Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2024-08-05 |
[4.1.12-124.88.3]
- crypto: pcrypt - Fix hungtask for PADATA_RESET (Lu Jialin) [Orabug: 36806710] {CVE-2023-52813}
- usbnet: sanity check for maxpacket (Oliver Neukum) [Orabug: 36806658] {CVE-2021-47495}
- phonet: fix rtm_phonet_notify() skb allocation (Eric Dumazet) [Orabug: 36683487] {CVE-2024-36946}
- wifi: nl80211: don't free NULL coalescing rule (Johannes Berg) [Orabug: 36683466] {CVE-2024-36941}
- bna: ensure the copied buf is NUL terminated (Bui Quang Minh) [Orabug: 36683433] {CVE-2024-36934}
- bna: use memdup_user to copy userspace buffers (Ivan Vecera) [Orabug: 36683433] {CVE-2024-36934}
- new helper: memdup_user_nul() (Al Viro) [Orabug: 36683433] {CVE-2024-36934}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (Ziyang Xuan) [Orabug: 36598047] {CVE-2024-27020}
- netfilter: nf_tables: __nft_expr_type_get() selects specific family type (Pablo Neira Ayuso) [Orabug: 36598047] {CVE-2024-27020}
- net/mlx5e: drop shorter ethernet frames (Manjunath Patil) [Orabug: 36879159] {CVE-2024-41090} {CVE-2024-41091}
[4.1.12-124.88.2]
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (Shigeru Yoshida) [Orabug: 36802310] {CVE-2023-52528}
- usbnet/smsc75xx: silence uninitialized variable warning (Dan Carpenter) {CVE-2023-52528}
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (Thadeu Lima de Souza Cascardo) [Orabug: 36685663] {CVE-2023-52880}
- netfilter: nf_tables: disallow anonymous set with timeout flag (Pablo Neira Ayuso) [Orabug: 36530112] {CVE-2024-26642}
- ubi: Check for too small LEB size in VTBL code (Richard Weinberger) [Orabug: 36356637] {CVE-2024-25739}
[4.1.12-124.88.1]
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (Trond Myklebust) [Orabug: 33958156] {CVE-2022-24448}
- NFSv4: Handle case where the lookup of a directory fails (Trond Myklebust) [Orabug: 33958156] {CVE-2022-24448}
CVE-2024-36941 |
CVE-2024-36934 |
CVE-2024-41091 |
CVE-2024-26642 |
CVE-2021-47495 |
CVE-2024-27020 |
CVE-2023-52880 |
CVE-2022-24448 |
CVE-2024-41090 |
CVE-2024-25739 |
CVE-2023-52528 |
CVE-2023-52813 |
CVE-2024-36946 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory | Channel Label |
Oracle Linux 6 (x86_64) | kernel-uek-4.1.12-124.88.3.el6uek.src.rpm | c32d3e3085f5b969b7da3c0d810e12e9 | - | ol6_x86_64_UEKR4_ELS |
kernel-uek-4.1.12-124.88.3.el6uek.x86_64.rpm | 1a5790877b919d95bf9b640a1059fda6 | - | ol6_x86_64_UEKR4_ELS | |
kernel-uek-debug-4.1.12-124.88.3.el6uek.x86_64.rpm | b9e2f0b5ec66f15be88f6998b122bb4d | - | ol6_x86_64_UEKR4_ELS | |
kernel-uek-debug-devel-4.1.12-124.88.3.el6uek.x86_64.rpm | 420b8e3555490d6a6cbe31ef0362399a | - | ol6_x86_64_UEKR4_ELS | |
kernel-uek-devel-4.1.12-124.88.3.el6uek.x86_64.rpm | fcb89898213526d48359d3a526a164d7 | - | ol6_x86_64_UEKR4_ELS | |
kernel-uek-doc-4.1.12-124.88.3.el6uek.noarch.rpm | 4b33142d0fcd5bb8936f4100acbe1fd1 | - | ol6_x86_64_UEKR4_ELS | |
kernel-uek-firmware-4.1.12-124.88.3.el6uek.noarch.rpm | 0d830555495c855a5cd9e9c3998782e6 | - | ol6_x86_64_UEKR4_ELS |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: