- kernel-4.18.0-553.16.1.el8_10 (almalinux8-arm64)
- 4.18.0-553.22.1.el8_10
- 2024-11-07 00:45:03
- 2024-11-14 09:06:30
- K20241107_11
- CVE-2024-42084, CVSSv2 Score: 5.5
- Description:
ftruncate: pass a signed offset
- CVE: https://access.redhat.com/security/cve/CVE-2024-42084
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://access.redhat.com/security/cve/CVE-2024-38579
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38559, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://access.redhat.com/security/cve/CVE-2024-38559
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41097, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41097
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39501
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26923-af-unix-fix-garbage-collector-racing-against-connect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42094, CVSSv2 Score: 7.8
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://access.redhat.com/security/cve/CVE-2024-42094
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://access.redhat.com/security/cve/CVE-2024-38558
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-ICMPv6.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42090, CVSSv2 Score: 5.5
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://access.redhat.com/security/cve/CVE-2024-42090
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://access.redhat.com/security/cve/CVE-2024-40904
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39499, CVSSv2 Score: 5.5
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39499
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39506, CVSSv2 Score: 5.5
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://access.redhat.com/security/cve/CVE-2024-39506
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in-lio-vf-rep-copy-packet.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://access.redhat.com/security/cve/CVE-2024-42228
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-37356
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp_update_alpha-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-42096
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://access.redhat.com/security/cve/CVE-2024-42131
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42124, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://access.redhat.com/security/cve/CVE-2024-42124
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41076, CVSSv2 Score: 5.5
- Description:
NFSv4: Fix memory leak in nfs4_set_security_label
- CVE: https://access.redhat.com/security/cve/CVE-2024-41076
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41076-nfsv4-fix-memory-leak-in-nfs4-set-security-label.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40901, CVSSv2 Score: 5.5
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://access.redhat.com/security/cve/CVE-2024-40901
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38619-usb-storage-alauda-fix-uninit-value-in-alauda_check_media.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38619, CVSSv2 Score: 5.5
- Description:
usb-storage: alauda: Check whether the media is initialized (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38619-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47441, CVSSv2 Score: 7.3
- Description:
mlxsw: thermal: Fix out-of-bounds memory accesses
- CVE: https://access.redhat.com/security/cve/CVE-2021-47441
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47441-mlxsw-thermal-fix-out-of-bounds-memory-accesses.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39471
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-39471-drm-amdgpu-fix-signedness-bug-in-sdma_v4_0_process_trap_irq.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42152, CVSSv2 Score: 5.5
- Description:
nvmet: fix a possible leak when destroy a ctrl during qp establishment
- CVE: https://access.redhat.com/security/cve/CVE-2024-42152
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl-during-qp-establishment.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42225, CVSSv2 Score: 7.5
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://access.redhat.com/security/cve/CVE-2024-42225
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42225-wifi-mt76-replace-skb_put-with-skb_put_zero.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41040, CVSSv2 Score: 7.0
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://access.redhat.com/security/cve/CVE-2024-41040
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41040-net-sched-fix-uaf-when-resolving-a-clash.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48866, CVSSv2 Score: 7.1
- Description:
HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
- CVE: https://access.redhat.com/security/cve/CVE-2022-48866
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48866-hid-hid-thrustmaster-fix-oob-read-in-thrustmaster-interrupts.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52800, CVSSv2 Score: 5.5
- Description:
wifi: ath11k: fix htt pktlog locking
- CVE: https://access.redhat.com/security/cve/CVE-2023-52800
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52800-wifi-ath11k-fix-htt-pktlog-locking.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52683, CVSSv2 Score:
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2023-52683.patch
- From:
- CVE-2023-52522, CVSSv2 Score: 5.5
- Description:
net: fix possible store tearing in neigh_periodic_work()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52522
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52522-net-fix-possible-store-tearing-in-neigh-periodic-work.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52476, CVSSv2 Score: 5.5
- Description:
perf/x86/lbr: Filter vsyscall addresses
- CVE: https://access.redhat.com/security/cve/CVE-2023-52476
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52476-perf-x86-lbr-filter-vsyscall-addresses.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26600, CVSSv2 Score: 5.5
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://access.redhat.com/security/cve/CVE-2024-26600
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52798, CVSSv2 Score: 5.5
- Description:
wifi: ath11k: fix dfs radar event locking
- CVE: https://access.redhat.com/security/cve/CVE-2023-52798
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52798-wifi-ath11k-fix-dfs-radar-event-locking.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52809, CVSSv2 Score: 5.5
- Description:
scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52809
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52809-scsi-libfc-fix-potential-null-pointer-dereference-in-fc-lport-ptp-setup.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52840, CVSSv2 Score: 5.5
- Description:
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52840
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52840-input-synaptics-rmi4-fix-use-after-free-in-rmi-unregister-function.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26595, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Move devlink param to TCAM code
- CVE: https://access.redhat.com/security/cve/CVE-2024-26595
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26595-mlxsw-spectrum-acl-tcam-move-devlink-param-to-tcam-code.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26595, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-26595
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26595-mlxsw-spectrum-acl-tcam-fix-null-pointer-dereference-in-error-path.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52605, CVSSv2 Score:
- Description:
CVE Rejected
- CVE:
- Patch: skipped/CVE-2023-52605.patch
- From:
- CVE-2021-47466, CVSSv2 Score: 5.5
- Description:
slub: don't panic for memcg kmem cache creation failure
- CVE: https://access.redhat.com/security/cve/CVE-2021-47466
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47466-slub-don-t-panic-for-memcg-kmem-cache-creation-failure.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47466, CVSSv2 Score: 5.5
- Description:
mm, slub: fix potential memoryleak in kmem_cache_open()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47466
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47466-mm-slub-fix-potential-memoryleak-in-kmem-cache-open.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47497, CVSSv2 Score: 5.5
- Description:
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
- CVE: https://access.redhat.com/security/cve/CVE-2021-47497
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47497-nvmem-fix-shift-out-of-bound-ubsan-with-byte-size-cells.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47527, CVSSv2 Score: 5.5
- Description:
serial: core: fix transmit-buffer reset and memleak
- CVE: https://access.redhat.com/security/cve/CVE-2021-47527
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47527-serial-core-fix-transmit-buffer-reset-and-memleak.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48760, CVSSv2 Score: 5.5
- Description:
USB: core: Fix hang in usb_kill_urb by adding memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2022-48760
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48760-usb-core-fix-hang-in-usb-kill-urb-by-adding-memory-barriers.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47609, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
- CVE: https://access.redhat.com/security/cve/CVE-2021-47609
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47609-firmware-arm-scpi-fix-string-overflow-in-scpi-genpd-driver.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47609, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
- CVE: https://access.redhat.com/security/cve/CVE-2021-47609
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47609-firmware-arm-scpi-fix-string-overflow-in-scpi-genpd-driver-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52470, CVSSv2 Score: 5.5
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52470
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52470-drm-radeon-check-the-alloc-workqueue-return-value-in-radeon-crtc-init.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48804, CVSSv2 Score: 5.5
- Description:
vt_ioctl: fix array_index_nospec in vt_setactivate
- CVE: https://access.redhat.com/security/cve/CVE-2022-48804
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48804-vt-ioctl-fix-array-index-nospec-in-vt-setactivate.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48836, CVSSv2 Score: 5.5
- Description:
Input: aiptek - use descriptors of current altsetting
- CVE: https://access.redhat.com/security/cve/CVE-2022-48836
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48836-input-aiptek-use-descriptors-of-current-altsetting.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48836, CVSSv2 Score: 5.5
- Description:
Input: aiptek - fix endpoint sanity check
- CVE: https://access.redhat.com/security/cve/CVE-2022-48836
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48836-input-aiptek-fix-endpoint-sanity-check.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48836, CVSSv2 Score: 5.5
- Description:
Input: aiptek - properly check endpoint type
- CVE: https://access.redhat.com/security/cve/CVE-2022-48836
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48836-input-aiptek-properly-check-endpoint-type.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47582, CVSSv2 Score: 5.5
- Description:
USB: core: Make do_proc_control() and do_proc_bulk() killable
- CVE: https://access.redhat.com/security/cve/CVE-2021-47582
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47582-usb-core-make-do-proc-control-and-do-proc-bulk-killable.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47582, CVSSv2 Score: 5.5
- Description:
usb: core: Don't hold the device lock while sleeping in do_proc_control()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47582
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47582-usb-core-don-t-hold-the-device-lock-while-sleeping-in-do-proc-control.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://access.redhat.com/security/cve/CVE-2024-42154
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://access.redhat.com/security/cve/CVE-2024-42154
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48754, CVSSv2 Score: 8.4
- Description:
phylib: fix potential use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-48754
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48754-phylib-fix-potential-use-after-free.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52817, CVSSv2 Score: 8.4
- Description:
drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52817
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52817-drm-amdgpu-fix-a-null-pointer-access-when-the-smc-rreg-pointer-is-null.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52817, CVSSv2 Score: 8.4
- Description:
drm/amdgpu/debugfs: fix error code when smc register accessors are NULL
- CVE: https://access.redhat.com/security/cve/CVE-2023-52817
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-52817-drm-amdgpu-debugfs-fix-error-code-when-smc-register-accessors-are-null.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://access.redhat.com/security/cve/CVE-2023-6040
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2023-6040-netfilter-nf-tables-reject-tables-of-unsupported-family.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38581, CVSSv2 Score: 7.8
- Description:
drm/amdgpu/mes: fix use-after-free issue
- CVE: https://access.redhat.com/security/cve/CVE-2024-38581
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38581-drm-amdgpu-mes-fix-use-after-free-issue.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40954, CVSSv2 Score: 7.8
- Description:
net: do not leave a dangling sk pointer, when socket creation fails
- CVE: https://access.redhat.com/security/cve/CVE-2024-40954
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-creation-fails.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40958, CVSSv2 Score: 7.8
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://access.redhat.com/security/cve/CVE-2024-40958
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41071, CVSSv2 Score: 7.8
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://access.redhat.com/security/cve/CVE-2024-41041
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41056, CVSSv2 Score: 5.5
- Description:
firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
- CVE: https://access.redhat.com/security/cve/CVE-2024-41056
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41056-firmware-cs-dsp-use-strnlen-on-name-fields-in-v1-wmfw-files.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41038, CVSSv2 Score: 5.5
- Description:
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
- CVE: https://access.redhat.com/security/cve/CVE-2024-41038
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41038-firmware-cs-dsp-prevent-buffer-overrun-when-processing-v2-alg-headers.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41064, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41065, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41023, CVSSv2 Score: 5.5
- Description:
sched/deadline: Fix task_struct reference leak
- CVE: https://access.redhat.com/security/cve/CVE-2024-41023
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41023-sched-deadline-fix-task-struct-reference-leak.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41035, CVSSv2 Score: 5.5
- Description:
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
- CVE: https://access.redhat.com/security/cve/CVE-2024-41035
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41035-usb-core-fix-duplicate-endpoint-bug-by-clearing-reserved-bits-in-the-descriptor.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-41044
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41060, CVSSv2 Score: 5.5
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://access.redhat.com/security/cve/CVE-2024-41060
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41055, CVSSv2 Score:
- Description:
Fix for skipped CVE-2023-52489 that modifies structure mem_section_usage only used at boot time
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Use struct_size() in kmalloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35944-vmci-use-struct-size-in-kmalloc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35944-vmci-fix-memcpy-run-time-warning-in-dg-dispatch-as-host.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35944
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35944-vmci-fix-possible-memcpy-run-time-warning-in-vmci-datagram-invoke-guest-handler.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35989, CVSSv2 Score: 5.5
- Description:
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
- CVE: https://access.redhat.com/security/cve/CVE-2024-35989
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35989-dmaengine-idxd-fix-oops-during-rmmod-on-single-cpu-platforms.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36920, CVSSv2 Score: 4.4
- Description:
scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
- CVE: https://access.redhat.com/security/cve/CVE-2024-36920
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36920-scsi-mpi3mr-avoid-memcpy-field-spanning-write-warning.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36883, CVSSv2 Score: 7.0
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36883
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36901, CVSSv2 Score: 5.5
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36901
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36902, CVSSv2 Score: 5.5
- Description:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36902
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36902-ipv6-fib6-rules-avoid-possible-null-dereference-in-fib6-rule-action.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36919, CVSSv2 Score: 4.4
- Description:
scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
- CVE: https://access.redhat.com/security/cve/CVE-2024-36919
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36919-scsi-bnx2fc-remove-spin-lock-bh-while-releasing-resources-after-upload.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36922, CVSSv2 Score: 4.4
- Description:
wifi: iwlwifi: read txq->read_ptr under lock
- CVE: https://access.redhat.com/security/cve/CVE-2024-36922
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36922-wifi-iwlwifi-read-txq-read-ptr-under-lock.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36939, CVSSv2 Score: 5.5
- Description:
nfs: handle error of rpc_proc_register() in init_nfs_fs()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36939
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36939-nfs-handle-error-of-rpc_proc_register-in-init_nfs_fs.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36953, CVSSv2 Score: 4.4
- Description:
KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id
- CVE: https://access.redhat.com/security/cve/CVE-2024-36953
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36953-kvm-arm64-vgic-v2-use-cpuid-from-userspace-as-vcpu-id.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-36953, CVSSv2 Score: 4.4
- Description:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36953
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-36953-kvm-arm64-vgic-v2-check-for-non-null-vcpu-in-vgic-v2-parse-attr.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40912
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211-sta-ps-deliver-wakeup.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40929, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://access.redhat.com/security/cve/CVE-2024-40929
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before-accessing-the-ssids.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40931, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_una is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-40931
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40931-mptcp-ensure-snd-una-is-properly-initialized-on-connect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40941, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://access.redhat.com/security/cve/CVE-2024-40941
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40959
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40960
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40978, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://access.redhat.com/security/cve/CVE-2024-40978
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40977, CVSSv2 Score: 5.5
- Description:
wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
- CVE: https://access.redhat.com/security/cve/CVE-2024-40977
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40977-wifi-mt76-mt7921s-fix-potential-hung-tasks-during-chip-recovery.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42237, CVSSv2 Score: 5.5
- Description:
firmware: cs_dsp: Validate payload length before processing block
- CVE: https://access.redhat.com/security/cve/CVE-2024-42237
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42237-firmware-cs-dsp-validate-payload-length-before-processing-block.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42238, CVSSv2 Score: 5.5
- Description:
firmware: cs_dsp: Return error if block header overflows file
- CVE: https://access.redhat.com/security/cve/CVE-2024-42238
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42238-firmware-cs-dsp-return-error-if-block-header-overflows-file.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://access.redhat.com/security/cve/CVE-2024-42265
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42322, CVSSv2 Score: 5.5
- Description:
ipvs: properly dereference pe in ip_vs_add_service
- CVE: https://access.redhat.com/security/cve/CVE-2024-42322
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-42322-ipvs-properly-dereference-pe-in-ip-vs-add-service.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-43830, CVSSv2 Score: 5.5
- Description:
leds: trigger: Unregister sysfs attributes before calling deactivate()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43830
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-43830-leds-trigger-unregister-sysfs-attributes-before-calling-deactivate.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://access.redhat.com/security/cve/CVE-2024-43871
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42226, CVSSv2 Score:
- Description:
Patch introduced regression and was reverted later.
- CVE:
- Patch: skipped/CVE-2024-42226.patch
- From:
- CVE-2024-26638, CVSSv2 Score:
- Description:
nbd: Low-score CVE. Patched function is called from a kthread and sleeps, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-26638.patch
- From:
- CVE-2024-26645, CVSSv2 Score: 4.4
- Description:
tracing: Ensure visibility when inserting an element into tracing_map
- CVE: https://access.redhat.com/security/cve/CVE-2024-26645
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26645-tracing-ensure-visibility-when-inserting-an-element-into-tracing-map.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26649, CVSSv2 Score: 4.4
- Description:
drm/amdgpu: Fix the null pointer when load rlc firmware
- CVE: https://access.redhat.com/security/cve/CVE-2024-26649
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26649-drm-amdgpu-fix-the-null-pointer-when-load-rlc-firmware.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26855, CVSSv2 Score: 4.4
- Description:
net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26855
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26855-net-ice-fix-potential-null-pointer-dereference-in-ice-bridge-setlink.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26880, CVSSv2 Score: 4.4
- Description:
dm: call the resume method on internal suspend
- CVE: https://access.redhat.com/security/cve/CVE-2024-26880
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://access.redhat.com/security/cve/CVE-2024-41012
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48619, CVSSv2 Score: 6.2
- Description:
Input: add bounds checking to input_set_capability()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48619
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2022-48619-input-add-bounds-checking-to-input-set-capability.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47097, CVSSv2 Score: 6.0
- Description:
Input: elantech - fix stack out of bound access in elantech_change_report_id()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47097
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47097-input-elantech-fix-stack-out-of-bound-access-in-elantech-change-report-id.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47101, CVSSv2 Score: 6.0
- Description:
asix: fix uninit-value in asix_mdio_read()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47101
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47101-asix-fix-uninit-value-in-asix-mdio-read.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26894, CVSSv2 Score: 6.0
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26894
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in-acpi-processor-power-exit.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47287, CVSSv2 Score: 5.5
- Description:
driver core: auxiliary bus: Fix memory leak when driver_register() fail
- CVE: https://access.redhat.com/security/cve/CVE-2021-47287
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47287-driver-core-auxiliary-bus-fix-memory-leak-when-driver-register-fail.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47289, CVSSv2 Score: 5.5
- Description:
ACPI: fix NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2021-47289
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47289-acpi-fix-null-pointer-dereference.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47321, CVSSv2 Score: 5.5
- Description:
watchdog: Fix possible use-after-free by calling del_timer_sync()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47321
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47321-watchdog-fix-possible-use-after-free-by-calling-del-timer-sync.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-27042, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
- CVE: https://access.redhat.com/security/cve/CVE-2024-27042
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-27042-drm-amdgpu-fix-potential-out-of-bounds-access-in-amdgpu-discovery-reg-base-init.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26939, CVSSv2 Score: 5.5
- Description:
drm/i915/vma: Fix UAF on destroy against retire race
- CVE: https://access.redhat.com/security/cve/CVE-2024-26939
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26939-drm-i915-vma-fix-uaf-on-destroy-against-retire-race.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35877, CVSSv2 Score: 5.5
- Description:
x86/mm/pat: fix VM_PAT handling in COW mappings
- CVE: https://access.redhat.com/security/cve/CVE-2024-35877
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35877-x86-mm-pat-fix-vm-pat-handling-in-cow-mappings.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26665, CVSSv2 Score: 5.5
- Description:
tunnels: fix out of bounds access when building IPv6 PMTU error
- CVE: https://access.redhat.com/security/cve/CVE-2024-26665
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26665-tunnels-fix-out-of-bounds-access-when-building-ipv6-pmtu-error.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570, CVSSv2 Score: 5.5
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41005, CVSSv2 Score: 5.5
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://access.redhat.com/security/cve/CVE-2024-41005
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41013, CVSSv2 Score: 5.5
- Description:
xfs: don't walk off the end of a directory data block
- CVE: https://access.redhat.com/security/cve/CVE-2024-41013
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41013-0002-xfs-don-t-walk-off-the-end-of-a-directory-data-block.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40988, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://access.redhat.com/security/cve/CVE-2024-40988
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40998, CVSSv2 Score: 5.5
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-40995, CVSSv2 Score: 5.5
- Description:
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40995
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40995-net-sched-act-api-fix-possible-infinite-loop-in-tcf-idr-check-alloc.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41014, CVSSv2 Score: 5.5
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: refactor tcp_retransmit_timer()
- CVE: https://access.redhat.com/security/cve/CVE-2024-41007
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41007-0001-tcp-refactor-tcp_retransmit_timer.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
net: tcp: fix unexcepted socket die when snd_wnd is 0
- CVE: https://access.redhat.com/security/cve/CVE-2024-41007
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41007-0002-net-tcp-fix-unexcepted-socket-die-when-snd_wnd-is-0.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41007, CVSSv2 Score: 5.5
- Description:
tcp: avoid too many retransmit packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-41007
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41007-0003-tcp-avoid-too-many-retransmit-packets.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47455, CVSSv2 Score: 5.5
- Description:
ptp: Fix possible memory leak in ptp_clock_register()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47455
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47455-ptp-fix-possible-memory-leak-in-ptp-clock-register.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47352, CVSSv2 Score: 5.5
- Description:
virtio-net: Add validation for used length
- CVE: https://access.redhat.com/security/cve/CVE-2021-47352
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47352-virtio-net-add-validation-for-used-length.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47383, CVSSv2 Score: 5.5
- Description:
tty: Fix out-of-bound vmalloc access in imageblit
- CVE: https://access.redhat.com/security/cve/CVE-2021-47383
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47383-tty-fix-out-of-bound-vmalloc-access-in-imageblit.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47412, CVSSv2 Score: 5.5
- Description:
block: don't call rq_qos_ops->done_bio if the bio isn't tracked
- CVE: https://access.redhat.com/security/cve/CVE-2021-47412
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47412-block-don-t-call-rq-qos-ops-done-bio-if-the-bio-isn-t-tracked.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47432, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Don't overflow in peek()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47432
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47432-lib-generic-radix-tree-c-don-t-overflow-in-peek.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47393, CVSSv2 Score: 5.5
- Description:
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47393
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47393-hwmon-mlxreg-fan-return-non-zero-value-when-fan-current-state-is-enforced-from-sysfs.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47338, CVSSv2 Score: 5.5
- Description:
fbmem: Do not delete the mode that is still in use
- CVE: https://access.redhat.com/security/cve/CVE-2021-47338
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47338-fbmem-do-not-delete-the-mode-that-is-still-in-use.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-27013, CVSSv2 Score: 5.5
- Description:
tun: limit printing rate when illegal packet received by tun dev
- CVE: https://access.redhat.com/security/cve/CVE-2024-27013
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-27013-tun-limit-printing-rate-when-illegal-packet-received-by-tun-dev.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-35809, CVSSv2 Score: 5.5
- Description:
PCI/PM: Drain runtime-idle callbacks before driver removal
- CVE: https://access.redhat.com/security/cve/CVE-2024-35809
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-35809-pci-pm-drain-runtime-idle-callbacks-before-driver-removal.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26720, CVSSv2 Score:
- Description:
This CVE introduces a regression and is reverted by CVE-2024-42102 in the same errata
- CVE:
- Patch: skipped/CVE-2024-26720.patch
- From: