- kernel-4.18.0-348.7.1.el8_5 (rhel8)
- 4.18.0-553.33.1.el8_10
- 2024-12-26 21:01:13
- 2025-01-03 14:39:27
- K20241226_05
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.18.0/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 4.18.0-348.12.2.el8_5
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
vfs: fs_context: fix up param length parsing in legacy_parse_param
- CVE: https://access.redhat.com/security/cve/CVE-2022-0185
- Patch: 4.18.0/CVE-2022-0185-vfs-fs_context-fix-up-param-length-parsing-in-legacy_parse_param.patch
- From: 4.18.0-348.12.2.el8_5
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: vfs: test that one given mount param is not larger than PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0185
- Patch: 5.4.0/CVE-2022-0185-UBUNTU-SAUCE-vfs-test-that-one-given-mount-param-is-not-larger-than-PAGE_SIZE.patch
- From: 5.4.0-96.109
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.18.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records-348.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-kpatch.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-4154, CVSSv2 Score: 7.8
- Description:
cgroup: verify that source is a string
- CVE: https://access.redhat.com/security/cve/CVE-2021-4154
- Patch: 4.18.0/CVE-2021-4154-cgroup-verify-that-source-is-a-string.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
drm/vmwgfx: Fix stale file descriptors on failed usercopy
- CVE: https://access.redhat.com/security/cve/CVE-2022-22942
- Patch: 4.18.0/CVE-2022-22942-drm-vmwgfx-Fix-stale-file-descriptors-on-failed-usercopy.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.18.0/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0516, CVSSv2 Score: 7.8
- Description:
KVM: s390: Return error on SIDA memop on normal guest
- CVE: https://access.redhat.com/security/cve/CVE-2022-0516
- Patch: 4.18.0/CVE-2022-0516-KVM-s390-Return-error-on-SIDA-memop-on-normal-guest.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array size
- CVE: https://access.redhat.com/security/cve/CVE-2022-25636
- Patch: 4.18.0/CVE-2022-25636.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2021-4028, CVSSv2 Score: 7.0
- Description:
RDMA/cma: Do not change route.addr.src_addr.ss_family
- CVE: https://access.redhat.com/security/cve/CVE-2021-4028
- Patch: 4.18.0/CVE-2021-4028-RDMA-cma-Do-not-change-route.addr.src_addr.ss_family.patch
- From: 4.18.0-348.23.1.el8_5
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0001-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-32
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0002-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://access.redhat.com/security/cve/cve-2021-41864
- Patch: 4.18.0/1324-bpf-Fix-integer-overflow-in-prealloc_elems_and_freel.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4037, CVSSv2 Score: 4.4
- Description:
xfs: fix up non-directory creation in SGID directories
- CVE: https://access.redhat.com/security/cve/cve-2021-4037
- Patch: 4.18.0/1626-xfs-fix-up-non-directory-creation-in-SGID-directorie.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash()
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2169-ipv6-use-siphash-in-rt6_exception_hash.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2170-ipv6-make-exception-cache-less-predictible.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash() (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2169-ipv6-use-siphash-in-rt6_exception_hash-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii
- CVE: https://access.redhat.com/security/cve/cve-2020-13974
- Patch: 4.18.0/2474-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-13974
- Patch: 4.18.0/2474-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4157, CVSSv2 Score: 5.9
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://access.redhat.com/security/cve/cve-2021-4157
- Patch: 4.18.0/2674-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nf.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3743, CVSSv2 Score: 6.2
- Description:
net: qrtr: fix another OOB Read in qrtr_endpoint_post
- CVE: https://access.redhat.com/security/cve/cve-2021-3743
- Patch: 4.18.0/7796-net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun()
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8090-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8091-ipv4-make-exception-cache-less-predictible.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun() (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8090-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4083, CVSSv2 Score: 7.4
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://access.redhat.com/security/cve/cve-2021-4083
- Patch: 4.18.0/9104-fget-check-that-the-fd-still-exists-after-getting-a-.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3773, CVSSv2 Score: 5.9
- Description:
netfilter: nat: force port remap to prevent shadowing well-known ports
- CVE: https://access.redhat.com/security/cve/cve-2021-3773
- Patch: 4.18.0/9346-netfilter-nat-force-port-remap-to-prevent-shadowing-.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45485, CVSSv2 Score: 7.5
- Description:
ipv6: use prandom_u32() for ID generation
- CVE: https://access.redhat.com/security/cve/cve-2021-45485
- Patch: 4.18.0/11062-ipv6-use-prandom_u32-for-ID-generation.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time credentials for process migraton perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/11280-cgroup-Use-open-time-credentials-for-process-migrat.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/11282-cgroup-Use-open-time-cgroup-namespace-for-process-m.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
tee: handle lookup of shm with reference count 0
- CVE: https://access.redhat.com/security/cve/cve-2021-44733
- Patch: 4.18.0/11389-tee-handle-lookup-of-shm-with-reference-count-0.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent potential read overflow in ioctl
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 4.18.0/11697-Input-joydev-prevent-potential-read-overflow-in-ioc.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-0941, CVSSv2 Score: 6.7
- Description:
bpf: Remove MTU check in __bpf_skb_max_len
- CVE: https://access.redhat.com/security/cve/CVE-2021-0941
- Patch: 4.18.0/CVE-2021-0941-bpf-Remove-MTU-check-in-__bpf_skb_max_len.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-4788, CVSSv2 Score:
- Description:
IBM Power9 is unsupported
- CVE:
- Patch: skipped/CVE-2020-4788.patch
- From:
- CVE-2020-0404, CVSSv2 Score: 5.5
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0404
- Patch: 4.15.0/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-malformed-USB-descriptors.patch
- From: kernel-4.15.0-96.97
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: 5.11.0/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-list.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: use drm_dev_unplug() during device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: 5.11.0/CVE-2020-27820-drm-nouveau-use-drm_dev_unplug-during-device-removal.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: clean up all clients on device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: 5.11.0/CVE-2020-27820-drm-nouveau-clean-up-all-clients-on-device-removal.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27820
- Patch: 4.18.0/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-kpatch.patch
- From: 4.18.0-372.9.1.el8
- CVE-2021-3669, CVSSv2 Score: 5.5
- Description:
ipc: replace costly bailout check in sysvipc_find_ipc()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3669
- Patch: 4.18.0/CVE-2021-3669-ipc-replace-costly-bailout-check-in-sysvipc_find_ipc.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3764 CVE-2021-3744, CVSSv2 Score: 5.5
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-bionic/4.15.0-163.171/0005-CVE-2021-3744-CVE-2021-3764-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd.patch
- From: 4.15.0-163.171
- CVE-2021-3759, CVSSv2 Score: 5.5
- Description:
memcg: enable accounting of ipc resources
- CVE: https://access.redhat.com/security/cve/cve-2021-3759
- Patch: 4.18.0/CVE-2021-3759-memcg-enable-accounting-of-ipc-resources.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
use init_tag from inithdr for ABORT chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
fix the processing for COOKIE_ECHO chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-fix-the-processing-for-COOKIE_ECHO-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_do_8_5_1_E_sa
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_do_8_5_1_E_sa.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_ootb
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_ootb.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.18.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-21781, CVSSv2 Score:
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2021-21781.patch
- From:
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2021-43056, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-43056.patch
- From:
- CVE-2022-0001, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-37159
- Patch: 4.19.0/CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_device.patch
- From: 4.19.208-1
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42739
- Patch: ubuntu-bionic/4.15.0-167.175/0004-CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch
- From: 4.15.0-167.175
- CVE-2021-43389, CVSSv2 Score: 5.5
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-43389
- Patch: ubuntu-bionic/4.15.0-166.174/0005-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 4.15.0-166.174
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43976
- Patch: 4.19.0/CVE-2021-43976-mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
- From: 4.19.232-1
- CVE-2022-0322, CVSSv2 Score: 5.5
- Description:
account stream padding length for reconf chunk
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0322
- Patch: 4.19.0/CVE-2022-0322.patch
- From: <= linux-4.19.208-1
- CVE-2022-0286, CVSSv2 Score: 5.5
- Description:
bonding: fix null dereference in bond_ipsec_add_sa()
- CVE: https://access.redhat.com/security/cve/CVE-2022-0286
- Patch: 4.18.0/CVE-2022-0286-bonding-fix-null-dereference-in-bond_ipsec_add_sa.patch
- From: <kernel-4.19.208-1
- CVE-2021-4203, CVSSv2 Score: 6.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses
- CVE: https://access.redhat.com/security/cve/cve-2021-4203
- Patch: 4.18.0/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4203, CVSSv2 Score: 6.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-4203
- Patch: 4.18.0/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses-kpatch-304.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation
- CVE: https://access.redhat.com/security/cve/cve-2021-45486
- Patch: 4.18.0/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-45486
- Patch: 4.18.0/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation-kpatch.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: rename guest_ins_data to sev_pio_data
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-SEV-ES-rename-guest_ins_data-to-sev_pio_data.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: clean up kvm_sev_es_ins/outs
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-SEV-ES-clean-up-kvm_sev_es_ins-outs.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: keep INS functions together
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-SEV-ES-keep-INS-functions-together.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: go over the sev_pio_data buffer in multiple passes if needed
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-SEV-ES-go-over-the-sev_pio_data-buffer-in-multiple-passes-if-needed.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: fix length of string I/O
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-SEV-ES-fix-length-of-string-IO.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: fix another issue with string I/O VMGEXITs
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-SEV-ES-fix-another-issue-with-string-I-O-VMGEXITs.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: SEV-ES: go over the sev_pio_data buffer in multiple passes if needed (adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-kpatch.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: x86: leave vcpu->arch.pio.count alone in emulator_pio_in_out
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-x86-leave-vcpu-arch-pio.count-alone-in-emulator_pio_in_out.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: x86: split the two parts of emulator_pio_in
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-x86-split-the-two-parts-of-emulator_pio_in.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2021-4093, CVSSv2 Score: 7.5
- Description:
KVM: x86: remove unnecessary arguments from complete_emulator_pio_in
- CVE: https://ubuntu.com/security/CVE-2021-4093
- Patch: 5.11.0/CVE-2021-4093-KVM-x86-remove-unnecessary-arguments-from-complete_emulator_pio_in.patch
- From: 5.11.0-1028.31~20.04.1
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 4.18.0/CVE-2022-27666.patch
- From: 4.18.0-372.9.1.el8
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
sock: remove one redundant SKB_FRAG_PAGE_ORDER macro (CVE-2022-27666 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 4.19.0/CVE-2022-27666-dependency.patch
- From: v5.14
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1729
- Patch: 4.18.0/CVE-2022-1729-perf-Fix-sys_perf_event_open-race-against-self.patch
- From: 5.10.120-1
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets earlier
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 4.18.0/CVE-2022-32250-netfilter-nf_tables-disallow-non-stateful-expression-in-sets-240.patch
- From: >kernel-4.18.0-372.9.1.el8
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 4.18.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset.patch
- From: 4.18.0-372.19.1
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: ubuntu-bionic/4.15.0-191.202/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: kernel-4.15.0-191.202
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.10.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.10.113-1
- CVE-2022-0494, CVSSv2 Score: 4.4
- Description:
block-map: add __GFP_ZERO flag for alloc_page in function
- CVE: https://access.redhat.com/security/cve/CVE-2022-0494
- Patch: 5.4.0/CVE-2022-0494-block-map-add-__GFP_ZERO-for-alloc_page-in-bio_copy_kern.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2021-3640, CVSSv2 Score: 6.7
- Description:
Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 4.19.0/CVE-2021-3640.patch
- From: <= linux-4.19.208-1
- CVE-2022-1055, CVSSv2 Score: 6.3
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1055
- Patch: 4.18.0/CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28390
- Patch: 4.14.0/CVE-2022-28390.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://access.redhat.com/security/cve/cve-2022-20368
- Patch: 4.18.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
SUNRPC: Ensure we flush any closed sockets before
- CVE: https://access.redhat.com/security/cve/CVE-2022-28893
- Patch: 4.18.0/CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
[PATCH] SUNRPC: Don't leak sockets in xs_local_connect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0003-CVE-2022-28893-SUNRPC-Don-t-leak-sockets-in-xs_local_connect.patch
- From: 5.4.0-124.140
- CVE-2022-29581, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: fix netns refcount changes in u32_change()
- CVE: https://access.redhat.com/security/cve/CVE-2022-29581
- Patch: 4.18.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 4.4.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix race in VT_RESIZEX
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-vt-vt_ioctl-fix-race-in-VT_RESIZEX.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-30002
- Patch: ubuntu-focal/5.4.0-73.82/0001-CVE-2021-30002-media-v4l-ioctl-Fix-memory-leak-in-video_usercopy.patch
- From: 5.4.0-73.82
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: prevent bad output lengths in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 5.10.0/CVE-2022-0168-cifs-prevent-bad-output-lengths-in-smb2_ioctl_query_info.patch
- From: 5.10.113-1
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 5.10.0/CVE-2022-0168-cifs-fix-NULL-ptr-dereference-in-smb2_ioctl_query_info.patch
- From: 5.10.113-1
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0854, CVSSv2 Score: 5.5
- Description:
Reinstate some of "swiotlb: rework "fix info leak with
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0854
- Patch: 4.18.0/CVE-2022-0854-Reinstate-some-of-swiotlb-rework-fix-info-leak-with-348.patch
- From: 5.10.120-1
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make variable "count" signed
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-make-variable-count-signed.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-2938, CVSSv2 Score: 7.8
- Description:
psi: Fix uaf issue when psi trigger is destroyed while being polled (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-2938
- Patch: 4.18.0/CVE-2022-2938-kpatch-348.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 5.15.37-39
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.18.0/CVE-2022-1048-kpatch-372.patch
- From: 5.10.113
- CVE-2022-2639, CVSSv2 Score: 7.8
- Description:
openvswitch: fix OOB access in reserve_sfa_size()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2639
- Patch: 4.18.0/CVE-2022-2639-openvswitch-fix-OOB-access-in-reserve_sfa_size.patch
- From: 4.18.0-372.26.1
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 4.18.0/CVE-2022-1016.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
Bail out in case userspace uses unsupported registers.
- CVE: https://access.redhat.com/security/cve/cve-2022-1015
- Patch: 4.18.0/CVE-2022-1015.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-1852, CVSSv2 Score: 5.5
- Description:
KVM: x86: avoid calling x86 emulator without a decoded
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1852
- Patch: 4.18.0/CVE-2022-1852-KVM-x86-avoid-calling-x86-emulator-without-a-decoded.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-2078, CVSSv2 Score: 5.3
- Description:
netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2078
- Patch: 4.18.0/CVE-2022-2078-netfilter-nf_tables-sanitize-nft_set_desc_concat_parse.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-23960, CVSSv2 Score:
- Description:
Out of scope as the patch is aarch64 related
- CVE:
- Patch: skipped/CVE-2022-23960.patch
- From:
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-24448
- Patch: 4.14.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0001-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0002-netfilter-nf_tables-do-not-allow-RULE_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-21499, CVSSv2 Score: 6.7
- Description:
lockdown: also lock down previous kgdb use
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21499
- Patch: 4.18.0/CVE-2022-21499-lockdown-also-lock-down-previous-kgdb-use.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-4139, CVSSv2 Score: 7.0
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute
- CVE: https://access.redhat.com/security/cve/CVE-2022-4139
- Patch: 4.18.0/CVE-2022-4139-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-co-348.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-R.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: prevent memory corruption in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: rhel8/4.18.0-425.13.1.el8_7/CVE-2022-2873-i2c-ismt-prevent-memory-corruption-in-ismt-access.patch
- From: 4.18.0-425.13.1.el8_7
- CVE-2022-41222, CVSSv2 Score: 7.0
- Description:
mm/mremap: hold the rmap lock in write mode when moving page table
- CVE: https://access.redhat.com/security/cve/CVE-2022-41222
- Patch: rhel8/4.18.0-425.13.1.el8_7/CVE-2022-41222-mm-mremap-hold-the-rmap-lock-in-write-mode-when-moving-page-table.patch
- From: 4.18.0-425.13.1.el8_7
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to
- CVE: https://access.redhat.com/security/cve/CVE-2022-4269
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4269-act_mirred-use-the-backlog-for-nested-calls-to-mirre.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4378-0001-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4378-0002-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2023-0266, CVSSv2 Score: 7.8
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-2066
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2023-0266-ALSA-pcm-Move-rwsem-lock-inside-snd_ctl_elem_read-to.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2023-0386, CVSSv2 Score: 7.0
- Description:
ovl: fail on invalid uid/gid mapping at copy up
- CVE: https://access.redhat.com/security/cve/CVE-2023-0386
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2023-0386-ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-41674, CVSSv2 Score: 7.3
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41674
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1679, CVSSv2 Score: 7.0
- Description:
ath9k: fix use-after-free in ath9k_hif_usb_rx_cbMIME-Version: 1.0
- CVE: https://access.redhat.com/security/cve/CVE-2022-1679
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3239, CVSSv2 Score: 7.0
- Description:
media: em28xx: initialize refcount before kref_get
- CVE: https://access.redhat.com/security/cve/CVE-2022-3239
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref_get.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3625, CVSSv2 Score: 7.8
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://access.redhat.com/security/cve/CVE-2022-3625
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-30594, CVSSv2 Score: 5.5
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
- CVE: https://access.redhat.com/security/cve/CVE-2022-30594
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-25265, CVSSv2 Score: 7.8
- Description:
x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
- CVE: https://access.redhat.com/security/cve/CVE-2022-25265
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-25265-0810-x86-elf-Disable-automatic-READ_IMPLIES_EXEC-on-64-bi.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-20141, CVSSv2 Score: 7.0
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://access.redhat.com/security/cve/CVE-2022-20141
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://access.redhat.com/security/cve/CVE-2022-3028
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://access.redhat.com/security/cve/CVE-2022-3564
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_reassemble_sdu-pre-372.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3623, CVSSv2 Score: 7.5
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3623
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page-pre-425.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://access.redhat.com/security/cve/CVE-2023-0461
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-the-LISTEN-status.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-42720, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://access.redhat.com/security/cve/CVE-2022-42720
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs-pre-425.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3524, CVSSv2 Score: 6.6
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3707, CVSSv2 Score: 5.5
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3628
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf_fweh_event_worker.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-43750, CVSSv2 Score: 6.7
- Description:
usb: mon: make mmapped memory read only
- CVE: https://access.redhat.com/security/cve/CVE-2022-43750
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
video: of_display_timing.h: include errno.h
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0001-video-of_display_timing.h-include-errno.h.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0002-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0003-fbcon-Prevent-that-screen-size-is-smaller-than-font-.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0004-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33656, CVSSv2 Score: 6.8
- Description:
vt: drop old FONT ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2021-33656
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net: fix a concurrency bug in l2tp_tunnel_register()
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0001-net-fix-a-concurrency-bug-in-l2tp_tunnel_register.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0002-l2tp-Serialize-access-to-sk_user_data-with-sk_callba.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0003-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
vt: use tty_insert_flip_string in respond_string
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0001-vt-use-tty_insert_flip_string-in-respond_string.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
vt: keyboard, use tty_insert_flip_string in puts_queue
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0002-vt-keyboard-use-tty_insert_flip_string-in-puts_queue.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drivers/tty/, stop using tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0003-tty-drivers-tty-stop-using-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: the rest, stop using tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0004-tty-the-rest-stop-using-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drop tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0006-tty-extract-tty_flip_buffer_commit-from-tty_flip_buf.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0007-tty-use-new-tty_insert_flip_string_and_push_buffer-i.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drop tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip-kpatch.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-22998, CVSSv2 Score: 5.5
- Description:
drm/virtio: Fix error code in virtio_gpu_object_shmem_init()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-22998
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-22998-drm-virtio-Fix-NULL-vs-IS_ERR-checking-in-virtio_gpu_object_shmem_init-pre-425.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-22998, CVSSv2 Score: 5.5
- Description:
drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-22998
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-22998-fix-build-options.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-32233
- Patch: rhel8/4.18.0-477.13.1.el8_8/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase-348.patch
- From: 4.18.0-477.13.1.el8_8
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28466
- Patch: rhel8/4.18.0-477.15.1.el8_8/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf.patch
- From: 4.18.0-477.15.1.el8_8
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-1281, CVSSv2 Score: 7.8
- Description:
net/sched: tcindex: update imperfect hash filters
- CVE: https://access.redhat.com/security/cve/CVE-2023-1281
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-resp.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-1829, CVSSv2 Score:
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://access.redhat.com/security/cve/CVE-2023-2124
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2194
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-2235, CVSSv2 Score: 7.8
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2235
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-4004, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://access.redhat.com/security/cve/CVE-2023-4004
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://access.redhat.com/security/cve/CVE-2023-3390
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-3090
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://access.redhat.com/security/cve/CVE-2023-35788
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35788-net-sched-flower-fix-possible-oob-write-in-fl-set-geneve-opt.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-20593-zenbleed.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://access.redhat.com/security/cve/CVE-2023-35001
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2002
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-44466, CVSSv2 Score: 8.8
- Description:
libceph: harden msgr2.1 frame segment length checks
- CVE: https://access.redhat.com/security/cve/CVE-2023-44466
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-44466-libceph-harden-msgr2.1-frame-segment-length-checks.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1118
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1118-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1989, CVSSv2 Score: 7.0
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-1989
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1989-Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_remove.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-3141
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
kernel/relay.c: fix read_pos error when multiple readers
- CVE: https://access.redhat.com/security/cve/CVE-2023-3268
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3268-kernel-relay.c-fix-read_pos-error-when-multiple-readers.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-3609
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3609-net-sched-cls-u32-fix-reference-counter-leak-leading-to-overflow-pre425.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://access.redhat.com/security/cve/CVE-2023-3611
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3611-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4128 CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_route-No-longer-copy-tcf_result-on-update.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4128 CVE-2023-4207, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_fw-No-longer-copy-tcf_result-on-update.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4128 CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-4128
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_u32-No-longer-copy-tcf_result-on-update.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-31436, CVSSv2 Score: 7.0
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://access.redhat.com/security/cve/CVE-2023-31436
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-35823, CVSSv2 Score: 7.0
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-35823
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-35824, CVSSv2 Score: 7.0
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-35824
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2021-43975, CVSSv2 Score: 6.7
- Description:
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
- CVE: https://access.redhat.com/security/cve/CVE-2021-43975
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2021-43975-atlantic-fix-oob-read-and-write-in-hw-atl-utils-fw-rpc-wait.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
- CVE: https://access.redhat.com/security/cve/CVE-2023-2513
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-add-EXT4_INODE_HAS_XATTR_SPACE-macro-in-xattr.h.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: fix use-after-free in ext4_xattr_set_entry
- CVE: https://access.redhat.com/security/cve/CVE-2023-2513
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-fix-use-after-free-in-ext4-xattr-set-entry.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-28772, CVSSv2 Score: 6.7
- Description:
seq_buf: Fix overflow in seq_buf_putmem_hex()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28772
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28772-seq-buf-fix-overflow-in-seq-buf-putmem-hex.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: betop: check shape of output reports
- CVE: https://access.redhat.com/security/cve/CVE-2023-1073
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1073-hid-betop-check-shape-of-output-reports-348.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2022-42895, CVSSv2 Score: 6.7
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-42895-bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-30456, CVSSv2 Score: 6.0
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://access.redhat.com/security/cve/CVE-2023-30456
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-30456-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-33203
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-33203-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to-race.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-1855, CVSSv2 Score: 6.3
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-1855
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://access.redhat.com/security/cve/CVE-2023-3161
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-3640, CVSSv2 Score: 5.5
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3640
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-28388, CVSSv2 Score: 5.5
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28388
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfree_skb.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://access.redhat.com/security/cve/CVE-2023-1074
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://access.redhat.com/security/cve/cve-2023-3772
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1252, CVSSv2 Score: 7.0
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1252, CVSSv2 Score: 7.0
- Description:
ovl: fix use after free in struct ovl_aio_req
- CVE: https://access.redhat.com/security/cve/CVE-2023-1252
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-kpatch.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-38457 CVE-2022-40133, CVSSv2 Score: 6.3
- Description:
drm/vmwgfx: Remove rcu locks from user resources
- CVE: https://access.redhat.com/security/cve/CVE-2022-40133
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-drm-vmwgfx-Remove-rcu-locks-from-user-resources-pre-425.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-38457 CVE-2022-40133, CVSSv2 Score: 6.3
- Description:
drm/vmwgfx: Remove rcu locks from user resources
- CVE: https://access.redhat.com/security/cve/CVE-2022-40133
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-drm-vmwgfx-Remove-rcu-locks-from-user-resources-post-240-fix.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-1-HID-asus-Remove-check-for-same-LED-brightness-on-set.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://access.redhat.com/security/cve/CVE-2023-1079
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://access.redhat.com/security/cve/CVE-2022-31084
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31084-media-dvb-core-Fix-kernel-WARNING-for-blocking-opera.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2022-4744, CVSSv2 Score:
- Description:
Not possible to trigger in rhel8
- CVE:
- Patch: skipped/CVE-2022-4744.patch
- From:
- CVE-2023-28328, CVSSv2 Score: 5.5
- Description:
media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28328
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28328-media-dvb-usb-az6027-fix-null-ptr-deref-in-az6027_i2.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2022-3594, CVSSv2 Score: 5.3
- Description:
r8152: Rate limit overflow messages
- CVE: https://access.redhat.com/security/cve/CVE-2022-3594
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-0458, CVSSv2 Score: 4.7
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://access.redhat.com/security/cve/CVE-2023-0458
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0458-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2022-45887, CVSSv2 Score: 4.7
- Description:
media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3594
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-45887-patch-media-ttusb-dec-fix-memory-leak-in-ttusb-dec-exit-dvb.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://access.redhat.com/security/cve/CVE-2023-26545
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-4155, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4155-kvm-sev-only-access-ghcb-fields-once-pre-372.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb
- CVE: https://access.redhat.com/security/cve/CVE-2023-4132
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-use-after-free-bugs-caused-by-do-submit-urb.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb
- CVE: https://access.redhat.com/security/cve/CVE-2023-4132
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-warning-due-to-null-work-func-t-function.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-0590, CVSSv2 Score: 4.7
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://access.redhat.com/security/cve/CVE-2023-0590
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc-graft-pre-425.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://access.redhat.com/security/cve/CVE-2023-3212
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3212-gfs2-don-t-deref-jdesc-in-evict-pre-477.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-1382, CVSSv2 Score: 5.5
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1382
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-fix-an-information-leak-in-tipc_topsrv_kern_subscr.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1382, CVSSv2 Score: 5.5
- Description:
tipc: set con sock in tipc_conn_alloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1382
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-set-con-sock-in-tipc_conn_alloc.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1382, CVSSv2 Score: 5.5
- Description:
tipc: add an extra conn_get in tipc_conn_alloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1382
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-add-an-extra-conn_get-in-tipc_conn_alloc.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4732, CVSSv2 Score: 4.7
- Description:
mm: thp: fix wrong cache flush in remove_migration_pmd()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4732
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-1-mm-thp-fix-wrong-cache-flush-in-remove_migration_pmd.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4732, CVSSv2 Score: 4.7
- Description:
mm/thp: simplify copying of huge zero page pmd when fork
- CVE: https://access.redhat.com/security/cve/CVE-2023-4732
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-2-mm-thp-simplify-copying-of-huge-zero-page-pmd-when-f.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-4732, CVSSv2 Score: 4.7
- Description:
mm/userfaultfd: fix uffd-wp special cases for
- CVE: https://access.redhat.com/security/cve/CVE-2023-4732
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-mm-userfaultfd-fix-uffd-wp-special-cases-for-fork-pre-477.21.1.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2023-2163, CVSSv2 Score: 8.2
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision taints
- CVE: https://access.redhat.com/security/cve/CVE-2023-2163
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-2163-bpf-fix-incorrect-verifier-pruning-due-to-missing-register-precision.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-3812, CVSSv2 Score: 7.8
- Description:
net: tun: fix bugs for oversize packet when napi frags enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-3812
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-1192, CVSSv2 Score: 6.5
- Description:
cifs: Fix UAF in cifs_demultiplex_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1192
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-1192-cifs-Fix-UAF-in-cifs_demultiplex_thread.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://access.redhat.com/security/cve/CVE-2023-5178
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: remove double-unlock
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7808-media-dvbdev-remove-double-unlock.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: Fix memleak in dvb_register_device
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7810-media-dvbdev-Fix-memleak-in-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: fix error logic at dvb_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7811-media-dvbdev-fix-error-logic-at-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: adopts refcnt to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-media-dvbdev-adopts-refcnt-to-avoid-UAF.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: fix refcnt bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7813-media-dvbdev-fix-refcnt-bug.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvbdev: adopts refcnt to avoid UAF (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race at dvb_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-media-dvb-core-Fix-use-after-free-due-to-race-at-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race at dvb_register_device() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886, CVSSv2 Score: 7.0
- Description:
media: dvb_net: avoid speculation from net slot
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7817-media-dvb_net-avoid-speculation-from-net-slot.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due on race condition at dvb_net
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-media-dvb-core-Fix-UAF-due-to-race-condition-at-dvb_net.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due on race condition at dvb_net (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb_ca_en50221: off by one in dvb_ca_en50221_io_do_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7819-media-dvb_ca_en50221-off-by-one-in-dvb_ca_en50221_io_do_ioctl.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb_ca_en50221: avoid speculation from CA slot
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7821-media-dvb_ca_en50221-avoid-speculation-from-CA-slot.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb_ca_en50221: fix a size write bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7822-media-dvb_ca_en50221-fix-a-size-write-bug.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-media-dvb-core-Fix-use-after-free-due-to-race-condition-at-dvb_ca_en50221.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919, CVSSv2 Score: 7.0
- Description:
media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-2162, CVSSv2 Score: 6.6
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://access.redhat.com/security/cve/CVE-2023-2162
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-t-1.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-42753, CVSSv2 Score: 7.0
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-42753
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-4622, CVSSv2 Score: 6.6
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://access.redhat.com/security/cve/CVE-2023-4622
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2022-36402, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix shader stage validation
- CVE: https://access.redhat.com/security/cve/CVE-2022-36402
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2022-36402-drm-vmwgfx-Fix-shader-stage-validation-1.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://access.redhat.com/security/cve/CVE-2023-4623
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch-hfsc-Ensure-inner-classes-have-fsc-curve.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
- CVE: https://access.redhat.com/security/cve/CVE-2023-4623
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch_hfsc-upgrade-rt-to-sc-when-it-becomes-.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch-348.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4921
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq-dequeue.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-4921
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2022-3545, CVSSv2 Score: 7.8
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-3545-nfp-fix-use-after-free-in-area-cache-get.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2022-41858, CVSSv2 Score: 7.1
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-41858-7989-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-1838, CVSSv2 Score: 7.1
- Description:
Fix double fget() in vhost_net_set_backend()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1838
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1838-7974-Fix-double-fget-in-vhost_net_set_backend.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://access.redhat.com/security/cve/CVE-2023-1073
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1073-8006-HID-check-empty-report_list-in-hid_validate_values.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6606
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6606-8022-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6610, CVSSv2 Score: 7.1
- Description:
smb: client: fix potential OOB in cifs_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8023-smb-client-fix-potential-OOB-in-cifs_dump_detail.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6610, CVSSv2 Score: 7.1
- Description:
smb: client: fix potential OOB in smb2_dump_detail()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6610
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8024-smb-client-fix-potential-OOB-in-smb2_dump_detail.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev-es: Fix SEV-ES OUT/IN immediate opcode vc handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7993-x86-sev-es-Fix-SEV-ES-OUT-IN-immediate-opcode-vc-han-pre372.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7994-x86-sev-Disable-MMIO-emulation-from-user-mode-pre372.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7995-x86-sev-Check-IOBM-for-IOIO-exceptions-from-user-spa-pre372.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://access.redhat.com/security/cve/CVE-2023-46813
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7996-x86-sev-Check-for-user-space-IOIO-pointing-to-kernel-pre372.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6535, CVSSv2 Score: 7.5
- Description:
Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8030-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva-pre372.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6536, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6536
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6536-8031-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6356, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: remove boilerplate code
- CVE: https://access.redhat.com/security/cve/CVE-2023-6356
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6356-CVE-2023-6535-CVE-2023-6536-8032-nvmet-tcp-remove-boilerplate-code-pre513.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6535, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://access.redhat.com/security/cve/CVE-2023-6535
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8033-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation-pre513.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7991-perf-Disallow-mis-matched-inherited-group-reads.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf/core: Fix potential NULL deref
- CVE: https://access.redhat.com/security/cve/CVE-2023-5717
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7992-perf-core-Fix-potential-NULL-deref.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-6817, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: skip inactive elements during set walk
- CVE: https://access.redhat.com/security/cve/CVE-2023-6817
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6817-8019-netfilter-nft_set_pipapo-skip-inactive-elements-duri.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-40283
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-40283-7990-Bluetooth-L2CAP-Fix-use-after-free-in-l2cap_sock_rea-348.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://access.redhat.com/security/cve/CVE-2024-0646
- Patch: rhel8/4.18.0-513.18.1.el8_9/CVE-2024-0646-8028-net-tls-update-curr-on-splice-as-well.patch
- From: 4.18.0-513.18.1.el8_9
- CVE-2024-0565, CVSSv2 Score: 7.4
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0565
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-0565-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://access.redhat.com/security/cve/CVE-2023-6931
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-51042, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix potential fence use-after-free v2
- CVE: https://access.redhat.com/security/cve/CVE-2023-51042
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-51042-drm-amdgpu-Fix-potential-fence-use-after-free-v2.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2021-33631, CVSSv2 Score: 7.3
- Description:
ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
- CVE: https://access.redhat.com/security/cve/CVE-2021-33631
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2021-33631-ext4-fix-kernel-BUG-in-ext4_write_inline_data_end.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-6546, CVSSv2 Score: 7.0
- Description:
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
- CVE: https://access.redhat.com/security/cve/CVE-2023-6546
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6546-tty-n_gsm-fix-the-UAF-caused-by-race-condition-in-gsm_cleanup_mux.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://access.redhat.com/security/cve/CVE-2024-1086
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2022-38096, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://access.redhat.com/security/cve/CVE-2022-38096
- Patch: rhel8/4.18.0-513.24.1.el8_9/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts-348.patch
- From: 4.18.0-513.24.1.el8_9
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://access.redhat.com/security/cve/CVE-2023-6176
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6176-net-tls-do-not-free-tls_rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://access.redhat.com/security/cve/CVE-2023-6932
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 4.18.0-553.el8_10
- CVE-2023-28464, CVSSv2 Score: 7.8
- Description:
Bluetooth: Fix double free in hci_conn_cleanup
- CVE: https://access.redhat.com/security/cve/CVE-2023-28464
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanup.patch
- From: 4.18.0-553.el8_10
- CVE-2024-0841, CVSSv2 Score: 6.6
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
- CVE: https://access.redhat.com/security/cve/CVE-2024-0841
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6915, CVSSv2 Score: 6.2
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://access.redhat.com/security/cve/CVE-2023-6915
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39198, CVSSv2 Score: 7.5
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://access.redhat.com/security/cve/CVE-2023-39198
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation-348.patch
- From: 4.18.0-553.el8_10
- CVE-2024-25742 CVE-2024-25743, CVSSv2 Score: 7.1
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://access.redhat.com/security/cve/CVE-2024-25743
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-25742-CVE-2024-25743-3942-x86-sev-Harden-VC-instruction-emulation-somewhat-348.patch
- From: 4.18.0-553.el8_10
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51779-2946-Bluetooth-af_bluetooth-Fix-Use-After-Free-in-bt_sock-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://access.redhat.com/security/cve/CVE-2023-24023
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-24023-3694-Bluetooth-Add-more-enc-key-size-check-348.patch
- From: 4.18.0-553.el8_10
- CVE-2019-13631, CVSSv2 Score: 5.3
- Description:
Input: gtco - bounds check collection indent level
- CVE: https://access.redhat.com/security/cve/CVE-2019-13631
- Patch: rhel8/4.18.0-553.el8_10/CVE-2019-13631-0684-Input-gtco-bounds-check-collection-indent-level.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52581, CVSSv2 Score:
- Description:
The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
- CVE:
- Patch: skipped/CVE-2023-52581.patch
- From:
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39189
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://access.redhat.com/security/cve/CVE-2023-39193
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 4.18.0-553.el8_10
- CVE-2023-4133, CVSSv2 Score:
- Description:
Complex adaptation required to add timer_shutdown_sync() in timers subsystem.
- CVE:
- Patch: skipped/CVE-2023-4133.patch
- From:
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: Fix error paths in set_con2fb_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-fix-error-paths-in-set-con2fb-map-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-38409, CVSSv2 Score: 5.5
- Description:
fbcon: set_con2fb_map needs to set con2fb_map!
- CVE: https://access.redhat.com/security/cve/CVE-2023-38409
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-set-con2fb-map-needs-to-set-con2fb-map-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-42755, CVSSv2 Score: 6.5
- Description:
net/sched: cls_rsvp: always try to match inside the linear part of skb
- CVE: https://access.redhat.com/security/cve/CVE-2023-42755
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-42755-net-sched-cls-rsvp-always-try-to-match-inside-the-linear-part-of-skb-477.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Remove docstring reference to kset
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-remove-docstring-reference-to-kset.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: modify kobject_get_path() to take a const
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const-348.patch
- From: 4.18.0-553.el8_10
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://access.redhat.com/security/cve/CVE-2023-45863
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
net: add a route cache full diagnostic message
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-add-a-route-cache-full-diagnostic-message.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
net/dst: use a smaller percpu_counter batch for dst entries accounting
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-dst-use-a-smaller-percpu-counter-batch-for-dst-entries-accounting.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-max-size-check-inline-with-ipv4-372.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: Remove extra counter pull before gc
- CVE: https://access.redhat.com/security/cve/CVE-2023-52340
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-extra-counter-pull-before-gc-372.patch
- From: 4.18.0-553.el8_10
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of
- CVE: https://access.redhat.com/security/cve/CVE-2019-15505
- Patch: rhel8/4.18.0-553.el8_10/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of.patch
- From: 4.18.0-553.el8_10
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://access.redhat.com/security/cve/CVE-2023-25775
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-25775-rdma-irdma-prevent-zero-length-stag-registration-348.patch
- From: 4.18.0-553.el8_10
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2023-51780
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51780-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
- From: 4.18.0-553.el8_10
- CVE-2022-3565, CVSSv2 Score: 7.8
- Description:
mISDN: fix use-after-free bugs in l1oip timer
- CVE: https://access.redhat.com/security/cve/CVE-2022-3565
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer.patch
- From: 4.18.0-553.el8_10
- CVE-2022-3565, CVSSv2 Score: 7.8
- Description:
verify struct l1oip layout
- CVE: https://access.redhat.com/security/cve/CVE-2022-3565
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer-kpatch.patch
- From: 4.18.0-553.el8_10
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
- From: 4.18.0-553.el8_10
- CVE-2022-0500, CVSSv2 Score:
- Description:
Complex adaptation required. Requires changes a lot of constants
- CVE:
- Patch: skipped/CVE-2022-0500.patch
- From:
- CVE-2022-23222, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-23222.patch
- From:
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52574, CVSSv2 Score: 4.4
- Description:
team: fix null-ptr-deref when team device type is changed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52574
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
- From: 4.18.0-553.el8_10
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
- From: 4.18.0-553.el8_10
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://access.redhat.com/security/cve/CVE-2023-3567
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52448, CVSSv2 Score: 4.7
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 4.18.0-553.el8_10
- CVE-2024-26602, CVSSv2 Score: 4.7
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://access.redhat.com/security/cve/CVE-2024-26602
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 4.18.0-553.el8_10
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://access.redhat.com/security/cve/CVE-2023-42754
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52489, CVSSv2 Score:
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2024-26609, CVSSv2 Score:
- Description:
CVE has been marked as REJECTED on the NVD website.
