Details
-
Improvement
-
Resolution: Fixed
-
Minor
-
Lustre 2.16.0, Lustre 2.15.5
-
None
-
3
-
9223372036854775807
Description
Security Fix(es):
- kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)
- kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193)
- kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
- kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction (CVE-2023-4244)
- kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list (CVE-2023-5717)
- kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356)
- kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535)
- kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536)
- kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606)
- kernel: OOB Access in smb2_dump_detail (CVE-2023-6610)
- kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)
https://access.redhat.com/errata/product/479/ver=/rhel---9/x86_64/RHSA-2024:1248
Attachments
Issue Links
- is related to
-
LU-17561 kernel update [RHEL 9.3 5.14.0-362.18.1.el9_3]
- Resolved