- kernel-4.18.0-553.56.1.el8_10 (rhel8)
- 4.18.0-553.74.1.el8_10
- 2025-09-17 20:29:39
- 2025-09-18 08:11:11
- K20250917_22
- CVE-2022-48919, CVSSv2 Score: 7.8
- Description:
cifs: fix double free race when mount fails in cifs_get_root()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48919
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2022-48919-cifs-fix-double-free-race-when-mount-fails-in-cifs_get_root.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2024-50301, CVSSv2 Score: 7.1
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://access.redhat.com/security/cve/CVE-2024-50301
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key_task_permission.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2024-53064, CVSSv2 Score: 5.5
- Description:
idpf: fix idpf_vc_core_init error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-53064
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2024-53064-idpf-fix-idpf_vc_core_init-error-path.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2025-21764, CVSSv2 Score: 7.8
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21764
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc_alloc_skb.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2022-49111, CVSSv2 Score: 7.0
- Description:
Bluetooth: Fix use after free in hci_send_acl
- CVE: https://access.redhat.com/security/cve/CVE-2022-49111
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49111-bluetooth-fix-use-after-free-in-hci_send_acl.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-49136, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set
- CVE: https://access.redhat.com/security/cve/CVE-2022-49136
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49136-bluetooth-hci_sync-fix-queuing-commands-when-hci_unregister-is-set.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-49058, CVSSv2 Score: 5.5
- Description:
cifs: potential buffer overflow in handling symlinks
- CVE: http://access.redhat.com/security/cve/cve-2022-49058
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49058-cifs-potential-buffer-overflow-in-handling-symlinks.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-57980, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://access.redhat.com/security/cve/cve-2024-57980
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-21991, CVSSv2 Score: 7.8
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://access.redhat.com/security/cve/cve-2025-21991
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-22004, CVSSv2 Score: 7.8
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://access.redhat.com/security/cve/cve-2025-22004
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-49788, CVSSv2 Score: 5.5
- Description:
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
- CVE: https://access.redhat.com/security/cve/cve-2022-49788
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49788-misc-vmw_vmci-fix-an-infoleak-in-vmci_host_do_receive_datagram.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-23150, CVSSv2 Score: 5.5
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://access.redhat.com/security/cve/CVE-2025-23150
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-37738, CVSSv2 Score: 5.5
- Description:
ext4: ignore xattrs past end
- CVE: https://access.redhat.com/security/cve/CVE-2025-37738
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-37738-ext4-ignore-xattrs-past-end.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-convert-guard-mutex.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-50154, CVSSv2 Score: 7.8
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://access.redhat.com/security/cve/CVE-2024-50154
- Patch: rhel8/4.18.0-553.63.1.el8_10/CVE-2024-50154-tcp-dccp-Don-t-use-timer_pending-in-reqsk_queue_unli.patch
- From: 4.18.0-553.63.1.el8_10
- CVE-2025-38086, CVSSv2 Score: 7.0
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://access.redhat.com/security/cve/CVE-2025-38086
- Patch: rhel8/4.18.0-553.63.1.el8_10/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii_nway_restart.patch
- From: 4.18.0-553.63.1.el8_10
- CVE-2025-21919, CVSSv2 Score: 7.8
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://access.redhat.com/security/cve/CVE-2025-21919
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21919-sched-fair-fix-potential-memory-corruption-in-child-cfs-rq-on-list.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2025-21905, CVSSv2 Score: 7.1
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://access.redhat.com/security/cve/CVE-2025-21905
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2022-49977, CVSSv2 Score: 7
- Description:
ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead
- CVE: https://access.redhat.com/security/cve/CVE-2022-49977
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2022-49977-ftrace-Fix-NULL-pointer-dereference-in-is_ftrace_trampoline-when-ftrace-is-dead.patch
- From: 4.18.0-553.64.1.el8_10
- CVE-2025-21928, CVSSv2 Score: 7.8
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21928
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-22020, CVSSv2 Score: 7.8
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://access.redhat.com/security/cve/CVE-2025-22020
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2022-50020, CVSSv2 Score: 7.0
- Description:
ext4: avoid resizing to a partial cluster size
- CVE: https://access.redhat.com/security/cve/CVE-2022-50020
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2022-50020-ext4-avoid-resizing-to-a-partial-cluster-size.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-38079, CVSSv2 Score: 7.0
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://access.redhat.com/security/cve/CVE-2025-38079
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-38079-crypto-algif_hash-fix-double-free-in-hash_accept.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890, CVSSv2 Score: 5.5
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890, CVSSv2 Score: 5.5
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-sch_hfsc-Fix-qlen-accounting-bug-when-using-peek-in-hfsc_enqueue.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890, CVSSv2 Score: 5.5
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-38052, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2021-47670, CVSSv2 Score: 7.8
- Description:
can: peak_usb: fix use after free bugs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47670
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2021-47670-can-peak_usb-fix-use-after-free-bugs.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21727, CVSSv2 Score: 7.8
- Description:
padata: fix UAF in padata_reorder
- CVE: https://access.redhat.com/security/cve/CVE-2025-21727
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21759, CVSSv2 Score: 7.8
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-add-dev_net_rcu-helper.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21759, CVSSv2 Score: 7.8
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-extend-RCU-protection-in-igmp6_send.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38159, CVSSv2 Score: 7.0
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-38159
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2024-56644, CVSSv2 Score: 5.5
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://access.redhat.com/security/cve/CVE-2024-56644
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38085, CVSSv2 Score: 5.5
- Description:
mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
- CVE: https://access.redhat.com/security/cve/CVE-2025-38085
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-38085-mm-hugetlb-fix-huge_pmd_unshare-vs-GUP-fast-race.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-22097, CVSSv2 Score: 7.8
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://access.redhat.com/security/cve/CVE-2025-22097
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-22097, CVSSv2 Score: 7.8
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://access.redhat.com/security/cve/CVE-2025-22097
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-37914, CVSSv2 Score: 7.0
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37914
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-37914-net_sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-38380, CVSSv2 Score: 7.0
- Description:
i2c/designware: Fix an initialization issue
- CVE: https://access.redhat.com/security/cve/CVE-2025-38380
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38380-i2c-designware-Fix-an-initialization-issue.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-38250, CVSSv2 Score: 7.0
- Description:
Bluetooth: hci_core: Fix use-after-free in vhci_flush()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38250
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38250-bluetooth-hci-core-fix-use-after-free-in-vhci-flush-553.58.1.patch
- From: 5.14.0-570.35.1.el9_6
- N/A, CVSSv2 Score: N/A
- Description:
module: use RCU to synchronize find_module
- CVE: N/A
- Patch: rhel8/remove-locking-check-in-find-module.patch
- From: N/A
- CVE-2025-22058, CVSSv2 Score: 7.1
- Description:
udp: Fix memory accounting leak.
- CVE: https://access.redhat.com/security/cve/CVE-2025-22058
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-22058-udp-Fix-memory-accounting-leak.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38200, CVSSv2 Score: 7.0
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://access.redhat.com/security/cve/CVE-2025-38200
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-38200-i40e-fix-MMIO-write-access-to-an-invalid-page-in-i40e_clear_hw.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38477, CVSSv2 Score: 7.3
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Fix-race-condition-on-qfq_aggregate.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38477, CVSSv2 Score: 7.3
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Avoid-triggering-might_sleep-in-atomic-context-in-qfq_delete_class.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38464, CVSSv2 Score: 7.3
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38464
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38211, CVSSv2 Score: 7.3
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38211, CVSSv2 Score: 7.3
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38332, CVSSv2 Score: 7.0
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://access.redhat.com/security/cve/CVE-2025-38332
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2022-49985, CVSSv2 Score: 7.0
- Description:
bpf: Don't use tnum_range on array range checking for poke descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2022-49985
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2022-49985-bpf-don-t-use-tnum_range-on-array-range-checking-for-poke-descriptors.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2025-38352, CVSSv2 Score: 7.8
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38352
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle_posix_cpu_timers-and-posix_cpu_timer_del.patch
- From: 4.18.0-553.74.1.el8_10
- N/A, CVSSv2 Score: N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A