- kernel-4.18.0-553.5.1.lve.1.el8 (cl8)
- 4.18.0-553.8.1.lve.el8
- 2024-08-08 20:31:34
- 2024-08-12 12:17:48
- K20240808_02
- CVE-2023-52669
- Description:
CVE patch is for s390 arch only
- CVE:
- Patch: skipped/CVE-2023-52669.patch
- From:
- CVE-2023-52675
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52675.patch
- From:
- CVE-2023-52686
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52686.patch
- From:
- CVE-2023-52703
- Description:
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
- CVE: https://access.redhat.com/security/cve/CVE-2023-52703
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52703-net-usb-kalmia-Don-t-pass-act_len-in-usb_bulk_msg-error-path.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52813
- Description:
crypto: pcrypt - Fix hungtask for PADATA_RESET
- CVE: https://access.redhat.com/security/cve/CVE-2023-52813
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52813-crypto-pcrypt-Fix-hungtask-for-PADATA_RESET.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52700
- Description:
tipc: fix kernel warning when sending SYN message
- CVE: https://access.redhat.com/security/cve/CVE-2023-52700
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52700-tipc-fix-kernel-warning-when-sending-SYN-message.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52835
- Description:
perf/core: Bail out early if the request AUX area is out of bound
- CVE: https://access.redhat.com/security/cve/CVE-2023-52835
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52835-perf-core-Bail-out-early-if-the-request-AUX-area-is-out-of-bound.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52781
- Description:
usb: config: fix iteration issue in 'usb_get_bos_descriptor()'
- CVE: https://access.redhat.com/security/cve/CVE-2023-52781
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52781-usb-config-fix-iteration-issue-in-usb_get_bos_descriptor.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52877
- Description:
usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52877
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52877-usb-typec-tcpm-Fix-NULL-pointer-dereference-in-tcpm_pd_svdm.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52667
- Description:
net/mlx5e: fix a potential double-free in fs_any_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2023-52667
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in-fs_any_create_groups.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52878
- Description:
can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2023-52878
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52878-can-dev-can_put_echo_skb-don-t-crash-kernel-if-can_priv::echo_skb-is-accessed-out-of-bounds.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://access.redhat.com/security/cve/CVE-2023-52464
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52464-EDAC_thunderx-Fix-possible-out-of-bounds-string-access.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26907
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://access.redhat.com/security/cve/CVE-2024-26907
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26907-RDMA_mlx5-Fix-fortify-source-warning-while-accessing-Eth-segment.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-5090
- Description:
x86: KVM: SVM: always update the x2avic msr interception
- CVE: https://access.redhat.com/security/cve/CVE-2023-5090
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-5090-x86-KVM-SVM-always-update-the-x2avic-msr-interception.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52626
- Description:
net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context
- CVE: https://access.redhat.com/security/cve/CVE-2023-52626
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52626-net_mlx5e-Fix-operation-precedence-bug-in-port-timestamping-napi_poll-context.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27397
- Description:
netfilter: Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-27397.patch
- From:
- CVE-2023-52560
- Description:
mm/damon/vaddr-test: fix memory leak in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52560
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52560-mm-damon-vaddr-test-fix-memory-leak-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35959
- Description:
net/mlx5e: Fix mlx5e_priv_init() cleanup flow
- CVE: https://access.redhat.com/security/cve/CVE-2024-35959
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35959-net-mlx5e-fix-mlx5e-priv-init-cleanup-flow.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47073
- Description:
platform/x86: dell-smbios-wmi: Fix oops on rmmod
- CVE: https://access.redhat.com/security/cve/CVE-2021-47073
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47073-platform-x86-dell-smbios-wmi-fix-oops-on-rmmod.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35960
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36004
- Description:
i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
- CVE: https://access.redhat.com/security/cve/CVE-2024-36004
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36004-i40e-do-not-use-wq-mem-reclaim-flag-for-workqueue.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35958
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26583 CVE-2024-26584 CVE-2024-26585
- Description:
tls: disable async encrypt/decrypt
- CVE: https://access.redhat.com/security/cve/CVE-2024-26585
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26583-tls-disable-async-encrypt-decrypt.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26859
- Description:
net/bnx2x: Prevent access to a freed page in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26859
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26859-net-bnx2x-prevent-access-to-a-freed-page-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: Reject connection with the device which
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-reject-connection-with-the-device-which.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Fix coding style
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: avoid memcmp() out of bounds warning
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Ignore NULL link key
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2020-26555
- Description:
Bluetooth: hci_event: Fix using memcmp when
- CVE: https://access.redhat.com/security/cve/CVE-2020-26555
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52615
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36007
- Description:
mlxsw: spectrum_acl_tcam: Fix warning during rehash
- CVE: https://access.redhat.com/security/cve/CVE-2024-36007
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36007-mlxsw-spectrum-acl-tcam-fix-warning-during-rehash.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: remove duplicated code
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-remove-duplicated-code.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: update/document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-update-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/msg.c: update and document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-msg-c-update-and-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/sem.c: document and update memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-sem-c-document-and-update-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-msg-sem-avoid-relying-on-a-stack.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47236
- Description:
net: cdc_eem: fix tx fixup skb leak
- CVE: https://access.redhat.com/security/cve/CVE-2021-47236
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47236-net-cdc-eem-fix-tx-fixup-skb-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47353
- Description:
udf: Fix NULL pointer dereference in udf_symlink function
- CVE: https://access.redhat.com/security/cve/CVE-2021-47353
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47353-udf-fix-null-pointer-dereference-in-udf-symlink.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47311
- Description:
net: qcom/emac: fix UAF in emac_remove
- CVE: https://access.redhat.com/security/cve/CVE-2021-47311
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47311-net-qcom-emac-fix-uaf-in-emac-remove.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47310
- Description:
net: ti: fix UAF in tlan_remove_one
- CVE: https://access.redhat.com/security/cve/CVE-2021-47310
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47310-net-ti-fix-uaf-in-tlan-remove-one.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: fix possible use-after-free in HFC_cleanup()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-fix-possible-use-after-free-in-hfc-cleanup.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-hfcpci-fix-use-after-free-bug-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47456
- Description:
can: peak_pci: peak_pci_remove(): fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2021-47456
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47456-can-peak-pci-peak-pci-remove-fix-uaf.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-46972
- Description:
ovl: fix leaked dentry
- CVE: https://access.redhat.com/security/cve/CVE-2021-46972
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-46972-ovl-fix-leaked-dentry.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47495
- Description:
usbnet: sanity check for maxpacket
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-sanity-check-for-maxpacket.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47495
- Description:
usbnet: fix error return code in usbnet_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47495
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-fix-error-return-code-in-usbnet-probe.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35835
- Description:
net/mlx5e: fix a double-free in arfs_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2024-35835
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35835-net-mlx5e-fix-a-double-free-in-arfs-create-groups.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35789
- Description:
wifi: mac80211: check/clear fast rx for non-4addr
- CVE: https://access.redhat.com/security/cve/CVE-2024-35789
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35845
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://access.redhat.com/security/cve/CVE-2024-35845
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35838
- Description:
wifi: mac80211: fix potential sta-link leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-35838
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35838-wifi-mac80211-fix-potential-sta-link-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35852
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35853
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during
- CVE: https://access.redhat.com/security/cve/CVE-2024-35853
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35854
- Description:
mlxsw: spectrum_acl_tcam: Fix possible
- CVE: https://access.redhat.com/security/cve/CVE-2024-35854
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35854-mlxsw-spectrum-acl-tcam-fix-possible.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35855
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
- CVE: https://access.redhat.com/security/cve/CVE-2024-35855
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35855-mlxsw-spectrum_acl_tcam-Fix-possible-use-after-free.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35888
- Description:
erspan: make sure erspan_base_hdr is present in
- CVE: https://access.redhat.com/security/cve/CVE-2024-35888
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35888-erspan-make-sure-erspan-base-hdr-is-present-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35890
- Description:
gro: fix ownership transfer
- CVE: https://access.redhat.com/security/cve/CVE-2024-35890
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-46909
- Description:
CVE patch is for arch/arm which is not supported.
- CVE:
- Patch: skipped/CVE-2021-46909.patch
- From:
- CVE-2024-26656
- Description:
drm/amdgpu: fix use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26656
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26675
- Description:
ppp_async: limit MRU to 64K
- CVE: https://access.redhat.com/security/cve/CVE-2024-26675
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26826
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26826
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26906
- Description:
x86/mm: Complex adaptation required to prevent BPF abuse.
- CVE:
- Patch: skipped/CVE-2024-26906.patch
- From:
- CVE-2024-26974
- Description:
crypto: qat - resolve race condition during AER
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26974
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-26974
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27410
- Description:
wifi: nl80211: reject iftype change with mesh ID
- CVE: https://access.redhat.com/security/cve/CVE-2024-27410
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-id.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26759
- Description:
swap: fix do_swap_page() race with swapoff
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26759-swap-fix-do-swap-page-race-with-swapoff.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26759
- Description:
mm/swap: fix race when skipping swapcache
- CVE: https://access.redhat.com/security/cve/CVE-2024-26759
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26759-mm-swap-fix-race-when-skipping-swapcache.patch
- From: 4.18.0-553.8.1.el8_10
- N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A