- CVE:
- Patch: skipped/CVE-2024-26609.patch
- From:
- CVE-2023-52580, CVSSv2 Score: 5.5
- Description:
net/core: Fix ETH_P_1588 flow dissector
- CVE: https://access.redhat.com/security/cve/CVE-2023-52580
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52580-net-core-Fix-ETH_P_1588-flow-dissector.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52620, CVSSv2 Score: 2.5
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://access.redhat.com/security/cve/CVE-2023-52620
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52620-netfilter-nf_tables-disallow-timeout-for-anonymous-s.patch
- From: 4.18.0-553.el8_10
- CVE-2024-26671, CVSSv2 Score: 4.4
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://access.redhat.com/security/cve/CVE-2024-26671
- Patch: rhel8/4.18.0-553.el8_10/CVE-2024-26671-blk-mq-fix-IO-hang-from-sbitmap-wakeup-race.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: 4.18.0-553.el8_10
- CVE-2021-3753, CVSSv2 Score: 4.7
- Description:
vt_kdsetmode: extend console locking
- CVE: https://access.redhat.com/security/cve/CVE-2021-3753
- Patch: rhel8/4.18.0-553.el8_10/CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
- From: 4.18.0-553.el8_10
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
- CVE: https://access.redhat.com/security/cve/CVE-2023-31083
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-31083-Bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag.patch
- From: 4.18.0-553.el8_10
- CVE-2023-37453, CVSSv2 Score:
- Description:
Introduced in the v4.18.0-513.5.1.el8 by 45bf39f8df7f
- CVE:
- Patch: skipped/CVE-2023-37453.patch
- From:
- CVE-2023-39194, CVSSv2 Score: 3.2
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://access.redhat.com/security/cve/CVE-2023-39194
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
- From: 4.18.0-553.el8_10
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://access.redhat.com/security/cve/CVE-2023-6121
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-6121-nvmet-nul-terminate-the-NQNs-passed-in-the-connect-c-348.patch
- From: 4.18.0-553.el8_10
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it to userspace
- CVE: https://access.redhat.com/security/cve/CVE-2023-1513
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-be.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://access.redhat.com/security/cve/CVE-2023-39192
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39192-netfilter-xt_u32-validate-user-space-input.patch
- From: 4.18.0-553.el8_10
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://access.redhat.com/security/cve/CVE-2023-39192
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-39192-netfilter-xt_u32-validate-user-space-input-kpatch-348.patch
- From: 4.18.0-553.el8_10
- CVE-2021-47153, CVSSv2 Score: 6.0
- Description:
i2c: i801: Don't generate an interrupt on bus reset
- CVE: https://access.redhat.com/security/cve/CVE-2021-47153
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47153-i2c-i801-don-t-generate-an-interrupt-on-bus-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2020-36777, CVSSv2 Score: 5.5
- Description:
media: dvbdev: Fix memory leak in dvb_media_device_free()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36777
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2020-36777-media-dvbdev-fix-memory-leak-in-dvb_media_device_free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171, CVSSv2 Score: 5.5
- Description:
net: usb: fix memory leak in smsc75xx_bind
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-memory-leak-in-smsc75xx-bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47171, CVSSv2 Score: 5.5
- Description:
net: usb: fix possible use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47171
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-possible-use-after-free-in-smsc75xx_bind.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - default implementations for request callbacks
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-default-implementations-for-request-callbacks.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: testmgr - split akcipher tests by a key type
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-testmgr-split-akcipher-tests-by-a-key-type.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-6240, CVSSv2 Score: 6.5
- Description:
crypto: akcipher - Disable signing and decryption
- CVE: https://access.redhat.com/security/cve/CVE-2023-6240
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-disable-signing-and-decryption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26610, CVSSv2 Score: 6.1
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://access.redhat.com/security/cve/CVE-2024-26610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52610, CVSSv2 Score: 6.4
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags-348.12.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52598, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52598.patch
- From:
- CVE-2022-48669, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2022-48669.patch
- From:
- CVE-2023-52607, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52607.patch
- From:
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26593, CVSSv2 Score: 7.1
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://access.redhat.com/security/cve/CVE-2024-26593
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2019-25162, CVSSv2 Score: 7.8
- Description:
i2c: Fix a potential use after free
- CVE: https://access.redhat.com/security/cve/CVE-2019-25162
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2019-25162-i2c-fix-a-potential-use-after-free.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52445, CVSSv2 Score: 7.8
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://access.redhat.com/security/cve/CVE-2023-52445
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-23307, CVSSv2 Score: 7.8
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://access.redhat.com/security/cve/CVE-2024-23307
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-23307-md-raid5-fix-atomicity-violation-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52606, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52606.patch
- From:
- CVE-2024-25744, CVSSv2 Score:
- Description:
This CVE modifies the functions which won't be available or doesn't make sense to patch as they are used during bootup time or init. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2024-25744.patch
- From:
- CVE-2021-47185, CVSSv2 Score: 4.4
- Description:
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
- CVE: https://access.redhat.com/security/cve/CVE-2021-47185
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47185-tty-tty_buffer-Fix-the-softlockup-issue-in-flush_to_.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2022-48627, CVSSv2 Score: 4.4
- Description:
vt: fix memory overlapping when deleting chars in the buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-48627
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in-the.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52477, CVSSv2 Score: 4.4
- Description:
usb: hub: Guard against accesses to uninitialized BOS descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2023-52477
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52477-usb-hub-Guard-against-accesses-to-uninitialized-BOS-348.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52513, CVSSv2 Score: 4.4
- Description:
RDMA/siw: Fix connection failure handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52513
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52513-RDMA-siw-Fix-connection-failure-handling-372.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52528, CVSSv2 Score: 4.4
- Description:
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
- CVE: https://access.redhat.com/security/cve/CVE-2023-52528
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52528-net-usb-smsc75xx-Fix-uninit-value-access-in-__smsc75.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52594, CVSSv2 Score: 4.4
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52595, CVSSv2 Score: 4.4
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26872, CVSSv2 Score: 4.4
- Description:
RDMA/srpt: Do not register event handler until srpt device is fully setup
- CVE: https://access.redhat.com/security/cve/CVE-2024-26872
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26872-RDMA-srpt-Do-not-register-event-handler-until-srpt-d.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26892, CVSSv2 Score: 4.4
- Description:
wifi: mt76: mt7921e: fix use-after-free in free_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26892
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26892-wifi-mt76-mt7921e-fix-use-after-free-in-free_irq-348.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52565, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2023-52565.patch
- From:
- CVE-2021-47055, CVSSv2 Score: N/A
- Description:
mtd: properly check all write ioctls for permissions
- CVE: https://access.redhat.com/security/cve/CVE-2021-47055
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-properly-check-all-write-ioctls-for-permissions.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47055, CVSSv2 Score: N/A
- Description:
mtd: require write permissions for locking and badblock ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2021-47055
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-require-write-permissions-for-locking-and-badblo.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26897, CVSSv2 Score:
- Description:
WiFi - Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-27052, CVSSv2 Score: 5.5
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
- CVE: https://access.redhat.com/security/cve/CVE-2024-27052
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26743, CVSSv2 Score: 5.5
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26743
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26779, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: fix race condition on enabling
- CVE: https://access.redhat.com/security/cve/CVE-2024-26779
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-425.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26901, CVSSv2 Score: 5.5
- Description:
do_sys_name_to_handle(): use kzalloc() to fix
- CVE: https://access.redhat.com/security/cve/CVE-2024-26901
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26919, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2024-26919.patch
- From:
- CVE-2024-26933, CVSSv2 Score: 5.5
- Description:
USB: core: Add hub_get() and hub_put() routines
- CVE: https://access.redhat.com/security/cve/CVE-2024-26933
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4056-USB-core-Add-hub_get-and-hub_put-routines.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26934, CVSSv2 Score: 5.5
- Description:
USB: core: Fix deadlock in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26934
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26934-usb-core-fix-deadlock-in-4.18.0-477.27.1.el8_8.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26964, CVSSv2 Score: 5.5
- Description:
USB: core: Add hub_get() and hub_put() routines
- CVE: https://access.redhat.com/security/cve/CVE-2024-26964
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26964-4060-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26973, CVSSv2 Score: 5.5
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://access.redhat.com/security/cve/CVE-2024-26973
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26993, CVSSv2 Score: 5.5
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://access.redhat.com/security/cve/CVE-2024-0340
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-mem.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26615, CVSSv2 Score: 5.5
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dum
- CVE: https://access.redhat.com/security/cve/CVE-2024-26615
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26615-net-smc-fix-illegal-rmb_desc-access-in-SMC-D-connect-372.32.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26642, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26643, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable (Netfilter).
- CVE:
- Patch: skipped/CVE-2024-26643.patch
- From:
- CVE-2024-26664, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable.
- CVE:
- Patch: skipped/CVE-2024-26664.patch
- From:
- CVE-2024-26693, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable (WiFi).
- CVE:
- Patch: skipped/CVE-2024-26693.patch
- From:
- CVE-2024-26694, CVSSv2 Score:
- Description:
The given kernel version isn't vulnerable (WiFi).
- CVE:
- Patch: skipped/CVE-2024-26694.patch
- From:
- CVE-2024-27059, CVSSv2 Score: 5.5
- Description:
USB: usb-storage: Prevent divide-by-0 error in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27059
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47013, CVSSv2 Score: 5.1
- Description:
net:emac/emac-mac: Fix a use after free in
- CVE: https://access.redhat.com/security/cve/CVE-2021-47013
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47013-net-emac-emac-mac-fix-a-use-after-free-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-46934, CVSSv2 Score: 4.4
- Description:
i2c: validate user data in compat ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-46934
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-46934-i2c-validate-user-data-in-compat-ioctl.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a-348.23.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: handle isoc Babble and Buffer Overrun events
- CVE: https://access.redhat.com/security/cve/CVE-2024-26659
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-handle-isoc-babble-and-buffer-overrun-events.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27014, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-193.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27014, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Prevent deadlock while disabling aRFS
- CVE: https://access.redhat.com/security/cve/CVE-2024-27014
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-304-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27056, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: protect TXQ list manipulation
- CVE: https://access.redhat.com/security/cve/CVE-2024-27056
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27056-0001-adapt-protect-TXQ-list-manipulation-upto-372.32.1.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-27056, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: ensure offloading TID queue exists
- CVE: https://access.redhat.com/security/cve/CVE-2024-27056
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27056-0002-adapt-ensure-offloading-TID-queue-exists-upto-477.10.1.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47118, CVSSv2 Score:
- Description:
No sense in patching an early boot function; inventing a runtime-wise patch is not impossible but isn't worth the effort for 4.4 score CVE
- CVE:
- Patch: skipped/CVE-2021-47118.patch
- From:
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0001-net-add-atomic_long_t-to-net_device_stats-fields.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0002-net-bridge-use-DEV_STATS_INC.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: Fix unwanted sign extension in netdev_stats_to_stats64()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0003-net-Fix-unwanted-sign-extension-in-netdev_stats_to_s.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52578, CVSSv2 Score: 4.7
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0004-net-add-atomic_long_t-to-net_device_stats-fields-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26744, CVSSv2 Score: 5.5
- Description:
RDMA/srpt: Support specifying the srpt_service_guid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26744
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52669, CVSSv2 Score:
- Description:
CVE patch is for s390 arch only
- CVE:
- Patch: skipped/CVE-2023-52669.patch
- From:
- CVE-2023-52675, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52675.patch
- From:
- CVE-2023-52686, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52686.patch
- From:
- CVE-2023-52703, CVSSv2 Score: 3.3
- Description:
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
- CVE: https://access.redhat.com/security/cve/CVE-2023-52703
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52703-net-usb-kalmia-Don-t-pass-act_len-in-usb_bulk_msg-error-path.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52813, CVSSv2 Score: 5.5
- Description:
crypto: pcrypt - Fix hungtask for PADATA_RESET
- CVE: https://access.redhat.com/security/cve/CVE-2023-52813
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52813-crypto-pcrypt-Fix-hungtask-for-PADATA_RESET.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52700, CVSSv2 Score: 5.5
- Description:
tipc: fix kernel warning when sending SYN message
- CVE: https://access.redhat.com/security/cve/CVE-2023-52700
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52700-tipc-fix-kernel-warning-when-sending-SYN-message.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52835, CVSSv2 Score: 5.5
- Description:
perf/core: Bail out early if the request AUX area is out of bound
- CVE: https://access.redhat.com/security/cve/CVE-2023-52835
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52835-perf-core-Bail-out-early-if-the-request-AUX-area-is-out-of-bound-305.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52781, CVSSv2 Score: 4.4
- Description:
usb: config: fix iteration issue in 'usb_get_bos_descriptor()'
- CVE: https://access.redhat.com/security/cve/CVE-2023-52781
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52781-usb-config-fix-iteration-issue-in-usb_get_bos_descriptor-477.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52877, CVSSv2 Score: 4.4
- Description:
usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52877
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52877-usb-typec-tcpm-Fix-NULL-pointer-dereference-in-tcpm_pd_svdm-348.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52878, CVSSv2 Score: 4.4
- Description:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-52878
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52878-can-dev-can_put_echo_skb-don-t-crash-kernel-if-can_priv-echo_skb-is-accessed-out-of-bounds.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52464, CVSSv2 Score: 2.9
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://access.redhat.com/security/cve/CVE-2023-52464
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52464-EDAC_thunderx-Fix-possible-out-of-bounds-string-access.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26907, CVSSv2 Score: 6.7
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://access.redhat.com/security/cve/CVE-2024-26907
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26907-RDMA_mlx5-Fix-fortify-source-warning-while-accessing-Eth-segment-372.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27397, CVSSv2 Score:
- Description:
netfilter: Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-27397.patch
- From:
- CVE-2023-52560, CVSSv2 Score:
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2023-52560.patch
- From:
- CVE-2024-35959, CVSSv2 Score:
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-35959.patch
- From:
- CVE-2021-47073, CVSSv2 Score: 2.3
- Description:
platform/x86: dell-smbios-wmi: Fix oops on rmmod
- CVE: https://access.redhat.com/security/cve/CVE-2021-47073
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47073-platform-x86-dell-smbios-wmi-fix-oops-on-rmmod.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35960, CVSSv2 Score: 5.5
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36004, CVSSv2 Score: 5.5
- Description:
i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
- CVE: https://access.redhat.com/security/cve/CVE-2024-36004
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36004-i40e-do-not-use-wq-mem-reclaim-flag-for-workqueue.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35958, CVSSv2 Score: 5.5
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26583 CVE-2024-26584 CVE-2024-26585, CVSSv2 Score: 5.1
- Description:
tls: disable async encrypt/decrypt
- CVE: https://access.redhat.com/security/cve/CVE-2024-26585
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26583-tls-disable-async-encrypt-decrypt.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26859, CVSSv2 Score: 4.1
- Description:
net/bnx2x: Prevent access to a freed page in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26859
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26859-net-bnx2x-prevent-access-to-a-freed-page-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: Reject connection with the device which
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-reject-connection-with-the-device-which-upto-513.24.1.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Fix coding style
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: avoid memcmp() out of bounds warning
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555, CVSSv2 Score: 5.4
- Description:
Bluetooth: hci_event: Fix using memcmp when
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52615, CVSSv2 Score: 4.4
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36007, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix warning during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-36007
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36007-mlxsw-spectrum-acl-tcam-fix-warning-during-rehash.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069, CVSSv2 Score: 5.5
- Description:
ipc/mqueue.c: remove duplicated code
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-remove-duplicated-code.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069, CVSSv2 Score: 5.5
- Description:
ipc/mqueue.c: update/document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-update-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069, CVSSv2 Score: 5.5
- Description:
ipc/msg.c: update and document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-msg-c-update-and-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069, CVSSv2 Score: 5.5
- Description:
ipc/sem.c: document and update memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-sem-c-document-and-update-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069, CVSSv2 Score: 5.5
- Description:
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-msg-sem-avoid-relying-on-a-stack.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47236, CVSSv2 Score: 5.5
- Description:
net: cdc_eem: fix tx fixup skb leak
- CVE: https://access.redhat.com/security/cve/CVE-2021-47236
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47236-net-cdc-eem-fix-tx-fixup-skb-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47353, CVSSv2 Score: 5.5
- Description:
udf: Fix NULL pointer dereference in udf_symlink function
- CVE: https://access.redhat.com/security/cve/CVE-2021-47353
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47353-udf-fix-null-pointer-dereference-in-udf-symlink.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47311, CVSSv2 Score: 5.5
- Description:
net: qcom/emac: fix UAF in emac_remove
- CVE: https://access.redhat.com/security/cve/CVE-2021-47311
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47311-net-qcom-emac-fix-uaf-in-emac-remove.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47310, CVSSv2 Score: 5.5
- Description:
net: ti: fix UAF in tlan_remove_one
- CVE: https://access.redhat.com/security/cve/CVE-2021-47310
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47310-net-ti-fix-uaf-in-tlan-remove-one.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356, CVSSv2 Score: 6.7
- Description:
mISDN: fix possible use-after-free in HFC_cleanup()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-fix-possible-use-after-free-in-hfc-cleanup.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356, CVSSv2 Score: 6.7
- Description:
mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-hfcpci-fix-use-after-free-bug-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47456, CVSSv2 Score: 5.5
- Description:
can: peak_pci: peak_pci_remove(): fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2021-47456
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47456-can-peak-pci-peak-pci-remove-fix-uaf.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-46972, CVSSv2 Score: 5.5
- Description:
ovl: fix leaked dentry
- CVE: https://access.redhat.com/security/cve/CVE-2021-46972
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-46972-ovl-fix-leaked-dentry.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47495, CVSSv2 Score: 5.5
- Description:
usbnet: sanity check for maxpacket
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-sanity-check-for-maxpacket-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47495, CVSSv2 Score: 5.5
- Description:
usbnet: fix error return code in usbnet_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-fix-error-return-code-in-usbnet-probe-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35835, CVSSv2 Score: 5.5
- Description:
net/mlx5e: fix a double-free in arfs_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2024-35835
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35835-net-mlx5e-fix-a-double-free-in-arfs-create-groups.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35789, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: check/clear fast rx for non-4addr
- CVE: https://access.redhat.com/security/cve/CVE-2024-35789
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35845, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://access.redhat.com/security/cve/CVE-2024-35845
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35838, CVSSv2 Score:
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-35838.patch
- From:
- CVE-2024-35852, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35853, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during
- CVE: https://access.redhat.com/security/cve/CVE-2024-35853
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35854, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix possible
- CVE: https://access.redhat.com/security/cve/CVE-2024-35854
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35854-mlxsw-spectrum-acl-tcam-fix-possible.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35855, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35855
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35855-mlxsw-spectrum_acl_tcam-Fix-possible-use-after-free.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35888, CVSSv2 Score: 5.5
- Description:
erspan: make sure erspan_base_hdr is present in
- CVE: https://access.redhat.com/security/cve/CVE-2024-35888
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35888-erspan-make-sure-erspan-base-hdr-is-present-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35890, CVSSv2 Score: 5.5
- Description:
gro: fix ownership transfer
- CVE: https://access.redhat.com/security/cve/CVE-2024-35890
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-46909, CVSSv2 Score:
- Description:
CVE patch is for arch/arm which is not supported.
- CVE:
- Patch: skipped/CVE-2021-46909.patch
- From:
- CVE-2024-26656, CVSSv2 Score: 4.7
- Description:
drm/amdgpu: fix use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26656
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug-477.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26675, CVSSv2 Score: 5.5
- Description:
ppp_async: limit MRU to 64K
- CVE: https://access.redhat.com/security/cve/CVE-2024-26675
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26735, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix possible use-after-free and
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26801, CVSSv2 Score: 5.5
- Description:
Bluetooth: Avoid potential use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26804, CVSSv2 Score: 5.5
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26906, CVSSv2 Score:
- Description:
x86/mm: Complex adaptation required to prevent BPF abuse.
- CVE:
- Patch: skipped/CVE-2024-26906.patch
- From:
- CVE-2024-26974, CVSSv2 Score: 5.8
- Description:
crypto: qat - resolve race condition during AER
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-4.18.0-513.24.1.el8_9.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26974, CVSSv2 Score: 5.8
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak-513.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26982, CVSSv2 Score: 5.5
- Description:
Squashfs: check the inode number is not the invalid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27410, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: reject iftype change with mesh ID
- CVE: https://access.redhat.com/security/cve/CVE-2024-27410
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-id.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26759, CVSSv2 Score: 5.5
- Description:
swap: fix do_swap_page() race with swapoff
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26759-swap-fix-do-swap-page-race-with-swapoff-425.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52881, CVSSv2 Score: 5.9
- Description:
tcp: do not accept ACK of bytes we never sent
- CVE: https://access.redhat.com/security/cve/CVE-2023-52881
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52881-tcp-do-not-accept-ack-of-bytes-we-never-sent-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26921, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2023-52451, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52451.patch
- From:
- CVE-2023-28746, CVSSv2 Score:
- Description:
RFDS: Medium score vulnerability affecting only Intel Atom CPUs, mitigated via microcode update.
- CVE:
- Patch: skipped/CVE-2023-28746.patch
- From:
- CVE-2023-52469, CVSSv2 Score: 7.8
- Description:
drivers/amd/pm: fix a use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52469
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_powe-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://access.redhat.com/security/cve/CVE-2024-36971
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36971-net-fix-__dst_negative_advice-race-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52530, CVSSv2 Score: 7.1
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-52530
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free-425.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26852, CVSSv2 Score: 7.0
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26852
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26852-net-ipv6-avoid-possible-UAF-in-ip6_route_mpath_notif.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27020, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-27020
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26586, CVSSv2 Score: 7.8
- Description:
mlxsw: spectrum_acl_tcam: Fix stack corruption
- CVE: https://access.redhat.com/security/cve/CVE-2024-26586
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26586-mlxsw-spectrum_acl_tcam-Fix-stack-corruption.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52756, CVSSv2 Score: 5.5
- Description:
pwm: Fix double shift bug
- CVE: https://access.redhat.com/security/cve/CVE-2023-52756
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52756-pwm-fix-double-shift-bug.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52679, CVSSv2 Score: 5.5
- Description:
of: Fix double free in of_parse_phandle_with_args_map
- CVE: https://access.redhat.com/security/cve/CVE-2023-52679
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52679-of-fix-double-free-in-of_parse_phandle_with_args_map.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52730, CVSSv2 Score: 5.5
- Description:
mmc: sdio: fix possible resource leaks in some error paths
- CVE: https://access.redhat.com/security/cve/CVE-2023-52730
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52730-mmc-sdio-fix-possible-resource-leaks-in-some-error-paths.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52784, CVSSv2 Score: 5.5
- Description:
bonding: stop the device in bond_setup_by_slave()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52784
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52784-bonding-stop-the-device-in-bond-setup-by-slave-513.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52775, CVSSv2 Score: 5.5
- Description:
net/smc: avoid data corruption caused by decline
- CVE: https://access.redhat.com/security/cve/CVE-2023-52775
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52775-net-smc-avoid-data-corruption-caused-by-decline.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52764, CVSSv2 Score: 5.5
- Description:
media: gspca: cpia1: shift-out-of-bounds in set_flicker
- CVE: https://access.redhat.com/security/cve/CVE-2023-52764
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52764-media-gspca-cpia1-shift-out-of-bounds-in-set_flicker.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52707, CVSSv2 Score: 5.5
- Description:
wait: add wake_up_pollfree()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52707
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52707-00-wait-add-wake_up_pollfree.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52707, CVSSv2 Score: 5.5
- Description:
sched/psi: Fix use-after-free in ep_remove_wait_queue()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52707
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52707-01-sched-psi-fix-use-after-free-in-ep_remove_wait_queue-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52762, CVSSv2 Score: 5.5
- Description:
virtio-blk: fix implicit overflow on virtio_max_dma_size
- CVE: https://access.redhat.com/security/cve/CVE-2023-52762
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52762-virtio-blk-fix-implicit-overflow-on-virtio_max_dma_size.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-46939, CVSSv2 Score: 5.5
- Description:
tracing: Restructure trace_clock_global() to never
- CVE: https://access.redhat.com/security/cve/CVE-2021-46939
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-46939-tracing-restructure-trace-clock-global-to-never.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-46939, CVSSv2 Score: 5.5
- Description:
tracing: Do no increment trace_clock_global() by
- CVE: https://access.redhat.com/security/cve/CVE-2021-46939
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-46939-tracing-do-no-increment-trace-clock-global-by.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47257, CVSSv2 Score: 5.5
- Description:
net: ieee802154: fix null deref in parse dev addr
- CVE: https://access.redhat.com/security/cve/CVE-2021-47257
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47257-net-ieee802154-fix-null-deref-in-parse-dev-addr.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47284, CVSSv2 Score: 5.5
- Description:
isdn: mISDN: netjet: Fix crash in nj_probe:
- CVE: https://access.redhat.com/security/cve/CVE-2021-47284
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47284-isdn-misdn-netjet-fix-crash-in-nj-probe.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52847, CVSSv2 Score: 5.8
- Description:
media: bttv: fix use after free error due to
- CVE: https://access.redhat.com/security/cve/CVE-2023-52847
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52847-media-bttv-fix-use-after-free-error-due-to.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26843, CVSSv2 Score:
- Description:
EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
- CVE:
- Patch: skipped/CVE-2024-26843.patch
- From:
- CVE-2024-35910, CVSSv2 Score:
- Description:
tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.
- CVE:
- Patch: skipped/CVE-2024-35910.patch
- From:
- CVE-2024-35937, CVSSv2 Score: 5.8
- Description:
wifi: cfg80211: check A-MSDU format more carefully
- CVE: https://access.redhat.com/security/cve/CVE-2024-35937
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35937-wifi-cfg80211-check-a-msdu-format-more-carefully-477.27.1.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47373, CVSSv2 Score: 4.4
- Description:
irqchip/gic-v3-its: Fix potential VPE leak on error
- CVE: https://access.redhat.com/security/cve/CVE-2021-47373
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47373-irqchip-gic-v3-its-Fix-potential-VPE-leak-on-error.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47468, CVSSv2 Score: 4.4
- Description:
isdn: mISDN: Fix sleeping function called from invalid context
- CVE: https://access.redhat.com/security/cve/CVE-2021-47468
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47468-isdn-mISDN-Fix-sleeping-function-called-from-invalid.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47548, CVSSv2 Score: 6.0
- Description:
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47548
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47548-ethernet-hisilicon-hns-hns_dsaf_misc-fix-a-possible-.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47579, CVSSv2 Score: 4.1
- Description:
ovl: fix warning in ovl_create_real()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47579
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47579-ovl-fix-warning-in-ovl_create_real.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47304, CVSSv2 Score: 5.5
- Description:
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
- CVE: https://access.redhat.com/security/cve/CVE-2021-47304
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47304-tcp-fix-tcp_init_transfer-to-not-reset-icsk_ca_initi.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47408, CVSSv2 Score: 4.7
- Description:
netfilter: conntrack: serialize hash resizes and cleanups
- CVE: https://access.redhat.com/security/cve/CVE-2021-47408
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47408-netfilter-conntrack-serialize-hash-resizes-and-clean-348.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47461, CVSSv2 Score: 7.0
- Description:
userfaultfd: fix a race between writeprotect and exit_mmap()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47461
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47461-userfaultfd-fix-a-race-between-writeprotect-and-exit.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48632, CVSSv2 Score: 5.5
- Description:
i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48632
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48632-i2c-mlxbf-prevent-stack-overflow-in-mlxbf_i2c_smbus_.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27011, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fix memleak in map from abort
- CVE: https://access.redhat.com/security/cve/CVE-2024-27011
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27011-netfilter-nf-tables-fix-memleak-in-map-from-abort-513.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27019, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27019
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27019-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27025, CVSSv2 Score: 5.5
- Description:
nbd: null check for nla_nest_start
- CVE: https://access.redhat.com/security/cve/CVE-2024-27025
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27025-nbd-null-check-for-nla-nest-start.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27388, CVSSv2 Score: 5.5
- Description:
SUNRPC: fix some memleaks in gssx_dec_option_array
- CVE: https://access.redhat.com/security/cve/CVE-2024-27388
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27388-sunrpc-fix-some-memleaks-in-gssx-dec-option-array.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27395, CVSSv2 Score:
- Description:
Fixed function is sleepy and called from a kthread, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-27395.patch
- From:
- CVE-2024-31076, CVSSv2 Score: 5.5
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-31076
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-31076-genirq-cpuhotplug-x86-vector-prevent-vector-leak.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-33621, CVSSv2 Score: 5.5
- Description:
ipvlan: Dont Use skb->sk in
- CVE: https://access.redhat.com/security/cve/CVE-2024-33621
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-33621-ipvlan-dont-use-skb-sk-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35824, CVSSv2 Score: 5.5
- Description:
misc: lis3lv02d_i2c: Fix regulators getting
- CVE: https://access.redhat.com/security/cve/CVE-2024-35824
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35824-misc-lis3lv02d-i2c-fix-regulators-getting.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35823, CVSSv2 Score: 5.5
- Description:
vt: fix unicode buffer corruption when deleting
- CVE: https://access.redhat.com/security/cve/CVE-2024-35823
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35847, CVSSv2 Score: 5.5
- Description:
irqchip/gic-v3-its: Prevent double free on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-35847
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35847-irqchip-gic-v3-its-prevent-double-free-on-error.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35893, CVSSv2 Score: 5.5
- Description:
net/sched: act_skbmod: prevent kernel-infoleak
- CVE: https://access.redhat.com/security/cve/CVE-2024-35893
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35893-net-sched-act-skbmod-prevent-kernel-infoleak.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35807, CVSSv2 Score: 5.5
- Description:
ext4: fix corruption during on-line resize
- CVE: https://access.redhat.com/security/cve/CVE-2024-35807
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35807-ext4-fix-corruption-during-on-line-resize-513.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35896, CVSSv2 Score: 5.5
- Description:
netfilter: validate user input for expected length
- CVE: https://access.redhat.com/security/cve/CVE-2024-35896
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35896-netfilter-validate-user-input-for-expected-length.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35925, CVSSv2 Score: 5.5
- Description:
block: prevent division by zero in blk_rq_stat_sum()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35925
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35925-block-prevent-division-by-zero-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35930, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35930
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35930-scsi-lpfc-fix-possible-memory-leak-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35947, CVSSv2 Score: 5.5
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://access.redhat.com/security/cve/CVE-2024-35947
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35947-dyndbg-fix-old-bug-on-in-control-parser.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35924, CVSSv2 Score: 5.5
- Description:
usb: typec: ucsi: Limit read size on v1.2
- CVE: https://access.redhat.com/security/cve/CVE-2024-35924
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35924-usb-typec-ucsi-limit-read-size-on-v1-2-477.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35912, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: rfi: fix potential response leaks
- CVE: https://access.redhat.com/security/cve/CVE-2024-35912
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35912-wifi-iwlwifi-mvm-rfi-fix-potential-response-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35899, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: flush pending destroy work before exit_net release
- CVE: https://access.redhat.com/security/cve/CVE-2024-35899
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35899-netfilter-nf-tables-flush-pending-destroy-work-513.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35938, CVSSv2 Score:
- Description:
wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.
- CVE:
- Patch: skipped/CVE-2024-35938.patch
- From:
- CVE-2023-52653, CVSSv2 Score: 5.5
- Description:
SUNRPC: fix a memleak in gss_import_v2_context
- CVE: https://access.redhat.com/security/cve/CVE-2023-52653
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52653-sunrpc-fix-a-memleak-in-gss-import-v2-context.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48743, CVSSv2 Score: 5.5
- Description:
net: amd-xgbe: Fix skb data length underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48743
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48743-net-amd-xgbe-fix-skb-data-length-underflow.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48747, CVSSv2 Score: 5.5
- Description:
block: Fix wrong offset in bio_truncate()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48747
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48747-block-fix-wrong-offset-in-bio-truncate.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48757, CVSSv2 Score: 5.5
- Description:
net: fix information leakage in /proc/net/ptype
- CVE: https://access.redhat.com/security/cve/CVE-2022-48757
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48757-net-fix-information-leakage-in-proc-net-ptype.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52463, CVSSv2 Score:
- Description:
Complex adaptation required. Issue can be reproduced with special UEFI implementation only.
- CVE:
- Patch: skipped/CVE-2023-52463.patch
- From:
- CVE-2023-52619, CVSSv2 Score: 5.5
- Description:
pstore/ram: Fix crash when setting number of cpus
- CVE: https://access.redhat.com/security/cve/CVE-2023-52619
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52619-pstore-ram-fix-crash-when-setting-number-of-cpus.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52623, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://access.redhat.com/security/cve/CVE-2023-52623
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26840, CVSSv2 Score: 5.5
- Description:
cachefiles: fix memory leak in
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26840
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles_add_cache.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26870, CVSSv2 Score: 5.5
- Description:
NFSv4.2: fix nfs4_listxattr kernel BUG at
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26870
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26870-nfsv4-2-fix-nfs4-listxattr-kernel-bug-at.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26878, CVSSv2 Score: 5.5
- Description:
quota: Fix potential NULL pointer dereference
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26878
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26878-quota-fix-potential-null-pointer-dereference.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26958, CVSSv2 Score: 5.5
- Description:
nfs: fix UAF in direct writes
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26958
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26958-nfs-fix-uaf-in-direct-writes-425.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36005, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: honor table dormant flag from
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36005
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag-from.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36006, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix incorrect list API
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36006
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36006-mlxsw-spectrum-acl-tcam-fix-incorrect-list-api.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36017, CVSSv2 Score: 5.5
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36017
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36270
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36286
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26660, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Implement bounds check for stream encoder creation in DCN301
- CVE: https://access.redhat.com/security/cve/CVE-2024-26660
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26686, CVSSv2 Score: 5.5
- Description:
exit: Use the correct exit_code in /proc/<pid>/stat
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-exit-use-the-correct-exit-code-in-proc-pid-stat.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26686, CVSSv2 Score: 5.5
- Description:
fs/proc: do_task_stat: use __for_each_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-fs-proc-do-task-stat-use-for-each-thread.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26686, CVSSv2 Score: 5.5
- Description:
fs/proc: do_task_stat: move
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-fs-proc-do-task-stat-move.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26686, CVSSv2 Score: 5.5
- Description:
fs/proc: do_task_stat: use sig->stats_lock to
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26698, CVSSv2 Score: 4.1
- Description:
hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
- CVE: https://access.redhat.com/security/cve/CVE-2024-26698
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26698-hv_netvsc-Fix-race-condition-between-netvsc_probe-an.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26704, CVSSv2 Score: 5.5
- Description:
ext4: fix double-free of blocks due to wrong
- CVE: https://access.redhat.com/security/cve/CVE-2024-26704
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26733, CVSSv2 Score: 5.5
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://access.redhat.com/security/cve/CVE-2024-26733
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26740, CVSSv2 Score: 5.5
- Description:
net: sched: act_mirred: drop dst for the direction from egress to ingress
- CVE: https://access.redhat.com/security/cve/CVE-2024-26740
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26740-net-sched-act_mirred-drop-dst-for-the-direction-from.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26740, CVSSv2 Score: 5.5
- Description:
net/sched: act_mirred: use the backlog for mirred ingress
- CVE: https://access.redhat.com/security/cve/CVE-2024-26740
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26740-net-sched-act-mirred-use-the-backlog-for-mirred-425.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26772, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26772
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26773, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26773
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26802, CVSSv2 Score: 5.5
- Description:
stmmac: Clear variable when destroying workqueue
- CVE: https://access.redhat.com/security/cve/CVE-2024-26802
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26802-stmmac-clear-variable-when-destroying-workqueue.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-21823, CVSSv2 Score: 7.5
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the
- CVE: https://access.redhat.com/security/cve/CVE-2024-21823
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36016, CVSSv2 Score: 6.4
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36016
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-4.18.0-513.18.1.el8_9.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38573, CVSSv2 Score: 5.5
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2024-38573
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference-4.18.0-372.32.1.el8_6.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36886, CVSSv2 Score: 7.1
- Description:
tipc: fix UAF in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36886
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36905, CVSSv2 Score: 5.5
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://access.redhat.com/security/cve/CVE-2024-36905
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52791, CVSSv2 Score: 5.5
- Description:
i2c: core: Fix atomic xfer check for non-preempt
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52791
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52791-i2c-core-fix-atomic-xfer-check-for-non-preempt.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52832, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52832
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52832-wifi-mac80211-don-t-return-unset-power-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52864, CVSSv2 Score: 5.5
- Description:
platform/x86: wmi: Fix opening of char device
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52864
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52864-platform-x86-wmi-fix-opening-of-char-device.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-25739, CVSSv2 Score: 5.5
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://www.cve.org/CVERecord?id=CVE-2024-25739
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-25739-ubi-check-for-too-small-leb-size-in-vtbl-code.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26640, CVSSv2 Score: 5.5
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://www.cve.org/CVERecord?id=CVE-2024-26640
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy-348-23.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52796, CVSSv2 Score: 5.5
- Description:
ipvlan: add ipvlan_route_v6_outbound() helper
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52796
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52796-ipvlan-add-ipvlan-route-v6-outbound-helper.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52811, CVSSv2 Score:
- Description:
PowerPC: Unsupported.
- CVE:
- Patch: skipped/CVE-2023-52811.patch
- From:
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to
- CVE: https://access.redhat.com/security/cve/CVE-2023-52622
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to
- CVE: https://access.redhat.com/security/cve/CVE-2023-52622
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-kpatch.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36904, CVSSv2 Score: 5.5
- Description:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36904
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36917, CVSSv2 Score: 5.5
- Description:
block: fix overflow in blk_ioctl_discard()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36917
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36917-block-fix-overflow-in-blk-ioctl-discard.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36489, CVSSv2 Score: 5.5
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36489
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init-348.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36929, CVSSv2 Score: 5.5
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://access.redhat.com/security/cve/CVE-2024-36929
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36889, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-36889
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26669, CVSSv2 Score: 5.5
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://access.redhat.com/security/cve/CVE-2024-26669
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26669-net-sched-flower-fix-chain-template-offload-kpatch.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36954, CVSSv2 Score: 5.5
- Description:
tipc: fix a possible memleak in tipc_buf_append
- CVE: https://access.redhat.com/security/cve/CVE-2024-36954
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36954-tipc-fix-a-possible-memleak-in-tipc-buf-append.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36941, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://access.redhat.com/security/cve/CVE-2024-36941
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36933, CVSSv2 Score: 5.5
- Description:
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36933
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36933-net-nsh-Use-correct-mac_offset-to-unwind-gso-skb-in-.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36933, CVSSv2 Score: 5.5
- Description:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- CVE: https://access.redhat.com/security/cve/CVE-2024-36933
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36933-nsh-restore-skb-protocol-data-mac-header-for.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36950, CVSSv2 Score: 5.5
- Description:
firewire: ohci: mask bus reset interrupts between ISR and bottom half
- CVE: https://access.redhat.com/security/cve/CVE-2024-36950
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36950-firewire-ohci-mask-bus-reset-interrupts-between.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36940, CVSSv2 Score: 5.5
- Description:
pinctrl: core: fix possible memory leak in pinctrl_enable()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36940
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36940-pinctrl-core-fix-possible-memory-leak-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36940, CVSSv2 Score: 5.5
- Description:
pinctrl: core: delete incorrect free in pinctrl_enable()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36940
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36940-pinctrl-core-delete-incorrect-free-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36960, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix invalid reads in fence signaled events
- CVE: https://access.redhat.com/security/cve/CVE-2024-36960
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36960-drm-vmwgfx-fix-invalid-reads-in-fence-signaled.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36978, CVSSv2 Score: 5.5
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36978
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38538, CVSSv2 Score: 5.5
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://access.redhat.com/security/cve/CVE-2024-38538
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-477.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47018, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-47018.patch
- From:
- CVE-2023-52486, CVSSv2 Score: 4.4
- Description:
drm: Don't unref the same fb many times by mistake due to deadlock handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52486
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39502, CVSSv2 Score: 5.5
- Description:
ionic: clean interrupt before enabling queue to avoid credit race
- CVE: https://access.redhat.com/security/cve/CVE-2024-39502
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-clean-interrupt-before-enabling-queue-to-348.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39502, CVSSv2 Score: 5.5
- Description:
ionic: fix use after netif_napi_del()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39502
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-fix-use-after-netif-napi-del.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-40974, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-26810, CVSSv2 Score: 4.4
- Description:
vfio/pci: Lock external INTx masking ops
- CVE: https://access.redhat.com/security/cve/CVE-2024-26810
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26614, CVSSv2 Score:
- Description:
Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.
- CVE:
- Patch: skipped/CVE-2024-26614.patch
- From:
- CVE-2024-26908, CVSSv2 Score: 5.5
- Description:
x86/xen: Fix memory leak in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26908
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26908-x86-xen-fix-memory-leak-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26908, CVSSv2 Score: 5.5
- Description:
x86/xen: Add some null pointer checking to smp.c
- CVE: https://access.redhat.com/security/cve/CVE-2024-26908
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26908-x86-xen-add-some-null-pointer-checking-to-smp-c.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35876, CVSSv2 Score: 5.5
- Description:
x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35876
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35876-x86-mce-make-sure-to-grab-mce-sysfs-mutex-in-348.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52834, CVSSv2 Score: 5.5
- Description:
atl1c: Work around the DMA RX overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2023-52834
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52834-atl1c-work-around-the-dma-rx-overflow-issue.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52834, CVSSv2 Score: 5.5
- Description:
atl1c: Work around the DMA RX overflow issue
- CVE: https://access.redhat.com/security/cve/CVE-2023-52834
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52834-atl1c-work-around-the-dma-rx-overflow-issue-kpatch.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: 4.18.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file-5.patch
- From: kernel-4.18.0-553.16.1.el8_10
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: 4.18.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-5.patch
- From: kernel-4.18.0-553.16.1.el8_10
- CVE-2024-26960, CVSSv2 Score: 5.5
- Description:
mm: swap: fix race between free_swap_and_cache()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26960
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26960-mm-swap-fix-race-between-free-swap-and-cache-553.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38555, CVSSv2 Score: 4.4
- Description:
net/mlx5: Discard command completions in internal
- CVE: https://access.redhat.com/security/cve/CVE-2024-38555
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38596, CVSSv2 Score: 4.7
- Description:
af_unix: Fix data races in
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38596-af-unix-fix-data-races-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38596, CVSSv2 Score: 4.7
- Description:
af_unix: Fix data-races around sk->sk_shutdown.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38596-af-unix-fix-data-races-around-sk-sk-shutdown.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38627, CVSSv2 Score: 4.4
- Description:
stm class: Fix a double free in
- CVE: https://access.redhat.com/security/cve/CVE-2024-38627
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38627-stm-class-fix-a-double-free-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39276, CVSSv2 Score: 5.5
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in
- CVE: https://access.redhat.com/security/cve/CVE-2024-39276
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39472, CVSSv2 Score: 5.5
- Description:
xfs: fix log recovery buffer allocation for the
- CVE: https://access.redhat.com/security/cve/CVE-2024-39472
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39487, CVSSv2 Score: 5.5
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://access.redhat.com/security/cve/CVE-2024-39487
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38615, CVSSv2 Score: 4.4
- Description:
cpufreq: Reorganize checks in cpufreq_offline()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38615-cpufreq-Reorganize-checks-in-cpufreq_offline.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38615, CVSSv2 Score: 4.4
- Description:
cpufreq: Split cpufreq_offline()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38615-cpufreq-Split-cpufreq_offline.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38615, CVSSv2 Score: 4.4
- Description:
cpufreq: Rearrange locking in cpufreq_remove_dev()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38615-cpufreq-Rearrange-locking-in-cpufreq_remove_dev.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38615, CVSSv2 Score: 4.4
- Description:
cpufreq: exit() callback is optional
- CVE: https://access.redhat.com/security/cve/CVE-2024-38615
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-40927, CVSSv2 Score: 5.5
- Description:
xhci: Fix giving back cancelled URBs even if halted endpoint can't reset
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-40927-xhci-Fix-giving-back-cancelled-URBs-even-if-halted.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-40927, CVSSv2 Score: 5.5
- Description:
xhci: Add additional dynamic debug to follow URBs in cancel and error cases.
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-40927-xhci-Add-additional-dynamic-debug-to-follow-URBs-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-40927, CVSSv2 Score: 5.5
- Description:
xhci: Fix failure to give back some cached cancelled URBs.
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-40927-xhci-Fix-failure-to-give-back-some-cached-cancelled.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-40927, CVSSv2 Score: 5.5
- Description:
xhci: Handle TD clearing for multiple streams case
- CVE: https://access.redhat.com/security/cve/CVE-2024-40927
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-40927-xhci-handle-td-clearing-for-multiple-streams-case.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52845, CVSSv2 Score: 5.5
- Description:
tipc: Change nla_policy for bearer-related names to
- CVE: https://access.redhat.com/security/cve/CVE-2023-52845
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52845-tipc-change-nla-policy-for-bearer-related-names-to.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52845, CVSSv2 Score: 5.5
- Description:
tipc: Change nla_policy for bearer-related names to
- CVE: https://access.redhat.com/security/cve/CVE-2023-52845
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52845-tipc-change-nla-policy-for-bearer-related-names-to-kpatch.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52803, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix RPC client cleaned up the freed pipefs
- CVE: https://access.redhat.com/security/cve/CVE-2023-52803
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52803-sunrpc-fix-rpc-client-cleaned-up-the-freed-pipefs-kpatch-372-32.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26961, CVSSv2 Score: 5.5
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26961, CVSSv2 Score: 5.5
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://access.redhat.com/security/cve/CVE-2024-26961
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new-kpatch.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27010, CVSSv2 Score: 5.5
- Description:
net/sched: Fix mirred deadlock on device recursion
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-27010
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27010-net-sched-Fix-mirred-deadlock-on-device-recursion-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27010, CVSSv2 Score: 5.5
- Description:
net/sched: Fix mirred deadlock on device recursion (Adaptation)
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-27010
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27010-net-sched-Fix-mirred-deadlock-on-device-recursion-kpatch-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35790, CVSSv2 Score: 5.5
- Description:
usb: typec: altmodes/displayport: create sysfs kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-35790
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35790-usb-typec-altmodes-displayport-create-sysfs-nodes-as-kpatch-477.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35910, CVSSv2 Score: 5.8
- Description:
tcp: properly terminate timers for kernel sockets
- CVE: https://access.redhat.com/security/cve/CVE-2024-35910
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35910-0002-tcp-properly-terminate-timers-for-kernel-sockets-kpatch.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-42084, CVSSv2 Score: 5.5
- Description:
ftruncate: pass a signed offset
- CVE: https://access.redhat.com/security/cve/CVE-2024-42084
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://access.redhat.com/security/cve/CVE-2024-38579
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38559, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://access.redhat.com/security/cve/CVE-2024-38559
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41097, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41097
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39501
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26923-af-unix-fix-garbage-collector-racing-against-connect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42094, CVSSv2 Score: 7.8
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://access.redhat.com/security/cve/CVE-2024-42094
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://access.redhat.com/security/cve/CVE-2024-38558
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-ICMPv6.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42090, CVSSv2 Score: 5.5
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://access.redhat.com/security/cve/CVE-2024-42090
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://access.redhat.com/security/cve/CVE-2024-40904
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39499, CVSSv2 Score: 5.5
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39499
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39506, CVSSv2 Score: 5.5
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://access.redhat.com/security/cve/CVE-2024-39506
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in-lio-vf-rep-copy-packet.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://access.redhat.com/security/cve/CVE-2024-42228
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha-kpatch-348.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42096
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://access.redhat.com/security/cve/CVE-2024-42131
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42124, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2024-42124
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41076, CVSSv2 Score: 5.5
- Description:
NFSv4: Fix memory leak in nfs4_set_security_label
- CVE: https://access.redhat.com/security/cve/CVE-2024-41076
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41076-nfsv4-fix-memory-leak-in-nfs4-set-security-label-372.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40901, CVSSv2 Score: 5.5
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://access.redhat.com/security/cve/CVE-2024-40901
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38619-usb-storage-alauda-fix-uninit-value-in-alauda_check_media.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47384, CVSSv2 Score: 5.5
- Description:
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47384
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47384-02-hwmon-w83793-Fix-NULL-pointer-dereference.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47385, CVSSv2 Score: 5.5
- Description:
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47385
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47385-02-hwmon-w83792d-Fix-NULL-pointer-dereference.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47386, CVSSv2 Score: 5.5
- Description:
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47386
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47386-02-hwmon-w83791d-Fix-NULL-pointer-dereference.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47384 CVE-2021-47385 CVE-2021-47386, CVSSv2 Score: 5.5
- Description:
hwmon: Fix NULL pointer dereference by removing unnecessary structure field
- CVE: https://access.redhat.com/security/cve/CVE-2021-47386
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47384-CVE-2021-47385-CVE-2021-47386-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47441, CVSSv2 Score: 7.3
- Description:
mlxsw: thermal: Fix out-of-bounds memory accesses
- CVE: https://access.redhat.com/security/cve/CVE-2021-47441
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47441-mlxsw-thermal-fix-out-of-bounds-memory-accesses.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39471-drm-amdgpu-fix-signedness-bug-in-sdma_v4_0_process_trap_irq.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42152, CVSSv2 Score: 5.5
- Description:
nvmet: fix a possible leak when destroy a ctrl during qp establishment
- CVE: https://access.redhat.com/security/cve/CVE-2024-42152
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl-during-qp-establishment-348.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26769, CVSSv2 Score: 5.5
- Description:
nvmet-fc: release reference on target port
- CVE: https://access.redhat.com/security/cve/CVE-2024-26769
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26769-0001-nvmet-fc-release-reference-on-target-port.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26769, CVSSv2 Score: 5.5
- Description:
nvmet-fc: avoid deadlock on delete association path
- CVE: https://access.redhat.com/security/cve/CVE-2024-26769
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26769-0002-nvmet-fc-avoid-deadlock-on-delete-association-path-kpatch-348.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-372.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch-372.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42225, CVSSv2 Score: 7.5
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-42225
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42225-wifi-mt76-replace-skb_put-with-skb_put_zero-372.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41040, CVSSv2 Score: 7.0
- Description:
net/sched: act_ct: fix err check for nf_conntrack_confirm
- CVE: https://access.redhat.com/security/cve/CVE-2024-41040
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41040-net-sched-act_ct-fix-err-check-for-nf_conntrack_conf-348.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41040, CVSSv2 Score: 7.0
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://access.redhat.com/security/cve/CVE-2024-41040
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41040-net-sched-fix-uaf-when-resolving-a-clash.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52800, CVSSv2 Score: 5.5
- Description:
wifi: ath11k: fix htt pktlog locking
- CVE: https://access.redhat.com/security/cve/CVE-2023-52800
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52800-wifi-ath11k-fix-htt-pktlog-locking.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52683, CVSSv2 Score:
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2023-52683.patch
- From:
- CVE-2023-52522, CVSSv2 Score: 5.5
- Description:
net: fix possible store tearing in neigh_periodic_work()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52522-net-fix-possible-store-tearing-in-neigh-periodic-work-425.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52476, CVSSv2 Score: 5.5
- Description:
perf/x86/lbr: Filter vsyscall addresses
- CVE: https://access.redhat.com/security/cve/CVE-2023-52476
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52476-perf-x86-lbr-filter-vsyscall-addresses-477.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26600, CVSSv2 Score: 5.5
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://access.redhat.com/security/cve/CVE-2024-26600
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52798, CVSSv2 Score: 5.5
- Description:
wifi: ath11k: fix dfs radar event locking
- CVE: https://access.redhat.com/security/cve/CVE-2023-52798
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52798-wifi-ath11k-fix-dfs-radar-event-locking.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52809, CVSSv2 Score: 5.5
- Description:
scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52809
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52809-scsi-libfc-fix-potential-null-pointer-dereference-in-fc-lport-ptp-setup.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52840, CVSSv2 Score: 5.5
- Description:
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52840
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52840-input-synaptics-rmi4-fix-use-after-free-in-rmi-unregister-function.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26595, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Move devlink param to TCAM code
- CVE: https://access.redhat.com/security/cve/CVE-2024-26595
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26595-mlxsw-spectrum-acl-tcam-move-devlink-param-to-tcam-code.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26595, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-26595
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26595-mlxsw-spectrum-acl-tcam-fix-null-pointer-dereference-in-error-path.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52605, CVSSv2 Score:
- Description:
CVE Rejected
- CVE:
- Patch: skipped/CVE-2023-52605.patch
- From:
- CVE-2021-47466, CVSSv2 Score: 5.5
- Description:
slub: don't panic for memcg kmem cache creation failure
- CVE: https://access.redhat.com/security/cve/CVE-2021-47466
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47466-slub-don-t-panic-for-memcg-kmem-cache-creation-failure.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47466, CVSSv2 Score: 5.5
- Description:
mm, slub: fix potential memoryleak in kmem_cache_open()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47466
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47466-mm-slub-fix-potential-memoryleak-in-kmem-cache-open.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47497, CVSSv2 Score: 5.5
- Description:
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
- CVE: https://access.redhat.com/security/cve/CVE-2021-47497
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47497-nvmem-fix-shift-out-of-bound-ubsan-with-byte-size-cells.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47527, CVSSv2 Score: 5.5
- Description:
serial: core: fix transmit-buffer reset and memleak
- CVE: https://access.redhat.com/security/cve/CVE-2021-47527
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47527-serial-core-fix-transmit-buffer-reset-and-memleak.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48760, CVSSv2 Score: 5.5
- Description:
USB: core: Fix hang in usb_kill_urb by adding memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2022-48760
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48760-usb-core-fix-hang-in-usb-kill-urb-by-adding-memory-barriers.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47609, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
- CVE: https://access.redhat.com/security/cve/CVE-2021-47609
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47609-firmware-arm-scpi-fix-string-overflow-in-scpi-genpd-driver.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47609, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
- CVE: https://access.redhat.com/security/cve/CVE-2021-47609
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47609-firmware-arm-scpi-fix-string-overflow-in-scpi-genpd-driver-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52470, CVSSv2 Score: 5.5
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52470
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52470-drm-radeon-check-the-alloc-workqueue-return-value-in-radeon-crtc-init.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48804, CVSSv2 Score: 5.5
- Description:
vt_ioctl: fix array_index_nospec in vt_setactivate
- CVE: https://access.redhat.com/security/cve/CVE-2022-48804
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48804-vt-ioctl-fix-array-index-nospec-in-vt-setactivate.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48836, CVSSv2 Score: 5.5
- Description:
Input: aiptek - use descriptors of current altsetting
- CVE: https://access.redhat.com/security/cve/CVE-2022-48836
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48836-input-aiptek-use-descriptors-of-current-altsetting.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48836, CVSSv2 Score: 5.5
- Description:
Input: aiptek - fix endpoint sanity check
- CVE: https://access.redhat.com/security/cve/CVE-2022-48836
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48836-input-aiptek-fix-endpoint-sanity-check.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48836, CVSSv2 Score: 5.5
- Description:
Input: aiptek - properly check endpoint type
- CVE: https://access.redhat.com/security/cve/CVE-2022-48836
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48836-input-aiptek-properly-check-endpoint-type.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47582, CVSSv2 Score: 5.5
- Description:
USB: core: Make do_proc_control() and do_proc_bulk() killable
- CVE: https://access.redhat.com/security/cve/CVE-2021-47582
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47582-usb-core-make-do-proc-control-and-do-proc-bulk-killable-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47582, CVSSv2 Score: 5.5
- Description:
usb: core: Don't hold the device lock while sleeping in do_proc_control()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47582
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47582-usb-core-don-t-hold-the-device-lock-while-sleeping-in-do-proc-control-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://access.redhat.com/security/cve/CVE-2024-42154
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://access.redhat.com/security/cve/CVE-2024-42154
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48754, CVSSv2 Score: 8.4
- Description:
phylib: fix potential use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-48754
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48754-phylib-fix-potential-use-after-free.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52817, CVSSv2 Score: 8.4
- Description:
drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52817
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52817-drm-amdgpu-fix-a-null-pointer-access-when-the-smc-rreg-pointer-is-null-4.18.0-372.32.1.el8_6.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52817, CVSSv2 Score: 8.4
- Description:
drm/amdgpu/debugfs: fix error code when smc register accessors are NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52817
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52817-drm-amdgpu-debugfs-fix-error-code-when-smc-register-accessors-are-null.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://access.redhat.com/security/cve/CVE-2023-6040
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-6040-netfilter-nf-tables-reject-tables-of-unsupported-family.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40954, CVSSv2 Score: 7.8
- Description:
net: do not leave a dangling sk pointer, when socket creation fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-40954
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-creation-fails.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40958, CVSSv2 Score: 7.8
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://access.redhat.com/security/cve/CVE-2024-40958
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41071, CVSSv2 Score: 7.8
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://access.redhat.com/security/cve/CVE-2024-41041
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41064, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41065, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41023, CVSSv2 Score: 5.5
- Description:
sched/deadline: Fix task_struct reference leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-41023
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41023-sched-deadline-fix-task-struct-reference-leak.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41035, CVSSv2 Score: 5.5
- Description:
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
- CVE: https://access.redhat.com/security/cve/CVE-2024-41035
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41035-usb-core-fix-duplicate-endpoint-bug-by-clearing-reserved-bits-in-the-descriptor-4.18.0-477.27.1.el8_8.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: ensure minimum packet size in ppp_write()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41044
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41044-ppp-ensure-minimum-packet-size-in-ppp_write.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-41044
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41060, CVSSv2 Score: 5.5
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://access.redhat.com/security/cve/CVE-2024-41060
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41055, CVSSv2 Score:
- Description:
The patch affects too much kernel code. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Use struct_size() in kmalloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35944-vmci-use-struct-size-in-kmalloc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35944-vmci-fix-memcpy-run-time-warning-in-dg-dispatch-as-host.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35944-vmci-fix-possible-memcpy-run-time-warning-in-vmci-datagram-invoke-guest-handler.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36883, CVSSv2 Score: 7.0
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36883
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36901, CVSSv2 Score: 5.5
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36901
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36902, CVSSv2 Score: 5.5
- Description:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36902
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36902-ipv6-fib6-rules-avoid-possible-null-dereference-in-fib6-rule-action.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36919, CVSSv2 Score: 4.4
- Description:
scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
- CVE: https://access.redhat.com/security/cve/CVE-2024-36919
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36919-scsi-bnx2fc-remove-spin-lock-bh-while-releasing-resources-after-upload.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36922, CVSSv2 Score: 4.4
- Description:
wifi: iwlwifi: read txq->read_ptr under lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-36922
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36922-wifi-iwlwifi-read-txq-read-ptr-under-lock-4.18.0-477.27.1.el8_8.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36939, CVSSv2 Score: 5.5
- Description:
nfs: handle error of rpc_proc_register() in init_nfs_fs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36939
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36939-nfs-handle-error-of-rpc_proc_register-in-init_nfs_fs.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40912
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211-sta-ps-deliver-wakeup.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40929, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://access.redhat.com/security/cve/CVE-2024-40929
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before-accessing-the-ssids.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40931, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_una is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-40931
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40931-mptcp-ensure-snd-una-is-properly-initialized-on-connect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40941, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://access.redhat.com/security/cve/CVE-2024-40941
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40959
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40960
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40978, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-40978
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://access.redhat.com/security/cve/CVE-2024-42265
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42322, CVSSv2 Score: 5.5
- Description:
ipvs: properly dereference pe in ip_vs_add_service
- CVE: https://access.redhat.com/security/cve/CVE-2024-42322
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42322-ipvs-properly-dereference-pe-in-ip-vs-add-service.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-43830, CVSSv2 Score: 5.5
- Description:
leds: trigger: Unregister sysfs attributes before calling deactivate()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43830
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-43830-leds-trigger-unregister-sysfs-attributes-before-calling-deactivate.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
driver core: Cast to (void *) with __force for __percpu pointer
- CVE: https://access.redhat.com/security/cve/CVE-2024-43871
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-43871-driver-core-Cast-to-void-with-__force-for-__percpu-p.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43871
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42226, CVSSv2 Score:
- Description:
Patch introduced regression and was reverted later.
- CVE:
- Patch: skipped/CVE-2024-42226.patch
- From:
- CVE-2024-26638, CVSSv2 Score:
- Description:
nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-26638.patch
- From:
- CVE-2024-26645, CVSSv2 Score: 4.4
- Description:
tracing: Ensure visibility when inserting an element into tracing_map
- CVE: https://access.redhat.com/security/cve/CVE-2024-26645
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26645-tracing-ensure-visibility-when-inserting-an-element-into-tracing-map.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26855, CVSSv2 Score: 4.4
- Description:
net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26855
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26855-net-ice-fix-potential-null-pointer-dereference-in-ice-bridge-setlink.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26880, CVSSv2 Score: 4.4
- Description:
dm: call the resume method on internal suspend
- CVE: https://access.redhat.com/security/cve/CVE-2024-26880
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://access.redhat.com/security/cve/CVE-2024-41012
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48619, CVSSv2 Score: 6.2
- Description:
Input: add bounds checking to input_set_capability()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48619-input-add-bounds-checking-to-input-set-capability.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47101, CVSSv2 Score: 6.0
- Description:
asix: fix uninit-value in asix_mdio_read()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47101
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47101-asix-fix-uninit-value-in-asix-mdio-read.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52478, CVSSv2 Score: 6.0
- Description:
HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
- CVE: https://access.redhat.com/security/cve/CVE-2023-52478
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52478-hid-logitech-hidpp-fix-kernel-crash-on-receiver-usb-disconnect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26894, CVSSv2 Score: 6.0
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26894
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in-acpi-processor-power-exit.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47287, CVSSv2 Score: 5.5
- Description:
driver core: auxiliary bus: Fix memory leak when driver_register() fail
- CVE: https://access.redhat.com/security/cve/CVE-2021-47287
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47287-driver-core-auxiliary-bus-fix-memory-leak-when-driver-register-fail.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47289, CVSSv2 Score: 5.5
- Description:
ACPI: fix NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2021-47289
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47289-acpi-fix-null-pointer-dereference-348.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47321, CVSSv2 Score: 5.5
- Description:
watchdog: Fix possible use-after-free by calling del_timer_sync()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47321
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47321-watchdog-fix-possible-use-after-free-by-calling-del-timer-sync.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35877, CVSSv2 Score: 5.5
- Description:
x86/mm/pat: fix VM_PAT handling in COW mappings
- CVE: https://access.redhat.com/security/cve/CVE-2024-35877
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35877-x86-mm-pat-fix-vm-pat-handling-in-cow-mappings.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26665, CVSSv2 Score: 5.5
- Description:
tunnels: fix out of bounds access when building IPv6 PMTU error
- CVE: https://access.redhat.com/security/cve/CVE-2024-26665
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26665-tunnels-fix-out-of-bounds-access-when-building-ipv6-pmtu-error.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label-372.13.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-372.13.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch-477.21.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: cec-adap: always cancel work in cec_transmit_msg_fh
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-23848-media-cec-cec-adap-always-cancel-work-in-cec_transmi.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: core: avoid recursive cec_claim_log_addrs
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-23848-media-cec-core-avoid-recursive-cec_claim_log_addrs.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: core: avoid recursive cec_claim_log_addrs kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-23848-media-cec-core-avoid-recursive-cec_claim_log_addrs-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: cec-api: add locking in cec_release()
- CVE: https://access.redhat.com/security/cve/CVE-2024-23848
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-23848-media-cec-cec-api-add-locking-in-cec_release.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40911, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://access.redhat.com/security/cve/CVE-2024-40911
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40911-wifi-cfg80211-Lock-wiphy-in-cfg80211_get_station.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41005, CVSSv2 Score: 5.5
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://access.redhat.com/security/cve/CVE-2024-41005
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41013, CVSSv2 Score: 5.5
- Description:
xfs: don't walk off the end of a directory data block
- CVE: https://access.redhat.com/security/cve/CVE-2024-41013
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41013-0002-xfs-don-t-walk-off-the-end-of-a-directory-data-block-upto-372.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40988, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://access.redhat.com/security/cve/CVE-2024-40988
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40998, CVSSv2 Score: 5.5
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40995, CVSSv2 Score: 5.5
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40995
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in-tcf-idr-check-alloc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41014, CVSSv2 Score: 5.5
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: refactor tcp_retransmit_timer()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41007
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41007-0001-tcp-refactor-tcp_retransmit_timer.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
net: tcp: fix unexcepted socket die when snd_wnd is 0
- CVE: https://access.redhat.com/security/cve/CVE-2024-41007
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41007-0002-net-tcp-fix-unexcepted-socket-die-when-snd_wnd-is-0.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: avoid too many retransmit packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-41007
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41007-0003-tcp-avoid-too-many-retransmit-packets.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47455, CVSSv2 Score: 5.5
- Description:
ptp: Fix possible memory leak in ptp_clock_register()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47455
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47455-ptp-fix-possible-memory-leak-in-ptp-clock-register.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47352, CVSSv2 Score: 5.5
- Description:
virtio-net: Add validation for used length
- CVE: https://access.redhat.com/security/cve/CVE-2021-47352
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47352-virtio-net-add-validation-for-used-length-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47383, CVSSv2 Score: 5.5
- Description:
tty: Fix out-of-bound vmalloc access in imageblit
- CVE: https://access.redhat.com/security/cve/CVE-2021-47383
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47383-tty-fix-out-of-bound-vmalloc-access-in-imageblit.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47412, CVSSv2 Score: 5.5
- Description:
block: don't call rq_qos_ops->done_bio if the bio isn't tracked
- CVE: https://access.redhat.com/security/cve/CVE-2021-47412
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47412-block-don-t-call-rq-qos-ops-done-bio-if-the-bio-isn-t-tracked-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47432, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Don't overflow in peek()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47432
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47432-lib-generic-radix-tree-c-don-t-overflow-in-peek.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47393, CVSSv2 Score: 5.5
- Description:
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47393
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47393-hwmon-mlxreg-fan-return-non-zero-value-when-fan-current-state-is-enforced-from-sysfs.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-27013, CVSSv2 Score: 5.5
- Description:
tun: limit printing rate when illegal packet received by tun dev
- CVE: https://access.redhat.com/security/cve/CVE-2024-27013
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-27013-tun-limit-printing-rate-when-illegal-packet-received-by-tun-dev.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35809, CVSSv2 Score: 5.5
- Description:
PCI/PM: Drain runtime-idle callbacks before driver removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-35809
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35809-pci-pm-drain-runtime-idle-callbacks-before-driver-removal.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26720, CVSSv2 Score:
- Description:
This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata
- CVE:
- Patch: skipped/CVE-2024-26720.patch
- From:
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://access.redhat.com/security/cve/CVE-2024-42301
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40961, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40961
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40961-ipv6-prevent-possible-NULL-deref-in-fib6_nh_init.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://access.redhat.com/security/cve/CVE-2024-42284
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41092, CVSSv2 Score: 7.8
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-41092
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38541, CVSSv2 Score: 9.8
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38541
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias-425.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-26976, CVSSv2 Score: 7.0
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://access.redhat.com/security/cve/CVE-2024-26976
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed-372.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38608, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Add wrapping for auxiliary_driver op and remove unused args
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38608-net-mlx5e-Add-wrapping-for-auxiliary_driver-ops-and-372.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38608, CVSSv2 Score: 5.5
- Description:
net/mlx5e: Fix netif state handling
- CVE: https://access.redhat.com/security/cve/CVE-2024-38608
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38608-net-mlx5e-Fix-netif-state-handling-372.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38540, CVSSv2 Score: 5.5
- Description:
bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
- CVE: https://access.redhat.com/security/cve/CVE-2024-38540
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38540-bnxt_re-avoid-shift-undefined-behavior-in-bnxt_qplib.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-38586, CVSSv2 Score: 5.5
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-38586-r8169-Fix-possible-ring-buffer-corruption-on-fragmen.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40983, CVSSv2 Score: 5.5
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://access.redhat.com/security/cve/CVE-2024-40983
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing-decryption.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-40984, CVSSv2 Score: 5.5
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
- CVE: https://access.redhat.com/security/cve/CVE-2024-40984
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-40984-ACPICA-Revert-ACPICA-avoid-Info-mapping-multiple-BAR.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://access.redhat.com/security/cve/CVE-2024-41042
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41042-netfilter-nf_tables-prefer-nft_chain_validate-348.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-46826, CVSSv2 Score: 5.5
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://access.redhat.com/security/cve/CVE-2024-46826
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-41009
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-44935, CVSSv2 Score: 5.5
- Description:
sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE: https://access.redhat.com/security/cve/CVE-2024-44935
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-44935-sctp-fix-null-ptr-deref-in-reuseport-add-sock-348.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-45018, CVSSv2 Score: 5.5
- Description:
netfilter: flowtable: initialise extack before use
- CVE: https://access.redhat.com/security/cve/CVE-2024-45018
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-45018-netfilter-flowtable-initialise-extack-before-use.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2023-52492, CVSSv2 Score: 4.4
- Description:
dmaengine: fix NULL pointer in channel unregistration function
- CVE: https://access.redhat.com/security/cve/CVE-2023-52492
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2023-52492-dmaengine-fix-null-pointer-in-channel-unregistration-function.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-44990, CVSSv2 Score: 5.5
- Description:
bonding: fix null pointer deref in bond_ipsec_offload_ok
- CVE: https://access.redhat.com/security/cve/CVE-2024-44990
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-44990-bonding-fix-null-pointer-deref-in-bond-ipsec-offload-ok-348.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-47668, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-47668
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41066, CVSSv2 Score: 5.5
- Description:
ibmvnic: rename local variable index to bufidx
- CVE: https://access.redhat.com/security/cve/CVE-2024-41066
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41066-ibmvnic-rename-local-variable-index-to-bufidx-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-41066, CVSSv2 Score: 5.5
- Description:
ibmvnic: Add tx check to prevent skb leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-41066
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-41066-ibmvnic-add-tx-check-to-prevent-skb-leak.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42070, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- CVE: https://access.redhat.com/security/cve/CVE-2024-42070
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42070-netfilter-nf-tables-fully-validate-nft-data-value-on-store-to-data-registers-4.18.0-348.23.1.el8_5.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42079, CVSSv2 Score: 5.5
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://access.redhat.com/security/cve/CVE-2024-42079
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42244, CVSSv2 Score: 5.5
- Description:
USB: serial: mos7840: fix crash on resume
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42244-usb-serial-mos7840-fix-crash-on-resume-4.18.0-477.27.1.el8_8.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42244, CVSSv2 Score: 5.5
- Description:
USB: serial: mos7840: fix crash on resume kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-42244
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42244-usb-serial-mos7840-fix-crash-on-resume-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-42292, CVSSv2 Score: 5.5
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42292
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://access.redhat.com/security/cve/CVE-2024-43854
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://access.redhat.com/security/cve/CVE-2024-43880
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning kpatch
- CVE: https://access.redhat.com/security/cve/CVE-2024-43880
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning-kpatch.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-43889, CVSSv2 Score:
- Description:
Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.
- CVE:
- Patch: skipped/CVE-2024-43889.patch
- From:
- CVE-2024-26924, CVSSv2 Score: 5.9
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://access.redhat.com/security/cve/CVE-2024-26924
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element-513.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35898, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35898
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-35898-netfilter-nf-tables-fix-potential-data-race-in-nft-flowtable-type-get.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2022-48773, CVSSv2 Score: 5.5
- Description:
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
- CVE: https://access.redhat.com/security/cve/CVE-2022-48773
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2022-48773-xprtrdma-fix-pointer-derefs-in-error-cases-of-rpcrdma-ep-create.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-35839, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-35839.patch
- From:
- CVE-2024-24857, CVSSv2 Score: 6.8
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://access.redhat.com/security/cve/CVE-2024-24857
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-24857-bluetooth-fix-toctou-in-hci-debugfs-implementation.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-26851, CVSSv2 Score: 5.5
- Description:
netfilter: nf_conntrack_h323: Add protection for bmp length out of
- CVE:
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2024-26851-netfilter-nf_conntrack_h323-add-protection-for-bmp-length-out-of-range.patch
- From:
- CVE-2022-48936, CVSSv2 Score: 5.5
- Description:
gso: do not skip outer ip header in case of ipip and net_failover
- CVE: https://access.redhat.com/security/cve/CVE-2022-48936
- Patch: rhel8/4.18.0-553.27.1.el8_10/CVE-2022-48936-gso-do-not-skip-outer-ip-header-in-case-of-ipip-and-net-failover.patch
- From: 4.18.0-553.27.1.el8_10
- CVE-2024-27399, CVSSv2 Score: 5.5
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://access.redhat.com/security/cve/CVE-2024-27399
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-38564, CVSSv2 Score: 5.5
- Description:
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
- CVE: https://access.redhat.com/security/cve/CVE-2024-38564
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in-bpf-link-create.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-46858, CVSSv2 Score: 7.0
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-46858
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-27043, CVSSv2 Score: 5.2
- Description:
media: edia: dvbdev: fix a use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2024-27043
- Patch: rhel8/4.18.0-553.30.1.el8_10/CVE-2024-27043-media-edia-dvbdev-fix-a-use-after-free-513.5.patch
- From: 4.18.0-553.30.1.el8_10
- CVE-2024-50264, CVSSv2 Score: 7.8
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://access.redhat.com/security/cve/CVE-2024-50264
- Patch: rhel8/4.18.0-553.32.1.el8_10/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 4.18.0-553.32.1.el8_10
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.15.0/kpatch-add-alt-asm-definitions-56.62.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2022-23816, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-23825, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23825.patch
- From:
- CVE-2022-26373, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-29900, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From: