- kernel-4.18.0-240.22.1.el8_3 (almalinux8)
- 4.18.0-477.27.2.el8_8
- 2023-10-07 18:37:30
- 2023-10-19 08:26:12
- K20231007_05
- CVE-2019-19528, CVSSv2 Score: 6.1
- Description:
USB: iowarrior: fix use-after-free on disconnect
- CVE: https://access.redhat.com/security/cve/cve-2019-19528
- Patch: 4.18.0/CVE-2019-19528-12197-usb-USB-iowarrior-fix-use-after-free-on-disconnect.patch
- From: kernel-4.18.0-305.el8
- CVE-2019-19523, CVSSv2 Score: 7.8
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://access.redhat.com/security/cve/cve-2019-19523
- Patch: 4.18.0/CVE-2019-19523-12144-usb-USB-adutux-fix-use-after-free-on-disconnect.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-11608, CVSSv2 Score: 4.3
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://access.redhat.com/security/cve/cve-2019-11608
- Patch: 4.18.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-12464, CVSSv2 Score: 6.7
- Description:
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
- CVE: https://access.redhat.com/security/cve/cve-2020-12464
- Patch: 4.18.0/CVE-2020-12464-12506-usb-USB-core-Fix-free-while-in-use-bug-in-the-USB-S.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-12114, CVSSv2 Score: 4.4
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: https://access.redhat.com/security/cve/cve-2020-12114
- Patch: 4.18.0/CVE-2020-12114-8212-fs-fs-namespace.c-fix-mountpoint-reference-counter-r.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://access.redhat.com/security/cve/cve-2019-14314
- Patch: 4.18.0/CVE-2020-14314-0009-fs-ext4-fix-potential-negative-array-index-in-do_spl.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: ubuntu-bionic-hwe-5.3/5.3.0-66.60/CVE-2020-14356-cgroup-fix-cgroup_sk_alloc-for-sk_clone_lock-46.38.patch
- From: 5.3.0-66.60
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: Fix sock_cgroup_data on big-endian.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: ubuntu-bionic-hwe-5.3/5.3.0-66.60/CVE-2020-14356-cgroup-Fix-sock_cgroup_data-on-big-endian.patch
- From: 5.3.0-66.60
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
netprio_cgroup: Fix unlimited memory leak of v2 cgroups
- CVE: https://access.redhat.com/security/cve/CVE-2020-14356
- Patch: 4.18.0/CVE-2020-14356-0505-net-netprio_cgroup-Fix-unlimited-memory-leak-of-v2-c.patch
- From: 4.18.0-305.el8
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-14356
- Patch: 4.18.0/CVE-2020-14356-kpatch.patch
- From: 4.18.0-305.el8
- CVE-2020-24394, CVSSv2 Score: 7.1
- Description:
nfsd: apply umask on fs without ACL support
- CVE: https://access.redhat.com/security/cve/cve-2020-24394
- Patch: 4.18.0/CVE-2020-24394-4117-fs-nfsd-apply-umask-on-fs-without-ACL-support.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://access.redhat.com/security/cve/cve-2020-25212
- Patch: 4.18.0/CVE-2020-25212-0342-fs-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25285, CVSSv2 Score: 6.4
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://access.redhat.com/security/cve/cve-2020-25285
- Patch: 4.18.0/CVE-2020-25285-9007-mm-mm-hugetlb-fix-a-race-between-hugetlb-sysctl-hand.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25284, CVSSv2 Score: 4.1
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://access.redhat.com/security/cve/cve-2020-25284
- Patch: 4.18.0/CVE-2020-25284-14205-block-rbd-require-global-CAP_SYS_ADMIN-for-mapping-.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-0431, CVSSv2 Score: 6.7
- Description:
HID: hid-input: clear unmapped usages
- CVE: https://access.redhat.com/security/cve/cve-2020-0431
- Patch: 4.18.0/CVE-2020-0431-7920-hid-HID-hid-input-clear-unmapped-usages.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25643, CVSSv2 Score: 6.6
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://access.redhat.com/security/cve/cve-2020-25643
- Patch: 4.18.0/CVE-2020-25643-5958-netdrv-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-28974, CVSSv2 Score: 5.0
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://access.redhat.com/security/cve/cve-2020-28974
- Patch: 4.18.0/CVE-2020-28974-17646-vt-Disable-KD_FONT_OP_COPY.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- CVE: https://access.redhat.com/security/cve/cve-2020-27786
- Patch: 4.18.0/CVE-2020-27786-2184-sound-ALSA-rawmidi-Fix-racy-buffer-resize-under-conc.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27786
- Patch: 4.18.0/CVE-2020-27786-kpatch.patch
- From: kernel-4.18.0-305.el8
- CVE-2021-0342, CVSSv2 Score: 6.7
- Description:
tun: correct header offsets in napi frags mode
- CVE: https://access.redhat.com/security/cve/cve-2021-0342
- Patch: 4.18.0/CVE-2021-0342-15000-netdrv-tun-correct-header-offsets-in-napi-frags-mod.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://access.redhat.com/security/cve/cve-2020-36322
- Patch: 4.18.0/CVE-2020-36322-16294-fs-fuse-fix-bad-inode.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-15437, CVSSv2 Score: 6.4
- Description:
serial: 8250: fix null-ptr-deref in serial8250_start_tx()
- CVE: https://access.redhat.com/security/cve/cve-2020-15437
- Patch: 4.18.0/CVE-2020-15437-11048-tty-serial-8250-fix-null-ptr-deref-in-serial8250_st.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-25704, CVSSv2 Score: 6.2
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://access.redhat.com/security/cve/cve-2020-25704
- Patch: 4.18.0/CVE-2020-25704-14269-kernel-perf-core-Fix-a-memory-leak-in-perf_event_pa.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
- CVE: https://access.redhat.com/security/cve/CVE-2020-36557
- Patch: 4.18.0/CVE-2020-36557-8.3-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtual.patch
- From: kernel-4.18.0-240.22.1.el8
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-36557
- Patch: 4.18.0/CVE-2020-36557-8.3-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtual-kpatch.patch
- From: kernel-4.18.0-240.22.1.el8
- CVE-2020-27835, CVSSv2 Score: 4.4
- Description:
IB/hfi1: Ensure correct mm is used at all times
- CVE: https://access.redhat.com/security/cve/cve-2020-27835
- Patch: 4.18.0/CVE-2020-27835-14206-infiniband-IB-hfi1-Ensure-correct-mm-is-used-at-all.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-27835, CVSSv2 Score: 4.4
- Description:
IB/hfi1: Ensure correct mm is used at all times (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27835
- Patch: 4.18.0/CVE-2020-27835-kpatch.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-35508, CVSSv2 Score: 4.5
- Description:
kernel: fork: properly initialize task_struct->task_struct_rh (rhel specific)
- CVE: https://access.redhat.com/security/cve/cve-2020-35508
- Patch: 4.18.0/CVE-2020-35508-11919-kernel-kernel-fork-properly-initialize-task_struct-.patch
- From: kernel-4.18.0-305.el8
- CVE-2020-12362, CVSSv2 Score:
- Description:
Mitigation is made with intel firmware update, el8 kernels also need 'i915.enable_guc' specified in cmdline to be affected
- CVE:
- Patch: skipped/CVE-2020-12362.patch
- From:
- CVE-2021-33909, CVSSv2 Score: 4.4
- Description:
af_key: pfkey_dump needs parameter validation
- CVE: https://access.redhat.com/security/cve/CVE-2021-0605
- Patch: 4.18.0/CVE-2021-0605-af_key-pfkey_dump-needs-parameter-validation.patch
- From: kernel-4.18.0-305
- CVE-2020-36312, CVSSv2 Score: 3.3
- Description:
[virt] kvm: fix memory leak in kvm_io_bus_unregister_dev()
- CVE: https://access.redhat.com/security/cve/cve-2020-36312
- Patch: 4.18.0/5525-virt-kvm-fix-memory-leak-in-kvm_io_bus_unregister_de.patch
- From: 4.18.0-304.el8
- CVE-2021-3501, CVSSv2 Score:
- Description:
The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8
- CVE:
- Patch: skipped/CVE-2021-3501.patch
- From:
- CVE-2021-3543, CVSSv2 Score:
- Description:
The problematic patch was introduced only in the 8.4 release, >=kernel-4.18.0-305.el8
- CVE:
- Patch: skipped/CVE-2021-3543.patch
- From:
- CVE-2020-26541, CVSSv2 Score:
- Description:
Affects only secure boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2020-26541.patch
- From:
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33909, CVSSv2 Score: 7.0
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://access.redhat.com/security/cve/cve-2021-33909
- Patch: 4.18.0/CVE-2021-33909-seq-file-disallow-extremely-large-seq-buffer-rhel8.patch
- From: 4.18.0-305.10.2.el8_4
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the
- CVE: https://access.redhat.com/security/cve/CVE-2021-32399
- Patch: 4.18.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the.patch
- From: 4.18.0-305.10.2.el8_4
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://ubuntu.com/security/CVE-2021-22543
- Patch: 4.18.0/CVE-2021-22543-17896-KVM-do-not-allow-mapping-valid-but-non-reference-co.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 4.18.0/CVE-2021-3609-17898-can-bcm-delay-release-of-struct-bcm_op-after-synchr.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 4.18.0/CVE-2021-22555.patch
- From: v5.12
- CVE-2021-37576, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-37576.patch
- From:
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: 4.18.0/CVE-2021-3653-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2.patch
- From: 4.18.0-305.19.1.el8_4
- CVE-2021-3656, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested
- CVE: https://access.redhat.com/security/cve/CVE-2021-3656
- Patch: 4.18.0/CVE-2021-3656-18059-KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-lt-305.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17987-RDMA-cma-Add-missing-locking-to-rdma_accept-lt-305.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17988-RDMA-ucma-Fix-the-locking-of-ctx-file-lt-305.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix locking for ctx->events_reported
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17989-RDMA-ucma-Fix-locking-for-ctx-events_reported.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 4.18.0/CVE-2020-36385-17990-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-wit.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2021-0512, CVSSv2 Score: 7.8
- Description:
HID: make arrays usage and value to be the same
- CVE: https://access.redhat.com/security/cve/CVE-2021-0512
- Patch: 4.18.0/CVE-2021-0512-18158-HID-make-arrays-usage-and-value-to-be-the-same.patch
- From: 4.18.0-305.25.1.el8_4
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
[block] nbd: Fix memory leak in nbd_add_socket
- CVE: https://access.redhat.com/security/cve/cve-2021-3348
- Patch: 4.18.0/1478-block-nbd-Fix-memory-leak-in-nbd_add_socket.patch
- From: 4.18.0-304.el8
- CVE-2021-20239, CVSSv2 Score: 4.4
- Description:
net, sctp, filter: remap copy_from_user failure error
- CVE: https://access.redhat.com/security/cve/cve-2021-20239
- Patch: 4.18.0/0085-net-sctp-filter-remap-copy_from_user-failure-error.patch
- From: 4.18.0-348.el8
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://access.redhat.com/security/cve/cve-2020-29660
- Patch: 4.18.0/0209-tty-Fix-session-locking.patch
- From: 4.18.0-348.el8
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
nbd: freeze the queue while we're adding connections
- CVE: https://access.redhat.com/security/cve/cve-2021-3348
- Patch: 4.18.0/0693-nbd-freeze-the-queue-while-we-re-adding-connections.patch
- From: 4.18.0-348.el8
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://access.redhat.com/security/cve/cve-2021-31916
- Patch: 4.18.0/1289-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 4.18.0-348.el8
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://access.redhat.com/security/cve/cve-2021-28950
- Patch: 4.18.0/1362-fuse-fix-live-lock-in-fuse_iget-240.patch
- From: 4.18.0-348.el8
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: devicetree: Avoid taking direct reference to device name string
- CVE: https://access.redhat.com/security/cve/cve-2020-0427
- Patch: 4.18.0/1378-pinctrl-devicetree-Avoid-taking-direct-reference-to-.patch
- From: 4.18.0-348.el8
- CVE-2020-36158, CVSSv2 Score: 6.7
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
- CVE: https://access.redhat.com/security/cve/cve-2020-36158
- Patch: 4.18.0/1379-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 4.18.0-348.el8
- CVE-2021-33033, CVSSv2 Score: 7.8
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://access.redhat.com/security/cve/cve-2021-33033
- Patch: 4.18.0/1612-cipso-calipso-resolve-a-number-of-problems-with-the-.patch
- From: 4.18.0-348.el8
- CVE-2020-36312, CVSSv2 Score: 3.3
- Description:
KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU
- CVE: https://access.redhat.com/security/cve/cve-2020-36312
- Patch: 4.18.0/2422-KVM-Destroy-I-O-bus-devices-on-unregister-failure-_a-240.patch
- From: 4.18.0-348.el8
- CVE-2020-36312, CVSSv2 Score: 3.3
- Description:
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
- CVE: https://access.redhat.com/security/cve/cve-2020-36312
- Patch: 4.18.0/2423-KVM-Stop-looking-for-coalesced-MMIO-zones-if-the-bus.patch
- From: 4.18.0-348.el8
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://access.redhat.com/security/cve/cve-2021-23133
- Patch: 4.18.0/2797-sctp-delay-auto_asconf-init-until-binding-the-first-.patch
- From: 4.18.0-348.el8
- CVE-2021-29646, CVSSv2 Score: 5.5
- Description:
tipc: better validate user input in tipc_nl_retrieve_key()
- CVE: https://access.redhat.com/security/cve/cve-2021-29646
