bugzilla Description: kernel: mm/mempolicy: fix uninit-value in mpol_rebind_policy()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49380
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347962
Bugzilla Description: kernel: f2fs: fix to avoid f2fs_bug_on() in dec_valid_node_count()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49457
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347963
Bugzilla Description: kernel: ARM: versatile: Add missing of_node_put in dcscb_init
CVSS Score:
CVSSv3 Score: 3.3
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49376
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347964
Bugzilla Description: kernel: scsi: sd: Fix potential NULL pointer dereference
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49226
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347965
Bugzilla Description: kernel: net: asix: add proper error handling of usb read errors
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49634
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347966
Bugzilla Description: kernel: sysctl: Fix data-races in proc_dou8vec_minmax().
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49674
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347967
Bugzilla Description: kernel: dm raid: fix accesses beyond end of raid member array
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49269
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347968
Bugzilla Description: kernel: can: isotp: sanitize CAN ID checks in isotp_bind()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49498
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347969
Bugzilla Description: kernel: ALSA: pcm: Check for null pointer of pointer substream before dereferencing it
CVSS Score:
CVSSv3 Score: 4.4
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49654
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347970
Bugzilla Description: kernel: net: dsa: qca8k: reset cpu port on MTU change
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49544
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347971
Bugzilla Description: kernel: ipw2x00: Fix potential NULL dereference in libipw_xmit()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49455
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347972
Bugzilla Description: kernel: misc: ocxl: fix possible double free in ocxl_file_register_afu
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-415
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49501
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347973
Bugzilla Description: kernel: usbnet: Run unregister_netdev() before unbind() again
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49649
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347974
Bugzilla Description: kernel: xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49589
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347975
Bugzilla Description: kernel: igmp: Fix data-races around sysctl_igmp_qrv.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49587
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347976
Bugzilla Description: kernel: tcp: Fix a data-race around sysctl_tcp_notsent_lowat.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49161
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347977
Bugzilla Description: kernel: ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49472
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347978
Bugzilla Description: kernel: net: phy: micrel: Allow probing without .driver_data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49126
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347979
Bugzilla Description: kernel: scsi: mpi3mr: Fix memory leaks
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49560
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347980
Bugzilla Description: kernel: exfat: check if cluster num is valid
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49680
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347981
Bugzilla Description: kernel: ARM: exynos: Fix refcount leak in exynos_map_pmu
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49667
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347982
Bugzilla Description: kernel: net: bonding: fix use-after-free after 802.3ad slave unbind
CVSS Score:
CVSSv3 Score: 7.0
Vector:
CWE: CWE-416
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49698
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347983
Bugzilla Description: kernel: netfilter: use get_random_u32 instead of prandom
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49254
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347984
Bugzilla Description: kernel: media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49266
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347985
Bugzilla Description: kernel: block: fix rq-qos breakage from skipping rq_qos_done_bio()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49367
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347986
Bugzilla Description: kernel: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49065
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347987
Bugzilla Description: kernel: SUNRPC: Fix the svc_deferred_event trace class
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49054
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347988
Bugzilla Description: kernel: Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49074
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347989
Bugzilla Description: kernel: irqchip/gic-v3: Fix GICR_CTLR.RWP polling
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49051
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347990
Bugzilla Description: kernel: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49154
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347991
Bugzilla Description: kernel: KVM: SVM: fix panic on out-of-bounds guest IRQ
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49614
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347992
Bugzilla Description: kernel: nvme: use struct group for generic command dwords
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49460
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347993
Bugzilla Description: kernel: PM / devfreq: rk3399_dmc: Disable edev on remove()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49240
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347994
Bugzilla Description: kernel: ASoC: mediatek: mt8195: Fix error handling in mt8195_mt6359_rt1019_rt5682_dev_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49617
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347995
Bugzilla Description: kernel: ASoC: Intel: sof_sdw: handle errors on card registration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49135
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347996
Bugzilla Description: kernel: drm/amd/display: Fix memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49554
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2347997
Bugzilla Description: kernel: zsmalloc: fix races between asynchronous zspage free and page migration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49526
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347998
Bugzilla Description: kernel: md/bitmap: don't set sb values if can't pass sanity check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49720
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2347999
Bugzilla Description: kernel: block: Fix handling of offline queues in blk_mq_alloc_request_hctx()
CVSS Score:
CVSSv3 Score: 6.7
Vector:
CWE: CWE-129
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49594
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348000
Bugzilla Description: kernel: tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49713
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348001
Bugzilla Description: kernel: usb: dwc2: Fix memory leak in dwc2_hcd_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49053
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348002
Bugzilla Description: kernel: scsi: target: tcmu: Fix possible page UAF
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49294
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348003
Bugzilla Description: kernel: drm/amd/display: Check if modulo is 0 before dividing.
