Skip to content

Conversation

@konflux-internal-p02
Copy link

This PR contains the following updates:

Package Update Change
kernel-headers patch 4.18.0-553.76.1.el8_10 -> 4.18.0-553.77.1.el8_10

kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer

CVE-2022-49328

More information

Severity

Moderate

References


kernel: tipc: fix use-after-free Read in tipc_named_reinit

CVE-2022-49696

More information

Severity

Moderate

References


kernel: ndisc: use RCU protection in ndisc_alloc_skb()

CVE-2025-21764

More information

Severity

Moderate

References


kernel: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx

CVE-2022-49377

More information

Severity

Moderate

References


kernel: dlm: fix plock invalid read

CVE-2022-49407

More information

Severity

Moderate

References


kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()

CVE-2022-49114

More information

Severity

Moderate

References


kernel: Bluetooth: Fix use after free in hci_send_acl

CVE-2022-49111

More information

Severity

Moderate

References


Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c

CVE-2023-1652

More information

Severity

Moderate

References


kernel: um: Fix out-of-bounds read in LDT setup

CVE-2022-49395

More information

Severity

Important

References


kernel: net: atlantic: fix aq_vec index out of range error

CVE-2022-50066

More information

Severity

Important

References


kernel: ipv6: mcast: extend RCU protection in igmp6_send()

CVE-2025-21759

More information

Severity

Important

References


kernel: net: atm: fix use after free in lec_send()

CVE-2025-22004

More information

Severity

Important

References


kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()

CVE-2025-22121

More information

Severity

Important

References


kernel: dm ioctl: prevent potential spectre v1 gadget

CVE-2022-49122

More information

Severity

Important

References


kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry()

CVE-2022-49846

More information

Severity

Important

References


kernel: Squashfs: fix handling and sanity checking of xattr_ids count

CVE-2023-52933

More information

Severity

Important

References


kernel: ext4: ignore xattrs past end

CVE-2025-37738

More information

Severity

Important

References


kernel: ibmvnic: Use kernel helpers for hex dumps

CVE-2025-22104

More information

Severity

Important

References


kernel: writeback: avoid use-after-free after removing device

CVE-2022-49995

More information

Severity

Moderate

References


kernel: wifi: iwlwifi: limit printed string from FW file

CVE-2025-21905

More information

Severity

Moderate

References


kernel: ext4: fix off-by-one error in do_split

CVE-2025-23150

More information

Severity

Moderate

References


kernel: ext4: avoid journaling sb update on error if journal is destroying

CVE-2025-22113

More information

Severity

Moderate

References


kernel: media: uvcvideo: Fix double free in error path

CVE-2024-57980

More information

Severity

Moderate

References


kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry

CVE-2025-37958

More information

Severity

Moderate

References


kernel: media: uvcvideo: Remove dangling pointers

CVE-2024-58002

More information

Severity

Important

References


kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()

CVE-2025-21928

More information

Severity

Important

References


kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()

CVE-2022-49788

More information

Severity

Important

References


kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done

CVE-2025-38052

More information

Severity

Important

References


kernel: cifs: potential buffer overflow in handling symlinks

CVE-2022-49058

More information

Severity

Important

References


kernel: tee: amdtee: fix race condition in amdtee_open_session

CVE-2023-53047

More information

Severity

Important

References


kernel: driver: base: fix UAF when driver_attach failed

CVE-2022-49385

More information

Severity

Important

References


kernel: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice

CVE-2025-38001

More information

Severity

Important

References


kernel: sch_hfsc: make hfsc_qlen_notify() idempotent

CVE-2025-38177

More information

Severity

Important

References


kernel: ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead

CVE-2022-49977

More information

Severity

Important

References


kernel: mm/hugetlb: avoid corrupting page->mapping in hugetlb_mcopy_atomic_pte

CVE-2022-49991

More information

Severity

Important

References


kernel: nfsd: don't ignore the return code of svc_proc_register()

CVE-2025-22026

More information

Severity

Important

References


kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()

CVE-2025-38000

More information

Severity

Important

References


kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc

CVE-2025-37890

More information

Severity

Important

References


kernel: net: qrtr: start MHI channel after endpoit creation

CVE-2022-50044

More information

Severity

Important

References


kernel: net/sched: Always pass notifications when child class becomes empty

CVE-2025-38350

More information

Severity

Important

References


kernel: xsk: fix OOB map writes when deleting elements

CVE-2024-56614

More information

Severity

Moderate

References


kernel: bpf: fix OOB devmap writes when deleting elements

CVE-2024-56615

More information

Severity

Moderate

References


kernel: md: fix mddev uaf while iterating all_mddevs list

CVE-2025-22126

More information

Severity

Moderate

References


Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c

CVE-2023-1652

More information

Severity

Important

References


kernel: um: Fix out-of-bounds read in LDT setup

CVE-2022-49395

More information

Severity

Moderate

References


kernel: Squashfs: fix handling and sanity checking of xattr_ids count

CVE-2023-52933

More information

Severity

Moderate

References


kernel: ext4: fix off-by-one error in do_split

CVE-2025-23150

More information

Severity

Important

References


net/http: Request smuggling due to acceptance of invalid chunked data in net/http

CVE-2025-22871

More information

Severity

Moderate

References


kernel: udmabuf: fix a buf size overflow issue during udmabuf creation

CVE-2025-37803

More information

Severity

Important

References


kernel: ext4: avoid journaling sb update on error if journal is destroying

CVE-2025-22113

More information

Severity

Important

References


kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry

CVE-2025-37958

More information

Severity

Important

References


kernel: wifi: iwlwifi: limit printed string from FW file

CVE-2025-21905

More information

Severity

Important

References


kernel: media: uvcvideo: Fix double free in error path

CVE-2024-57980

More information

Severity

Important

References


kernel: i2c/designware: Fix an initialization issue

CVE-2025-38380

More information

Severity

Important

References


kernel: tls: always refresh the queue when reading sock

CVE-2025-38471

More information

Severity

Important

References


kernel: scsi: lpfc: Use memcpy() for BIOS version

CVE-2025-38332

More information

Severity

Important

References


kernel: crypto: algif_hash - fix double free in hash_accept

CVE-2025-38079

More information

Severity

Important

References


kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()

CVE-2025-21867

More information

Severity

Important

References


kernel: inet: inet_defrag: prevent sk release while still in use

CVE-2024-26921

More information

Severity

Moderate

References


kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().

CVE-2024-36933

More information

Severity

Moderate

References


kernel: tracing: Ensure visibility when inserting an element into tracing_map

CVE-2024-26645

More information

Severity

Moderate

References


kernel: drm/amdgpu: Fix potential out-of-bounds access in &#​39;amdgpu_discovery_reg_base_init()&#​39;

CVE-2024-27042

More information

Severity

Moderate

References


kernel: powerpc/lib: Validate size for vector operations

CVE-2023-52606

More information

Severity

Moderate

References


kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()

CVE-2024-35930

More information

Severity

Moderate

References


kernel: netfilter: nf_tables: prefer nft_chain_validate

CVE-2024-41042

More information

Severity

Moderate

References


kernel: SUNRPC: Fix a suspicious RCU usage warning

CVE-2023-52623

More information

Severity

Moderate

References


kernel: vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame

CVE-2024-58099

More information

Severity

Moderate

References


kernel: drm/i915/vma: Fix UAF on destroy against retire race

CVE-2024-26939

More information

Severity

Moderate

References


kernel: irqchip/gic-v3-its: Prevent double free on error

CVE-2024-35847

More information

Severity

Moderate

References

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the renovate/rpm/rhoai-2.19/rpm-lockfile-kernel-headers-vulnerability branch 8 times, most recently from f9c66b8 to bd0523f Compare September 29, 2025 16:35
Signed-off-by: konflux-internal-p02 <170854209+konflux-internal-p02[bot]@users.noreply.github.com>
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the renovate/rpm/rhoai-2.19/rpm-lockfile-kernel-headers-vulnerability branch from bd0523f to cd0887f Compare September 29, 2025 16:35
@konflux-internal-p02 konflux-internal-p02 bot changed the title chore(deps): update rpm updates to v4.18.0-553.77.1.el8_10 [security] (rhoai-2.19) chore(deps): update rpm updates to v4.18.0-553.77.1.el8_10 [security] (rhoai-2.19) - abandoned Nov 1, 2025
@konflux-internal-p02
Copy link
Author

Autoclosing Skipped

This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants