- kernel-4.18.0-513.5.1.lve.el8 (cl8)
- 4.18.0-513.9.1.lve.el8
- 2024-01-27 00:11:09
- 2024-02-05 07:39:26
- K20240127_05
- CVE-2023-2163
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision taints
- CVE: https://access.redhat.com/security/cve/CVE-2023-2163
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-2163-bpf-fix-incorrect-verifier-pruning-due-to-missing-register-precision.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-3812
- Description:
net: tun: fix bugs for oversize packet when napi frags enabled
- CVE: https://access.redhat.com/security/cve/CVE-2023-3812
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-5178
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://access.redhat.com/security/cve/CVE-2023-5178
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvbdev: remove double-unlock
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7808-media-dvbdev-remove-double-unlock.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvbdev: Fix memleak in dvb_register_device
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7810-media-dvbdev-Fix-memleak-in-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvbdev: fix error logic at dvb_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7811-media-dvbdev-fix-error-logic-at-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvbdev: adopts refcnt to avoid UAF
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-media-dvbdev-adopts-refcnt-to-avoid-UAF.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvbdev: fix refcnt bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7813-media-dvbdev-fix-refcnt-bug.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvbdev: adopts refcnt to avoid UAF (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvb-core: Fix use-after-free due to race at dvb_register_device()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-media-dvb-core-Fix-use-after-free-due-to-race-at-dvb_register_device.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45884
- Description:
media: dvb-core: Fix use-after-free due to race at dvb_register_device() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45884
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886
- Description:
media: dvb_net: avoid speculation from net slot
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7817-media-dvb_net-avoid-speculation-from-net-slot.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886
- Description:
media: dvb-core: Fix use-after-free due on race condition at dvb_net
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-media-dvb-core-Fix-UAF-due-to-race-condition-at-dvb_net.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45886
- Description:
media: dvb-core: Fix use-after-free due on race condition at dvb_net (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45886
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919
- Description:
media: dvb_ca_en50221: off by one in dvb_ca_en50221_io_do_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7819-media-dvb_ca_en50221-off-by-one-in-dvb_ca_en50221_io_do_ioctl.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919
- Description:
media: dvb_ca_en50221: avoid speculation from CA slot
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7821-media-dvb_ca_en50221-avoid-speculation-from-CA-slot.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919
- Description:
media: dvb_ca_en50221: fix a size write bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7822-media-dvb_ca_en50221-fix-a-size-write-bug.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919
- Description:
media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-media-dvb-core-Fix-use-after-free-due-to-race-condition-at-dvb_ca_en50221.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2022-45919
- Description:
media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-45919
- Patch: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-kpatch.patch
- From: 4.18.0-513.9.1.el8_9
- CVE-2023-2162
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://access.redhat.com/security/cve/CVE-2023-2162
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-t.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://access.redhat.com/security/cve/CVE-2023-42753
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-4622
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://access.redhat.com/security/cve/CVE-2023-4622
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-20569
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-5633
- Description:
drm/vmwgfx: Fix possible invalid drm gem put calls
- CVE: https://access.redhat.com/security/cve/CVE-2023-5633
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-5633-drm-vmwgfx-Fix-possible-invalid-drm-gem-put-calls.patch
- From: 4.18.0-513.11.1.el8_9
- CVE-2023-5633
- Description:
drm/vmwgfx: Keep a gem reference to user bos in surfaces
- CVE: https://access.redhat.com/security/cve/CVE-2023-5633
- Patch: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-5633-drm-vmwgfx-Keep-a-gem-reference-to-user-bos-in-surfa.patch
- From: 4.18.0-513.11.1.el8_9
- N/A
- Description:
x86 xen add xenpv restore regs and return to usermode
- CVE: N/A
- Patch: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
- From: N/A