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49104
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348004
Bugzilla Description: kernel: staging: vchiq_core: handle NULL result of find_service_by_handle
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49555
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348005
Bugzilla Description: kernel: Bluetooth: hci_qca: Use del_timer_sync() before freeing
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49176
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348006
Bugzilla Description: kernel: bfq: fix use-after-free in bfq_dispatch_request
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49350
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348007
Bugzilla Description: kernel: net: mdio: unexport __init-annotated mdio_bus_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49509
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348008
Bugzilla Description: kernel: media: i2c: max9286: fix kernel oops when removing module
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49311
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348009
Bugzilla Description: kernel: drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47636
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348010
Bugzilla Description: kernel: ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49055
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348011
Bugzilla Description: kernel: drm/amdkfd: Check for potential null return of kmalloc_array()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49469
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348012
Bugzilla Description: kernel: btrfs: fix anon_dev leak in create_subvol()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49476
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348013
Bugzilla Description: kernel: mt76: mt7921: fix kernel crash at mt7921_pci_remove
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49454
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348014
Bugzilla Description: kernel: PCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49543
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348015
Bugzilla Description: kernel: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49579
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348016
Bugzilla Description: kernel: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49225
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348017
Bugzilla Description: kernel: mt76: mt7921s: fix a possible memory leak in mt7921_load_patch
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49497
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348018
Bugzilla Description: kernel: net: remove two BUG() from skb_checksum_help()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49312
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348019
Bugzilla Description: kernel: staging: rtl8712: fix a potential memory leak in r871xu_drv_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49385
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348020
Bugzilla Description: kernel: driver: base: fix UAF when driver_attach failed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49689
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348021
Bugzilla Description: kernel: xen-blkfront: Handle NULL gendisk
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49643
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348022
Bugzilla Description: kernel: ima: Fix a potential integer overflow in ima_appraise_measurement
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49325
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348023
Bugzilla Description: kernel: tcp: add accessors to read/set tp->snd_cwnd
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49372
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348024
Bugzilla Description: kernel: tcp: tcp_rtx_synack() can be called from process context
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49193
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348025
Bugzilla Description: kernel: ice: fix 'scheduling while atomic' on aux critical err interrupt
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49169
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348026
Bugzilla Description: kernel: f2fs: use spin_lock to avoid hang
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49162
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348027
Bugzilla Description: kernel: video: fbdev: sm712fb: Fix crash in smtcfb_write()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49188
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348028
Bugzilla Description: kernel: remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49145
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348029
Bugzilla Description: kernel: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49435
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348030
Bugzilla Description: kernel: mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49556
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348031
Bugzilla Description: kernel: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49626
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348032
Bugzilla Description: kernel: sfc: fix use after free when disabling sriov
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49496
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348033
Bugzilla Description: kernel: media: mediatek: vcodec: prevent kernel crash when rmmod mtk-vcodec-dec.ko
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49506
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348034
Bugzilla Description: kernel: drm/mediatek: Add vblank register/unregister callback functions
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49194
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348036
Bugzilla Description: kernel: net: bcmgenet: Use stronger register read/writes to assure ordering
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49236
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348037
Bugzilla Description: kernel: bpf: Fix UAF due to race between btf_try_get_module and load_module
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49348
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348038
Bugzilla Description: kernel: ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49412
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348039
