- kernel-4.18.0-240.el8 (oel8)
- 4.18.0-553.5.1.el8_10
- 2024-06-19 16:10:35
- 2024-06-25 09:21:21
- K20240619_20
- CVE-2020-24490, CVSSv2 Score:
- Description:
[net] Bluetooth: fix kernel oops in store_pending_adv_report
- CVE: https://access.redhat.com/security/cve/cve-2020-24490
- Patch: 4.18.0/CVE-2020-24490-net-Bluetooth-fix-kernel-oops-in-store_pending_adv_.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-12351 CVE-2020-25661, CVSSv2 Score: 7.5
- Description:
[net] Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel
- CVE: https://access.redhat.com/security/cve/cve-2020-25661
- Patch: 4.18.0/CVE-2020-12351-Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-12352 CVE-2020-25662, CVSSv2 Score: 5.3
- Description:
[net] Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-25662
- Patch: 4.18.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: update the net random state on interrupt and activity
- CVE: https://access.redhat.com/security/cve/CVE-2020-16166
- Patch: 4.18.0/CVE-2020-16166.patch
- From: 4.18.0-240.8.1.el8_3
- CVE-2020-25211, CVSSv2 Score: 6.0
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: rhel8/4.18.0-240.10.1.el8_3/CVE-2020-25211-netfilter-ctnetlink-add-a-range-check-for-l3-l4-protonum.patch
- From: 4.18.0-240.10.1.el8_3
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://access.redhat.com/security/cve/CVE-2020-25705
- Patch: 4.18.0/icmp-randomize-the-global-rate-limiter.patch
- From: 4.18.0-240.15.1.el8_3
- CVE-2020-29661, CVSSv2 Score: 7.8
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29661
- Patch: rhel8/4.18.0-240.15.1.el8_3/CVE-2020-29661.patch
- From: 4.18.0-240.15.1.el8_3
- CVE-2020-14351, CVSSv2 Score: 7.8
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: rhel8/4.18.0-240.15.1.el8_3/CVE-2020-14351.patch
- From: 4.18.0-240.15.1.el8_3
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
epoll: Keep a reference on files added to the check list
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0001-epoll-Keep-a-reference-on-files-added-to-the-check.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
do_epoll_ctl(): clean the failure exits up a bit
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0002-do_epoll_ctl-clean-the-failure-exits-up-a-bit.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
fix regression in "epoll: Keep a reference on files added to the check list"
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0003-fix-regression-in-epoll-Keep-a-reference-on-files.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-27152, CVSSv2 Score: 5.3
- Description:
KVM: ioapic: break infinite recursion on lazy EOI
- CVE: https://access.redhat.com/security/cve/cve-2020-27152
- Patch: 4.18.0/CVE-2020-27152-KVM-ioapic-break-infinite-recursion-on-lazy-EOI.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 4.18.0/CVE-2020-28374-scsi-target-Fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 4.18.0/CVE-2020-28374-scsi-target-Fix-XCOPY-NAA-identifier-lookup-kpatch-1.patch
- From: 4.18.0-240.22.1.el8_3
- n/a, CVSSv2 Score: n/a
- Description:
futex: Handle transient ownerless rtmutex state correctly (CVE-2021-3347 dependency)
- CVE: n/a
- Patch: 4.18.0/CVE-2021-3347-00-futex-Handle-transient-ownerless-rtmutex-state-correctly.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Ensure the correct return value from futex_lock_pi
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-01-futex-Ensure-the-correct-return-value-from-futex_lock_pi.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Replace pointless printk in fixup_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-02-futex-Replace-pointless-printk-in-fixup_owner.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Simplify fixup_pi_state_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-03-futex-Simplify-fixup_pi_state_owner.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-04-futex-Provide-and-use-pi_state_update_owner.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-05-futex-Handle-faults-correctly-for-PI-futexes.patch
- From: v5.11
- CVE-2021-26708, CVSSv2 Score: 7.8
- Description:
vsock: fix the race conditions in multi-transport support
- CVE: https://access.redhat.com/security/cve/cve-2021-26708
- Patch: 4.18.0/CVE-2021-26708-vsock-fix-the-race-conditions-in-multi-transport-sup.patch
- From: >kernel-4.18.0-240.10.1.el8_3
- CVE-2021-27363 CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://access.redhat.com/security/cve/cve-2021-27364
- Patch: 4.18.0/0001-scsi-iscsi-Restrict-sessions-and-handles-to-admin-ca.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 4.18.0/0002-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sys.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 4.18.0/0003-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PA.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 4.18.0/0004-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2019-19528, CVSSv2 Score: 6.1
- Description:
USB: iowarrior: fix use-after-free on disconnect
- CVE: https://access.redhat.com/security/cve/cve-2019-19528
- Patch: 4.18.0/CVE-2019-19528-12197-usb-USB-iowarrior-fix-use-after-free-on-disconnect.patch
- From: kernel-4.18.0-305.el8
- CVE-2019-19523, CVSSv2 Score: 7.8
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://access.redhat.com/security/cve/cve-2019-19523
- Patch: 4.18.0/CVE-2019-19523-12144-usb-USB-adutux-fix-use-after-free-on-disconnect.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-11608, CVSSv2 Score: 4.3
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://access.redhat.com/security/cve/cve-2019-11608
- Patch: 4.18.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-12464, CVSSv2 Score: 6.7
- Description:
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
- CVE: https://access.redhat.com/security/cve/cve-2020-12464
- Patch: 4.18.0/CVE-2020-12464-12506-usb-USB-core-Fix-free-while-in-use-bug-in-the-USB-S.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-12114, CVSSv2 Score: 4.4
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: https://access.redhat.com/security/cve/cve-2020-12114
- Patch: 4.18.0/CVE-2020-12114-8212-fs-fs-namespace.c-fix-mountpoint-reference-counter-r.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://access.redhat.com/security/cve/cve-2019-14314
- Patch: 4.18.0/CVE-2020-14314-0009-fs-ext4-fix-potential-negative-array-index-in-do_spl.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: ubuntu-bionic-hwe-5.3/5.3.0-66.60/CVE-2020-14356-cgroup-fix-cgroup_sk_alloc-for-sk_clone_lock-46.38.patch
- From: 5.3.0-66.60
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: Fix sock_cgroup_data on big-endian.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: ubuntu-bionic-hwe-5.3/5.3.0-66.60/CVE-2020-14356-cgroup-Fix-sock_cgroup_data-on-big-endian.patch
- From: 5.3.0-66.60
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
netprio_cgroup: Fix unlimited memory leak of v2 cgroups
- CVE: https://access.redhat.com/security/cve/CVE-2020-14356
- Patch: 4.18.0/CVE-2020-14356-0505-net-netprio_cgroup-Fix-unlimited-memory-leak-of-v2-c.patch
- From: 4.18.0-305.el8
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-14356
- Patch: 4.18.0/CVE-2020-14356-kpatch.patch
- From: 4.18.0-305.el8
- CVE-2020-24394, CVSSv2 Score: 7.1
- Description:
nfsd: apply umask on fs without ACL support
- CVE: https://access.redhat.com/security/cve/cve-2020-24394
- Patch: 4.18.0/CVE-2020-24394-4117-fs-nfsd-apply-umask-on-fs-without-ACL-support.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://access.redhat.com/security/cve/cve-2020-25212
- Patch: 4.18.0/CVE-2020-25212-0342-fs-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25285, CVSSv2 Score: 6.4
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://access.redhat.com/security/cve/cve-2020-25285
- Patch: 4.18.0/CVE-2020-25285-9007-mm-mm-hugetlb-fix-a-race-between-hugetlb-sysctl-hand.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25284, CVSSv2 Score: 4.1
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://access.redhat.com/security/cve/cve-2020-25284
- Patch: 4.18.0/CVE-2020-25284-14205-block-rbd-require-global-CAP_SYS_ADMIN-for-mapping-.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-0431, CVSSv2 Score: 6.7
- Description:
HID: hid-input: clear unmapped usages
- CVE: https://access.redhat.com/security/cve/cve-2020-0431
- Patch: 4.18.0/CVE-2020-0431-7920-hid-HID-hid-input-clear-unmapped-usages.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25643, CVSSv2 Score: 6.6
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://access.redhat.com/security/cve/cve-2020-25643
- Patch: 4.18.0/CVE-2020-25643-5958-netdrv-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-28974, CVSSv2 Score: 5.0
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://access.redhat.com/security/cve/cve-2020-28974
- Patch: 4.18.0/CVE-2020-28974-17646-vt-Disable-KD_FONT_OP_COPY.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- CVE: https://access.redhat.com/security/cve/cve-2020-27786
- Patch: 4.18.0/CVE-2020-27786-2184-sound-ALSA-rawmidi-Fix-racy-buffer-resize-under-conc.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27786
- Patch: 4.18.0/CVE-2020-27786-kpatch.patch
- From: kernel-4.18.0-305.el8
- CVE-2021-0342, CVSSv2 Score: 6.7
- Description:
tun: correct header offsets in napi frags mode
- CVE: https://access.redhat.com/security/cve/cve-2021-0342
- Patch: 4.18.0/CVE-2021-0342-15000-netdrv-tun-correct-header-offsets-in-napi-frags-mod.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://access.redhat.com/security/cve/cve-2020-36322
- Patch: 4.18.0/CVE-2020-36322-16294-fs-fuse-fix-bad-inode.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-15437, CVSSv2 Score: 6.4
- Description:
serial: 8250: fix null-ptr-deref in serial8250_start_tx()
- CVE: https://access.redhat.com/security/cve/cve-2020-15437
- Patch: 4.18.0/CVE-2020-15437-11048-tty-serial-8250-fix-null-ptr-deref-in-serial8250_st.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25704, CVSSv2 Score: 6.2
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://access.redhat.com/security/cve/cve-2020-25704
- Patch: 4.18.0/CVE-2020-25704-14269-kernel-perf-core-Fix-a-memory-leak-in-perf_event_pa.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
- CVE: https://access.redhat.com/security/cve/CVE-2020-36557
- Patch: 4.18.0/CVE-2020-36557-8.3-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtual.patch
- From: kernel-4.18.0-240.22.1.el8
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-36557
- Patch: 4.18.0/CVE-2020-36557-8.3-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtual-kpatch.patch
- From: kernel-4.18.0-240.22.1.el8
- CVE-2020-27835, CVSSv2 Score: 4.4
- Description:
IB/hfi1: Ensure correct mm is used at all times
- CVE: https://access.redhat.com/security/cve/cve-2020-27835
- Patch: 4.18.0/CVE-2020-27835-14206-infiniband-IB-hfi1-Ensure-correct-mm-is-used-at-all.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-27835, CVSSv2 Score: 4.4
- Description:
IB/hfi1: Ensure correct mm is used at all times (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27835
- Patch: 4.18.0/CVE-2020-27835-kpatch.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-35508, CVSSv2 Score: 4.5
- Description:
kernel: fork: properly initialize task_struct->task_struct_rh (rhel specific)
- CVE: https://access.redhat.com/security/cve/cve-2020-35508
- Patch: 4.18.0/CVE-2020-35508-11919-kernel-kernel-fork-properly-initialize-task_struct-.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-12362, CVSSv2 Score:
- Description:
Mitigation is made with intel firmware update, el8 kernels also need 'i915.enable_guc' specified in cmdline to be affected
- CVE:
- Patch: skipped/CVE-2020-12362.patch
- From:
- CVE-2021-33909, CVSSv2 Score: 4.4
- Description:
af_key: pfkey_dump needs parameter validation
- CVE: https://access.redhat.com/security/cve/CVE-2021-0605
- Patch: 4.18.0/CVE-2021-0605-af_key-pfkey_dump-needs-parameter-validation.patch
- From: kernel-4.18.0-305
- CVE-2020-36312, CVSSv2 Score: 3.3
- Description:
[virt] kvm: fix memory leak in kvm_io_bus_unregister_dev()
- CVE: https://access.redhat.com/security/cve/cve-2020-36312
- Patch: 4.18.0/5525-virt-kvm-fix-memory-leak-in-kvm_io_bus_unregister_de.patch
- From: 4.18.0-304.el8
- CVE-2021-3501, CVSSv2 Score:
- Description:
The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8
- CVE:
- Patch: skipped/CVE-2021-3501.patch
- From:
- CVE-2021-3543, CVSSv2 Score:
- Description:
The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8
- CVE:
- Patch: skipped/CVE-2021-3543.patch
- From:
- CVE-2020-26541, CVSSv2 Score:
- Description:
Affects only secure boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2020-26541.patch
- From:
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33909, CVSSv2 Score: 7.0
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://access.redhat.com/security/cve/cve-2021-33909
- Patch: 4.18.0/CVE-2021-33909-seq-file-disallow-extremely-large-seq-buffer-rhel8.patch
- From: 4.18.0-305.10.2.el8_4
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the
- CVE: https://access.redhat.com/security/cve/CVE-2021-32399
- Patch: 4.18.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the.patch
- From: 4.18.0-305.10.2.el8_4
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://ubuntu.com/security/CVE-2021-22543
- Patch: 4.18.0/CVE-2021-22543-17896-KVM-do-not-allow-mapping-valid-but-non-reference-co.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 4.18.0/CVE-2021-3609-17898-can-bcm-delay-release-of-struct-bcm_op-after-synchr.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 4.18.0/CVE-2021-22555.patch
- From: v5.12
- CVE-2021-37576, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-37576.patch
- From:
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: 4.18.0/CVE-2021-3653-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-240.patch
- From: 4.18.0-305.19.1.el8_4
- CVE-2021-3656, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested
- CVE: https://access.redhat.com/security/cve/CVE-2021-3656
- Patch: 4.18.0/CVE-2021-3656-18059-KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-lt-305.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17987-RDMA-cma-Add-missing-locking-to-rdma_accept-lt-305.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17988-RDMA-ucma-Fix-the-locking-of-ctx-file-lt-305.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix locking for ctx->events_reported
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17989-RDMA-ucma-Fix-locking-for-ctx-events_reported.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17990-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-wit.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2021-0512, CVSSv2 Score: 7.8
- Description:
HID: make arrays usage and value to be the same
- CVE: https://access.redhat.com/security/cve/CVE-2021-0512
- Patch: 4.18.0/CVE-2021-0512-18158-HID-make-arrays-usage-and-value-to-be-the-same.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
[block] nbd: Fix memory leak in nbd_add_socket
- CVE: https://access.redhat.com/security/cve/cve-2021-3348
- Patch: 4.18.0/1478-block-nbd-Fix-memory-leak-in-nbd_add_socket.patch
- From: 4.18.0-304.el8
- CVE-2021-20239, CVSSv2 Score: 4.4
- Description:
net, sctp, filter: remap copy_from_user failure error
- CVE: https://access.redhat.com/security/cve/cve-2021-20239
- Patch: 4.18.0/0085-net-sctp-filter-remap-copy_from_user-failure-error.patch
- From: 4.18.0-348.el8
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://access.redhat.com/security/cve/cve-2020-29660
- Patch: 4.18.0/0209-tty-Fix-session-locking.patch
- From: 4.18.0-348.el8
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
nbd: freeze the queue while we're adding connections
- CVE: https://access.redhat.com/security/cve/cve-2021-3348
- Patch: 4.18.0/0693-nbd-freeze-the-queue-while-we-re-adding-connections.patch
- From: 4.18.0-348.el8
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://access.redhat.com/security/cve/cve-2021-31916
- Patch: 4.18.0/1289-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 4.18.0-348.el8
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://access.redhat.com/security/cve/cve-2021-28950
- Patch: 4.18.0/1362-fuse-fix-live-lock-in-fuse_iget-240.patch
- From: 4.18.0-348.el8
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: devicetree: Avoid taking direct reference to device name string
- CVE: https://access.redhat.com/security/cve/cve-2020-0427
- Patch: 4.18.0/1378-pinctrl-devicetree-Avoid-taking-direct-reference-to-.patch
- From: 4.18.0-348.el8
- CVE-2020-36158, CVSSv2 Score: 6.7
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
- CVE: https://access.redhat.com/security/cve/cve-2020-36158
- Patch: 4.18.0/1379-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 4.18.0-348.el8
- CVE-2021-33033, CVSSv2 Score: 7.8
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://access.redhat.com/security/cve/cve-2021-33033
- Patch: 4.18.0/1612-cipso-calipso-resolve-a-number-of-problems-with-the-.patch
- From: 4.18.0-348.el8
- CVE-2020-36312, CVSSv2 Score: 3.3
- Description:
KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU
- CVE: https://access.redhat.com/security/cve/cve-2020-36312
- Patch: 4.18.0/2422-KVM-Destroy-I-O-bus-devices-on-unregister-failure-_a-240.patch
- From: 4.18.0-348.el8
- CVE-2020-36312, CVSSv2 Score: 3.3
- Description:
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
- CVE: https://access.redhat.com/security/cve/cve-2020-36312
- Patch: 4.18.0/2423-KVM-Stop-looking-for-coalesced-MMIO-zones-if-the-bus.patch
- From: 4.18.0-348.el8
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://access.redhat.com/security/cve/cve-2021-23133
- Patch: 4.18.0/2797-sctp-delay-auto_asconf-init-until-binding-the-first-.patch
- From: 4.18.0-348.el8
- CVE-2021-29646, CVSSv2 Score: 5.5
- Description:
tipc: better validate user input in tipc_nl_retrieve_key()
- CVE: https://access.redhat.com/security/cve/cve-2021-29646
- Patch: 4.18.0/5221-tipc-better-validate-user-input-in-tipc_nl_retrieve_.patch
- From: 4.18.0-348.el8
- CVE-2021-31440, CVSSv2 Score: 7.0
- Description:
bpf: Fix propagation of 32-bit signed bounds from 64-bit bounds
- CVE: https://access.redhat.com/security/cve/cve-2021-31440
- Patch: 4.18.0/6564-bpf-Fix-propagation-of-32-bit-signed-bounds-from-64-.patch
- From: 4.18.0-348.el8
- CVE-2021-31440, CVSSv2 Score: 7.0
- Description:
bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
- CVE: https://access.redhat.com/security/cve/cve-2021-31440
- Patch: 4.18.0/7001-bpf-Fix-propagation-of-32-bit-unsigned-bounds-from-6.patch
- From: 4.18.0-348.el8
- CVE-2021-3573, CVSSv2 Score: 6.7
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/cve-2021-3573
- Patch: 4.18.0/7050-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 4.18.0-348.el8
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/cve-2021-29650
- Patch: 4.18.0/7052-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.18.0-348.el8
- CVE-2021-3564, CVSSv2 Score: 6.3
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://access.redhat.com/security/cve/cve-2021-3564
- Patch: 4.18.0/7591-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.18.0-348.el8
- CVE-2021-0129, CVSSv2 Score: 7.1
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://access.redhat.com/security/cve/cve-2021-0129
- Patch: 4.18.0/8822-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-a.patch
- From: 4.18.0-348.el8
- CVE-2020-29368, CVSSv2 Score: 7.0
- Description:
mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()
- CVE: https://access.redhat.com/security/cve/cve-2020-29368
- Patch: 4.18.0/9329-mm-thp-make-the-THP-mapcount-atomic-against-__split_-240.patch
- From: 4.18.0-348.el8
- CVE-2020-29368, CVSSv2 Score: 7.0
- Description:
mm: thp: fix MADV_REMOVE deadlock on shmem THP
- CVE: https://access.redhat.com/security/cve/cve-2020-29368
- Patch: 4.18.0/9330-mm-thp-fix-MADV_REMOVE-deadlock-on-shmem-THP-240.patch
- From: 4.18.0-348.el8
- CVE-2021-28971, CVSSv2 Score: 4.7
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://access.redhat.com/security/cve/cve-2021-28971
- Patch: 4.18.0/9810-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-statu.patch
- From: 4.18.0-348.el8
- CVE-2021-20194, CVSSv2 Score: 7.0
- Description:
[net] bpf: Don't return EINVAL from {get, set}sockopt when optlen > PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-20194
- Patch: 4.18.0/5196-net-bpf-Don-t-return-EINVAL-from-get-set-sockopt-whe.patch
- From: 4.18.0-304.el8
- CVE-2021-20194, CVSSv2 Score: 7.0
- Description:
bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- CVE: https://access.redhat.com/security/cve/cve-2021-20194
- Patch: 4.18.0/10226-bpf-cgroup-Fix-optlen-WARN_ON_ONCE-toctou.patch
- From: 4.18.0-348.el8
- CVE-2021-20194, CVSSv2 Score: 7.0
- Description:
bpf, cgroup: Fix problematic bounds check
- CVE: https://access.redhat.com/security/cve/cve-2021-20194
- Patch: 4.18.0/10227-bpf-cgroup-Fix-problematic-bounds-check.patch
- From: 4.18.0-348.el8
- CVE-2021-3600, CVSSv2 Score: 7.8
- Description:
bpf: Fix 32 bit src register truncation on div/mod
- CVE: https://access.redhat.com/security/cve/cve-2021-3600
- Patch: 4.18.0/10233-bpf-Fix-32-bit-src-register-truncation-on-div-mod.patch
- From: 4.18.0-348.el8
- CVE-2021-3444, CVSSv2 Score: 7.0
- Description:
bpf: Fix truncation handling for mod32 dst reg wrt zero
- CVE: https://access.redhat.com/security/cve/cve-2021-3444
- Patch: 4.18.0/13757-bpf-Fix-truncation-handling-for-mod32-dst-reg-wrt-z.patch
- From: 4.18.0-348.el8
- CVE-2020-36386, CVSSv2 Score: 7.1
- Description:
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
- CVE: https://access.redhat.com/security/cve/cve-2020-36386
- Patch: 4.18.0/10931-Bluetooth-Fix-slab-out-of-bounds-read-in-hci_extend.patch
- From: 4.18.0-348.el8
- CVE-2021-3635, CVSSv2 Score: 4.1
- Description:
netfilter: nf_tables: fix flowtable list del corruption
- CVE: https://access.redhat.com/security/cve/cve-2021-3635
- Patch: 4.18.0/13613-netfilter-nf_tables-fix-flowtable-list-del-corrupti.patch
- From: 4.18.0-348.el8
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Prohibit alu ops for pointer types not defining ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0001-bpf-Prohibit-alu-ops-for-pointer-types-not-defining-.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Fix off-by-one for area size in creating mask to left
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0002-bpf-Fix-off-by-one-for-area-size-in-creating-mask-to.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0003-bpf-Simplify-alu_limit-masking-for-pointer-arithmeti.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Add sanity check for upper ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0004-bpf-Add-sanity-check-for-upper-ptr_limit.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Use correct permission flag for mixed signed bounds arithmetic
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13620-bpf-Use-correct-permission-flag-for-mixed-signed-bo.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13621-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13622-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-a.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13623-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Improve verifier error messages for users
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13624-bpf-Improve-verifier-error-messages-for-users.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13626-bpf-Refactor-and-streamline-bounds-check-into-helpe-240.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Move sanitize_val_alu out of op switch
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13627-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From: 4.18.0-348.el8
- CVE-2021-29155 CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Tighten speculative pointer arithmetic mask
- CVE: https://access.redhat.com/security/cve/cve-2021-33200
- Patch: 4.18.0/13628-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From: 4.18.0-348.el8
- CVE-2021-29155 CVE-2021-31829, CVSSv2 Score: 6.2
- Description:
bpf: Fix masking negation logic upon negative dst register
- CVE: https://access.redhat.com/security/cve/cve-2021-31829
- Patch: 4.18.0/13630-bpf-Fix-masking-negation-logic-upon-negative-dst-re.patch
- From: 4.18.0-348.el8
- CVE-2021-29155 CVE-2021-31829, CVSSv2 Score: 6.2
- Description:
bpf: Fix leakage of uninitialized bpf stack under speculation
- CVE: https://access.redhat.com/security/cve/cve-2021-31829
- Patch: 4.18.0/13631-bpf-Fix-leakage-of-uninitialized-bpf-stack-under-sp.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Wrap aux data inside bpf_sanitize_info container
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13633-bpf-Wrap-aux-data-inside-bpf_sanitize_info-containe.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Fix mask direction swap upon off reg sign change
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13634-bpf-Fix-mask-direction-swap-upon-off-reg-sign-chang.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: No need to simulate speculative domain for immediates
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13635-bpf-No-need-to-simulate-speculative-domain-for-imme.patch
- From: 4.18.0-348.el8
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://access.redhat.com/security/cve/cve-2021-3679
- Patch: 4.18.0/13654-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-caus.patch
- From: 4.18.0-348.el8
- CVE-2021-3659, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://access.redhat.com/security/cve/cve-2021-3659
- Patch: 4.18.0/13655-net-mac802154-Fix-general-protection-fault.patch
- From: 4.18.0-348.el8
- CVE-2020-26147 CVE-2020-26140 CVE-2020-26143, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13729-mac80211-assure-all-fragments-are-encrypted.patch
- From: 4.18.0-348.el8
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13730-mac80211-prevent-mixed-key-and-fragment-cache-attac.patch
- From: 4.18.0-348.el8
- CVE-2020-24588 CVE-2020-26144, CVSSv2 Score: 4.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13731-mac80211-properly-handle-A-MSDUs-that-start-with-an.patch
- From: 4.18.0-348.el8
- CVE-2020-24588 CVE-2020-26144, CVSSv2 Score: 6.5
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13732-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: 4.18.0-348.el8
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13733-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: 4.18.0-348.el8
- CVE-2020-26146, CVSSv2 Score: 5.3
- Description:
mac80211: check defrag PN against current frame
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13735-mac80211-check-defrag-PN-against-current-frame.patch
- From: 4.18.0-348.el8
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13736-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 4.18.0-348.el8
- CVE-2020-26139, CVSSv2 Score: 3.5
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13737-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: 4.18.0-348.el8
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13738-mac80211-extend-protection-against-mixed-key-and-fr.patch
- From: 4.18.0-348.el8
- CVE-2020-26146, CVSSv2 Score: 4.3
- Description:
ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13739-ath10k-add-CCMP-PN-replay-protection-for-fragmented.patch
- From: 4.18.0-348.el8
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for PCIe
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13740-ath10k-drop-fragments-with-multicast-DA-for-PCIe.patch
- From: 4.18.0-348.el8
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for SDIO
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13741-ath10k-drop-fragments-with-multicast-DA-for-SDIO.patch
- From: 4.18.0-348.el8
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
ath10k: drop MPDU which has discard flag set by firmware for SDIO
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13742-ath10k-drop-MPDU-which-has-discard-flag-set-by-firm.patch
- From: 4.18.0-348.el8
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
ath10k: Fix TKIP Michael MIC verification for PCIe
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13743-ath10k-Fix-TKIP-Michael-MIC-verification-for-PCIe.patch
- From: 4.18.0-348.el8
- CVE-2020-24588 CVE-2020-26144, CVSSv2 Score: 6.5
- Description:
ath10k: Validate first subframe of A-MSDU before processing the list
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13744-ath10k-Validate-first-subframe-of-A-MSDU-before-pro.patch
- From: 4.18.0-348.el8
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks (kpatch adaptation)
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13730-mac80211-prevent-mixed-key-and-fragment-cache-attac-kpatch-1.patch
- From: 4.18.0-348.el8
- CVE-2020-24586, CVSSv2 Score: 4.3
- Description:
mac80211: add fragment cache to sta_info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24586
- Patch: 4.18.0/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: 4.18.0-348.el8
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
mac80211: prevent attacks on TKIP/WEP as well (kpatch adaptation)
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13736-mac80211-prevent-attacks-on-TKIP-WEP-as-well-kpatch-1.patch
- From: 4.18.0-348.el8
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://access.redhat.com/security/cve/cve-2021-3732
- Patch: 4.18.0/13951-ovl-prevent-private-clone-if-bind-mount-is-not-allo-240.patch
- From: 4.18.0-348.el8
- CVE-2021-33098, CVSSv2 Score: 5.5
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://access.redhat.com/security/cve/CVE-2021-33098
- Patch: 4.18.0/CVE-2021-33098-ixgbe-fix-large-MTU-request-from-VF.patch
- From: kernel-4.18.0-348.el8
- CVE-2019-14615, CVSSv2 Score:
- Description:
Already included.
- CVE:
- Patch: skipped/CVE-2019-14615.patch
- From:
- CVE-2020-27777, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2020-27777.patch
- From:
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://access.redhat.com/security/cve/cve-2021-20321
- Patch: 4.18.0/14188-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 4.18.0-348.7.1.el8
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.1.12/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 4.1.12-124.59.1.2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/print: introduce new struct drm_device based WARN* macros
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-0001-drm-print-introduce-new-struct-drm_device-based-WARN.patch
- From: 4.18.0-240.el8
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-240.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.18.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records-348.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-kpatch.patch
- From: 5.4.17-2136.302.7.2
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
drm/vmwgfx: Fix stale file descriptors on failed usercopy
- CVE: https://access.redhat.com/security/cve/CVE-2022-22942
- Patch: 4.18.0/CVE-2022-22942-drm-vmwgfx-Fix-stale-file-descriptors-on-failed-usercopy.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.14.0/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.14.262-200.489.amzn2
- CVE-2022-0516, CVSSv2 Score: 7.8
- Description:
KVM: s390: Return error on SIDA memop on normal guest
- CVE: https://access.redhat.com/security/cve/CVE-2022-0516
- Patch: 4.18.0/CVE-2022-0516-KVM-s390-Return-error-on-SIDA-memop-on-normal-guest.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array size
- CVE: https://access.redhat.com/security/cve/CVE-2022-25636
- Patch: 4.18.0/CVE-2022-25636.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0001-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-32
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0002-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://access.redhat.com/security/cve/cve-2021-41864
- Patch: 4.18.0/1324-bpf-Fix-integer-overflow-in-prealloc_elems_and_freel.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4037, CVSSv2 Score: 4.4
- Description:
xfs: fix up non-directory creation in SGID directories
- CVE: https://access.redhat.com/security/cve/cve-2021-4037
- Patch: 4.18.0/1626-xfs-fix-up-non-directory-creation-in-SGID-directorie-240.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash()
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2169-ipv6-use-siphash-in-rt6_exception_hash.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2170-ipv6-make-exception-cache-less-predictible.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash() (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2169-ipv6-use-siphash-in-rt6_exception_hash-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii
- CVE: https://access.redhat.com/security/cve/cve-2020-13974
- Patch: 4.18.0/2474-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-13974
- Patch: 4.18.0/2474-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4157, CVSSv2 Score: 5.9
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://access.redhat.com/security/cve/cve-2021-4157
- Patch: 4.18.0/2674-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nf.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3743, CVSSv2 Score: 6.2
- Description:
net: qrtr: fix another OOB Read in qrtr_endpoint_post
- CVE: https://access.redhat.com/security/cve/cve-2021-3743
- Patch: 4.18.0/7796-net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun()
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8090-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8091-ipv4-make-exception-cache-less-predictible.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun() (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8090-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4083, CVSSv2 Score: 7.4
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://access.redhat.com/security/cve/cve-2021-4083
- Patch: 4.18.0/9104-fget-check-that-the-fd-still-exists-after-getting-a-.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3773, CVSSv2 Score: 5.9
- Description:
netfilter: nat: force port remap to prevent shadowing well-known ports
- CVE: https://access.redhat.com/security/cve/cve-2021-3773
- Patch: 4.18.0/9346-netfilter-nat-force-port-remap-to-prevent-shadowing-.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45485, CVSSv2 Score: 7.5
- Description:
ipv6: use prandom_u32() for ID generation
- CVE: https://access.redhat.com/security/cve/cve-2021-45485
- Patch: 4.18.0/11062-ipv6-use-prandom_u32-for-ID-generation.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: unify attach permission checking
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/0192-cgroup-unify-attach-permission-checking.patch
- From: kernel-4.18.0-348.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup/cgroup.c: replace 'of->kn->priv' with of_cft()
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/0203-cgroup-cgroup.c-replace-of-kn-priv-with-of_cft.patch
- From: kernel-4.18.0-348.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: cgroup.{procs,threads} factor out common parts
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/0206-cgroup-cgroup.-procs-threads-factor-out-common-parts.patch
- From: kernel-4.18.0-348.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time credentials for process migraton perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/11280-cgroup-Use-open-time-credentials-for-process-migrat.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/11282-cgroup-Use-open-time-cgroup-namespace-for-process-m.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
tee: handle lookup of shm with reference count 0
- CVE: https://access.redhat.com/security/cve/cve-2021-44733
- Patch: 4.18.0/11389-tee-handle-lookup-of-shm-with-reference-count-0.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent potential read overflow in ioctl
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 4.18.0/11697-Input-joydev-prevent-potential-read-overflow-in-ioc.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: use true,false for bool variable
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/1329-fuse-use-true-false-for-bool-variable.patch
- From: kernel-4.18.0-348.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-240-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-0941, CVSSv2 Score: 6.7
- Description:
bpf: Remove MTU check in __bpf_skb_max_len
- CVE: https://access.redhat.com/security/cve/CVE-2021-0941
- Patch: 4.18.0/CVE-2021-0941-bpf-Remove-MTU-check-in-__bpf_skb_max_len-193.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-4788, CVSSv2 Score:
- Description:
IBM Power9 is unsupported
- CVE:
- Patch: skipped/CVE-2020-4788.patch
- From:
- CVE-2020-0404, CVSSv2 Score: 5.5
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0404
- Patch: 4.15.0/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-malformed-USB-descriptors.patch
- From: kernel-4.15.0-96.97
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-list.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: clean up all clients on device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-clean-up-all-clients-on-device-removal.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27820
- Patch: 4.18.0/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-kpatch-240.patch
- From: 4.18.0-372.9.1.el8
- CVE-2021-3669, CVSSv2 Score: 5.5
- Description:
ipc: replace costly bailout check in sysvipc_find_ipc()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3669
- Patch: 4.18.0/CVE-2021-3669-ipc-replace-costly-bailout-check-in-sysvipc_find_ipc.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3764 CVE-2021-3744, CVSSv2 Score: 5.5
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-bionic/4.15.0-163.171/0005-CVE-2021-3744-CVE-2021-3764-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd.patch
- From: 4.15.0-163.171
- CVE-2021-3759, CVSSv2 Score: 5.5
- Description:
memcg: enable accounting of ipc resources
- CVE: https://access.redhat.com/security/cve/cve-2021-3759
- Patch: 4.18.0/CVE-2021-3759-memcg-enable-accounting-of-ipc-resources.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
use init_tag from inithdr for ABORT chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
fix the processing for COOKIE_ECHO chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-fix-the-processing-for-COOKIE_ECHO-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_do_8_5_1_E_sa
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_do_8_5_1_E_sa.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_ootb
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_ootb.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.18.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare-80.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-21781, CVSSv2 Score:
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2021-21781.patch
- From:
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2021-43056, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-43056.patch
- From:
- CVE-2022-0001, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
hso: fix bailout in error case of probe
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-37159
- Patch: 4.19.0/CVE-2021-37159-hso-fix-bailout-in-error-case-of-probe.patch
- From: 4.19.208-1
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-37159
- Patch: 4.19.0/CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_device.patch
- From: 4.19.208-1
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42739
- Patch: ubuntu-bionic/4.15.0-167.175/0004-CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch
- From: 4.15.0-167.175
- CVE-2021-43389, CVSSv2 Score: 5.5
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-43389
- Patch: ubuntu-bionic/4.15.0-166.174/0005-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 4.15.0-166.174
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43976
- Patch: 4.19.0/CVE-2021-43976-mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
- From: 4.19.232-1
- CVE-2022-0322, CVSSv2 Score: 5.5
- Description:
account stream padding length for reconf chunk
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0322
- Patch: 4.19.0/CVE-2022-0322.patch
- From: <= linux-4.19.208-1
- CVE-2021-4203, CVSSv2 Score: 6.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses
- CVE: https://access.redhat.com/security/cve/cve-2021-4203
- Patch: 4.18.0/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4203, CVSSv2 Score: 6.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-4203
- Patch: 4.18.0/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses-kpatch-193.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation
- CVE: https://access.redhat.com/security/cve/cve-2021-45486
- Patch: 4.18.0/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-45486
- Patch: 4.18.0/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation-kpatch.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 4.18.0/CVE-2022-27666.patch
- From: 4.18.0-372.9.1.el8
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
sock: remove one redundant SKB_FRAG_PAGE_ORDER macro (CVE-2022-27666 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 4.19.0/CVE-2022-27666-dependency.patch
- From: v5.14
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1729
- Patch: 4.18.0/CVE-2022-1729-perf-Fix-sys_perf_event_open-race-against-self.patch
- From: 5.10.120-1
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets earlier
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 4.18.0/CVE-2022-32250-netfilter-nf_tables-disallow-non-stateful-expression-in-sets-240.patch
- From: >kernel-4.18.0-372.9.1.el8
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 4.18.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset.patch
- From: 4.18.0-372.19.1
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: ubuntu-bionic/4.15.0-191.202/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: kernel-4.15.0-191.202
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.10.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.10.113-1
- CVE-2022-0494, CVSSv2 Score: 4.4
- Description:
block-map: add __GFP_ZERO flag for alloc_page in function
- CVE: https://access.redhat.com/security/cve/CVE-2022-0494
- Patch: 5.4.0/CVE-2022-0494-block-map-add-__GFP_ZERO-for-alloc_page-in-bio_copy_kern.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2021-3640, CVSSv2 Score: 6.7
- Description:
Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 4.19.0/CVE-2021-3640.patch
- From: <= linux-4.19.208-1
- CVE-2022-1055, CVSSv2 Score: 6.3
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1055
- Patch: 4.18.0/CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28390
- Patch: 4.14.0/CVE-2022-28390.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://access.redhat.com/security/cve/cve-2022-20368
- Patch: 4.18.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
SUNRPC: Ensure we flush any closed sockets before
- CVE: https://access.redhat.com/security/cve/CVE-2022-28893
- Patch: 4.18.0/CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-pre-304.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
[PATCH] SUNRPC: Don't leak sockets in xs_local_connect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0003-CVE-2022-28893-SUNRPC-Don-t-leak-sockets-in-xs_local_connect.patch
- From: 5.4.0-124.140
- CVE-2022-29581, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: fix netns refcount changes in u32_change()
- CVE: https://access.redhat.com/security/cve/CVE-2022-29581
- Patch: 4.18.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 4.4.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix race in VT_RESIZEX
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-vt-vt_ioctl-fix-race-in-VT_RESIZEX.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-30002
- Patch: ubuntu-focal/5.4.0-73.82/0001-CVE-2021-30002-media-v4l-ioctl-Fix-memory-leak-in-video_usercopy.patch
- From: 5.4.0-73.82
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: prevent bad output lengths in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 5.10.0/CVE-2022-0168-cifs-prevent-bad-output-lengths-in-smb2_ioctl_query_info.patch
- From: 5.10.113-1
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 4.18.0/CVE-2022-0168-cifs-fix-NULL-ptr-dereference-in-smb2_ioctl_query_info-240.patch
- From: 5.10.113-1
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0854, CVSSv2 Score: 5.5
- Description:
Reinstate some of "swiotlb: rework "fix info leak with
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0854
- Patch: 4.18.0/CVE-2022-0854-Reinstate-some-of-swiotlb-rework-fix-info-leak-with-348.patch
- From: 5.10.120-1
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make variable "count" signed
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-make-variable-count-signed.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-2938, CVSSv2 Score: 7.8
- Description:
psi: Fix uaf issue when psi trigger is destroyed while being polled (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-2938
- Patch: 4.18.0/CVE-2022-2938-kpatch-305.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.18.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls-240.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.18.0/CVE-2022-1048-kpatch-240.patch
- From: 5.10.113
- CVE-2022-2639, CVSSv2 Score: 7.8
- Description:
openvswitch: fix OOB access in reserve_sfa_size()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2639
- Patch: 4.18.0/CVE-2022-2639-openvswitch-fix-OOB-access-in-reserve_sfa_size.patch
- From: 4.18.0-372.26.1
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 4.18.0/CVE-2022-1016.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
Bail out in case userspace uses unsupported registers.
- CVE: https://access.redhat.com/security/cve/cve-2022-1015
- Patch: 4.18.0/CVE-2022-1015.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-2078, CVSSv2 Score: 5.3
- Description:
netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2078
- Patch: 4.18.0/CVE-2022-2078-netfilter-nf_tables-sanitize-nft_set_desc_concat_parse.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-23960, CVSSv2 Score:
- Description:
Out of scope as the patch is aarch64 related
- CVE:
- Patch: skipped/CVE-2022-23960.patch
- From:
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-24448
- Patch: 4.14.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0001-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0002-netfilter-nf_tables-do-not-allow-RULE_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-21499, CVSSv2 Score: 6.7
- Description:
lockdown: also lock down previous kgdb use
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21499
- Patch: 4.18.0/CVE-2022-21499-lockdown-also-lock-down-previous-kgdb-use.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-4139, CVSSv2 Score: 7.0
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute
- CVE: https://access.redhat.com/security/cve/CVE-2022-4139
- Patch: 4.18.0/CVE-2022-4139-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-co-305.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-1-net-usb-ax88179_178a-allow-optionally-getting-mac-ad.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-2-ax88179_178a-Merge-memcpy-le32_to_cpus-to-get_unalig.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-3-net-usb-ax88179_178a-fix-packet-alignment-padding.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-R.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: prevent memory corruption in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: rhel8/4.18.0-425.13.1.el8_7/CVE-2022-2873-i2c-ismt-prevent-memory-corruption-in-ismt-access.patch
- From: 4.18.0-425.13.1.el8_7
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to
- CVE: https://access.redhat.com/security/cve/CVE-2022-4269
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4269-2-net-sched-act_mirred-refactor-the-handle-of-xmit-pre-304.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to
- CVE: https://access.redhat.com/security/cve/CVE-2022-4269
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4269-act_mirred-use-the-backlog-for-nested-calls-to-mirre-pre-304.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4378-0001-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4378-0002-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2023-0386, CVSSv2 Score: 7.0
- Description:
ovl: fail on invalid uid/gid mapping at copy up
- CVE: https://access.redhat.com/security/cve/CVE-2023-0386
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2023-0386-ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-41674, CVSSv2 Score: 7.3
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41674
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1679, CVSSv2 Score: 7.0
- Description:
ath9k: fix use-after-free in ath9k_hif_usb_rx_cbMIME-Version: 1.0
- CVE: https://access.redhat.com/security/cve/CVE-2022-1679
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3239, CVSSv2 Score: 7.0
- Description:
media: em28xx: initialize refcount before kref_get
- CVE: https://access.redhat.com/security/cve/CVE-2022-3239
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref_get.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3625, CVSSv2 Score: 7.8
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://access.redhat.com/security/cve/CVE-2022-3625
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-30594, CVSSv2 Score: 5.5
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
- CVE: https://access.redhat.com/security/cve/CVE-2022-30594
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-25265, CVSSv2 Score: 7.8
- Description:
x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
- CVE: https://access.redhat.com/security/cve/CVE-2022-25265
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-25265-0810-x86-elf-Disable-automatic-READ_IMPLIES_EXEC-on-64-bi.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-20141, CVSSv2 Score: 7.0
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://access.redhat.com/security/cve/CVE-2022-20141
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://access.redhat.com/security/cve/CVE-2022-3028
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://access.redhat.com/security/cve/CVE-2022-3564
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_reassemble_sdu-pre-372.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3623, CVSSv2 Score: 7.5
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3623
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page-pre-304.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://access.redhat.com/security/cve/CVE-2023-0461
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-the-LISTEN-status.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-42720, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://access.redhat.com/security/cve/CVE-2022-42720
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs-pre-425.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3524, CVSSv2 Score: 6.6
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3707, CVSSv2 Score: 5.5
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3628
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf_fweh_event_worker.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-43750, CVSSv2 Score: 6.7
- Description:
usb: mon: make mmapped memory read only
- CVE: https://access.redhat.com/security/cve/CVE-2022-43750
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
video: of_display_timing.h: include errno.h
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0001-video-of_display_timing.h-include-errno.h.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0002-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0003-fbcon-Prevent-that-screen-size-is-smaller-than-font-240.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0004-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33656, CVSSv2 Score: 6.8
- Description:
vt: drop old FONT ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2021-33656
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net: fix a concurrency bug in l2tp_tunnel_register()
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0001-net-fix-a-concurrency-bug-in-l2tp_tunnel_register.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0002-l2tp-Serialize-access-to-sk_user_data-with-sk_callba.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0003-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
vt: use tty_insert_flip_string in respond_string
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0001-vt-use-tty_insert_flip_string-in-respond_string.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
vt: keyboard, use tty_insert_flip_string in puts_queue
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0002-vt-keyboard-use-tty_insert_flip_string-in-puts_queue.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drivers/tty/, stop using tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0003-tty-drivers-tty-stop-using-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: the rest, stop using tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0004-tty-the-rest-stop-using-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drop tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0006-tty-extract-tty_flip_buffer_commit-from-tty_flip_buf.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0007-tty-use-new-tty_insert_flip_string_and_push_buffer-i-240.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drop tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip-kpatch.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-32233
- Patch: rhel8/4.18.0-477.13.1.el8_8/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase-348.patch
- From: 4.18.0-477.13.1.el8_8
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28466
- Patch: rhel8/4.18.0-477.15.1.el8_8/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf-240.patch
- From: 4.18.0-477.15.1.el8_8
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-1281, CVSSv2 Score: 7.8
- Description:
net/sched: tcindex: update imperfect hash filters
- CVE: https://access.redhat.com/security/cve/CVE-2023-1281
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-resp.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-1829, CVSSv2 Score:
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2194
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-2235, CVSSv2 Score: 7.8
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2235
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-4004, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://access.redhat.com/security/cve/CVE-2023-4004
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://access.redhat.com/security/cve/CVE-2023-3390
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with-2.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-3090
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://access.redhat.com/security/cve/CVE-2023-35788
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35788-net-sched-flower-fix-possible-oob-write-in-fl-set-geneve-opt.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-20593-zenbleed.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://access.redhat.com/security/cve/CVE-2023-35001
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2002
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1118
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1118-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1989, CVSSv2 Score: 7.0
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-1989
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1989-Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_remove.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-3141
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
kernel/relay.c: fix read_pos error when multiple readers
- CVE: https://access.redhat.com/security/cve/CVE-2023-3268
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3268-kernel-relay.c-fix-read_pos-error-when-multiple-readers.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-3609
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3609-net-sched-cls-u32-fix-reference-counter-leak-leading-to-overflow-pre425.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://access.redhat.com/security/cve/CVE-2023-3611
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3611-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4128 CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_route-No-longer-copy-tcf_result-on-update.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4128 CVE-2023-4207, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_fw-No-longer-copy-tcf_result-on-update.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4128 CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_u32-No-longer-copy-tcf_result-on-update.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-31436, CVSSv2 Score: 7.0
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://access.redhat.com/security/cve/CVE-2023-31436
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-35823, CVSSv2 Score: 7.0
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-35823
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-35824, CVSSv2 Score: 7.0
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-35824
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2021-43975, CVSSv2 Score: 6.7
- Description:
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
- CVE: https://access.redhat.com/security/cve/CVE-2021-43975
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2021-43975-atlantic-fix-oob-read-and-write-in-hw-atl-utils-fw-rpc-wait-pre240.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
- CVE: https://access.redhat.com/security/cve/CVE-2023-2513
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-add-EXT4_INODE_HAS_XATTR_SPACE-macro-in-xattr.h.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: fix use-after-free in ext4_xattr_set_entry
- CVE: https://access.redhat.com/security/cve/CVE-2023-2513
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-fix-use-after-free-in-ext4-xattr-set-entry.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-28772, CVSSv2 Score: 6.7
- Description:
seq_buf: Fix overflow in seq_buf_putmem_hex()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28772
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28772-seq-buf-fix-overflow-in-seq-buf-putmem-hex.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: betop: check shape of output reports
- CVE: https://access.redhat.com/security/cve/CVE-2023-1073
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1073-hid-betop-check-shape-of-output-reports-348.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2022-42895, CVSSv2 Score: 6.7
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-42895-bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-30456, CVSSv2 Score: 6.0
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://access.redhat.com/security/cve/CVE-2023-30456
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-30456-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-33203
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-33203-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to-race.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-1855, CVSSv2 Score: 6.3
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-1855
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://access.redhat.com/security/cve/CVE-2023-3161
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-3640, CVSSv2 Score: 5.5
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3640
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-28388, CVSSv2 Score: 5.5
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28388
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfree_skb.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://access.redhat.com/security/cve/CVE-2023-1074
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://access.redhat.com/security/cve/cve-2023-3772
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1252, CVSSv2 Score: 7.0
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1252, CVSSv2 Score: 7.0
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-kpatch.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-38457 CVE-2022-40133, CVSSv2 Score: 6.3
- Description:
drm/vmwgfx: Remove rcu locks from user resources
- CVE: https://access.redhat.com/security/cve/CVE-2022-40133
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-drm-vmwgfx-Remove-rcu-locks-from-user-resources-pre-425.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-1-HID-asus-Remove-check-for-same-LED-brightness-on-set.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://access.redhat.com/security/cve/CVE-2022-31084
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31084-media-dvb-core-Fix-kernel-WARNING-for-blocking-opera.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2022-4744, CVSSv2 Score:
- Description:
Not possible to trigger in rhel8
- CVE:
- Patch: skipped/CVE-2022-4744.patch
- From:
- CVE-2023-28328, CVSSv2 Score: 5.5
- Description:
media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28328
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28328-media-dvb-usb-az6027-fix-null-ptr-deref-in-az6027_i2.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2022-3594, CVSSv2 Score: 5.3
- Description:
r8152: Rate limit overflow messages
- CVE: https://access.redhat.com/security/cve/CVE-2022-3594
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-0458, CVSSv2 Score: 4.7
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://access.redhat.com/security/cve/CVE-2023-0458
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0458-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2022-45887, CVSSv2 Score: 4.7
- Description:
media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3594
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-45887-patch-media-ttusb-dec-fix-memory-leak-in-ttusb-dec-exit-dvb.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://access.redhat.com/security/cve/CVE-2023-26545
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb
- CVE: https://access.redhat.com/security/cve/CVE-2023-4132
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-use-after-free-bugs-caused-by-do-submit-urb.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb
- CVE: https://access.redhat.com/security/cve/CVE-2023-4132
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-warning-due-to-null-work-func-t-function.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-0590, CVSSv2 Score: 4.7
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://access.redhat.com/security/cve/CVE-2023-0590
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc-graft-pre-425.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://access.redhat.com/security/cve/CVE-2023-3212
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3212-gfs2-don-t-deref-jdesc-in-evict-pre-477.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-1382, CVSSv2 Score: 5.5
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1382
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-fix-an-information-leak-in-tipc_topsrv_kern_subscr.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1382, CVSSv2 Score: 5.5
- Description:
tipc: set con sock in tipc_conn_alloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1382
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-set-con-sock-in-tipc_conn_alloc.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1382, CVSSv2 Score: 5.5
- Description:
tipc: add an extra conn_get in tipc_conn_alloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1382
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-add-an-extra-conn_get-in-tipc_conn_alloc.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-2163, CVSSv2 Score: 8.2
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision taints
- CVE: https://access.redhat.com/security/cve/CVE-2023-2163
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-2163-bpf-fix-incorrect-verifier-pruning-due-to-missing-register-precision.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-3812, CVSSv2 Score: 7.8
- Description:
net: tun: fix bugs for oversize packet when napi frags enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-3812
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled-240.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-1192, CVSSv2 Score: 6.5
- Description:
cifs: Fix UAF in cifs_demultiplex_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1192
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-1192-cifs-Fix-UAF-in-cifs_demultiplex_thread.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://access.redhat.com/security/cve/CVE-2023-5178
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup-240.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: remove double-unlock
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7808-media-dvbdev-remove-double-unlock.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: Fix memleak in dvb_register_device
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7810-media-dvbdev-Fix-memleak-in-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: fix error logic at dvb_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7811-media-dvbdev-fix-error-logic-at-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: adopts refcnt to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-media-dvbdev-adopts-refcnt-to-avoid-UAF.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: fix refcnt bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7813-media-dvbdev-fix-refcnt-bug.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: adopts refcnt to avoid UAF (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race at dvb_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-media-dvb-core-Fix-use-after-free-due-to-race-at-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race at dvb_register_device() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886, CVSSv2 Score: 7.0
- Description:
media: dvb_net: avoid speculation from net slot
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7817-media-dvb_net-avoid-speculation-from-net-slot.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due on race condition at dvb_net
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-media-dvb-core-Fix-UAF-due-to-race-condition-at-dvb_net.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due on race condition at dvb_net (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb_ca_en50221: off by one in dvb_ca_en50221_io_do_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7819-media-dvb_ca_en50221-off-by-one-in-dvb_ca_en50221_io_do_ioctl.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb_ca_en50221: avoid speculation from CA slot
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7821-media-dvb_ca_en50221-avoid-speculation-from-CA-slot.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb_ca_en50221: fix a size write bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7822-media-dvb_ca_en50221-fix-a-size-write-bug.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-media-dvb-core-Fix-use-after-free-due-to-race-condition-at-dvb_ca_en50221.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-2162, CVSSv2 Score: 6.6
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://access.redhat.com/security/cve/CVE-2023-2162
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-t-1.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-42753, CVSSv2 Score: 7.0
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-42753
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-4622, CVSSv2 Score: 6.6
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://access.redhat.com/security/cve/CVE-2023-4622
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://access.redhat.com/security/cve/CVE-2023-4623
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch-hfsc-Ensure-inner-classes-have-fsc-curve.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
- CVE: https://access.redhat.com/security/cve/CVE-2023-4623
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch_hfsc-upgrade-rt-to-sc-when-it-becomes-.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch-240.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4921
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq-dequeue.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-4921
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2022-3545, CVSSv2 Score: 7.8
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-3545-nfp-fix-use-after-free-in-area-cache-get.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2022-41858, CVSSv2 Score: 7.1
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-41858-7989-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-1838, CVSSv2 Score: 7.1
- Description:
Fix double fget() in vhost_net_set_backend()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1838
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1838-7974-Fix-double-fget-in-vhost_net_set_backend.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1073
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1073-8006-HID-check-empty-report_list-in-hid_validate_values.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6606
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6606-8022-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6610, CVSSv2 Score: 7.1
- Description:
smb: client: fix potential OOB in cifs_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8023-smb-client-fix-potential-OOB-in-cifs_dump_detail.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6610, CVSSv2 Score: 7.1
- Description:
smb: client: fix potential OOB in smb2_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8024-smb-client-fix-potential-OOB-in-smb2_dump_detail-pre304.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6535, CVSSv2 Score: 7.5
- Description:
Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8030-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva-pre304.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6536, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6536
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6536-8031-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6356, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: remove boilerplate code
- CVE: https://access.redhat.com/security/cve/CVE-2023-6356
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6356-CVE-2023-6535-CVE-2023-6536-8032-nvmet-tcp-remove-boilerplate-code-pre513.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6535, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8033-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation-pre304.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7991-perf-Disallow-mis-matched-inherited-group-reads-240.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf/core: Fix potential NULL deref
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7992-perf-core-Fix-potential-NULL-deref.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6817, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: skip inactive elements during set walk
- CVE: https://access.redhat.com/security/cve/CVE-2023-6817
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6817-8019-netfilter-nft_set_pipapo-skip-inactive-elements-duri.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-40283
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-40283-7990-Bluetooth-L2CAP-Fix-use-after-free-in-l2cap_sock_rea-348.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://access.redhat.com/security/cve/CVE-2024-0646
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2024-0646-8028-net-tls-update-curr-on-splice-as-well.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2024-0565, CVSSv2 Score: 7.4
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0565
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-0565-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-51042, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix potential fence use-after-free v2
- CVE: https://access.redhat.com/security/cve/CVE-2023-51042
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-51042-drm-amdgpu-Fix-potential-fence-use-after-free-v2.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2021-33631, CVSSv2 Score: 7.3
- Description:
ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
- CVE: https://access.redhat.com/security/cve/CVE-2021-33631
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2021-33631-ext4-fix-kernel-BUG-in-ext4_write_inline_data_end.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-6546, CVSSv2 Score: 7.0
- Description:
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2023-6546
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6546-tty-n_gsm-fix-the-UAF-caused-by-race-condition-in-gsm_cleanup_mux.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://access.redhat.com/security/cve/CVE-2024-1086
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2022-38096, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://access.redhat.com/security/cve/CVE-2022-38096
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts-240.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6176
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6176-net-tls-do-not-free-tls_rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://access.redhat.com/security/cve/CVE-2023-6932
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 4.18.0-553.el8_10
- CVE-2023-28464, CVSSv2 Score: 7.8
- Description:
Bluetooth: Fix double free in hci_conn_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2023-28464
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanup-305.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6915, CVSSv2 Score: 6.2
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://access.redhat.com/security/cve/CVE-2023-6915
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39198, CVSSv2 Score: 7.5
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://access.redhat.com/security/cve/CVE-2023-39198
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation-240.patch
- From: 4.18.0-553.el8_10
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51779-2946-Bluetooth-af_bluetooth-Fix-Use-After-Free-in-bt_sock-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://access.redhat.com/security/cve/CVE-2023-24023
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-24023-3694-Bluetooth-Add-more-enc-key-size-check-348.patch
- From: 4.18.0-553.el8_10
- CVE-2019-13631, CVSSv2 Score: 5.3
- Description:
Input: gtco - bounds check collection indent level
- CVE: https://access.redhat.com/security/cve/CVE-2019-13631
- Patch: rhel8/4.18.0-553.el8_10/CVE-2019-13631-0684-Input-gtco-bounds-check-collection-indent-level.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52581, CVSSv2 Score:
- Description:
The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
- CVE:
- Patch: skipped/CVE-2023-52581.patch
- From:
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39189
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://access.redhat.com/security/cve/CVE-2023-39193
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 4.18.0-553.el8_10
- CVE-2023-4133, CVSSv2 Score:
- Description:
Complex adaptation required to add timer_shutdown_sync() in timers subsystem.
- CVE:
- Patch: skipped/CVE-2023-4133.patch
- From:
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: Fix error paths in set_con2fb_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-fix-error-paths-in-set-con2fb-map-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: set_con2fb_map needs to set con2fb_map!
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-set-con2fb-map-needs-to-set-con2fb-map-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-42755, CVSSv2 Score: 6.5
- Description:
net/sched: cls_rsvp: always try to match inside the linear part of skb
- CVE: https://access.redhat.com/security/cve/CVE-2023-42755
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-42755-net-sched-cls-rsvp-always-try-to-match-inside-the-linear-part-of-skb-477.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Remove docstring reference to kset
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-remove-docstring-reference-to-kset.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: modify kobject_get_path() to take a const
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const-240.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
net: add a route cache full diagnostic message
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-add-a-route-cache-full-diagnostic-message.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
net/dst: use a smaller percpu_counter batch for dst entries accounting
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-dst-use-a-smaller-percpu-counter-batch-for-dst-entries-accounting.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-max-size-check-inline-with-ipv4-240.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: Remove extra counter pull before gc
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-extra-counter-pull-before-gc-372.patch
- From: 4.18.0-553.el8_10
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of
- CVE: https://access.redhat.com/security/cve/CVE-2019-15505
- Patch: rhel8/4.18.0-553.el8_10/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of.patch
- From: 4.18.0-553.el8_10
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-25775-rdma-irdma-prevent-zero-length-stag-registration-348.patch
- From: 4.18.0-553.el8_10
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2023-51780
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51780-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in-240.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
- From: 4.18.0-553.el8_10
- CVE-2022-3565, CVSSv2 Score: 7.8
- Description:
mISDN: fix use-after-free bugs in l1oip timer
- CVE: https://access.redhat.com/security/cve/CVE-2022-3565
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer.patch
- From: 4.18.0-553.el8_10
- CVE-2022-3565, CVSSv2 Score: 7.8
- Description:
verify struct l1oip layout
- CVE: https://access.redhat.com/security/cve/CVE-2022-3565
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer-kpatch.patch
- From: 4.18.0-553.el8_10
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
- From: 4.18.0-553.el8_10
- CVE-2022-0500, CVSSv2 Score:
- Description:
Complex adaptation required. Requires changes a lot of constants
- CVE:
- Patch: skipped/CVE-2022-0500.patch
- From:
- CVE-2022-23222, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-23222.patch
- From:
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-240.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
- From: 4.18.0-553.el8_10
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
- From: 4.18.0-553.el8_10
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52448, CVSSv2 Score: 4.7
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in-4.18.0-305.25.1.el8_4.patch
- From: 4.18.0-553.el8_10
- CVE-2024-26602, CVSSv2 Score: 4.7
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26602
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 4.18.0-553.el8_10
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://access.redhat.com/security/cve/CVE-2023-42754
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52489, CVSSv2 Score:
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2023-52620, CVSSv2 Score: 2.5
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://access.redhat.com/security/cve/CVE-2023-52620
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52620-netfilter-nf_tables-disallow-timeout-for-anonymous-s.patch
- From: 4.18.0-553.el8_10
- CVE-2024-26671, CVSSv2 Score: 4.4
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://access.redhat.com/security/cve/CVE-2024-26671
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-26671-blk-mq-fix-IO-hang-from-sbitmap-wakeup-race.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: 4.18.0-553.el8_10
- CVE-2021-3753, CVSSv2 Score: 4.7
- Description:
vt_kdsetmode: extend console locking
- CVE: https://access.redhat.com/security/cve/CVE-2021-3753
- Patch: rhel8/4.18.0-553.el8_10/CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
- From: 4.18.0-553.el8_10
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
- CVE: https://access.redhat.com/security/cve/CVE-2023-31083
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-31083-Bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39194, CVSSv2 Score: 3.2
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39194
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://access.redhat.com/security/cve/CVE-2023-6121
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6121-nvmet-nul-terminate-the-NQNs-passed-in-the-connect-c-348.patch
- From: 4.18.0-553.el8_10
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it to userspace
- CVE: https://access.redhat.com/security/cve/CVE-2023-1513
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-be.patch
- From: 4.18.0-553.el8_10
- CVE-2021-47153, CVSSv2 Score: 6.0
- Description:
i2c: i801: Don't generate an interrupt on bus reset
- CVE: https://access.redhat.com/security/cve/CVE-2021-47153
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47153-i2c-i801-don-t-generate-an-interrupt-on-bus-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2020-36777, CVSSv2 Score: 5.5
- Description:
media: dvbdev: Fix memory leak in dvb_media_device_free()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36777
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2020-36777-media-dvbdev-fix-memory-leak-in-dvb_media_device_free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171, CVSSv2 Score: 5.5
- Description:
net: usb: fix memory leak in smsc75xx_bind
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-memory-leak-in-smsc75xx-bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171, CVSSv2 Score: 5.5
- Description:
net: usb: fix possible use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-possible-use-after-free-in-smsc75xx_bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - default implementations for request callbacks
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-default-implementations-for-request-callbacks.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: testmgr - split akcipher tests by a key type
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-testmgr-split-akcipher-tests-by-a-key-type.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-disable-signing-and-decryption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26610, CVSSv2 Score: 6.1
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://access.redhat.com/security/cve/CVE-2024-26610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52610, CVSSv2 Score: 6.4
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags-240.22.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52598, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52598.patch
- From:
- CVE-2022-48669, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2022-48669.patch
- From:
- CVE-2023-52607, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52607.patch
- From:
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.15.0/kpatch-add-alt-asm-definitions-56.62.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2022-23816, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-23825, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23825.patch
- From:
- CVE-2022-26373, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-29900, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From: