- kernel-4.18.0-372.102.1.el8_6 (rhel8)
- 4.18.0-372.173.1.el8_6
- 2026-02-06 10:30:42
- 2026-02-09 10:46:31
- K20260206_02
- CVE-2023-3006
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-3006.patch
- From:
- CVE-2023-52578
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-372.105.1.el8_6/CVE-2023-52578-3959-net-add-atomic_long_t-to-net_device_stats-fields.patch
- From: 4.18.0-372.105.1.el8_6
- CVE-2023-52578
- Description:
net: Fix unwanted sign extension in netdev_stats_to_stats64()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-372.105.1.el8_6/CVE-2023-52578-3960-net-Fix-unwanted-sign-extension-in-netdev_stats_to_stats64.patch
- From: 4.18.0-372.105.1.el8_6
- CVE-2023-52578
- Description:
net: bridge: use DEV_STATS_INC()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-372.105.1.el8_6/CVE-2023-52578-3961-net-bridge-use-DEV_STATS_INC.patch
- From: 4.18.0-372.105.1.el8_6
- CVE-2023-52578
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://access.redhat.com/security/cve/CVE-2023-52578
- Patch: rhel8/4.18.0-372.105.1.el8_6/CVE-2023-52578-3959-kpatch.patch
- From: 4.18.0-372.105.1.el8_6
- CVE-2021-47013
- Description:
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
- CVE: https://access.redhat.com/security/cve/CVE-2021-47013
- Patch: rhel8/4.18.0-372.105.1.el8_6/CVE-2021-47013-net-emac-emac-mac-Fix-a-use-after-free-in-emac_mac_tx_buf_send.patch
- From: 4.18.0-372.105.1.el8_6
- CVE-2023-4155
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4155-kvm-sev-only-access-ghcb-fields-once-pre-425.patch
- From: kernel-4.18.0-513.5.1.el8_9
- CVE-2023-51779
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in
- CVE: https://access.redhat.com/security/cve/CVE-2023-51779
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-51779-2946-Bluetooth-af_bluetooth-Fix-Use-After-Free-in-bt_sock-425.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52530
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-52530
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free-425.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.10.113
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls.patch
- From: 5.15.37-39
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.15.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 5.15.37-39
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.18.0/CVE-2022-1048-kpatch-372.patch
- From: 5.10.113
- CVE-2024-26642
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://access.redhat.com/security/cve/CVE-2024-26642
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26993
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26993
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2021-47310
- Description:
net: ti: fix UAF in tlan_remove_one
- CVE: https://access.redhat.com/security/cve/CVE-2021-47310
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47310-net-ti-fix-uaf-in-tlan-remove-one.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2022-1789
- Description:
KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID
- CVE: https://access.redhat.com/security/cve/CVE-2022-1789
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1789-KVM-x86-mmu-fix-NULL-pointer-dereference-on-guest-INVPCID.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2024-26583 CVE-2024-26584 CVE-2024-26585
- Description:
tls: disable async encrypt/decrypt
- CVE: https://access.redhat.com/security/cve/CVE-2024-26585
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26583-tls-disable-async-encrypt-decrypt.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and
- CVE: https://access.redhat.com/security/cve/CVE-2024-26735
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in
- CVE: https://access.redhat.com/security/cve/CVE-2024-26801
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://access.redhat.com/security/cve/CVE-2024-26804
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-27397
- Description:
netfilter: Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-27397.patch
- From:
- CVE-2024-35958
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://access.redhat.com/security/cve/CVE-2024-35958
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36005
- Description:
netfilter: nf_tables: honor table dormant flag from
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36005
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag-from.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36886
- Description:
tipc: fix UAF in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-36886
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47548
- Description:
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47548
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47548-ethernet-hisilicon-hns-hns_dsaf_misc-fix-a-possible-.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48743
- Description:
net: amd-xgbe: Fix skb data length underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48743
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48743-net-amd-xgbe-fix-skb-data-length-underflow.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2023-52667
- Description:
net/mlx5e: fix a potential double-free in fs_any_create_groups
- CVE: https://access.redhat.com/security/cve/CVE-2023-52667
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in-fs_any_create_groups.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52784
- Description:
bonding: stop the device in bond_setup_by_slave()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52784
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52784-bonding-stop-the-device-in-bond-setup-by-slave-513.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26733
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://access.redhat.com/security/cve/CVE-2024-26733
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26852
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26852
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26852-net-ipv6-avoid-possible-UAF-in-ip6_route_mpath_notif.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26908
- Description:
CVE marked as rejected by vendor
- CVE:
- Patch: skipped/CVE-2024-26908.patch
- From:
- CVE-2024-35960
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://access.redhat.com/security/cve/CVE-2024-35960
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36020
- Description:
i40e: fix vf may be used uninitialized in this
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36020
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36020-i40e-fix-vf-may-be-used-uninitialized-in-this.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36025
- Description:
scsi: qla2xxx: Fix off by one in
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36025
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36025-scsi-qla2xxx-fix-off-by-one-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36929
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://access.redhat.com/security/cve/CVE-2024-36929
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38596
- Description:
af_unix: Fix data races in
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38596-af-unix-fix-data-races-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38596
- Description:
af_unix: Fix data-races around sk->sk_shutdown.
- CVE: https://access.redhat.com/security/cve/CVE-2024-38596
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38596-af-unix-fix-data-races-around-sk-sk-shutdown.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47393
- Description:
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47393
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47393-hwmon-mlxreg-fan-return-non-zero-value-when-fan-current-state-is-enforced-from-sysfs.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2023-52486
- Description:
drm: Don't unref the same fb many times by mistake due to deadlock handling
- CVE: https://access.redhat.com/security/cve/CVE-2023-52486
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26640
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://www.cve.org/CVERecord?id=CVE-CVE-2024-26640
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26810
- Description:
vfio/pci: Lock external INTx masking ops
- CVE: https://access.redhat.com/security/cve/CVE-2024-26810
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26826
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://access.redhat.com/security/cve/CVE-2024-26826
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-26870
- Description:
NFSv4.2: fix nfs4_listxattr kernel BUG at
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26870
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26870-nfsv4-2-fix-nfs4-listxattr-kernel-bug-at.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-33621
- Description:
ipvlan: Dont Use skb->sk in
- CVE: https://access.redhat.com/security/cve/CVE-2024-33621
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-33621-ipvlan-dont-use-skb-sk-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35789
- Description:
wifi: mac80211: check/clear fast rx for non-4addr
- CVE: https://access.redhat.com/security/cve/CVE-2024-35789
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36000
- Description:
mm/hugetlb: fix missing hugetlb_lock for resv
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36000
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36000-mm-hugetlb-fix-missing-hugetlb-lock-for-resv.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36489
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://access.redhat.com/security/cve/CVE-2024-36489
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38555
- Description:
net/mlx5: Discard command completions in internal
- CVE: https://access.redhat.com/security/cve/CVE-2024-38555
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47311
- Description:
net: qcom/emac: fix UAF in emac_remove
- CVE: https://access.redhat.com/security/cve/CVE-2021-47311
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47311-net-qcom-emac-fix-uaf-in-emac-remove.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47566
- Description:
proc/vmcore: let pfn_is_ram() return a bool
- CVE: https://access.redhat.com/security/cve/CVE-2021-47566
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2021-47566-proc-vmcore-let-pfn_is_ram-return-a-bool.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2021-47566
- Description:
proc/vmcore: fix clearing user buffer by properly using clear_user()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47566
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2021-47566-proc-vmcore-fix-clearing-user-buffer-by-properly-us.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48637
- Description:
bnxt: prevent skb UAF after handing over to PTP worker
- CVE: https://access.redhat.com/security/cve/CVE-2022-48637
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48637-bnxt-prevent-skb-UAF-after-handing-over-to-PTP-work.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48827
- Description:
NFSD: Fix the behavior of READ near OFFSET_MAX
- CVE: https://access.redhat.com/security/cve/CVE-2022-48827
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48827-NFSD-Fix-the-behavior-of-READ-near-OFFSET_MAX.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48828
- Description:
NFSD: Fix ia_size underflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-48828
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48828-NFSD-Fix-ia_size-underflow.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2022-48829
- Description:
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
- CVE: https://access.redhat.com/security/cve/CVE-2022-48829
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2022-48829-NFSD-Fix-NFSv3-SETATTR-CREATE-s-handling-of-large-f.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://access.redhat.com/security/cve/CVE-2023-52439
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52448
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://access.redhat.com/security/cve/CVE-2023-52448
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52881
- Description:
tcp: do not accept ACK of bytes we never sent
- CVE: https://access.redhat.com/security/cve/CVE-2023-52881
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52881-tcp-do-not-accept-ack-of-bytes-we-never-sent-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2023-52885
- Description:
SUNRPC: Fix UAF in svc_tcp_listen_data_ready()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52885
- Patch: rhel8/4.18.0-372.118.1.el8_6/CVE-2023-52885-SUNRPC-Fix-UAF-in-svc_tcp_listen_data_ready.patch
- From: 4.18.0-372.118.1.el8_6
- CVE-2024-21823
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the
- CVE: https://access.redhat.com/security/cve/CVE-2024-21823
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35852
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when
- CVE: https://access.redhat.com/security/cve/CVE-2024-35852
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36017
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36017
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://access.redhat.com/security/cve/CVE-2024-36971
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36971-net-fix-__dst_negative_advice-race-372.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39502
- Description:
ionic: clean interrupt before enabling queue to avoid credit race
- CVE: https://access.redhat.com/security/cve/CVE-2024-39502
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-clean-interrupt-before-enabling-queue-to.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-39502
- Description:
ionic: fix use after netif_napi_del()
- CVE: https://access.redhat.com/security/cve/CVE-2024-39502
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-fix-use-after-netif-napi-del.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: remove duplicated code
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-remove-duplicated-code.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue.c: update/document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-update-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/msg.c: update and document memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-msg-c-update-and-document-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/sem.c: document and update memory barriers
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-sem-c-document-and-update-memory-barriers.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47069
- Description:
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
- CVE: https://access.redhat.com/security/cve/CVE-2021-47069
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-msg-sem-avoid-relying-on-a-stack.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: fix possible use-after-free in HFC_cleanup()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-fix-possible-use-after-free-in-hfc-cleanup.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47356
- Description:
mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq
- CVE: https://access.redhat.com/security/cve/CVE-2021-47356
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-hfcpci-fix-use-after-free-bug-in.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2021-47468
- Description:
isdn: mISDN: Fix sleeping function called from invalid context
- CVE: https://access.redhat.com/security/cve/CVE-2021-47468
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47468-isdn-mISDN-Fix-sleeping-function-called-from-invalid.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48793
- Description:
KVM: x86: nSVM: fix potential NULL derefernce on nested migration
- CVE: https://access.redhat.com/security/cve/CVE-2022-48793
- Patch: rhel8/4.18.0-372.119.1.el8_6/CVE-2022-48793-KVM-x86-nSVM-fix-potential-NULL-derefernce-on-nested.patch
- From: 4.18.0-372.119.1.el8_6
- CVE-2022-48799
- Description:
perf: Fix list corruption in perf_cgroup_switch()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48799
- