- kernel-4.18.0-513.24.1.el8_9 (rhel8)
- 4.18.0-553.8.1.el8_10
- 2024-07-09 07:30:59
- 2024-07-17 07:41:26
- K20240709_01
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6176
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6176-net-tls-do-not-free-tls_rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://access.redhat.com/security/cve/CVE-2023-6932
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 4.18.0-553.el8_10
- CVE-2023-28464, CVSSv2 Score: 7.8
- Description:
Bluetooth: Fix double free in hci_conn_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2023-28464
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanup.patch
- From: 4.18.0-553.el8_10
- CVE-2024-0841, CVSSv2 Score: 6.6
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
- CVE: https://access.redhat.com/security/cve/CVE-2024-0841
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6915, CVSSv2 Score: 6.2
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://access.redhat.com/security/cve/CVE-2023-6915
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39198, CVSSv2 Score: 7.5
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://access.redhat.com/security/cve/CVE-2023-39198
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 4.18.0-553.el8_10
- CVE-2021-4204, CVSSv2 Score: 6.4
- Description:
UBUNTU: SAUCE: bpf: prevent helper argument PTR_TO_ALLOC_MEM to have offset other than 0
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4204
- Patch: 5.11.0/CVE-2021-4204-UBUNTU-SAUCE-bpf-prevent-helper-argument-PTR_TO_ALLOC_MEM-to-have-offset-other-than-0.patch
- From: 5.11.0-46.51~20.04.2
- CVE-2024-25742 CVE-2024-25743, CVSSv2 Score: 7.1
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://access.redhat.com/security/cve/CVE-2024-25743
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-25742-CVE-2024-25743-3942-x86-sev-Harden-VC-instruction-emulation-somewhat.patch
- From: 4.18.0-553.el8_10
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51779-2946-Bluetooth-af_bluetooth-Fix-Use-After-Free-in-bt_sock.patch
- From: 4.18.0-553.el8_10
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://access.redhat.com/security/cve/CVE-2023-24023
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-24023-3694-Bluetooth-Add-more-enc-key-size-check.patch
- From: 4.18.0-553.el8_10
- CVE-2019-13631, CVSSv2 Score: 5.3
- Description:
Input: gtco - bounds check collection indent level
- CVE: https://access.redhat.com/security/cve/CVE-2019-13631
- Patch: rhel8/4.18.0-553.el8_10/CVE-2019-13631-0684-Input-gtco-bounds-check-collection-indent-level.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52581, CVSSv2 Score:
- Description:
The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
- CVE:
- Patch: skipped/CVE-2023-52581.patch
- From:
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39189
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://access.redhat.com/security/cve/CVE-2023-39193
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 4.18.0-553.el8_10
- CVE-2023-4133, CVSSv2 Score: 5.5
- Description:
cxgb4: fix use after free bugs caused by circular
- CVE: https://access.redhat.com/security/cve/CVE-2023-4133
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-4133-cxgb4-fix-use-after-free-bugs-caused-by-circular-dependency-problem.patch
- From: 4.18.0-553.el8_10
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: Fix error paths in set_con2fb_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-fix-error-paths-in-set-con2fb-map.patch
- From: 4.18.0-553.el8_10
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: set_con2fb_map needs to set con2fb_map!
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-set-con2fb-map-needs-to-set-con2fb-map.patch
- From: 4.18.0-553.el8_10
- CVE-2023-42755, CVSSv2 Score: 6.5
- Description:
net/sched: cls_rsvp: always try to match inside the linear part of skb
- CVE: https://access.redhat.com/security/cve/CVE-2023-42755
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-42755-net-sched-cls-rsvp-always-try-to-match-inside-the-linear-part-of-skb.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6622, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: bail out on mismatching
- CVE: https://access.redhat.com/security/cve/CVE-2023-6622
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Remove docstring reference to kset
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-remove-docstring-reference-to-kset.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: modify kobject_get_path() to take a const
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
net: add a route cache full diagnostic message
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-add-a-route-cache-full-diagnostic-message.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
net/dst: use a smaller percpu_counter batch for dst entries accounting
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-dst-use-a-smaller-percpu-counter-batch-for-dst-entries-accounting.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: Remove extra counter pull before gc
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-extra-counter-pull-before-gc.patch
- From: 4.18.0-553.el8_10
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of
- CVE: https://access.redhat.com/security/cve/CVE-2019-15505
- Patch: rhel8/4.18.0-553.el8_10/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of.patch
- From: 4.18.0-553.el8_10
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-25775-rdma-irdma-prevent-zero-length-stag-registration.patch
- From: 4.18.0-553.el8_10
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2023-51780
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51780-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
- From: 4.18.0-553.el8_10
- CVE-2022-3565, CVSSv2 Score: 7.8
- Description:
mISDN: fix use-after-free bugs in l1oip timer
- CVE: https://access.redhat.com/security/cve/CVE-2022-3565
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer.patch
- From: 4.18.0-553.el8_10
- CVE-2022-3565, CVSSv2 Score: 7.8
- Description:
verify struct l1oip layout
- CVE: https://access.redhat.com/security/cve/CVE-2022-3565
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer-kpatch.patch
- From: 4.18.0-553.el8_10
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
- From: 4.18.0-553.el8_10
- CVE-2022-0500, CVSSv2 Score:
- Description:
Complex adaptation required. Requires changes a lot of constants
- CVE:
- Patch: skipped/CVE-2022-0500.patch
- From:
- CVE-2022-23222, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-23222.patch
- From:
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
- From: 4.18.0-553.el8_10
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
- From: 4.18.0-553.el8_10
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52448, CVSSv2 Score: 4.7
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 4.18.0-553.el8_10
- CVE-2024-26602, CVSSv2 Score: 4.7
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26602
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 4.18.0-553.el8_10
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://access.redhat.com/security/cve/CVE-2023-42754
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52489, CVSSv2 Score:
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2024-26609, CVSSv2 Score:
- Description:
CVE has been marked as REJECTED on the NVD website.
- CVE:
- Patch: skipped/CVE-2024-26609.patch
- From:
- CVE-2023-52580, CVSSv2 Score: 5.5
- Description:
net/core: Fix ETH_P_1588 flow dissector
- CVE: https://access.redhat.com/security/cve/CVE-2023-52580
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52580-net-core-Fix-ETH_P_1588-flow-dissector.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52620, CVSSv2 Score: 2.5
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://access.redhat.com/security/cve/CVE-2023-52620
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52620-netfilter-nf_tables-disallow-timeout-for-anonymous-s.patch
- From: 4.18.0-553.el8_10
- CVE-2024-26671, CVSSv2 Score: 4.4
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://access.redhat.com/security/cve/CVE-2024-26671
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-26671-blk-mq-fix-IO-hang-from-sbitmap-wakeup-race.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: 4.18.0-553.el8_10
- CVE-2021-3753, CVSSv2 Score: 4.7
- Description:
vt_kdsetmode: extend console locking
- CVE: https://access.redhat.com/security/cve/CVE-2021-3753
- Patch: rhel8/4.18.0-553.el8_10/CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
- From: 4.18.0-553.el8_10
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
- CVE: https://access.redhat.com/security/cve/CVE-2023-31083
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-31083-Bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag.patch
- From: 4.18.0-553.el8_10
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Unite old scheme and new scheme descriptor reads
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-37453-0001-USB-core-Unite-old-scheme-and-new-scheme-descriptor-.patch
- From: 4.18.0-553.el8_10
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Change usb_get_device_descriptor() API
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-37453-0002-USB-core-Change-usb_get_device_descriptor-API.patch
- From: 4.18.0-553.el8_10
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-37453-0003-USB-core-Fix-race-by-not-overwriting-udev-descriptor.patch
- From: 4.18.0-553.el8_10
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix oversight in SuperSpeed initialization
- CVE: https://access.redhat.com/security/cve/CVE-2023-37453
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-37453-0004-USB-core-Fix-oversight-in-SuperSpeed-initialization.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39194, CVSSv2 Score: 3.2
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39194
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://access.redhat.com/security/cve/CVE-2023-6121
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6121-nvmet-nul-terminate-the-NQNs-passed-in-the-connect-c.patch
- From: 4.18.0-553.el8_10
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it to userspace
- CVE: https://access.redhat.com/security/cve/CVE-2023-1513
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-be.patch
- From: 4.18.0-553.el8_10
- CVE-2021-47153, CVSSv2 Score: 6.0
- Description:
i2c: i801: Don't generate an interrupt on bus reset
- CVE: https://access.redhat.com/security/cve/CVE-2021-47153
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47153-i2c-i801-don-t-generate-an-interrupt-on-bus-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2020-36777, CVSSv2 Score: 5.5
- Description:
media: dvbdev: Fix memory leak in dvb_media_device_free()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36777
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2020-36777-media-dvbdev-fix-memory-leak-in-dvb_media_device_free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171, CVSSv2 Score: 5.5
- Description:
net: usb: fix memory leak in smsc75xx_bind
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-memory-leak-in-smsc75xx-bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171, CVSSv2 Score: 5.5
- Description:
net: usb: fix possible use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-possible-use-after-free-in-smsc75xx_bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - default implementations for request callbacks
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-default-implementations-for-request-callbacks.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: testmgr - split akcipher tests by a key type
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-testmgr-split-akcipher-tests-by-a-key-type.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-disable-signing-and-decryption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52520, CVSSv2 Score: 5.5
- Description:
platform/x86: think-lmi: Fix reference leak
- CVE: https://access.redhat.com/security/cve/CVE-2023-52520
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52520-platform-x86-think-lmi-fix-reference-leak.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26610, CVSSv2 Score: 6.1
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://access.redhat.com/security/cve/CVE-2024-26610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52610, CVSSv2 Score: 6.4
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52598, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52598.patch
- From:
- CVE-2022-48669, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2022-48669.patch
- From:
- CVE-2023-52607, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52607.patch
- From:
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26593, CVSSv2 Score: 7.1
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://access.redhat.com/security/cve/CVE-2024-26593
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2019-25162, CVSSv2 Score: 7.8
- Description:
i2c: Fix a potential use after free
- CVE: https://access.redhat.com/security/cve/CVE-2019-25162
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2019-25162-i2c-fix-a-potential-use-after-free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52445, CVSSv2 Score: 7.8
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2023-52445
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-23307, CVSSv2 Score: 7.8
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://access.redhat.com/security/cve/CVE-2024-23307
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-23307-md-raid5-fix-atomicity-violation-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52606, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52606.patch
- From:
- CVE-2024-25744, CVSSv2 Score:
- Description:
This CVE modifies the functions which won't be available or doesn't make sense to patch as they are used during bootup time or init. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2024-25744.patch
- From:
- CVE-2021-47185, CVSSv2 Score: 4.4
- Description:
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
- CVE: https://access.redhat.com/security/cve/CVE-2021-47185
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47185-tty-tty_buffer-Fix-the-softlockup-issue-in-flush_to_.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2022-48627, CVSSv2 Score: 4.4
- Description:
vt: fix memory overlapping when deleting chars in the buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-48627
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in-the.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52477, CVSSv2 Score: 4.4
- Description:
usb: hub: Guard against accesses to uninitialized BOS descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2023-52477
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52477-usb-hub-Guard-against-accesses-to-uninitialized-BOS-.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52513, CVSSv2 Score: 4.4
- Description:
RDMA/siw: Fix connection failure handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52513
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52513-RDMA-siw-Fix-connection-failure-handling.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52528, CVSSv2 Score: 4.4
- Description:
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
- CVE: https://access.redhat.com/security/cve/CVE-2023-52528
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52528-net-usb-smsc75xx-Fix-uninit-value-access-in-__smsc75.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52594, CVSSv2 Score: 4.4
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52595, CVSSv2 Score: 4.4
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26872, CVSSv2 Score: 4.4
- Description:
RDMA/srpt: Do not register event handler until srpt device is fully setup
- CVE: https://access.redhat.com/security/cve/CVE-2024-26872
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26872-RDMA-srpt-Do-not-register-event-handler-until-srpt-d.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26892, CVSSv2 Score: 4.4
- Description:
wifi: mt76: mt7921e: fix use-after-free in free_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26892
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26892-wifi-mt76-mt7921e-fix-use-after-free-in-free_irq.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52565, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2023-52565.patch
- From:
- CVE-2021-47055, CVSSv2 Score: N/A
- Description:
mtd: properly check all write ioctls for permissions
- CVE: https://access.redhat.com/security/cve/CVE-2021-47055
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-properly-check-all-write-ioctls-for-permissions.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47055, CVSSv2 Score: N/A
- Description:
mtd: require write permissions for locking and badblock ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2021-47055
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-require-write-permissions-for-locking-and-badblo.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26897, CVSSv2 Score:
- Description:
WiFi - Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-27052, CVSSv2 Score: 5.5
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
- CVE: https://access.redhat.com/security/cve/CVE-2024-27052
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26743, CVSSv2 Score: 5.5
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26743
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26779, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: fix race condition on enabling
- CVE: https://access.redhat.com/security/cve/CVE-2024-26779
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26901, CVSSv2 Score: 5.5
- Description:
do_sys_name_to_handle(): use kzalloc() to fix
- CVE: https://access.redhat.com/security/cve/CVE-2024-26901
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26919, CVSSv2 Score: 5.5
- Description:
usb: ulpi: Fix debugfs directory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26919
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26919-4043-usb-ulpi-Fix-debugfs-directory-leak.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26933, CVSSv2 Score: 5.5
- Description:
USB: core: Add hub_get() and hub_put() routines
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4056-USB-core-Add-hub_get-and-hub_put-routines.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26933, CVSSv2 Score: 5.5
- Description:
USB: core: Fix deadlock in port "disable" sysfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4057-USB-core-Fix-deadlock-in-port-disable-sysfs-attribut.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26934, CVSSv2 Score: 5.5
- Description:
USB: core: Fix deadlock in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26934
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26934-usb-core-fix-deadlock-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26964, CVSSv2 Score: 5.5
- Description:
USB: core: Add hub_get() and hub_put() routines
- CVE: https://access.redhat.com/security/cve/CVE-2024-26964
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26964-4060-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26973, CVSSv2 Score: 5.5
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://access.redhat.com/security/cve/CVE-2024-26973
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26993, CVSSv2 Score: 5.5
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0340
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-mem.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26603, CVSSv2 Score: 5.5
- Description:
x86/fpu: Stop relying on userspace for info to
- CVE: https://access.redhat.com/security/cve/CVE-2024-26603
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26615, CVSSv2 Score: 5.5
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dum
- CVE: https://access.redhat.com/security/cve/CVE-2024-26615
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26615-net-smc-fix-illegal-rmb_desc-access-in-SMC-D-connect.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26642, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26643, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable (Netfilter).
- CVE:
- Patch: skipped/CVE-2024-26643.patch
- From:
- CVE-2024-26664, CVSSv2 Score: 5.5
- Description:
hwmon: (coretemp) Fix out-of-bounds memory access
- CVE: https://access.redhat.com/security/cve/CVE-2024-26664
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26664-hwmon-coretemp-Fix-out-of-bounds-memory-access.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26693, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: fix a crash when we run out of stations
- CVE: https://access.redhat.com/security/cve/CVE-2024-26693
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26693-wifi-iwlwifi-mvm-fix-a-crash-when-we-run-out-of-stat.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26694, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: fix double-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26694
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26694-wifi-iwlwifi-fix-double-free-bug.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27059, CVSSv2 Score: 5.5
- Description:
USB: usb-storage: Prevent divide-by-0 error in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27059
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47013, CVSSv2 Score: 5.1
- Description:
net:emac/emac-mac: Fix a use after free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47013
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47013-net-emac-emac-mac-fix-a-use-after-free-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-46934, CVSSv2 Score: 4.4
- Description:
i2c: validate user data in compat ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-46934
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-46934-i2c-validate-user-data-in-compat-ioctl.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: process isoc TD properly when there was a
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: handle isoc Babble and Buffer Overrun events
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-handle-isoc-babble-and-buffer-overrun-events.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27014, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-513.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27014, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-513-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- N/A, CVSSv2 Score: N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A