Details
-
Improvement
-
Resolution: Fixed
-
Minor
-
Lustre 2.16.0, Lustre 2.15.5
-
None
-
3
-
9223372036854775807
Description
Security Fix(es):
- kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)
- kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)
- kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)
- kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)
- kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)
- kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)
- kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)
Bug Fix(es):
- OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:RHEL-21394)
- kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:RHEL-24010)
- Screen floods with random colour suggesting something not initialised (JIRA:RHEL-21055)
- kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:RHEL-22766)
- tx-checksumming required for accessing port in OpenShift for RHEL 8.6 (JIRA:RHEL-20822)
- kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:RHEL-22077)
- kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:RHEL-22930)
- rbd: don't move requests to the running list on errors [8.x] (JIRA:RHEL-24204)
- kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:RHEL-24479)
- ceph: several cap and snap fixes (JIRA:RHEL-20909)
- [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:RHEL-23063)
- unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:RHEL-25719)
- [RHEL8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:RHEL-26101)
- kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:RHEL-19954)
- backport smartpqi: fix disable_managed_interrupts (JIRA:RHEL-26139)
- kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:RHEL-26331)
- ceph: always check dir caps asynchronously (JIRA:RHEL-27496)
Enhancement(s):
- [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:RHEL-25811)
https://access.redhat.com/errata/product/479/ver=/rhel---8/x86_64/RHSA-2024:1607
Attachments
Issue Links
- is related to
-
LU-17593 kernel update [RHEL 8.9 4.18.0-513.18.1.el8_9]
- Resolved