- Patch: 4.18.0/5221-tipc-better-validate-user-input-in-tipc_nl_retrieve_.patch
- From: 4.18.0-348.el8
- CVE-2021-31440, CVSSv2 Score: 7.0
- Description:
bpf: Fix propagation of 32-bit signed bounds from 64-bit bounds
- CVE: https://access.redhat.com/security/cve/cve-2021-31440
- Patch: 4.18.0/6564-bpf-Fix-propagation-of-32-bit-signed-bounds-from-64-.patch
- From: 4.18.0-348.el8
- CVE-2021-31440, CVSSv2 Score: 7.0
- Description:
bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
- CVE: https://access.redhat.com/security/cve/cve-2021-31440
- Patch: 4.18.0/7001-bpf-Fix-propagation-of-32-bit-unsigned-bounds-from-6.patch
- From: 4.18.0-348.el8
- CVE-2021-3573, CVSSv2 Score: 6.7
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/cve-2021-3573
- Patch: 4.18.0/7050-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 4.18.0-348.el8
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/cve-2021-29650
- Patch: 4.18.0/7052-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.18.0-348.el8
- CVE-2021-3564, CVSSv2 Score: 6.3
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://access.redhat.com/security/cve/cve-2021-3564
- Patch: 4.18.0/7591-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.18.0-348.el8
- CVE-2021-0129, CVSSv2 Score: 7.1
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://access.redhat.com/security/cve/cve-2021-0129
- Patch: 4.18.0/8822-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-a.patch
- From: 4.18.0-348.el8
- CVE-2020-29368, CVSSv2 Score: 7.0
- Description:
mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()
- CVE: https://access.redhat.com/security/cve/cve-2020-29368
- Patch: 4.18.0/9329-mm-thp-make-the-THP-mapcount-atomic-against-__split_-240.patch
- From: 4.18.0-348.el8
- CVE-2020-29368, CVSSv2 Score: 7.0
- Description:
mm: thp: fix MADV_REMOVE deadlock on shmem THP
- CVE: https://access.redhat.com/security/cve/cve-2020-29368
- Patch: 4.18.0/9330-mm-thp-fix-MADV_REMOVE-deadlock-on-shmem-THP-240.patch
- From: 4.18.0-348.el8
- CVE-2021-28971, CVSSv2 Score: 4.7
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://access.redhat.com/security/cve/cve-2021-28971
- Patch: 4.18.0/9810-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-statu.patch
- From: 4.18.0-348.el8
- CVE-2021-20194, CVSSv2 Score: 7.0
- Description:
[net] bpf: Don't return EINVAL from {get, set}sockopt when optlen > PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-20194
- Patch: 4.18.0/5196-net-bpf-Don-t-return-EINVAL-from-get-set-sockopt-whe.patch
- From: 4.18.0-304.el8
- CVE-2021-20194, CVSSv2 Score: 7.0
- Description:
bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- CVE: https://access.redhat.com/security/cve/cve-2021-20194
- Patch: 4.18.0/10226-bpf-cgroup-Fix-optlen-WARN_ON_ONCE-toctou.patch
- From: 4.18.0-348.el8
- CVE-2021-20194, CVSSv2 Score: 7.0
- Description:
bpf, cgroup: Fix problematic bounds check
- CVE: https://access.redhat.com/security/cve/cve-2021-20194
- Patch: 4.18.0/10227-bpf-cgroup-Fix-problematic-bounds-check.patch
- From: 4.18.0-348.el8
- CVE-2021-3600, CVSSv2 Score: 7.8
- Description:
bpf: Fix 32 bit src register truncation on div/mod
- CVE: https://access.redhat.com/security/cve/cve-2021-3600
- Patch: 4.18.0/10233-bpf-Fix-32-bit-src-register-truncation-on-div-mod.patch
- From: 4.18.0-348.el8
- CVE-2021-3444, CVSSv2 Score: 7.0
- Description:
bpf: Fix truncation handling for mod32 dst reg wrt zero
- CVE: https://access.redhat.com/security/cve/cve-2021-3444
- Patch: 4.18.0/13757-bpf-Fix-truncation-handling-for-mod32-dst-reg-wrt-z.patch
- From: 4.18.0-348.el8
- CVE-2020-36386, CVSSv2 Score: 7.1
- Description:
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
- CVE: https://access.redhat.com/security/cve/cve-2020-36386
- Patch: 4.18.0/10931-Bluetooth-Fix-slab-out-of-bounds-read-in-hci_extend.patch
- From: 4.18.0-348.el8
- CVE-2021-3635, CVSSv2 Score: 4.1
- Description:
netfilter: nf_tables: fix flowtable list del corruption
- CVE: https://access.redhat.com/security/cve/cve-2021-3635
- Patch: 4.18.0/13613-netfilter-nf_tables-fix-flowtable-list-del-corrupti.patch
- From: 4.18.0-348.el8
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Prohibit alu ops for pointer types not defining ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0001-bpf-Prohibit-alu-ops-for-pointer-types-not-defining-.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Fix off-by-one for area size in creating mask to left
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0002-bpf-Fix-off-by-one-for-area-size-in-creating-mask-to.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0003-bpf-Simplify-alu_limit-masking-for-pointer-arithmeti.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Add sanity check for upper ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0004-bpf-Add-sanity-check-for-upper-ptr_limit.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Use correct permission flag for mixed signed bounds arithmetic
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13620-bpf-Use-correct-permission-flag-for-mixed-signed-bo.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13621-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13622-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-a.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13623-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Improve verifier error messages for users
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13624-bpf-Improve-verifier-error-messages-for-users.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13626-bpf-Refactor-and-streamline-bounds-check-into-helpe-240.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Move sanitize_val_alu out of op switch
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13627-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From: 4.18.0-348.el8
- CVE-2021-29155 CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Tighten speculative pointer arithmetic mask
- CVE: https://access.redhat.com/security/cve/cve-2021-33200
- Patch: 4.18.0/13628-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From: 4.18.0-348.el8
- CVE-2021-29155 CVE-2021-31829, CVSSv2 Score: 6.2
- Description:
bpf: Fix masking negation logic upon negative dst register
- CVE: https://access.redhat.com/security/cve/cve-2021-31829
- Patch: 4.18.0/13630-bpf-Fix-masking-negation-logic-upon-negative-dst-re.patch
- From: 4.18.0-348.el8
- CVE-2021-29155 CVE-2021-31829, CVSSv2 Score: 6.2
- Description:
bpf: Fix leakage of uninitialized bpf stack under speculation
- CVE: https://access.redhat.com/security/cve/cve-2021-31829
- Patch: 4.18.0/13631-bpf-Fix-leakage-of-uninitialized-bpf-stack-under-sp.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Wrap aux data inside bpf_sanitize_info container
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13633-bpf-Wrap-aux-data-inside-bpf_sanitize_info-containe.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: Fix mask direction swap upon off reg sign change
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13634-bpf-Fix-mask-direction-swap-upon-off-reg-sign-chang.patch
- From: 4.18.0-348.el8
- CVE-2021-29155, CVSSv2 Score: 4.4
- Description:
bpf: No need to simulate speculative domain for immediates
- CVE: https://access.redhat.com/security/cve/cve-2021-29155
- Patch: 4.18.0/13635-bpf-No-need-to-simulate-speculative-domain-for-imme.patch
- From: 4.18.0-348.el8
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://access.redhat.com/security/cve/cve-2021-3679
- Patch: 4.18.0/13654-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-caus.patch
- From: 4.18.0-348.el8
- CVE-2021-3659, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://access.redhat.com/security/cve/cve-2021-3659
- Patch: 4.18.0/13655-net-mac802154-Fix-general-protection-fault.patch
- From: 4.18.0-348.el8
- CVE-2020-26147 CVE-2020-26140 CVE-2020-26143, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13729-mac80211-assure-all-fragments-are-encrypted.patch
- From: 4.18.0-348.el8
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13730-mac80211-prevent-mixed-key-and-fragment-cache-attac.patch
- From: 4.18.0-348.el8
- CVE-2020-24588 CVE-2020-26144, CVSSv2 Score: 4.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13731-mac80211-properly-handle-A-MSDUs-that-start-with-an.patch
- From: 4.18.0-348.el8
- CVE-2020-24588 CVE-2020-26144, CVSSv2 Score: 6.5
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13732-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: 4.18.0-348.el8
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13733-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: 4.18.0-348.el8
- CVE-2020-26146, CVSSv2 Score: 5.3
- Description:
mac80211: check defrag PN against current frame
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13735-mac80211-check-defrag-PN-against-current-frame.patch
- From: 4.18.0-348.el8
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13736-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 4.18.0-348.el8
- CVE-2020-26139, CVSSv2 Score: 3.5
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13737-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: 4.18.0-348.el8
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13738-mac80211-extend-protection-against-mixed-key-and-fr.patch
- From: 4.18.0-348.el8
- CVE-2020-26146, CVSSv2 Score: 4.3
- Description:
ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13739-ath10k-add-CCMP-PN-replay-protection-for-fragmented.patch
- From: 4.18.0-348.el8
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for PCIe
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13740-ath10k-drop-fragments-with-multicast-DA-for-PCIe.patch
- From: 4.18.0-348.el8
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for SDIO
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13741-ath10k-drop-fragments-with-multicast-DA-for-SDIO.patch
- From: 4.18.0-348.el8
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
ath10k: drop MPDU which has discard flag set by firmware for SDIO
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13742-ath10k-drop-MPDU-which-has-discard-flag-set-by-firm.patch
- From: 4.18.0-348.el8
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
ath10k: Fix TKIP Michael MIC verification for PCIe
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13743-ath10k-Fix-TKIP-Michael-MIC-verification-for-PCIe.patch
- From: 4.18.0-348.el8
- CVE-2020-24588 CVE-2020-26144, CVSSv2 Score: 6.5
- Description:
ath10k: Validate first subframe of A-MSDU before processing the list
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13744-ath10k-Validate-first-subframe-of-A-MSDU-before-pro.patch
- From: 4.18.0-348.el8
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks (kpatch adaptation)
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13730-mac80211-prevent-mixed-key-and-fragment-cache-attac-kpatch-1.patch
- From: 4.18.0-348.el8
- CVE-2020-24586, CVSSv2 Score: 4.3
- Description:
mac80211: add fragment cache to sta_info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24586
- Patch: 4.18.0/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: 4.18.0-348.el8
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
mac80211: prevent attacks on TKIP/WEP as well (kpatch adaptation)
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13736-mac80211-prevent-attacks-on-TKIP-WEP-as-well-kpatch-1.patch
- From: 4.18.0-348.el8
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://access.redhat.com/security/cve/cve-2021-3732
- Patch: 4.18.0/13951-ovl-prevent-private-clone-if-bind-mount-is-not-allo-240.patch
- From: 4.18.0-348.el8
- CVE-2021-33098, CVSSv2 Score: 5.5
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://access.redhat.com/security/cve/CVE-2021-33098
- Patch: 4.18.0/CVE-2021-33098-ixgbe-fix-large-MTU-request-from-VF.patch
- From: kernel-4.18.0-348.el8
- CVE-2019-14615, CVSSv2 Score:
- Description:
Already included.
- CVE:
- Patch: skipped/CVE-2019-14615.patch
- From:
- CVE-2020-27777, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2020-27777.patch
- From:
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://access.redhat.com/security/cve/cve-2021-20321
- Patch: 4.18.0/14188-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 4.18.0-348.7.1.el8
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.1.12/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 4.1.12-124.59.1.2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/print: introduce new struct drm_device based WARN* macros
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-0001-drm-print-introduce-new-struct-drm_device-based-WARN.patch
- From: 4.18.0-240.el8
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-240.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.18.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.18.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records-348.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 5.4.17-2136.302.7.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 5.4.17/CVE-2021-0920-kpatch.patch
- From: 5.4.17-2136.302.7.2
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
drm/vmwgfx: Fix stale file descriptors on failed usercopy
- CVE: https://access.redhat.com/security/cve/CVE-2022-22942
- Patch: 4.18.0/CVE-2022-22942-drm-vmwgfx-Fix-stale-file-descriptors-on-failed-usercopy.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.14.0/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.14.262-200.489.amzn2
- CVE-2022-0516, CVSSv2 Score: 7.8
- Description:
KVM: s390: Return error on SIDA memop on normal guest
- CVE: https://access.redhat.com/security/cve/CVE-2022-0516
- Patch: 4.18.0/CVE-2022-0516-KVM-s390-Return-error-on-SIDA-memop-on-normal-guest.patch
- From: 4.18.0-348.20.1.el8_5
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array size
- CVE: https://access.redhat.com/security/cve/CVE-2022-25636
- Patch: 4.18.0/CVE-2022-25636.patch
- From: >4.18.0-348.12.2.el8_5
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0001-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-32
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0002-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://access.redhat.com/security/cve/cve-2021-41864
- Patch: 4.18.0/1324-bpf-Fix-integer-overflow-in-prealloc_elems_and_freel.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4037, CVSSv2 Score: 4.4
- Description:
xfs: fix up non-directory creation in SGID directories
- CVE: https://access.redhat.com/security/cve/cve-2021-4037
- Patch: 4.18.0/1626-xfs-fix-up-non-directory-creation-in-SGID-directorie-240.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash()
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2169-ipv6-use-siphash-in-rt6_exception_hash.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2170-ipv6-make-exception-cache-less-predictible.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash() (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/2169-ipv6-use-siphash-in-rt6_exception_hash-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii
- CVE: https://access.redhat.com/security/cve/cve-2020-13974
- Patch: 4.18.0/2474-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-13974
- Patch: 4.18.0/2474-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4157, CVSSv2 Score: 5.9
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://access.redhat.com/security/cve/cve-2021-4157
- Patch: 4.18.0/2674-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nf.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3743, CVSSv2 Score: 6.2
- Description:
net: qrtr: fix another OOB Read in qrtr_endpoint_post
- CVE: https://access.redhat.com/security/cve/cve-2021-3743
- Patch: 4.18.0/7796-net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3752, CVSSv2 Score: 7.0
- Description:
Bluetooth: fix use-after-free error in lock_sock_nested()
- CVE: https://access.redhat.com/security/cve/cve-2021-3752
- Patch: 4.18.0/7971-Bluetooth-fix-use-after-free-error-in-lock_sock_nest.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun()
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8090-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8091-ipv4-make-exception-cache-less-predictible.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun() (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.18.0/8090-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4083, CVSSv2 Score: 7.4
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://access.redhat.com/security/cve/cve-2021-4083
- Patch: 4.18.0/9104-fget-check-that-the-fd-still-exists-after-getting-a-.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3773, CVSSv2 Score: 5.9
- Description:
netfilter: nat: force port remap to prevent shadowing well-known ports
- CVE: https://access.redhat.com/security/cve/cve-2021-3773
- Patch: 4.18.0/9346-netfilter-nat-force-port-remap-to-prevent-shadowing-.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45485, CVSSv2 Score: 7.5
- Description:
ipv6: use prandom_u32() for ID generation
- CVE: https://access.redhat.com/security/cve/cve-2021-45485
- Patch: 4.18.0/11062-ipv6-use-prandom_u32-for-ID-generation.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: unify attach permission checking
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/0192-cgroup-unify-attach-permission-checking.patch
- From: kernel-4.18.0-348.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup/cgroup.c: replace 'of->kn->priv' with of_cft()
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/0203-cgroup-cgroup.c-replace-of-kn-priv-with-of_cft.patch
- From: kernel-4.18.0-348.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: cgroup.{procs,threads} factor out common parts
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/0206-cgroup-cgroup.-procs-threads-factor-out-common-parts.patch
- From: kernel-4.18.0-348.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time credentials for process migraton perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/11280-cgroup-Use-open-time-credentials-for-process-migrat.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.18.0/11282-cgroup-Use-open-time-cgroup-namespace-for-process-m.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
tee: handle lookup of shm with reference count 0
- CVE: https://access.redhat.com/security/cve/cve-2021-44733
- Patch: 4.18.0/11389-tee-handle-lookup-of-shm-with-reference-count-0.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent potential read overflow in ioctl
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 4.18.0/11697-Input-joydev-prevent-potential-read-overflow-in-ioc.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: use true,false for bool variable
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/1329-fuse-use-true-false-for-bool-variable.patch
- From: kernel-4.18.0-348.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-240-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-0941, CVSSv2 Score: 6.7
- Description:
bpf: Remove MTU check in __bpf_skb_max_len
- CVE: https://access.redhat.com/security/cve/CVE-2021-0941
- Patch: 4.18.0/CVE-2021-0941-bpf-Remove-MTU-check-in-__bpf_skb_max_len-193.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-4788, CVSSv2 Score:
- Description:
IBM Power9 is unsupported
- CVE:
- Patch: skipped/CVE-2020-4788.patch
- From:
- CVE-2020-0404, CVSSv2 Score: 5.5
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0404
- Patch: 4.15.0/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-malformed-USB-descriptors.patch
- From: kernel-4.15.0-96.97
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-list.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: clean up all clients on device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-clean-up-all-clients-on-device-removal.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27820
- Patch: 4.18.0/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-kpatch-240.patch
- From: 4.18.0-372.9.1.el8
- CVE-2021-3669, CVSSv2 Score: 5.5
- Description:
ipc: replace costly bailout check in sysvipc_find_ipc()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3669
- Patch: 4.18.0/CVE-2021-3669-ipc-replace-costly-bailout-check-in-sysvipc_find_ipc.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3764 CVE-2021-3744, CVSSv2 Score: 5.5
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-bionic/4.15.0-163.171/0005-CVE-2021-3744-CVE-2021-3764-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd.patch
- From: 4.15.0-163.171
- CVE-2021-3759, CVSSv2 Score: 5.5
- Description:
memcg: enable accounting of ipc resources
- CVE: https://access.redhat.com/security/cve/cve-2021-3759
- Patch: 4.18.0/CVE-2021-3759-memcg-enable-accounting-of-ipc-resources.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
use init_tag from inithdr for ABORT chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
fix the processing for COOKIE_ECHO chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-fix-the-processing-for-COOKIE_ECHO-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_do_8_5_1_E_sa
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_do_8_5_1_E_sa.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_ootb
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_ootb.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.18.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare-80.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-21781, CVSSv2 Score:
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2021-21781.patch
- From:
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2021-43056, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-43056.patch
- From:
- CVE-2022-0001, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
hso: fix bailout in error case of probe
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-37159
- Patch: 4.19.0/CVE-2021-37159-hso-fix-bailout-in-error-case-of-probe.patch
- From: 4.19.208-1
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-37159
- Patch: 4.19.0/CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_device.patch
- From: 4.19.208-1
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42739
- Patch: ubuntu-bionic/4.15.0-167.175/0004-CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch
- From: 4.15.0-167.175
- CVE-2021-43389, CVSSv2 Score: 5.5
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-43389
- Patch: ubuntu-bionic/4.15.0-166.174/0005-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 4.15.0-166.174
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43976
- Patch: 4.19.0/CVE-2021-43976-mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
- From: 4.19.232-1
- CVE-2022-0322, CVSSv2 Score: 5.5
- Description:
account stream padding length for reconf chunk
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0322
- Patch: 4.19.0/CVE-2022-0322.patch
- From: <= linux-4.19.208-1
- CVE-2021-4203, CVSSv2 Score: 6.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses
- CVE: https://access.redhat.com/security/cve/cve-2021-4203
- Patch: 4.18.0/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-4203, CVSSv2 Score: 6.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-4203
- Patch: 4.18.0/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses-kpatch-193.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation
- CVE: https://access.redhat.com/security/cve/cve-2021-45486
- Patch: 4.18.0/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-45486
- Patch: 4.18.0/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation-kpatch.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 4.18.0/CVE-2022-27666.patch
- From: 4.18.0-372.9.1.el8
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
sock: remove one redundant SKB_FRAG_PAGE_ORDER macro (CVE-2022-27666 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 4.19.0/CVE-2022-27666-dependency.patch
- From: v5.14
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1729
- Patch: 4.18.0/CVE-2022-1729-perf-Fix-sys_perf_event_open-race-against-self.patch
- From: 5.10.120-1
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets earlier
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 4.18.0/CVE-2022-32250-netfilter-nf_tables-disallow-non-stateful-expression-in-sets-240.patch
- From: >kernel-4.18.0-372.9.1.el8
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 4.18.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset.patch
- From: 4.18.0-372.19.1
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: ubuntu-bionic/4.15.0-191.202/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: kernel-4.15.0-191.202
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.10.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.10.113-1
- CVE-2022-0494, CVSSv2 Score: 4.4
- Description:
block-map: add __GFP_ZERO flag for alloc_page in function
- CVE: https://access.redhat.com/security/cve/CVE-2022-0494
- Patch: 5.4.0/CVE-2022-0494-block-map-add-__GFP_ZERO-for-alloc_page-in-bio_copy_kern.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2021-3640, CVSSv2 Score: 6.7
- Description:
Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 4.19.0/CVE-2021-3640.patch
- From: <= linux-4.19.208-1
- CVE-2022-1055, CVSSv2 Score: 6.3
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1055
- Patch: 4.18.0/CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28390
- Patch: 4.14.0/CVE-2022-28390.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://access.redhat.com/security/cve/cve-2022-20368
- Patch: 4.18.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
SUNRPC: Ensure we flush any closed sockets before
- CVE: https://access.redhat.com/security/cve/CVE-2022-28893
- Patch: 4.18.0/CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-pre-304.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
[PATCH] SUNRPC: Don't leak sockets in xs_local_connect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0003-CVE-2022-28893-SUNRPC-Don-t-leak-sockets-in-xs_local_connect.patch
- From: 5.4.0-124.140
- CVE-2022-29581, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: fix netns refcount changes in u32_change()
- CVE: https://access.redhat.com/security/cve/CVE-2022-29581
- Patch: 4.18.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 4.4.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 5.4.17/CVE-2020-36516-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 5.4.17-2136.306.1.3
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix race in VT_RESIZEX
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-vt-vt_ioctl-fix-race-in-VT_RESIZEX.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-30002
- Patch: ubuntu-focal/5.4.0-73.82/0001-CVE-2021-30002-media-v4l-ioctl-Fix-memory-leak-in-video_usercopy.patch
- From: 5.4.0-73.82
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: prevent bad output lengths in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 5.10.0/CVE-2022-0168-cifs-prevent-bad-output-lengths-in-smb2_ioctl_query_info.patch
- From: 5.10.113-1
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0168
- Patch: 4.18.0/CVE-2022-0168-cifs-fix-NULL-ptr-dereference-in-smb2_ioctl_query_info-240.patch
- From: 5.10.113-1
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0854, CVSSv2 Score: 5.5
- Description:
Reinstate some of "swiotlb: rework "fix info leak with
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0854
- Patch: 4.18.0/CVE-2022-0854-Reinstate-some-of-swiotlb-rework-fix-info-leak-with-348.patch
- From: 5.10.120-1
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make variable "count" signed
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-make-variable-count-signed.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-2938, CVSSv2 Score: 7.8
- Description:
psi: Fix uaf issue when psi trigger is destroyed while being polled (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-2938
- Patch: 4.18.0/CVE-2022-2938-kpatch-305.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.18.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls-240.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 5.10.113
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.18.0/CVE-2022-1048-kpatch-240.patch
- From: 5.10.113
- CVE-2022-2639, CVSSv2 Score: 7.8
- Description:
openvswitch: fix OOB access in reserve_sfa_size()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2639
- Patch: 4.18.0/CVE-2022-2639-openvswitch-fix-OOB-access-in-reserve_sfa_size.patch
- From: 4.18.0-372.26.1
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 4.18.0/CVE-2022-1016.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
Bail out in case userspace uses unsupported registers.
- CVE: https://access.redhat.com/security/cve/cve-2022-1015
- Patch: 4.18.0/CVE-2022-1015.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-2078, CVSSv2 Score: 5.3
- Description:
netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2078
- Patch: 4.18.0/CVE-2022-2078-netfilter-nf_tables-sanitize-nft_set_desc_concat_parse.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-23960, CVSSv2 Score:
- Description:
Out of scope as the patch is aarch64 related
- CVE:
- Patch: skipped/CVE-2022-23960.patch
- From:
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-24448
- Patch: 4.14.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0001-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another
- CVE: https://linux.oracle.com/cve/CVE-2022-2586.html
- Patch: 5.4.17/CVE-2022-2586-0002-netfilter-nf_tables-do-not-allow-RULE_ID-to-refer-to.patch
- From: 5.4.17-2136.311.6.el8uek
- CVE-2022-21499, CVSSv2 Score: 6.7
- Description:
lockdown: also lock down previous kgdb use
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21499
- Patch: 4.18.0/CVE-2022-21499-lockdown-also-lock-down-previous-kgdb-use.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-4139, CVSSv2 Score: 7.0
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute
- CVE: https://access.redhat.com/security/cve/CVE-2022-4139
- Patch: 4.18.0/CVE-2022-4139-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-co-305.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-1-net-usb-ax88179_178a-allow-optionally-getting-mac-ad.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-2-ax88179_178a-Merge-memcpy-le32_to_cpus-to-get_unalig.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-3-net-usb-ax88179_178a-fix-packet-alignment-padding.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 4.18.0/CVE-2022-2964-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-R.patch
- From: 4.18.0-425.10.1.el8_7
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: prevent memory corruption in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: rhel8/4.18.0-425.13.1.el8_7/CVE-2022-2873-i2c-ismt-prevent-memory-corruption-in-ismt-access.patch
- From: 4.18.0-425.13.1.el8_7
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to
- CVE: https://access.redhat.com/security/cve/CVE-2022-4269
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4269-2-net-sched-act_mirred-refactor-the-handle-of-xmit-pre-304.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to
- CVE: https://access.redhat.com/security/cve/CVE-2022-4269
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4269-act_mirred-use-the-backlog-for-nested-calls-to-mirre-pre-304.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4378-0001-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2022-4378-0002-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2023-0266, CVSSv2 Score: 7.8
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://access.redhat.com/security/cve/CVE-2023-2066
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2023-0266-ALSA-pcm-Move-rwsem-lock-inside-snd_ctl_elem_read-to.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2023-0386, CVSSv2 Score: 7.0
- Description:
ovl: fail on invalid uid/gid mapping at copy up
- CVE: https://access.redhat.com/security/cve/CVE-2023-0386
- Patch: rhel8/4.18.0-425.19.2.el8_7/CVE-2023-0386-ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
- From: 4.18.0-425.19.2.el8_7
- CVE-2022-41674, CVSSv2 Score: 7.3
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41674
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1679, CVSSv2 Score: 7.0
- Description:
ath9k: fix use-after-free in ath9k_hif_usb_rx_cbMIME-Version: 1.0
- CVE: https://access.redhat.com/security/cve/CVE-2022-1679
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3239, CVSSv2 Score: 7.0
- Description:
media: em28xx: initialize refcount before kref_get
- CVE: https://access.redhat.com/security/cve/CVE-2022-3239
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref_get.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3625, CVSSv2 Score: 7.8
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://access.redhat.com/security/cve/CVE-2022-3625
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-30594, CVSSv2 Score: 5.5
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
- CVE: https://access.redhat.com/security/cve/CVE-2022-30594
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-25265, CVSSv2 Score: 7.8
- Description:
x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
- CVE: https://access.redhat.com/security/cve/CVE-2022-25265
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-25265-0810-x86-elf-Disable-automatic-READ_IMPLIES_EXEC-on-64-bi.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-20141, CVSSv2 Score: 7.0
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://access.redhat.com/security/cve/CVE-2022-20141
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://access.redhat.com/security/cve/CVE-2022-3028
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://access.redhat.com/security/cve/CVE-2022-3564
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_reassemble_sdu-pre-372.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3623, CVSSv2 Score: 7.5
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
- CVE: https://access.redhat.com/security/cve/CVE-2022-3623
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page-pre-304.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://access.redhat.com/security/cve/CVE-2023-0461
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-the-LISTEN-status.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-42720, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://access.redhat.com/security/cve/CVE-2022-42720
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs-pre-425.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3524, CVSSv2 Score: 6.6
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3707, CVSSv2 Score: 5.5
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3628
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf_fweh_event_worker.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-43750, CVSSv2 Score: 6.7
- Description:
usb: mon: make mmapped memory read only
- CVE: https://access.redhat.com/security/cve/CVE-2022-43750
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
video: of_display_timing.h: include errno.h
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0001-video-of_display_timing.h-include-errno.h.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0002-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0003-fbcon-Prevent-that-screen-size-is-smaller-than-font-240.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://access.redhat.com/security/cve/CVE-2021-33655
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0004-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2021-33656, CVSSv2 Score: 6.8
- Description:
vt: drop old FONT ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2021-33656
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net: fix a concurrency bug in l2tp_tunnel_register()
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0001-net-fix-a-concurrency-bug-in-l2tp_tunnel_register.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0002-l2tp-Serialize-access-to-sk_user_data-with-sk_callba.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://access.redhat.com/security/cve/CVE-2022-4129
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0003-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
vt: use tty_insert_flip_string in respond_string
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0001-vt-use-tty_insert_flip_string-in-respond_string.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
vt: keyboard, use tty_insert_flip_string in puts_queue
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0002-vt-keyboard-use-tty_insert_flip_string-in-puts_queue.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drivers/tty/, stop using tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0003-tty-drivers-tty-stop-using-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: the rest, stop using tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0004-tty-the-rest-stop-using-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drop tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0006-tty-extract-tty_flip_buffer_commit-from-tty_flip_buf.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0007-tty-use-new-tty_insert_flip_string_and_push_buffer-i-240.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2022-1462, CVSSv2 Score: 6.8
- Description:
tty: drop tty_schedule_flip()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1462
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip-kpatch.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-32233
- Patch: rhel8/4.18.0-477.13.1.el8_8/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase-348.patch
- From: 4.18.0-477.13.1.el8_8
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://access.redhat.com/security/cve/CVE-2023-28466
- Patch: rhel8/4.18.0-477.15.1.el8_8/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf-240.patch
- From: 4.18.0-477.15.1.el8_8
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-1281, CVSSv2 Score: 7.8
- Description:
net/sched: tcindex: update imperfect hash filters
- CVE: https://access.redhat.com/security/cve/CVE-2023-1281
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-resp.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-1829, CVSSv2 Score:
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2194
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-2235, CVSSv2 Score: 7.8
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2235
- Patch: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
- From: 4.18.0-477.21.1.el8_8
- CVE-2023-4004, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://access.redhat.com/security/cve/CVE-2023-4004
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://access.redhat.com/security/cve/CVE-2023-3390
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with-2.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://access.redhat.com/security/cve/CVE-2023-3090
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://access.redhat.com/security/cve/CVE-2023-35788
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35788-net-sched-flower-fix-possible-oob-write-in-fl-set-geneve-opt.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-20593-zenbleed.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://access.redhat.com/security/cve/CVE-2023-35001
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 4.18.0-477.27.1.el8_8
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2023-2002
- Patch: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 4.18.0-477.27.1.el8_8
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.15.0/kpatch-add-alt-asm-definitions-56.62.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2022-23816, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-23825, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23825.patch
- From:
- CVE-2022-26373, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-29900, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From: