- kernel-4.18.0-553.22.1.lve.el7h (cl7h)
- 4.18.0-553.109.1.lve.el7h
- 2026-03-18 09:05:31
- 2026-03-19 12:17:56
- K20260318_24
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://access.redhat.com/security/cve/CVE-2024-42301
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40961
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40961
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40961-ipv6-prevent-possible-NULL-deref-in-fib6_nh_init.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-42284
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41092
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-41092
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38541
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27062
- Description:
nouveau: lock the client object tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-27062
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-27062-nouveau-lock-the-client-object-tree.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27062
- Description:
nouveau: lock the client object tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-27062
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-27062-nouveau-lock-the-client-object-tree-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-26976
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://access.redhat.com/security/cve/CVE-2024-26976
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-26976
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://access.redhat.com/security/cve/CVE-2024-26976
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed-kpatch.patch
- From: kernel-4.18.0-553.27.1.el8_10
- CVE-2024-38608
- Description:
net/mlx5e: Add wrapping for auxiliary_driver op and remove unused args
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38608-net-mlx5e-Add-wrapping-for-auxiliary_driver-ops-and.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38608
- Description:
net/mlx5e: Fix netif state handling
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38608-net-mlx5e-Fix-netif-state-handling.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38540
- Description:
bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
- CVE: https://access.redhat.com/security/cve/CVE-2024-38540
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38540-bnxt_re-avoid-shift-undefined-behavior-in-bnxt_qplib.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38586
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38586-r8169-Fix-possible-ring-buffer-corruption-on-fragmen.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40983
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://access.redhat.com/security/cve/CVE-2024-40983
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing-decryption.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40924
- Description:
drm/i915/dpt: Make DPT object unshrinkable
- CVE: https://access.redhat.com/security/cve/CVE-2024-40924
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40924-drm-i915-dpt-Make-DPT-object-unshrinkable.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40984
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
- CVE: https://access.redhat.com/security/cve/CVE-2024-40984
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40984-ACPICA-Revert-ACPICA-avoid-Info-mapping-multiple-BAR.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41042
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://access.redhat.com/security/cve/CVE-2024-41042
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41042-netfilter-nf_tables-prefer-nft_chain_validate.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-46826
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://access.redhat.com/security/cve/CVE-2024-46826
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-44935
- Description:
sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE: https://access.redhat.com/security/cve/CVE-2024-44935
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-44935-sctp-fix-null-ptr-deref-in-reuseport-add-sock.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-45018
- Description:
netfilter: flowtable: initialise extack before use
- CVE: https://access.redhat.com/security/cve/CVE-2024-45018
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-45018-netfilter-flowtable-initialise-extack-before-use.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2023-52492
- Description:
dmaengine: fix NULL pointer in channel unregistration function
- CVE: https://access.redhat.com/security/cve/CVE-2023-52492
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2023-52492-dmaengine-fix-null-pointer-in-channel-unregistration-function.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-44990
- Description:
bonding: fix null pointer deref in bond_ipsec_offload_ok
- CVE: https://access.redhat.com/security/cve/CVE-2024-44990
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-44990-bonding-fix-null-pointer-deref-in-bond-ipsec-offload-ok.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-47668
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47668
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-44989
- Description:
bonding: fix xfrm real_dev null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-44989
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-44989-bonding-fix-xfrm-real-dev-null-pointer-dereference.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41066
- Description:
ibmvnic: rename local variable index to bufidx
- CVE: https://access.redhat.com/security/cve/CVE-2024-41066
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41066-ibmvnic-rename-local-variable-index-to-bufidx.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41066
- Description:
ibmvnic: Add tx check to prevent skb leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-41066
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41066-ibmvnic-add-tx-check-to-prevent-skb-leak.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41093
- Description:
drm/amdgpu: avoid using null object of framebuffer
- CVE: https://access.redhat.com/security/cve/CVE-2024-41093
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41093-drm-amdgpu-avoid-using-null-object-of-framebuffer.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42070
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-42070
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42070-netfilter-nf-tables-fully-validate-nft-data-value-on-store-to-data-registers.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42079
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://access.redhat.com/security/cve/CVE-2024-42079
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42244
- Description:
USB: serial: mos7840: fix crash on resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42244-usb-serial-mos7840-fix-crash-on-resume.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42244
- Description:
USB: serial: mos7840: fix crash on resume kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42244-usb-serial-mos7840-fix-crash-on-resume-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42292
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42292
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43854
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://access.redhat.com/security/cve/CVE-2024-43854
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43880
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-43880
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43880
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-43880
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43889
- Description:
Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.
- CVE:
- Patch: skipped/CVE-2024-43889.patch
- From:
- CVE-2024-26924
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://access.redhat.com/security/cve/CVE-2024-26924
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35898
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35898
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-35898-netfilter-nf-tables-fix-potential-data-race-in-nft-flowtable-type-get.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2022-48773
- Description:
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
- CVE: https://access.redhat.com/security/cve/CVE-2022-48773
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2022-48773-xprtrdma-fix-pointer-derefs-in-error-cases-of-rpcrdma-ep-create.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35939
- Description:
dma-direct: Leak pages on dma_set_decrypted() failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-35939
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-35939-dma-direct-leak-pages-on-dma-set-decrypted-failure.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43892
- Description:
mm/memcg: minor cleanup for MEM_CGROUP_ID_MAX
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43892-mm-memcg-minor-cleanup-for-mem-cgroup-id-max.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43892
- Description:
mm: memcontrol: fix cannot alloc the maximum memcg ID
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43892-mm-memcontrol-fix-cannot-alloc-the-maximum-memcg-id.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43892
- Description:
memcontrol: ensure memcg acquired by id is properly set up
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43892-memcontrol-ensure-memcg-acquired-by-id-is-properly-set-up.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43892
- Description:
memcg: protect concurrent access to mem_cgroup_idr
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43892-memcg-protect-concurrent-access-to-mem_cgroup_idr.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43892
- Description:
memcg: protect concurrent access to mem_cgroup_idr
- CVE: https://access.redhat.com/security/cve/CVE-2024-43892
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43892-memcg-protect-concurrent-access-to-mem_cgroup_idr-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35839
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-35839.patch
- From:
- CVE-2024-24857
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://access.redhat.com/security/cve/CVE-2024-24857
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-24857-bluetooth-fix-toctou-in-hci-debugfs-implementation.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-26851
- Description:
netfilter: nf_conntrack_h323: Add protection for bmp length out of
- CVE:
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26851-netfilter-nf_conntrack_h323-add-protection-for-bmp-length-out-of-range.patch
- From:
- CVE-2022-48936
- Description:
gso: do not skip outer ip header in case of ipip and net_failover
- CVE: https://access.redhat.com/security/cve/CVE-2022-48936
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2022-48936-gso-do-not-skip-outer-ip-header-in-case-of-ipip-and-net-failover.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27017
- Description:
netfilter: nftables: add helper function to flush set elements
- CVE: https://access.redhat.com/security/cve/CVE-2024-27017
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-27017-netfilter-nftables-add-helper-function-to-flush-set-elements.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27017
- Description:
netfilter: nft_set_pipapo: walk over current view on netlink dump
- CVE: https://access.redhat.com/security/cve/CVE-2024-27017
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-27017-netfilter-nft-set-pipapo-walk-over-current-view-on-netlink-dump.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27017
- Description:
netfilter: nf_tables: missing iterator type in lookup walk
- CVE: https://access.redhat.com/security/cve/CVE-2024-27017
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-27017-netfilter-nf-tables-missing-iterator-type-in-lookup-walk.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27017
- Description:
netfilter: nft_set_pipapo: walk over current view on netlink dump
- CVE: https://access.redhat.com/security/cve/CVE-2024-27017
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-27017-netfilter-nft-set-pipapo-walk-over-current-view-on-netlink-dump-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27399
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://access.redhat.com/security/cve/CVE-2024-27399
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-38564
- Description:
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
- CVE: https://access.redhat.com/security/cve/CVE-2024-38564
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-46858
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-27043
- Description:
media: edia: dvbdev: fix a use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-27043
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-27043-media-edia-dvbdev-fix-a-use-after-free.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://access.redhat.com/security/cve/CVE-2024-50264
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-50082
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://access.redhat.com/security/cve/CVE-2024-50082
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-50256
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://access.redhat.com/security/cve/CVE-2024-50256
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6-553.22.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-46695
- Description:
selinux,smack: don't bypass permissions check in inode_setsecctx hook
- CVE: https://access.redhat.com/security/cve/CVE-2024-46695
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-49949
- Description:
net: avoid potential underflow in qdisc_pkt_len_init() with UFO
- CVE: https://access.redhat.com/security/cve/CVE-2024-49949
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc-pkt-len-init-with-ufo.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-50142
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://access.redhat.com/security/cve/CVE-2024-50142
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-50110
- Description:
xfrm: fix one more kernel-infoleak in algo dumping
- CVE: https://access.redhat.com/security/cve/CVE-2024-50110
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch
- From: 4.18.0-553.32.1.el8_10
- CVE-2024-50192
- Description:
arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware
- CVE:
- Patch: skipped/CVE-2024-50192.patch
- From:
- CVE-2024-53088
- Description:
i40e: fix i40e_count_filters() to count only active/new filters
- CVE: https://access.redhat.com/security/cve/CVE-2024-53088
- Patch: rhel8/4.18.0-553.34.1.el8_10/CVE-2024-53088-i40e-fix-i40e_count_filters-to-count-only-active-new.patch
- From: 4.18.0-553.34.1.el8_10
- CVE-2024-53088
- Description:
i40e: fix race condition by adding filter's intermediate sync state
- CVE: https://access.redhat.com/security/cve/CVE-2024-53088
- Patch: rhel8/4.18.0-553.34.1.el8_10/CVE-2024-53088-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch
- From: 4.18.0-553.34.1.el8_10
- CVE-2024-53088
- Description:
i40e: fix race condition by adding filter's intermediate sync state
- CVE: https://access.redhat.com/security/cve/CVE-2024-53088
- Patch: rhel8/4.18.0-553.34.1.el8_10/CVE-2024-53088-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state-kpatch.patch
- From: 4.18.0-553.34.1.el8_10
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://access.redhat.com/security/cve/CVE-2024-53122
- Patch: rhel8/4.18.0-553.34.1.el8_10/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 4.18.0-553.34.1.el8_10
- CVE-2024-26935
- Description:
scsi: core: Fix unremoved procfs host directory regression
- CVE: https://access.redhat.com/security/cve/CVE-2024-26935
- Patch: rhel8/4.18.0-553.37.1.el8_10/CVE-2024-26935-scsi-core-fix-unremoved-procfs-host-directory-regression.patch
- From: 4.18.0-553.37.1.el8_10
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://access.redhat.com/security/cve/CVE-2024-53104
- Patch: rhel8/4.18.0-553.40.1.el8_10/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UNDEFINED.patch
- From: 4.18.0-553.40.1.el8_10
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://access.redhat.com/security/cve/cve-2024-50302
- Patch: 2024/CVE-2024-50302/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://access.redhat.com/security/cve/cve-2024-53197
- Patch: 2024/CVE-2024-53197/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-57807
- Description:
scsi: megaraid_sas: Fix for a potential deadlock
- CVE: https://access.redhat.com/security/cve/cve-2024-57807
- Patch: 2024/CVE-2024-57807/CVE-2024-57807-scsi-megaraid-sas-fix-for-a-potential-deadlock.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2023-52922
- Description:
can: bcm: Fix UAF in bcm_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52922
- Patch: rhel8/4.18.0-553.45.1.el8_10/CVE-2023-52922-can-bcm-Fix-UAF-in-bcm_proc_show.patch
- From: 4.18.0-553.45.1.el8_10
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://access.redhat.com/security/cve/CVE-2024-53150
- Patch: rhel8/4.18.0-553.50.1.el8_10/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 4.18.0-553.50.1.el8_10
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://access.redhat.com/security/cve/CVE-2024-53141
- Patch: rhel8/4.18.0-553.52.1.el8_10/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 4.18.0-553.52.1.el8_10
- CVE-2022-49011
- Description:
hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49011
- Patch: rhel8/4.18.0-553.52.1.el8_10/CVE-2022-49011-hwmon-coretemp-fix-pci-device-refcount-leak-in-nv1a_.patch
- From: 4.18.0-553.52.1.el8_10
- CVE-2024-40906
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-40906
- Patch: rhel8/4.18.0-553.53.1.el8_10/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 4.18.0-553.53.1.el8_10
- CVE-2024-44970
- Description:
net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
- CVE: https://access.redhat.com/security/cve/CVE-2024-44970
- Patch: rhel8/4.18.0-553.53.1.el8_10/CVE-2024-44970-net-mlx5e-SHAMPO-Fix-invalid-WQ-linked-list-unlink.patch
- From: 4.18.0-553.53.1.el8_10
- CVE-2025-21756
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-21756
- Patch: rhel8/4.18.0-553.53.1.el8_10/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 4.18.0-553.53.1.el8_10
- CVE-2025-21756
- Description:
vsock: Orphan socket after transport release
- CVE: https://access.redhat.com/security/cve/CVE-2025-21756
- Patch: rhel8/4.18.0-553.53.1.el8_10/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 4.18.0-553.53.1.el8_10
- CVE-2024-43842
- Description:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43842
- Patch: rhel8/4.18.0-553.54.1.el8_10/CVE-2024-43842-wifi-rtw89-Fix-array-index-mistake-in-rtw89_sta_info_get_iter.patch
- From: 4.18.0-553.54.1.el8_10
- CVE-2022-49395
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49395.patch
- From:
- CVE-2022-48919
- Description:
cifs: fix double free race when mount fails in cifs_get_root()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48919
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2022-48919-cifs-fix-double-free-race-when-mount-fails-in-cifs_get_root.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://access.redhat.com/security/cve/CVE-2024-50301
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key_task_permission.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2024-53064
- Description:
idpf: fix idpf_vc_core_init error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-53064
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2024-53064-idpf-fix-idpf_vc_core_init-error-path.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21764
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc_alloc_skb.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2022-49111
- Description:
Bluetooth: Fix use after free in hci_send_acl
- CVE: https://access.redhat.com/security/cve/CVE-2022-49111
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49111-bluetooth-fix-use-after-free-in-hci_send_acl.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-49846
- Description:
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49846
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49846-udf-fix-a-slab-out-of-bounds-write-bug-in-udf_find_entry.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-49058
- Description:
cifs: potential buffer overflow in handling symlinks
- CVE: http://access.redhat.com/security/cve/cve-2022-49058
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49058-cifs-potential-buffer-overflow-in-handling-symlinks.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://access.redhat.com/security/cve/cve-2024-57980
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-21991
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://access.redhat.com/security/cve/cve-2025-21991
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://access.redhat.com/security/cve/cve-2025-22004
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-49788
- Description:
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
- CVE: https://access.redhat.com/security/cve/cve-2022-49788
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49788-misc-vmw_vmci-fix-an-infoleak-in-vmci_host_do_receive_datagram.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://access.redhat.com/security/cve/CVE-2025-23150
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-37738
- Description:
ext4: ignore xattrs past end
- CVE: https://access.redhat.com/security/cve/CVE-2025-37738
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-37738-ext4-ignore-xattrs-past-end.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-convert-guard-mutex.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://access.redhat.com/security/cve/CVE-2024-50154
- Patch: rhel8/4.18.0-553.63.1.el8_10/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unli.patch
- From: 4.18.0-553.63.1.el8_10
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://access.redhat.com/security/cve/CVE-2025-38086
- Patch: rhel8/4.18.0-553.63.1.el8_10/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii_nway_restart.patch
- From: 4.18.0-553.63.1.el8_10
- CVE-2025-21919
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://access.redhat.com/security/cve/CVE-2025-21919
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21919-sched-fair-fix-potential-memory-corruption-in-child-cfs-rq-on-list.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://access.redhat.com/security/cve/CVE-2025-21905
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2022-49977
- Description:
ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead
- CVE: https://access.redhat.com/security/cve/CVE-2022-49977
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2022-49977-ftrace-Fix-NULL-pointer-dereference-in-is_ftrace_trampoline-when-ftrace-is-dead.patch
- From: 4.18.0-553.64.1.el8_10
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21928
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-22020
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://access.redhat.com/security/cve/CVE-2025-22020
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2022-50020
- Description:
ext4: avoid resizing to a partial cluster size
- CVE: https://access.redhat.com/security/cve/CVE-2022-50020
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2022-50020-ext4-avoid-resizing-to-a-partial-cluster-size.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://access.redhat.com/security/cve/CVE-2025-38079
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-38079-crypto-algif_hash-fix-double-free-in-hash_accept.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-sch_hfsc-Fix-qlen-accounting-bug-when-using-peek-in-hfsc_enqueue.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2021-47670
- Description:
can: peak_usb: fix use after free bugs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47670
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2021-47670-can-peak_usb-fix-use-after-free-bugs.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://access.redhat.com/security/cve/CVE-2025-21727
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-add-dev_net_rcu-helper.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-extend-RCU-protection-in-igmp6_send.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-38159
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://access.redhat.com/security/cve/CVE-2024-56644
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://access.redhat.com/security/cve/CVE-2025-22097
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://access.redhat.com/security/cve/CVE-2025-22097
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37914
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-37914-net_sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-38380
- Description:
i2c/designware: Fix an initialization issue
- CVE: https://access.redhat.com/security/cve/CVE-2025-38380
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38380-i2c-designware-Fix-an-initialization-issue.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-38250
- Description:
Bluetooth: hci_core: Fix use-after-free in vhci_flush()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38250
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38250-bluetooth-hci-core-fix-use-after-free-in-vhci-flush-553.58.1.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://access.redhat.com/security/cve/CVE-2025-22058
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-22058-udp-Fix-memory-accounting-leak.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://access.redhat.com/security/cve/CVE-2025-38200
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-38200-i40e-fix-MMIO-write-access-to-an-invalid-page-in-i40e_clear_hw.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Fix-race-condition-on-qfq_aggregate.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Avoid-triggering-might_sleep-in-atomic-context-in-qfq_delete_class.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38464
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://access.redhat.com/security/cve/CVE-2025-38332
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2022-49985
- Description:
bpf: Don't use tnum_range on array range checking for poke descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2022-49985
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2022-49985-bpf-don-t-use-tnum_range-on-array-range-checking-for-poke-descriptors.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38352
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle_posix_cpu_timers-and-posix_cpu_timer_del.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Limit packet length to skb->len
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2023-53125-net-usb-smsc75xx-Limit-packet-length-to-skb-len.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2023-53125-net-usb-smsc75xx-Move-packet-length-check-to-prevent-kernel-panic-in-skb_pull.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_qfq-make-qfq_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_cbq: make cbq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_cbq-make-cbq_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_htb-make-htb_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_htb-make-htb_deactivate-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_hfsc-make-hfsc_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_ets-make-est_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_drr-make-drr_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38449
- Description:
requires a very complex adaptation
- CVE:
- Patch: skipped/CVE-2025-38449.patch
- From:
- CVE-2025-38392
- Description:
idpf: convert control queue mutex to a spinlock
- CVE: https://access.redhat.com/security/cve/CVE-2025-38392
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38392-idpf-convert-control-queue-mutex-to-a-spinlock.patch
- From: 4.18.0-553.75.1.el8_10
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38461
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38461-vsock-Fix-transport_-TOCTOU.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38498
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38498-do_change_type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38498
- Description:
use uniform permission checks for all mount propagation changes
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38556
- Description:
HID: core: Harden s32ton() against conversion to 0 bits
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38556-core-Harden-s32ton-against-conversion-to-0-bits.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38556
- Description:
HID: core: fix shift-out-of-bounds in hid_report_raw_event
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38556-HID-core-fix-shift-out-of-bounds-in-hid_report_raw_event.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://access.redhat.com/security/cve/CVE-2025-38718
- Patch: rhel8/4.18.0-553.77.1.el8_10/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 4.18.0-553.77.1.el8_10
- CVE-2025-22026
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-22026.patch
- From:
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-37797
- Patch: rhel8/4.18.0-553.77.1.el8_10/CVE-2025-37797-net_sched-hfsc-Fix-a-UAF-vulnerability-in-class-handling.patch
- From: 4.18.0-553.77.1.el8_10
- CVE-2022-50087
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-50087.patch
- From:
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39730
- Patch: rhel8/4.18.0-553.78.1.el8_10/CVE-2025-39730-NFS-Fix-filehandle-bounds-checking-in-nfs_fh_to_dentry.patch
- From: 4.18.0-553.78.1.el8_10
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://access.redhat.com/security/cve/CVE-2025-38527
- Patch: rhel8/4.18.0-553.78.1.el8_10/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs_oplock_break.patch
- From: 4.18.0-553.78.1.el8_10
- CVE-2023-53305 CVE-2022-50386
- Description:
Bluetooth: L2CAP: Fix use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50386
- Patch: rhel8/4.18.0-553.79.1.el8_10/CVE-2023-53305-bluetooth-l2cap-fix-use-after-free.patch
- From: 4.18.0-553.79.1.el8_10
- CVE-2022-50228
- Description:
KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0
- CVE: https://access.redhat.com/security/cve/CVE-2022-50228
- Patch: rhel8/4.18.0-553.79.1.el8_10/CVE-2022-50228-KVM-SVM-dont-BUG-if-userspace-injects-an-interrupt.patch
- From: 4.18.0-553.79.1.el8_10
- CVE-2023-53373
- Description:
crypto: seqiv - Handle EBUSY correctly
- CVE: https://access.redhat.com/security/cve/CVE-2023-53373
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2023-53373-crypto-seqiv-handle-ebusy-correctly.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2025-39751
- Description:
This CVE has been rejected or withdrawn by its CVE Numbering Authority as per NVD website
- CVE:
- Patch: skipped/CVE-2025-39751.patch
- From:
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2025-39757-ALSA-usb-audio-Validate-UAC3-cluster-segment-descriptors.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2025-39757-ALSA-usb-audio-Fix-size-validation-in-convert_chmap_v3.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2023-53297
- Description:
Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
- CVE: https://access.redhat.com/security/cve/CVE-2023-53297
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2023-53297-Bluetooth-L2CAP-fix-bad-unlock-balance-in-l2cap_disconnect_rsp.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2025-39817
- Description:
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
- CVE: https://access.redhat.com/security/cve/CVE-2025-39817
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2025-39817-efivarfs-fix-slab-out-of-bounds-in-efivarfs-d-compare.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2025-39841
- Description:
scsi: lpfc: Fix buffer free/clear order in deferred receive path
- CVE: https://access.redhat.com/security/cve/CVE-2025-39841
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2025-39841-scsi-lpfc-fix-buffer-free-clear-order-in-deferred-receive-path.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2025-39849
- Description:
wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39849
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2025-39849-wifi-cfg80211-sme-cap-ssid-length-in-cfg80211-connect-result.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2023-53386
- Description:
Bluetooth: Fix potential use-after-free when clear keys
- CVE: https://access.redhat.com/security/cve/CVE-2023-53386
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2023-53386-Bluetooth-Fix-potential-use-after-free-when-clear-keys.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39864
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2023-53226
- Description:
wifi: mwifiex: Fix OOB and integer underflow when rx packets
- CVE: https://access.redhat.com/security/cve/CVE-2023-53226
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53226-wifi-mwifiex-Fix-OOB-and-integer-underflow-when-rx-packets.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2023-53226
- Description:
wifi: mwifiex: Fix missed return in oob checks failed path
- CVE: https://access.redhat.com/security/cve/CVE-2023-53226
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53226-wifi-mwifiex-Fix-missed-return-in-oob-checks-failed-path.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2023-53226
- Description:
wifi: mwifiex: Fix OOB and integer underflow when rx packets
- CVE: https://access.redhat.com/security/cve/CVE-2023-53226
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53226-wifi-mwifiex-Fix-oob-check-condition-in-mwifiex_process_rx_packet.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2023-53257
- Description:
wifi: mac80211: check S1G action frame size
- CVE: https://access.redhat.com/security/cve/CVE-2023-53257
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53257-wifi-mac80211-check-S1G-action-frame-size.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2022-50367
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2022-50367
- Patch: rhel8/4.18.0-553.83.1.el8_10/CVE-2022-50367-fs-fix-uaf-gpf-bug-in-nilfs-mdt-destroy.patch
- From: 4.18.0-553.83.1.el8_10
- CVE-2023-53178
- Description:
mm: fix zswap writeback race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-53178
- Patch: rhel8/4.18.0-553.83.1.el8_10/CVE-2023-53178-mm-fix-zswap-writeback-race-condition.patch
- From: 4.18.0-553.83.1.el8_10
- CVE-2023-53178
- Description:
mm: zswap: fix missing folio cleanup in writeback race path
- CVE: https://access.redhat.com/security/cve/CVE-2023-53178
- Patch: rhel8/4.18.0-553.83.1.el8_10/CVE-2023-53178-mm-zswap-fix-missing-folio-cleanup-in-writeback-race-path.patch
- From: 4.18.0-553.83.1.el8_10
- CVE-2025-39718
- Description:
vsock/virtio: Validate length in packet header before skb_put()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39718
- Patch: rhel8/4.18.0-553.84.1.el8_10/CVE-2025-39718-vsock-virtio-validate-length-in-packet-header-before-skb-put.patch
- From: 4.18.0-553.84.1.el8_10
- CVE-2025-39697
- Description:
NFS: Fix a race when updating an existing write
- CVE: https://access.redhat.com/security/cve/CVE-2025-39697
- Patch: rhel8/4.18.0-553.85.1.el8_10/CVE-2025-39697-nfs-fix-a-race-when-updating-an-existing-write.patch
- From: 4.18.0-553.85.1.el8_10
- CVE-2025-39971
- Description:
i40e: fix idx validation in config queues msg
- CVE: https://access.redhat.com/security/cve/CVE-2025-39971
- Patch: rhel8/4.18.0-553.85.1.el8_10/CVE-2025-39971-i40e-fix-idx-validation-in-config-queues-msg.patch
- From: 4.18.0-553.85.1.el8_10
- CVE-2023-53513
- Description:
nbd: fix incomplete validation of ioctl arg
- CVE: https://access.redhat.com/security/cve/CVE-2023-53513
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2023-53513-nbd-fix-incomplete-validation-of-ioctl-arg.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-39825
- Description:
smb: client: fix race with concurrent opens in rename(2)
- CVE: https://access.redhat.com/security/cve/CVE-2025-39825
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-39825-smb-client-fix-race-with-concurrent-opens-in-rename2.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38724
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-38724-nfsd-handle-get_client_locked-failure-in-nfsd4_setclientid_confirm.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-39898
- Description:
e1000e: fix heap overflow in e1000_set_eeprom
- CVE: https://access.redhat.com/security/cve/CVE-2025-39898
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-39898-e1000e-fix-heap-overflow-in-e1000_set_eeprom.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://access.redhat.com/security/cve/CVE-2025-39883
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-39883-mm-memory-failure-fix-VM_BUG_ON_PAGE-when-unpoison-memory.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://access.redhat.com/security/cve/CVE-2025-39955
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-39955-tcp-clear-tcp_sk-sk-fastopen_rsk-in-tcp_disconnect.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-39955
- Description:
tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().
- CVE: https://access.redhat.com/security/cve/CVE-2025-39955
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-39955-tcp-don-t-call-reqsk_fastopen_remove-in-tcp_conn_request.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2022-50543
- Description:
RDMA/rxe: Fix mr->map double free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50543
- Patch: rhel8/4.18.0-553.89.1.el8_10/CVE-2022-50543-rdma-rxe-fix-mr-map-double-free.patch
- From: 4.18.0-553.89.1.el8_10
- CVE-2023-53401
- Description:
mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
- CVE: https://access.redhat.com/security/cve/CVE-2023-53401
- Patch: rhel8/4.18.0-553.89.1.el8_10/CVE-2023-53401-mm-kmem-fix-a-null-pointer-dereference-in-obj-stock-flush-required.patch
- From: 4.18.0-553.89.1.el8_10
- CVE-2023-53539
- Description:
RDMA/rxe: Fix incomplete state save in rxe_requester
- CVE: https://access.redhat.com/security/cve/CVE-2023-53539
- Patch: rhel8/4.18.0-553.89.1.el8_10/CVE-2023-53539-rdma-rxe-fix-incomplete-state-save-in-rxe-requester.patch
- From: 4.18.0-553.89.1.el8_10
- CVE-2025-40240
- Description:
sctp: avoid NULL dereference when chunk data buffer is missing
- CVE: https://access.redhat.com/security/cve/CVE-2025-40240
- Patch: rhel8/4.18.0-553.92.1.el8_10/CVE-2025-40240-sctp-avoid-null-dereference-when-chunk-data-buffer-is-missing.patch
- From: 4.18.0-553.92.1.el8_10
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://access.redhat.com/security/cve/CVE-2025-68285
- Patch: rhel8/4.18.0-553.92.1.el8_10/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have-mon-and-osd-map.patch
- From: 4.18.0-553.92.1.el8_10
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://access.redhat.com/security/cve/CVE-2025-68285
- Patch: rhel8/4.18.0-553.92.1.el8_10/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have-mon-and-osd-map-kpatch.patch
- From: 4.18.0-553.92.1.el8_10
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39993
- Patch: rhel8/4.18.0-553.92.1.el8_10/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect-kpatch.patch
- From: 4.18.0-553.92.1.el8_10
- CVE-2023-53552
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-53552.patch
- From:
- CVE-2025-40096
- Description:
drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
- CVE: https://access.redhat.com/security/cve/CVE-2025-40096
- Patch: rhel8/4.18.0-553.94.1.el8_10/CVE-2025-40096-drm-sched-fix-potential-double-free-in-drm-sched.patch
- From: 4.18.0-553.94.1.el8_10
- CVE-2025-68301
- Description:
net: atlantic: fix fragment overflow handling in RX path
- CVE: https://access.redhat.com/security/cve/CVE-2025-68301
- Patch: rhel8/4.18.0-553.94.1.el8_10/CVE-2025-68301-net-atlantic-fix-fragment-overflow-handling-in-rx-path.patch
- From: 4.18.0-553.94.1.el8_10
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38051
- Patch: rhel8/4.18.0-553.94.1.el8_10/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 4.18.0-553.94.1.el8_10
- CVE-2025-39933
- Description:
smb: client: let recv_done verify data_offset, data_length and remaining_data_length
- CVE: https://access.redhat.com/security/cve/CVE-2025-39933
- Patch: rhel8/4.18.0-553.94.1.el8_10/CVE-2025-39933-smb-client-let-recv-done-verify-data-offset.patch
- From: 4.18.0-553.94.1.el8_10
- CVE-2025-40248
- Description:
vsock: Ignore signal/timeout on connect() if already established
- CVE: https://access.redhat.com/security/cve/CVE-2025-40248
- Patch: rhel8/4.18.0-553.97.1.el8_10/CVE-2025-40248-vsock-ignore-signal-timeout-on-connect-if-already-established.patch
- From: 4.18.0-553.97.1.el8_10
- CVE-2025-40277
- Description:
drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
- CVE: https://access.redhat.com/security/cve/CVE-2025-40277
- Patch: rhel8/4.18.0-553.97.1.el8_10/CVE-2025-40277-drm-vmwgfx-validate-command-header-size-against-svga-cmd-max-datasize.patch
- From: 4.18.0-553.97.1.el8_10
- CVE-2023-53673
- Description:
Bluetooth: hci_event: call disconnect callback before deleting conn
- CVE: https://access.redhat.com/security/cve/CVE-2023-53673
- Patch: rhel8/4.18.0-553.97.1.el8_10/CVE-2023-53673-bluetooth-hci-event-call-disconnect-callback-before-deleting-conn.patch
- From: 4.18.0-553.97.1.el8_10
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://access.redhat.com/security/cve/CVE-2025-40154
- Patch: rhel8/4.18.0-553.97.1.el8_10/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 4.18.0-553.97.1.el8_10
- CVE-2022-50865
- Description:
tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
- CVE: https://access.redhat.com/security/cve/CVE-2022-50865
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2022-50865-tcp-fix-a-signed-integer-overflow-bug-in-tcp_add_backlog.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://access.redhat.com/security/cve/CVE-2025-38415
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-38415-squashfs-check-return-result-of-sb_min_blocksize.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://access.redhat.com/security/cve/CVE-2025-38415
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://access.redhat.com/security/cve/CVE-2025-38415
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-38415-squashfs-check-return-result-of-sb_min_blocksize-kpatch.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2024-26766
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://access.redhat.com/security/cve/CVE-2024-26766
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-error.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-38022
- Description:
RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
- CVE: https://access.redhat.com/security/cve/CVE-2025-38022
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-38022-rdma-core-fix-kasan-slab-use-after-free-read-in-ib-register-device-problem.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://access.redhat.com/security/cve/CVE-2025-38024
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-38459
- Description:
atm: clip: Fix infinite recursive call of clip_push().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38459
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-38459-atm-clip-fix-infinite-recursive-call-of-clip-push.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-39760
- Description:
usb: core: config: Prevent OOB read in SS endpoint companion parsing
- CVE: https://access.redhat.com/security/cve/CVE-2025-39760
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-39760-usb-core-config-prevent-oob-read-in-ss-endpoint-companion-parsing.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-40258
- Description:
mptcp: fix race condition in mptcp_schedule_work()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40258
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-40258-mptcp-fix-race-condition-in-mptcp-schedule-work.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-40271
- Description:
fs/proc: fix uaf in proc_readdir_de()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40271
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-40271-fs-proc-fix-uaf-in-proc-readdir-de.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2025-40322
- Description:
fbdev: bitblit: bound-check glyph index in bit_putcs*
- CVE: https://access.redhat.com/security/cve/CVE-2025-40322
- Patch: rhel8/4.18.0-553.100.1.el8_10/CVE-2025-40322-fbdev-bitblit-bound-check-glyph-index-in-bit-putcs.patch
- From: 4.18.0-553.100.1.el8_10
- CVE-2022-50673
- Description:
ext4: fix use-after-free in ext4_orphan_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2022-50673
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2022-50673-ext4-fix-use-after-free-in-ext4_orphan_cleanup.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://access.redhat.com/security/cve/CVE-2025-38403
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40269
- Description:
ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
- CVE: https://access.redhat.com/security/cve/CVE-2025-40269
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40269-alsa-usb-audio-fix-potential-overflow-of-pcm-transfer-buffer.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-68349
- Description:
NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
- CVE: https://access.redhat.com/security/cve/CVE-2025-68349
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-68349-nfsv4-pnfs-clear-nfs-ino-layoutcommit-in-pnfs-mark-layout-stateid-invalid.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2026-22998
- Description:
nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec
- CVE: https://access.redhat.com/security/cve/CVE-2026-22998
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2026-22998-nvme-tcp-fix-null-pointer-dereferences-in-nvmet-tcp-build-pdu-iovec.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40158
- Description:
net: dst: add four helpers to annotate data-races around dst->dev
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40158-01-net-dst-add-four-helpers-to-annotate-data-races-553.22.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40158
- Description:
net: Add locking to protect skb->dev access in ip_output
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40158-02-net-add-locking-to-protect-skb-dev-access-in-ip_output.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40158
- Description:
net: gain ipv4 mtu when mtu is not locked
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40158-03-net-gain-ipv4-mtu-when-mtu-is-not-locked.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40158
- Description:
ipv4: use RCU protection in __ip_rt_update_pmtu()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40158-03-ipv4-use-RCU-protection-in-__ip_rt_update_pmtu.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40158
- Description:
net: dst: introduce dst->dev_rcu
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40158-04-net-dst-introduce-dst-dev_rcu-553.22.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40158
- Description:
ipv6: use RCU in ip6_output()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40158
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40158-ipv6-use-RCU-in-ip6_output.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40135
- Description:
ipv6: use RCU in ip6_xmit()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40135
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40135-ipv6-use-RCU-in-ip6_xmit.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40170
- Description:
net: use dst_dev_rcu() in sk_setup_caps()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40170-00-optimize-kpatch-553.30.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40170
- Description:
ipv4: add RCU protection to ip4_dst_hoplimit()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40170-01-ipv4-add-RCU-protection-to-ip4_dst_hoplimit.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40170
- Description:
ipv4: use RCU protection in ip_dst_mtu_maybe_forward()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40170-02-ipv4-use-RCU-protection-in-ip_dst_mtu_maybe_forward.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40170
- Description:
net: use dst_dev_rcu() in sk_setup_caps()
- CVE: https://access.redhat.com/security/cve/CVE-2025-40170
- Patch: rhel8/4.18.0-553.104.1.el8_10/CVE-2025-40170-net-use-dst_dev_rcu-in-sk_setup_caps.patch
- From: 4.18.0-553.104.1.el8_10
- CVE-2025-40168
- Description:
smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40168
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2025-40168-smc-use-sk-dst-get-and-dst-dev-rcu-in-smc-clc-prfx-match.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2025-40304
- Description:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-40304
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2025-40304-fbdev-add-bounds-checking-in-bit-putcs-to-fix-vmalloc-out-of-bounds.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_event: Ignore multiple conn complete events
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0001-Bluetooth-hci_event-Ignore-multiple-conn-complete-ev.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_event: Fix checking for invalid handle on error status
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0002-Bluetooth-hci_event-Fix-checking-for-invalid-handle-.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_sync: Cleanup hci_conn if it cannot be aborted
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0003-Bluetooth-hci_sync-Cleanup-hci_conn-if-it-cannot-be-.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0004-Bluetooth-hci_sync-Fix-UAF-on-hci_abort_conn_sync.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0005-Bluetooth-hci_sync-Fix-UAF-in-hci_disconnect_all_syn.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2025-40064
- Description:
smc: Fix use-after-free in __pnet_find_base_ndev().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40064
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-40064-smc-fix-use-after-free-in-pnet-find-base-ndev.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2025-68800
- Description:
mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
- CVE: https://access.redhat.com/security/cve/CVE-2025-68800
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-68800-mlxsw-spectrum-mr-fix-use-after-free-when-updating-multicast-route-stats.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2025-38129
- Description:
page_pool: Fix use-after-free in page_pool_recycle_in_ring
- CVE: https://access.redhat.com/security/cve/CVE-2025-38129
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-38129-page-pool-fix-use-after-free-in-page-pool-recycle-in-ring.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2026-23074
- Description:
net/sched: Enforce that teql can only be used as root qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2026-23074
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2026-23074-net-sched-enforce-that-teql-can-only-be-used-as-root-qdisc.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2025-38248
- Description:
bridge: mcast: Fix use-after-free during router port configuration
- CVE: https://access.redhat.com/security/cve/CVE-2025-38248
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-38248-bridge-mcast-fix-use-after-free-during-router-port-configuration.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2026-23097
- Description:
migrate: correct lock ordering for hugetlb file folios
- CVE: https://access.redhat.com/security/cve/CVE-2026-23097
- Patch: rhel8/4.18.0-553.109.1.el8_10/CVE-2026-23097-migrate-correct-lock-ordering-for-hugetlb-file-folios.patch
- From: 4.18.0-553.109.1.el8_10
- CVE-2025-71085
- Description:
ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
- CVE: https://access.redhat.com/security/cve/CVE-2025-71085
- Patch: rhel8/4.18.0-553.111.1.el8_10/CVE-2025-71085-ipv6-bug-in-pskb-expand-head-as-part-of-calipso-skbuff-setattr.patch
- From: 4.18.0-553.111.1.el8_10
- CVE-2026-23001
- Description:
macvlan: fix possible UAF in macvlan_forward_source()
- CVE: https://access.redhat.com/security/cve/CVE-2026-23001
- Patch: rhel8/4.18.0-553.111.1.el8_10/CVE-2026-23001-macvlan-fix-possible-uaf-in-macvlan-forward-source.patch
- From: 4.18.0-553.111.1.el8_10
- N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A