- kernel-4.18.0-372.115.1.el8_6 (rhel8)
- 4.18.0-372.166.1.el8_6
- 2025-11-18 09:31:50
- 2025-11-19 11:08:59
- K20251118_05
- CVE-2021-47311
- Description:
net: qcom/emac: fix UAF in emac_remove
- CVE: https://access.redhat.com/security/cve/CVE-2021-47311
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47311-net-qcom-emac-fix-uaf-in-emac-remove.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47566
- Description:
proc/vmcore: let pfn_is_ram() return a bool
- CVE: https://access.redhat.com/security/cve/CVE-2021-47566
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2021-47566-proc-vmcore-let-pfn_is_ram-return-a-bool.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2021-47566
- Description:
proc/vmcore: fix clearing user buffer by properly using clear_user()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47566
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2021-47566-proc-vmcore-fix-clearing-user-buffer-by-properly-us.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48637
- Description:
bnxt: prevent skb UAF after handing over to PTP worker
- CVE: https://access.redhat.com/security/cve/CVE-2022-48637
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48637-bnxt-prevent-skb-UAF-after-handing-over-to-PTP-work.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48827
- Description:
NFSD: Fix the behavior of READ near OFFSET_MAX
- CVE: https://access.redhat.com/security/cve/CVE-2022-48827
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48827-NFSD-Fix-the-behavior-of-READ-near-OFFSET_MAX.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48828
- Description:
NFSD: Fix ia_size underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48828
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48828-NFSD-Fix-ia_size-underflow.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48829
- Description:
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
- CVE: https://access.redhat.com/security/cve/CVE-2022-48829
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48829-NFSD-Fix-NFSv3-SETATTR-CREATE-s-handling-of-large-f.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52448
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52881
- Description:
tcp: do not accept ACK of bytes we never sent
- CVE: https://access.redhat.com/security/cve/CVE-2023-52881
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52881-tcp-do-not-accept-ack-of-bytes-we-never-sent-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52885
- Description:
SUNRPC: Fix UAF in svc_tcp_listen_data_ready()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52885
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2023-52885-SUNRPC-Fix-UAF-in-svc_tcp_listen_data_ready.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2024-21823
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the
- CVE: https://access.redhat.com/security/cve/CVE-2024-21823
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35852
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36017
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36017
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://access.redhat.com/security/cve/CVE-2024-36971
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36971-net-fix-__dst_negative_advice-race-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39502
- Description:
ionic: clean interrupt before enabling queue to avoid credit race
- CVE: https://access.redhat.com/security/cve/CVE-2024-39502
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-clean-interrupt-before-enabling-queue-to.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39502
- Description:
ionic: fix use after netif_napi_del()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39502
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-fix-use-after-netif-napi-del.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: remove duplicated code
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-remove-duplicated-code.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: update/document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-update-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/msg.c: update and document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-msg-c-update-and-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/sem.c: document and update memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-sem-c-document-and-update-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-msg-sem-avoid-relying-on-a-stack.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: fix possible use-after-free in HFC_cleanup()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-fix-possible-use-after-free-in-hfc-cleanup.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-hfcpci-fix-use-after-free-bug-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47468
- Description:
isdn: mISDN: Fix sleeping function called from invalid context
- CVE: https://access.redhat.com/security/cve/CVE-2021-47468
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47468-isdn-mISDN-Fix-sleeping-function-called-from-invalid.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48793
- Description:
KVM: x86: nSVM: fix potential NULL derefernce on nested migration
- CVE: https://access.redhat.com/security/cve/CVE-2022-48793
- Patch: rhel8/4.18.0-372.119.1.el8_6/CVE-2022-48793-KVM-x86-nSVM-fix-potential-NULL-derefernce-on-nested.patch
- From: 4.18.0-372.119.1.el8_6
- CVE-2022-48799
- Description:
perf: Fix list corruption in perf_cgroup_switch()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48799
- Patch: rhel8/4.18.0-372.119.1.el8_6/CVE-2022-48799-perf-Fix-list-corruption-in-perf_cgroup_switch.patch
- From: 4.18.0-372.119.1.el8_6
- CVE-2023-52434
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52610
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52864
- Description:
platform/x86: wmi: Fix opening of char device
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52864
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52864-platform-x86-wmi-fix-opening-of-char-device.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35845
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://access.redhat.com/security/cve/CVE-2024-35845
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36016
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-4.18.0-513.18.1.el8_9.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36904
- Description:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36904
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36941
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://access.redhat.com/security/cve/CVE-2024-36941
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38570
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-513.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch-513.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48796
- Description:
iommu: Fix potential use-after-free during probe
- CVE: https://access.redhat.com/security/cve/CVE-2022-48796
- Patch: 4.18.0/CVE-2022-48796-iommu-fix-potential-use-after-free-during-probe.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2021-47138
- Description:
cxgb4: avoid accessing registers when clearing filters
- CVE: https://access.redhat.com/security/cve/CVE-2021-47138
- Patch: 4.18.0/CVE-2021-47138-cxgb4-avoid-accessing-registers-when-clearing-filters.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2021-47378
- Description:
nvme-rdma: destroy cm id before destroy qp to avoid use after free
- CVE: https://access.redhat.com/security/cve/CVE-2021-47378
- Patch: 4.18.0/CVE-2021-47378-nvme-rdma-destroy-cm-id-before-destroy-qp-to-avoid-use-after-free.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2022-48659
- Description:
mm/slub: fix to return errno if kmalloc() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-48659
- Patch: 4.18.0/CVE-2022-48659-mm-slub-fix-to-return-errno-if-kmalloc-fails.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-38540
- Description:
bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
- CVE: https://access.redhat.com/security/cve/CVE-2024-38540
- Patch: 4.18.0/CVE-2024-38540-bnxt-re-avoid-shift-undefined-behavior-in.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-38564
- Description:
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
- CVE: https://access.redhat.com/security/cve/CVE-2024-38564
- Patch: 4.18.0/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-38586
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: 4.18.0/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-41014
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: 4.18.0/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2021-47461
- Description:
userfaultfd: fix a race between writeprotect and exit_mmap()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47461
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47461-userfaultfd-fix-a-race-between-writeprotect-and-exit.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26698
- Description:
hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
- CVE: https://access.redhat.com/security/cve/CVE-2024-26698
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26698-hv_netvsc-Fix-race-condition-between-netvsc_probe-an.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35823
- Description:
vt: fix unicode buffer corruption when deleting
- CVE: https://access.redhat.com/security/cve/CVE-2024-35823
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47492
- Description:
mm, thp: bail out early in collapse_file for writeback page
- CVE: https://access.redhat.com/security/cve/CVE-2021-47492
- Patch: rhel8/4.18.0-372.123.1.el8_6/CVE-2021-47492-mm-thp-bail-out-early-in-collapse_file-for-writebac.patch
- From: 4.18.0-372.123.1.el8
- CVE-2022-48687
- Description:
ipv6: sr: fix out-of-bounds read when setting HMAC data
- CVE: https://access.redhat.com/security/cve/CVE-2022-48687
- Patch: rhel8/4.18.0-372.123.1.el8_6/CVE-2022-48687-ipv6-sr-fix-out-of-bounds-read-when-setting-HMAC-da.patch
- From: 4.18.0-372.123.1.el8
- CVE-2021-47352
- Description:
virtio-net: Add validation for used length
- CVE: https://access.redhat.com/security/cve/CVE-2021-47352
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47352-virtio-net-add-validation-for-used-length-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-27020
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-27020
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27019
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27019
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27019-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35898
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35898
- Patch: rhel8/4.18.0-372.123.1.el8_6/CVE-2024-35898-netfilter-nf_tables-Fix-potential-data-race-in-__nf.patch
- From: 4.18.0-372.123.1.el8
- CVE-2024-26704
- Description:
ext4: fix double-free of blocks due to wrong
- CVE: https://access.redhat.com/security/cve/CVE-2024-26704
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26772
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26772
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26773
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26773
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48638
- Description:
cgroup: cgroup_get_from_id() must check the looked-up kn is a directory
- CVE: https://access.redhat.com/security/cve/CVE-2022-48638
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2022-48638-cgroup-cgroup_get_from_id-must-check-the-looked-up-k.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
exit: Use the correct exit_code in /proc/<pid>/stat
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-exit-use-the-correct-exit-code-in-proc-pid-stat.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: use __for_each_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-fs-proc-do-task-stat-use-for-each-thread.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: move thread_group_cputime_adjusted() outside of lock_task_sighand()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-fs-proc-do-task-stat-move.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-36889
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-36889
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-36889-mptcp-ensure-snd_nxt-is-properly-initialized-on-conn.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-41071-wifi-mac80211-Avoid-address-calculations-via-out-of-.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-36270
- Description:
netfilter: tproxy: bail out if IP has been disabled
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36270
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26923
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26923-af-unix-fix-garbage-collector-racing-against-connect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26598
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
- CVE: https://access.redhat.com/security/cve/CVE-2024-26598
- Patch: rhel8/4.18.0-372.126.1.el8_6/CVE-2024-26598-KVM-arm64-vgic-its-Avoid-potential-UAF-in-LPI-trans.patch
- From: 4.18.0-372.126.1.el8_6
- CVE-2024-26830
- Description:
Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.
- CVE:
- Patch: skipped/CVE-2024-26830.patch
- From:
- CVE-2024-40998
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48773
- Description:
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
- CVE: https://access.redhat.com/security/cve/CVE-2022-48773
- Patch: rhel8/4.18.0-372.127.1.el8_6/CVE-2022-48773-xprtrdma-fix-pointer-derefs-in-error-cases-of-rpcrd.patch
- From: 4.18.0-372.127.1.el8_6
- CVE-2024-26656
- Description:
drm/amdgpu: fix use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26656
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug-477.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-46858
- Patch: rhel8/4.18.0-372.129.1.el8_6/CVE-2024-46858-mptcp-pm-Fix-uaf-in-__timer_delete_sync.patch
- From: 4.18.0-372.129.1.el8_6
- CVE-2022-48695
- Description:
scsi: mpt3sas: Fix use-after-free warning
- CVE: https://access.redhat.com/security/cve/CVE-2022-48695
- Patch: rhel8/4.18.0-372.129.1.el8_6/CVE-2022-48695-scsi-mpt3sas-Fix-use-after-free-warning.patch
- From: 4.18.0-372.129.1.el8_6
- CVE-2022-48786
- Description:
vsock: remove vsock from connected table when connect is interrupted by a signal
- CVE: https://access.redhat.com/security/cve/CVE-2022-48786
- Patch: rhel8/4.18.0-372.131.1.el8_6/CVE-2022-48786-vsock-remove-vsock-from-connected-table-when-connect.patch
- From: 4.18.0-372.131.1.el8_6
- CVE-2024-35890
- Description:
gro: fix ownership transfer
- CVE: https://access.redhat.com/security/cve/CVE-2024-35890
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://access.redhat.com/security/cve/CVE-2024-53104
- Patch: rhel8/4.18.0-553.40.1.el8_10/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UNDEFINED-477.patch
- From: 4.18.0-553.40.1.el8_10
- CVE-2021-46960
- Description:
cifs: Return correct error code from smb2_get_enc_key
- CVE: https://access.redhat.com/security/cve/cve-2021-46960
- Patch: 2021/CVE-2021-46960/CVE-2021-46960-cifs-Return-correct-error-code-from-smb2_get_enc_key.patch
- From: 4.18.0-372.139.1.el8_6
- CVE-2023-52922
- Description:
can: bcm: Fix UAF in bcm_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52922
- Patch: rhel8/4.18.0-553.45.1.el8_10/CVE-2023-52922-can-bcm-Fix-UAF-in-bcm_proc_show.patch
- From: 4.18.0-553.45.1.el8_10
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://access.redhat.com/security/cve/cve-2024-50302
- Patch: 2024/CVE-2024-50302/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://access.redhat.com/security/cve/cve-2024-53197
- Patch: 2024/CVE-2024-53197/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel8/4.18.0-372.141.1.el8_6//CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 4.18.0-372.141.1.el8_6
- CVE-2024-53197
- Description:
ALSA: usb-audio: add minimal macros for __free(kfree) to work
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel8/4.18.0-372.141.1.el8_6//CVE-2024-53197-ALSA-usb-audio-add-minimal-macros-for-__free-kfree-to-work.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://access.redhat.com/security/cve/CVE-2024-53150
- Patch: rhel8/4.18.0-553.50.1.el8_10/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 4.18.0-553.50.1.el8_10
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://access.redhat.com/security/cve/CVE-2024-53141
- Patch: rhel8/4.18.0-553.52.1.el8_10/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 4.18.0-553.52.1.el8_10
- CVE-2022-49328
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2022-49328.patch
- From:
- CVE-2022-49696
- Description:
tipc: fix use-after-free Read in tipc_named_reinit
- CVE: https://access.redhat.com/security/cve/CVE-2022-49696
- Patch: rhel8/4.18.0-372.149.1.el8_6/CVE-2022-49696-tipc-fix-use-after-free-Read-in-tipc_named_reinit.patch
- From: 4.18.0-372.149.1.el8_6
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21764
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc_alloc_skb.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2022-49114
- Description:
scsi: libfc: Fix use after free in fc_exch_abts_resp()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49114
- Patch: rhel8/4.18.0-372.150.1.el8_6/CVE-2022-49114-scsi-libfc-Fix-use-after-free-in-fc_exch_abts_resp.patch
- From: 4.18.0-372.150.1.el8_6
- CVE-2022-49122
- Description:
dm ioctl: prevent potential spectre v1 gadget
- CVE: https://access.redhat.com/security/cve/CVE-2022-49122
- Patch: rhel8/4.18.0-372.150.1.el8_6/CVE-2022-49122-dm-ioctl-prevent-potential-spectre-v1-gadget.patch
- From: 4.18.0-372.150.1.el8_6
- CVE-2022-49111
- Description:
Bluetooth: Fix use after free in hci_send_acl
- CVE: https://access.redhat.com/security/cve/CVE-2022-49111
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49111-bluetooth-fix-use-after-free-in-hci_send_acl.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-50066
- Description:
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()
- CVE: https://access.redhat.com/security/cve/CVE-2022-50066
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-50066-net-atlantic-fix-aq_vec-index-out-of-range-error.patch
- From: kernel-eus-8.6-4.18.0-372.150.1.el8_6
- CVE-2022-49058
- Description:
cifs: potential buffer overflow in handling symlinks
- CVE: http://access.redhat.com/security/cve/cve-2022-49058
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49058-cifs-potential-buffer-overflow-in-handling-symlinks.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-49395
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49395.patch
- From:
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://access.redhat.com/security/cve/cve-2025-22004
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://access.redhat.com/security/cve/CVE-2025-21905
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2025-37738
- Description:
ext4: ignore xattrs past end
- CVE: https://access.redhat.com/security/cve/CVE-2025-37738
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-37738-ext4-ignore-xattrs-past-end.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-49788
- Description:
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
- CVE: https://access.redhat.com/security/cve/cve-2022-49788
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49788-misc-vmw_vmci-fix-an-infoleak-in-vmci_host_do_receive_datagram.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-50020
- Description:
ext4: avoid resizing to a partial cluster size
- CVE: https://access.redhat.com/security/cve/CVE-2022-50020
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2022-50020-ext4-avoid-resizing-to-a-partial-cluster-size.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2022-50022
- Description:
drivers:md:fix a potential use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-50022
- Patch: rhel8/4.18.0-372.157.1.el8_6/CVE-2022-50022-drivers-md-fix-a-potential-use-after-free-bug.patch
- From: 4.18.0-372.157.1.el8_6
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://access.redhat.com/security/cve/cve-2024-57980
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path-477.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove s_ctrl and g_ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Remove-s_ctrl-and-g_ctrl.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove s_ctrl and g_ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Remove-s_ctrl-and-g_ctrl-kpatch.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Set error_idx during ctrl_commit errors
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Set-error_idx-during-ctrl_commit-errors.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-477.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-convert-guard-mutex.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://access.redhat.com/security/cve/CVE-2025-21727
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21919
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://access.redhat.com/security/cve/CVE-2025-21919
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21919-sched-fair-fix-potential-memory-corruption-in-child-cfs-rq-on-list.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21928
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://access.redhat.com/security/cve/CVE-2025-23150
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://access.redhat.com/security/cve/CVE-2025-38086
- Patch: rhel8/4.18.0-553.63.1.el8_10/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii_nway_restart.patch
- From: 4.18.0-553.63.1.el8_10
- CVE-2025-38380
- Description:
i2c/designware: Fix an initialization issue
- CVE: https://access.redhat.com/security/cve/CVE-2025-38380
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38380-i2c-designware-Fix-an-initialization-issue.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2021-47670
- Description:
can: peak_usb: fix use after free bugs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47670
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2021-47670-can-peak_usb-fix-use-after-free-bugs.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38177
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38177
- Patch: rhel8/4.18.0-372.158.1.el8_6/CVE-2025-38177-sch_hfsc-make-hfsc_qlen_notify-idempotent.patch
- From: 4.18.0-372.158.1.el8_6
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-sch_hfsc-Fix-qlen-accounting-bug-when-using-peek-in-hfsc_enqueue.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://access.redhat.com/security/cve/CVE-2025-38079
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-38079-crypto-algif_hash-fix-double-free-in-hash_accept.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2022-49977
- Description:
ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead
- CVE: https://access.redhat.com/security/cve/CVE-2022-49977
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2022-49977-ftrace-Fix-NULL-pointer-dereference-in-is_ftrace_trampoline-when-ftrace-is-dead.patch
- From: 4.18.0-553.64.1.el8_10
- CVE-2025-38250
- Description:
Bluetooth: hci_core: Fix use-after-free in vhci_flush()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38250
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38250-bluetooth-hci-core-fix-use-after-free-in-vhci-flush-513.24.1.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38350
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_qfq-make-qfq_qlen_notify-idempotent-372.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_cbq: make cbq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_cbq-make-cbq_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_htb-make-htb_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_htb-make-htb_deactivate-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_ets-make-est_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_drr-make-drr_qlen_notify-idempotent-372.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38085
- Description:
mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
- CVE: https://access.redhat.com/security/cve/CVE-2025-38085
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-38085-mm-hugetlb-fix-huge_pmd_unshare-vs-GUP-fast-race-513.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-38159
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://access.redhat.com/security/cve/CVE-2025-38332
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38352
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle_posix_cpu_timers-and-posix_cpu_timer_del.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38464
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2022-50211
- Description:
md-raid10: fix KASAN warning
- CVE: https://access.redhat.com/security/cve/CVE-2022-50211
- Patch: rhel8/4.18.0-372.162.1.el8_6/CVE-2022-50211-md-raid10-fix-KASAN-warning.patch
- From: 4.18.0-372.162.1.el8_6
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-add-dev_net_rcu-helper.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-extend-RCU-protection-in-igmp6_send.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://access.redhat.com/security/cve/CVE-2025-22058
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-22058-udp-Fix-memory-accounting-leak.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://access.redhat.com/security/cve/CVE-2025-38200
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-38200-i40e-fix-MMIO-write-access-to-an-invalid-page-in-i40e_clear_hw.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Fix-race-condition-on-qfq_aggregate-372.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Avoid-triggering-might_sleep-in-atomic-context-in-qfq_delete_class.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://access.redhat.com/security/cve/CVE-2025-38527
- Patch: rhel8/4.18.0-372.162.1.el8_6/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs_oplock_break.patch
- From: 4.18.0-372.162.1.el8_6
- CVE-2022-49969
- Description:
drm/amd/display: clear optc underflow before turn off odm clock
- CVE: https://access.redhat.com/security/cve/CVE-2022-49969
- Patch: rhel8/4.18.0-372.164.1.el8_6/CVE-2022-49969-drm-amd-display-clear-optc-underflow-before-turn-off-odm-clock.patch
- From: 4.18.0-372.164.1.el8_6
- CVE-2022-49985
- Description:
bpf: Don't use tnum_range on array range checking for poke descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2022-49985
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2022-49985-bpf-don-t-use-tnum_range-on-array-range-checking-for-poke-descriptors.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2022-50087
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-50087.patch
- From:
- CVE-2022-50229
- Description:
ALSA: bcd2000: Fix a UAF bug on the error path of probing
- CVE: https://access.redhat.com/security/cve/CVE-2022-50229
- Patch: rhel8/4.18.0-372.164.1.el8_6/CVE-2022-50229-alsa-bcd2000-fix-a-UAF-bug-on-the-error-path-of-probing.patch
- From: 4.18.0-372.164.1.el8_6
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37914
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-37914-net_sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38449
- Description:
requires a very complex adaptation
- CVE:
- Patch: skipped/CVE-2025-38449.patch
- From:
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38461
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38461-vsock-Fix-transport_-TOCTOU.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38498
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38498-do_change_type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38498
- Description:
use uniform permission checks for all mount propagation changes
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2024-36896
- Description:
Not affected: issue introduced since 4.18.0-477.*
- CVE:
- Patch: skipped/CVE-2024-36896.patch
- From:
- CVE-2023-53305 CVE-2022-50386
- Description:
Bluetooth: L2CAP: Fix use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50386
- Patch: rhel8/4.18.0-553.79.1.el8_10/CVE-2023-53305-bluetooth-l2cap-fix-use-after-free.patch
- From: 4.18.0-553.79.1.el8_10
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Limit packet length to skb->len
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2023-53125-net-usb-smsc75xx-Limit-packet-length-to-skb-len.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2023-53125-net-usb-smsc75xx-Move-packet-length-check-to-prevent-kernel-panic-in-skb_pull.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39730
- Patch: rhel8/4.18.0-553.78.1.el8_10/CVE-2025-39730-NFS-Fix-filehandle-bounds-checking-in-nfs_fh_to_dentry-348.patch
- From: 4.18.0-553.78.1.el8_10
- CVE-2025-38556
- Description:
HID: core: Harden s32ton() against conversion to 0 bits
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38556-core-Harden-s32ton-against-conversion-to-0-bits.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38556
- Description:
HID: core: fix shift-out-of-bounds in hid_report_raw_event
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38556-HID-core-fix-shift-out-of-bounds-in-hid_report_raw_event.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-22026
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-22026.patch
- From:
- CVE-2022-50137
- Description:
RDMA/irdma: Fix a window for use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50137
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50137-rdma-irdma-fix-a-window-for-use-after-free.patch
- From: 4.18.0-372.166.1.el8_6
- CVE-2022-50228
- Description:
KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0
- CVE: https://access.redhat.com/security/cve/CVE-2022-50228
- Patch: rhel8/4.18.0-553.79.1.el8_10/CVE-2022-50228-KVM-SVM-dont-BUG-if-userspace-injects-an-interrupt.patch
- From: 4.18.0-553.79.1.el8_10
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-37797
- Patch: rhel8/4.18.0-553.77.1.el8_10/CVE-2025-37797-net_sched-hfsc-Fix-a-UAF-vulnerability-in-class-handling.patch
- From: 4.18.0-553.77.1.el8_10
- CVE-2025-39751
- Description:
ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control
- CVE: https://access.redhat.com/security/cve/CVE-2025-39751
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2025-39751-alsa-hda-ca0132-fix-buffer-overflow-in-add-tuning-control.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2022-50070
- Description:
mptcp: do not queue data on closed subflows
- CVE: https://access.redhat.com/security/cve/CVE-2022-50070
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50070-mptcp-do-not-queue-data-on-closed-subflows.patch
- From: 4.18.0-372.166.1.el8_6
- CVE-2020-25656
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52832
- Description:
wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52832
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52832-wifi-mac80211-don-t-return-unset-power-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://access.redhat.com/security/cve/CVE-2024-53122
- Patch: rhel8/4.18.0-553.34.1.el8_10/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 4.18.0-553.34.1.el8_10