Bugzilla Description: kernel: bfq: Avoid merging queues with different parents
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49671
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348040
Bugzilla Description: kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49202
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348041
Bugzilla Description: kernel: Bluetooth: hci_uart: add missing NULL check in h5_enqueue
CVSS Score:
CVSSv3 Score: 6.1
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49453
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348042
Bugzilla Description: kernel: soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49491
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348043
Bugzilla Description: kernel: drm/rockchip: vop: fix possible null-ptr-deref in vop_bind()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49276
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348044
Bugzilla Description: kernel: jffs2: fix memory leak in jffs2_scan_medium
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49089
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348045
Bugzilla Description: kernel: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49201
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348046
Bugzilla Description: kernel: ibmvnic: fix race between xmit and reset
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49572
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348047
Bugzilla Description: kernel: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49285
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348048
Bugzilla Description: kernel: iio: accel: mma8452: use the correct logic to get mma8452_data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49729
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348049
Bugzilla Description: kernel: nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49647
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348050
Bugzilla Description: kernel: cgroup: Use separate src/dst nodes when preloading css_sets for migration
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49082
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348051
Bugzilla Description: kernel: scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49397
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348052
Bugzilla Description: kernel: phy: qcom-qmp: fix struct clk leak on probe errors
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49356
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348053
Bugzilla Description: kernel: SUNRPC: Trap RDMA segment overflows
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49480
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348054
Bugzilla Description: kernel: ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49158
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348055
Bugzilla Description: kernel: scsi: qla2xxx: Fix warning message due to adisc being flushed
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49390
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348056
Bugzilla Description: kernel: macsec: fix UAF bug for real_dev
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49441
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348057
Bugzilla Description: kernel: tty: fix deadlock caused by calling printk() under tty_port->lock
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49597
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348058
Bugzilla Description: kernel: tcp: Fix data-races around sysctl_tcp_base_mss.
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49326
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348059
Bugzilla Description: kernel: rtl818x: Prevent using not initialized queues
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-908
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49097
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348060
Bugzilla Description: kernel: NFS: Avoid writeback threads getting stuck in mempool_alloc()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49383
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348061
Bugzilla Description: kernel: watchdog: rzg2l_wdt: Fix 'BUG: Invalid wait context'
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49095
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348062
Bugzilla Description: kernel: scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49725
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348063
Bugzilla Description: kernel: i40e: Fix call trace in setup_tx_descriptors
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49272
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348064
Bugzilla Description: kernel: ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49060
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348065
Bugzilla Description: kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49529
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348066
Bugzilla Description: kernel: drm/amdgpu/pm: fix the null pointer while the smu is disabled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47639
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348067
Bugzilla Description: kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49205
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348068
Bugzilla Description: kernel: bpf, sockmap: Fix double uncharge the mem of sk_msg
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49295
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348069
Bugzilla Description: kernel: nbd: call genl_unregister_family() first in nbd_cleanup()
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49664
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348070
Bugzilla Description: kernel: tipc: move bc link creation back to tipc_node_create
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49623
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348071
Bugzilla Description: kernel: powerpc/xive/spapr: correct bitmap allocation size
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49434
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348072
Bugzilla Description: kernel: PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49452
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348073
Bugzilla Description: kernel: dpaa2-eth: retrieve the virtual address before dma_unmap
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49340
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348074
Bugzilla Description: kernel: ip_gre: test csum_start instead of transport header
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49516
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348075
Bugzilla Description: kernel: ice: always check VF VSI pointer values
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49645
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348076
Bugzilla Description: kernel: drm/panfrost: Fix shrinker list corruption by madvise IOCTL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49611
Severity: important
Released on: 26/02/2025
Advisory:
Bugzilla: 2348077
Bugzilla Description: kernel: x86/speculation: Fill RSB on vmexit for IBRS
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49218
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348078
Bugzilla Description: kernel: drm/dp: Fix OOB read when handling Post Cursor2 register
CVSS Score:
CVSSv3 Score: 7.1
Vector:
CWE: CWE-125
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49537
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348079
Bugzilla Description: kernel: scsi: lpfc: Fix call trace observed during I/O with CMF enabled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49485
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348080
Bugzilla Description: kernel: drm/v3d: Fix null pointer dereference of pointer perfmon
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49474
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348082
Bugzilla Description: kernel: Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49069
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348083
Bugzilla Description: kernel: drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49239
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348084
Bugzilla Description: kernel: ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49642
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348085
Bugzilla Description: kernel: net: stmmac: dwc-qos: Disable split header for Tegra194
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49669
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348086
Bugzilla Description: kernel: mptcp: fix race on unaccepted mptcp sockets
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49329
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348087
Bugzilla Description: kernel: vduse: Fix NULL pointer dereference on sysfs access
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49477
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348088
Bugzilla Description: kernel: ASoC: samsung: Fix refcount leak in aries_audio_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49287
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348089
Bugzilla Description: kernel: tpm: fix reference counting for struct tpm_chip
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49701
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348090
Bugzilla Description: kernel: scsi: ibmvfc: Allocate/free queue resource only during probe/remove
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49078
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348091
Bugzilla Description: kernel: lz4: fix LZ4_decompress_safe_partial read out of bound
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49494
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348092
Bugzilla Description: kernel: mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49265
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348093
Bugzilla Description: kernel: PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49668
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348094
Bugzilla Description: kernel: PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49343
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348095
Bugzilla Description: kernel: ext4: avoid cycles in directory h-tree
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49181
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348096
Bugzilla Description: kernel: xen: fix is_xen_pmu()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47654
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348097
Bugzilla Description: kernel: samples/landlock: Fix path_list memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49191
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348098
Bugzilla Description: kernel: mxser: fix xmit_buf leak in activate when LSR == 0xff
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49699
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348099
Bugzilla Description: kernel: filemap: Handle sibling entries in filemap_get_read_batch()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49707
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348100
Bugzilla Description: kernel: ext4: add reserved GDT blocks check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49677
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348101
Bugzilla Description: kernel: ARM: cns3xxx: Fix refcount leak in cns3xxx_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49274
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348102
Bugzilla Description: kernel: ocfs2: fix crash when mount with quota enabled
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49339
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348103
Bugzilla Description: kernel: net: ipv6: unexport __init-annotated seg6_hmac_init()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49219
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348104
Bugzilla Description: kernel: vfio/pci: fix memory leak during D3hot to D0 transition
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49262
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348105
Bugzilla Description: kernel: crypto: octeontx2 - remove CONFIG_DM_CRYPT check
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49147
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348106
Bugzilla Description: kernel: block: Fix the maximum minor value is blk_alloc_ext_minor()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49417
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348107
Bugzilla Description: kernel: iwlwifi: mei: fix potential NULL-ptr deref
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49440
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348108
Bugzilla Description: kernel: powerpc/rtas: Keep MSR[RI] set when calling RTAS
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49721
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348109
Bugzilla Description: kernel: arm64: ftrace: consistently handle PLTs.
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47644
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348110
Bugzilla Description: kernel: media: staging: media: zoran: move videodev alloc
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49519
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348111
Bugzilla Description: kernel: ath10k: skip ath10k_halt during suspend for driver state RESTARTING
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49108
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348112
Bugzilla Description: kernel: clk: mediatek: Fix memory leaks on probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49705
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348113
Bugzilla Description: kernel: 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49282
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348114
Bugzilla Description: kernel: f2fs: quota: fix loop condition at f2fs_quota_sync()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49066
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348115
Bugzilla Description: kernel: veth: Ensure eth header is in skb's linear part
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49354
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348116
Bugzilla Description: kernel: ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49722
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348117
Bugzilla Description: kernel: ice: Fix memory corruption in VF driver
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49251
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348118
Bugzilla Description: kernel: ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49541
Severity: important
Released on: 26/02/2025
Advisory: RHSA-2023:2458, RHSA-2022:5819, RHSA-2022:7683,
Bugzilla: 2348119
Bugzilla Description: kernel: cifs: fix potential double free during failed mount
CVSS Score:
CVSSv3 Score: 7.8
Vector:
CWE: CWE-415
Affected Packages: kernel-0:5.14.0-284.11.1.el9_2,kernel-0:4.18.0-425.3.1.el8,kernel-0:4.18.0-372.19.1.el8_6,
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49091
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348120
Bugzilla Description: kernel: drm/imx: Fix memory leak in imx_pd_connector_get_modes
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49500
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348121
Bugzilla Description: kernel: wl1251: dynamically allocate memory used for DMA
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49371
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348122
Bugzilla Description: kernel: driver core: fix deadlock in __device_attach
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49166
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348123
Bugzilla Description: kernel: ntfs: add sanity check on allocation size
CVSS Score:
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49675
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348124
Bugzilla Description: kernel: tick/nohz: unexport __init-annotated tick_nohz_full_setup()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49117
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348125
Bugzilla Description: kernel: mips: ralink: fix a refcount leak in ill_acc_of_setup()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49187
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348126
Bugzilla Description: kernel: clk: Fix clk_hw_get_clk() when dev is NULL
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49549
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348127
Bugzilla Description: kernel: x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49513
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348128
Bugzilla Description: kernel: cpufreq: governor: Use kobject release() method to free dbs_data
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49067
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348129
Bugzilla Description: kernel: powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49336
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348130
Bugzilla Description: kernel: drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49217
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348131
Bugzilla Description: kernel: scsi: pm8001: Fix abort all task initialization
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2021-47658
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348132
Bugzilla Description: kernel: drm/amd/pm: fix a potential gpu_metrics_table memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49704
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348133
Bugzilla Description: kernel: 9p: fix fid refcount leak in v9fs_vfs_get_link
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49172
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348134
Bugzilla Description: kernel: parisc: Fix non-access data TLB cache flush faults
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49174
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348135
Bugzilla Description: kernel: ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49114
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348136
Bugzilla Description: kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49304
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348137
Bugzilla Description: kernel: drivers: tty: serial: Fix deadlock in sa1100_set_termios()
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49685
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348138
Bugzilla Description: kernel: iio: trigger: sysfs: fix use-after-free on remove
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49250
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348139
Bugzilla Description: kernel: ASoC: codecs: rx-macro: fix accessing compander for aux
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49346
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348140
Bugzilla Description: kernel: net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49241
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348141
Bugzilla Description: kernel: ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49238
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348142
Bugzilla Description: kernel: ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49719
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348143
Bugzilla Description: kernel: irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-402
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49550
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348144
Bugzilla Description: kernel: fs/ntfs3: provide block_invalidate_folio to fix memory leak
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49490
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348145
Bugzilla Description: kernel: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49502
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348146
Bugzilla Description: kernel: media: rga: fix possible memory leak in rga_probe
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49653
Severity: low
Released on: 26/02/2025
Advisory:
Bugzilla: 2348147
Bugzilla Description: kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49098
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348148
Bugzilla Description: kernel: Drivers: hv: vmbus: Fix potential crash on module unload
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49170
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348149
Bugzilla Description: kernel: f2fs: fix to do sanity check on curseg->alloc_type
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49601
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348150
Bugzilla Description: kernel: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.
CVSS Score:
CVSSv3 Score: 4.7
Vector:
CWE: CWE-362
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49583
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348151
Bugzilla Description: kernel: iavf: Fix handling of dummy receive descriptors
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-401
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49665
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348152
Bugzilla Description: kernel: platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49061
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348153
Bugzilla Description: kernel: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE: CWE-476
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49122
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348154
Bugzilla Description: kernel: dm ioctl: prevent potential spectre v1 gadget
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document


CVE-2022-49245
Severity: moderate
Released on: 26/02/2025
Advisory:
Bugzilla: 2348155
Bugzilla Description: kernel: ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume
CVSS Score:
CVSSv3 Score: 5.5
Vector:
CWE:
Affected Packages:
Package States: Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9,
Full Details
CVE document