- kernel-4.18.0-553.104.1.lve.el7h (cl7h)
- 4.18.0-553.109.1.lve.el7h
- 2026-03-18 09:05:30
- 2026-03-19 12:17:56
- K20260318_24
- CVE-2025-40168
- Description:
smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40168
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2025-40168-smc-use-sk-dst-get-and-dst-dev-rcu-in-smc-clc-prfx-match.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2025-40304
- Description:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-40304
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2025-40304-fbdev-add-bounds-checking-in-bit-putcs-to-fix-vmalloc-out-of-bounds.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_event: Ignore multiple conn complete events
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0001-Bluetooth-hci_event-Ignore-multiple-conn-complete-ev.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_event: Fix checking for invalid handle on error status
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0002-Bluetooth-hci_event-Fix-checking-for-invalid-handle-.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_sync: Cleanup hci_conn if it cannot be aborted
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0003-Bluetooth-hci_sync-Cleanup-hci_conn-if-it-cannot-be-.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0004-Bluetooth-hci_sync-Fix-UAF-on-hci_abort_conn_sync.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2023-53762
- Description:
Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
- CVE: https://access.redhat.com/security/cve/CVE-2023-53762
- Patch: rhel8/4.18.0-553.105.1.el8_10/CVE-2023-53762-0005-Bluetooth-hci_sync-Fix-UAF-in-hci_disconnect_all_syn.patch
- From: 4.18.0-553.105.1.el8_10
- CVE-2025-40064
- Description:
smc: Fix use-after-free in __pnet_find_base_ndev().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40064
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-40064-smc-fix-use-after-free-in-pnet-find-base-ndev.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2025-68800
- Description:
mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
- CVE: https://access.redhat.com/security/cve/CVE-2025-68800
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-68800-mlxsw-spectrum-mr-fix-use-after-free-when-updating-multicast-route-stats.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2025-38129
- Description:
page_pool: Fix use-after-free in page_pool_recycle_in_ring
- CVE: https://access.redhat.com/security/cve/CVE-2025-38129
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-38129-page-pool-fix-use-after-free-in-page-pool-recycle-in-ring.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2026-23074
- Description:
net/sched: Enforce that teql can only be used as root qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2026-23074
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2026-23074-net-sched-enforce-that-teql-can-only-be-used-as-root-qdisc.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2025-38248
- Description:
bridge: mcast: Fix use-after-free during router port configuration
- CVE: https://access.redhat.com/security/cve/CVE-2025-38248
- Patch: rhel8/4.18.0-553.107.1.el8_10/CVE-2025-38248-bridge-mcast-fix-use-after-free-during-router-port-configuration.patch
- From: 4.18.0-553.107.1.el8_10
- CVE-2026-23097
- Description:
migrate: correct lock ordering for hugetlb file folios
- CVE: https://access.redhat.com/security/cve/CVE-2026-23097
- Patch: rhel8/4.18.0-553.109.1.el8_10/CVE-2026-23097-migrate-correct-lock-ordering-for-hugetlb-file-folios.patch
- From: 4.18.0-553.109.1.el8_10
- CVE-2025-71085
- Description:
ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
- CVE: https://access.redhat.com/security/cve/CVE-2025-71085
- Patch: rhel8/4.18.0-553.111.1.el8_10/CVE-2025-71085-ipv6-bug-in-pskb-expand-head-as-part-of-calipso-skbuff-setattr.patch
- From: 4.18.0-553.111.1.el8_10
- CVE-2026-23001
- Description:
macvlan: fix possible UAF in macvlan_forward_source()
- CVE: https://access.redhat.com/security/cve/CVE-2026-23001
- Patch: rhel8/4.18.0-553.111.1.el8_10/CVE-2026-23001-macvlan-fix-possible-uaf-in-macvlan-forward-source.patch
- From: 4.18.0-553.111.1.el8_10
- N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A