- kernel-4.18.0-544.lve.el8 (cl8)
- 4.18.0-553.8.1.lve.el8
- 2024-08-08 20:31:34
- 2024-08-12 12:17:48
- K20240808_02
- CVE-2021-47153
- Description:
i2c: i801: Don't generate an interrupt on bus reset
- CVE: https://access.redhat.com/security/cve/CVE-2021-47153
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47153-i2c-i801-don-t-generate-an-interrupt-on-bus-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2020-36777
- Description:
media: dvbdev: Fix memory leak in dvb_media_device_free()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36777
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2020-36777-media-dvbdev-fix-memory-leak-in-dvb_media_device_free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171
- Description:
net: usb: fix memory leak in smsc75xx_bind
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-memory-leak-in-smsc75xx-bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171
- Description:
net: usb: fix possible use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-possible-use-after-free-in-smsc75xx_bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240
- Description:
crypto: akcipher - default implementations for request callbacks
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-default-implementations-for-request-callbacks.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240
- Description:
crypto: testmgr - split akcipher tests by a key type
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-testmgr-split-akcipher-tests-by-a-key-type.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-disable-signing-and-decryption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52520
- Description:
platform/x86: think-lmi: Fix reference leak
- CVE: https://access.redhat.com/security/cve/CVE-2023-52520
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52520-platform-x86-think-lmi-fix-reference-leak.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26610
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://access.redhat.com/security/cve/CVE-2024-26610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52610
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52598
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52598.patch
- From:
- CVE-2022-48669
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2022-48669.patch
- From:
- CVE-2023-52607
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52607.patch
- From:
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26593
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://access.redhat.com/security/cve/CVE-2024-26593
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2019-25162
- Description:
i2c: Fix a potential use after free
- CVE: https://access.redhat.com/security/cve/CVE-2019-25162
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2019-25162-i2c-fix-a-potential-use-after-free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52445
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2023-52445
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-23307
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://access.redhat.com/security/cve/CVE-2024-23307
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-23307-md-raid5-fix-atomicity-violation-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52606
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52606.patch
- From:
- CVE-2024-25744
- Description:
This CVE modifies the functions which won't be available or doesn't make sense to patch as they are used during bootup time or init. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2024-25744.patch
- From:
- CVE-2021-47185
- Description:
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
- CVE: https://access.redhat.com/security/cve/CVE-2021-47185
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47185-tty-tty_buffer-Fix-the-softlockup-issue-in-flush_to_.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2022-48627
- Description:
vt: fix memory overlapping when deleting chars in the buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-48627
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in-the.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52477
- Description:
usb: hub: Guard against accesses to uninitialized BOS descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2023-52477
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52477-usb-hub-Guard-against-accesses-to-uninitialized-BOS-.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52513
- Description:
RDMA/siw: Fix connection failure handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52513
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52513-RDMA-siw-Fix-connection-failure-handling.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52528
- Description:
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
- CVE: https://access.redhat.com/security/cve/CVE-2023-52528
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52528-net-usb-smsc75xx-Fix-uninit-value-access-in-__smsc75.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52594
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52595
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26872
- Description:
RDMA/srpt: Do not register event handler until srpt device is fully setup
- CVE: https://access.redhat.com/security/cve/CVE-2024-26872
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26872-RDMA-srpt-Do-not-register-event-handler-until-srpt-d.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26892
- Description:
wifi: mt76: mt7921e: fix use-after-free in free_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26892
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26892-wifi-mt76-mt7921e-fix-use-after-free-in-free_irq.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52565
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2023-52565.patch
- From:
- CVE-2021-47055
- Description:
mtd: properly check all write ioctls for permissions
- CVE: https://access.redhat.com/security/cve/CVE-2021-47055
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-properly-check-all-write-ioctls-for-permissions.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47055
- Description:
mtd: require write permissions for locking and badblock ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2021-47055
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-require-write-permissions-for-locking-and-badblo.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26897
- Description:
WiFi - Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-27052
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
- CVE: https://access.redhat.com/security/cve/CVE-2024-27052
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26743
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26743
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26779
- Description:
wifi: mac80211: fix race condition on enabling
- CVE: https://access.redhat.com/security/cve/CVE-2024-26779
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26901
- Description:
do_sys_name_to_handle(): use kzalloc() to fix
- CVE: https://access.redhat.com/security/cve/CVE-2024-26901
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26919
- Description:
usb: ulpi: Fix debugfs directory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26919
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26919-4043-usb-ulpi-Fix-debugfs-directory-leak.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26933
- Description:
USB: core: Add hub_get() and hub_put() routines
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4056-USB-core-Add-hub_get-and-hub_put-routines.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26933
- Description:
USB: core: Fix deadlock in port "disable" sysfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4057-USB-core-Fix-deadlock-in-port-disable-sysfs-attribut.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26934
- Description:
USB: core: Fix deadlock in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26934
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26934-usb-core-fix-deadlock-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26964
- Description:
USB: core: Add hub_get() and hub_put() routines
- CVE: https://access.redhat.com/security/cve/CVE-2024-26964
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26964-4060-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26973
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://access.redhat.com/security/cve/CVE-2024-26973
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26993
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-0340
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0340
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-mem.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26603
- Description:
x86/fpu: Stop relying on userspace for info to
- CVE: https://access.redhat.com/security/cve/CVE-2024-26603
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26615
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dum
- CVE: https://access.redhat.com/security/cve/CVE-2024-26615
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26615-net-smc-fix-illegal-rmb_desc-access-in-SMC-D-connect.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26642
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26643
- Description:
The given kernel version isn't vulnerable (Netfilter).
- CVE:
- Patch: skipped/CVE-2024-26643.patch
- From:
- CVE-2024-26664
- Description:
hwmon: (coretemp) Fix out-of-bounds memory access
- CVE: https://access.redhat.com/security/cve/CVE-2024-26664
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26664-hwmon-coretemp-Fix-out-of-bounds-memory-access.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26693
- Description:
wifi: iwlwifi: mvm: fix a crash when we run out of stations
- CVE: https://access.redhat.com/security/cve/CVE-2024-26693
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26693-wifi-iwlwifi-mvm-fix-a-crash-when-we-run-out-of-stat.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26694
- Description:
wifi: iwlwifi: fix double-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26694
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26694-wifi-iwlwifi-fix-double-free-bug.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27059
- Description:
USB: usb-storage: Prevent divide-by-0 error in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27059
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47013
- Description:
net:emac/emac-mac: Fix a use after free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47013
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47013-net-emac-emac-mac-fix-a-use-after-free-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-46934
- Description:
i2c: validate user data in compat ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-46934
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-46934-i2c-validate-user-data-in-compat-ioctl.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659
- Description:
xhci: process isoc TD properly when there was a
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659
- Description:
xhci: handle isoc Babble and Buffer Overrun events
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-handle-isoc-babble-and-buffer-overrun-events.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27014
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-513.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27014
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-513-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27056
- Description:
wifi: iwlwifi: mvm: ensure offloading TID queue exists
- CVE: https://access.redhat.com/security/cve/CVE-2024-27056
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27056-wifi-iwlwifi-mvm-ensure-offloading-TID-queue-exists.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27048
- Description:
wifi: brcm80211: handle pmk_op allocation failure
- CVE: https://access.redhat.com/security/cve/CVE-2024-27048
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27048-wifi-brcm80211-handle-pmk_op-allocation-failure.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47118
- Description:
No sense in patching an early boot function; inventing a runtime-wise patch is not impossible but isn't worth the effort for 4.4 score CVE
- CVE:
- Patch: skipped/CVE-2021-47118.patch
- From:
- CVE-2023-52578
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0001-net-add-atomic_long_t-to-net_device_stats-fields-from-477.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52578
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0002-net-bridge-use-DEV_STATS_INC-from-372.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52578
- Description:
net: Fix unwanted sign extension in netdev_stats_to_stats64()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0003-net-Fix-unwanted-sign-extension-in-netdev_stats_to_s.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52578
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0004-net-add-atomic_long_t-to-net_device_stats-fields-from-477-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26744
- Description:
RDMA/srpt: Support specifying the srpt_service_guid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26744
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52669
- Description:
CVE patch is for s390 arch only
- CVE:
- Patch: skipped/CVE-2023-52669.patch
- From:
- CVE-2023-52675
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52675.patch
- From:
- CVE-2023-52686
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52686.patch
- From:
- CVE-2023-52703
- Description:
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
- CVE: https://access.redhat.com/security/cve/CVE-2023-52703
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52703-net-usb-kalmia-Don-t-pass-act_len-in-usb_bulk_msg-error-path.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52813
- Description:
crypto: pcrypt - Fix hungtask for PADATA_RESET
- CVE: https://access.redhat.com/security/cve/CVE-2023-52813
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52813-crypto-pcrypt-Fix-hungtask-for-PADATA_RESET.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52700
- Description:
tipc: fix kernel warning when sending SYN message
- CVE: https://access.redhat.com/security/cve/CVE-2023-52700
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52700-tipc-fix-kernel-warning-when-sending-SYN-message.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52835
- Description:
perf/core: Bail out early if the request AUX area is out of bound
- CVE: https://access.redhat.com/security/cve/CVE-2023-52835
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52835-perf-core-Bail-out-early-if-the-request-AUX-area-is-out-of-bound.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52781
- Description:
usb: config: fix iteration issue in 'usb_get_bos_descriptor()'
- CVE: https://access.redhat.com/security/cve/CVE-2023-52781
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52781-usb-config-fix-iteration-issue-in-usb_get_bos_descriptor.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52877
- Description:
usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52877
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52877-usb-typec-tcpm-Fix-NULL-pointer-dereference-in-tcpm_pd_svdm.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52667
- Description:
net/mlx5e: fix a potential double-free in fs_any_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2023-52667
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in-fs_any_create_groups.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52878
- Description:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-52878
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52878-can-dev-can_put_echo_skb-don-t-crash-kernel-if-can_priv::echo_skb-is-accessed-out-of-bounds.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://access.redhat.com/security/cve/CVE-2023-52464
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52464-EDAC_thunderx-Fix-possible-out-of-bounds-string-access.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26907
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://access.redhat.com/security/cve/CVE-2024-26907
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26907-RDMA_mlx5-Fix-fortify-source-warning-while-accessing-Eth-segment.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-5090
- Description:
x86: KVM: SVM: always update the x2avic msr interception
- CVE: https://access.redhat.com/security/cve/CVE-2023-5090
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-5090-x86-KVM-SVM-always-update-the-x2avic-msr-interception.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27397
- Description:
netfilter: Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-27397.patch
- From:
- CVE-2023-52560
- Description:
mm/damon/vaddr-test: fix memory leak in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52560
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52560-mm-damon-vaddr-test-fix-memory-leak-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35959
- Description:
net/mlx5e: Fix mlx5e_priv_init() cleanup flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-35959
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35959-net-mlx5e-fix-mlx5e-priv-init-cleanup-flow.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47073
- Description:
platform/x86: dell-smbios-wmi: Fix oops on rmmod
- CVE: https://access.redhat.com/security/cve/CVE-2021-47073
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47073-platform-x86-dell-smbios-wmi-fix-oops-on-rmmod.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35960
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36004
- Description:
i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
- CVE: https://access.redhat.com/security/cve/CVE-2024-36004
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36004-i40e-do-not-use-wq-mem-reclaim-flag-for-workqueue.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35958
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26583 CVE-2024-26584 CVE-2024-26585
- Description:
tls: disable async encrypt/decrypt
- CVE: https://access.redhat.com/security/cve/CVE-2024-26585
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26583-tls-disable-async-encrypt-decrypt.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26859
- Description:
net/bnx2x: Prevent access to a freed page in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26859
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26859-net-bnx2x-prevent-access-to-a-freed-page-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: Reject connection with the device which
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-reject-connection-with-the-device-which.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Fix coding style
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: avoid memcmp() out of bounds warning
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Fix using memcmp when
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52615
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36007
- Description:
mlxsw: spectrum_acl_tcam: Fix warning during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-36007
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36007-mlxsw-spectrum-acl-tcam-fix-warning-during-rehash.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: remove duplicated code
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-remove-duplicated-code.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: update/document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-update-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/msg.c: update and document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-msg-c-update-and-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/sem.c: document and update memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-sem-c-document-and-update-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-msg-sem-avoid-relying-on-a-stack.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47236
- Description:
net: cdc_eem: fix tx fixup skb leak
- CVE: https://access.redhat.com/security/cve/CVE-2021-47236
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47236-net-cdc-eem-fix-tx-fixup-skb-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47353
- Description:
udf: Fix NULL pointer dereference in udf_symlink function
- CVE: https://access.redhat.com/security/cve/CVE-2021-47353
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47353-udf-fix-null-pointer-dereference-in-udf-symlink.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47311
- Description:
net: qcom/emac: fix UAF in emac_remove
- CVE: https://access.redhat.com/security/cve/CVE-2021-47311
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47311-net-qcom-emac-fix-uaf-in-emac-remove.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47310
- Description:
net: ti: fix UAF in tlan_remove_one
- CVE: https://access.redhat.com/security/cve/CVE-2021-47310
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47310-net-ti-fix-uaf-in-tlan-remove-one.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: fix possible use-after-free in HFC_cleanup()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-fix-possible-use-after-free-in-hfc-cleanup.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-hfcpci-fix-use-after-free-bug-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47456
- Description:
can: peak_pci: peak_pci_remove(): fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2021-47456
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47456-can-peak-pci-peak-pci-remove-fix-uaf.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-46972
- Description:
ovl: fix leaked dentry
- CVE: https://access.redhat.com/security/cve/CVE-2021-46972
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-46972-ovl-fix-leaked-dentry.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47495
- Description:
usbnet: sanity check for maxpacket
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-sanity-check-for-maxpacket.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47495
- Description:
usbnet: fix error return code in usbnet_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-fix-error-return-code-in-usbnet-probe.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35835
- Description:
net/mlx5e: fix a double-free in arfs_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2024-35835
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35835-net-mlx5e-fix-a-double-free-in-arfs-create-groups.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35789
- Description:
wifi: mac80211: check/clear fast rx for non-4addr
- CVE: https://access.redhat.com/security/cve/CVE-2024-35789
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35845
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://access.redhat.com/security/cve/CVE-2024-35845
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35838
- Description:
wifi: mac80211: fix potential sta-link leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-35838
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35838-wifi-mac80211-fix-potential-sta-link-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35852
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35853
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during
- CVE: https://access.redhat.com/security/cve/CVE-2024-35853
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35854
- Description:
mlxsw: spectrum_acl_tcam: Fix possible
- CVE: https://access.redhat.com/security/cve/CVE-2024-35854
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35854-mlxsw-spectrum-acl-tcam-fix-possible.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35855
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35855
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35855-mlxsw-spectrum_acl_tcam-Fix-possible-use-after-free.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35888
- Description:
erspan: make sure erspan_base_hdr is present in
- CVE: https://access.redhat.com/security/cve/CVE-2024-35888
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35888-erspan-make-sure-erspan-base-hdr-is-present-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35890
- Description:
gro: fix ownership transfer
- CVE: https://access.redhat.com/security/cve/CVE-2024-35890
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-46909
- Description:
CVE patch is for arch/arm which is not supported.
- CVE:
- Patch: skipped/CVE-2021-46909.patch
- From:
- CVE-2024-26656
- Description:
drm/amdgpu: fix use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26656
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26675
- Description:
ppp_async: limit MRU to 64K
- CVE: https://access.redhat.com/security/cve/CVE-2024-26675
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26826
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26826
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26906
- Description:
x86/mm: Complex adaptation required to prevent BPF abuse.
- CVE:
- Patch: skipped/CVE-2024-26906.patch
- From:
- CVE-2024-26974
- Description:
crypto: qat - resolve race condition during AER
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26974
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27410
- Description:
wifi: nl80211: reject iftype change with mesh ID
- CVE: https://access.redhat.com/security/cve/CVE-2024-27410
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-id.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26759
- Description:
swap: fix do_swap_page() race with swapoff
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26759-swap-fix-do-swap-page-race-with-swapoff.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26759
- Description:
mm/swap: fix race when skipping swapcache
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26759-mm-swap-fix-race-when-skipping-swapcache.patch
- From: 4.18.0-553.8.1.el8_10
- N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A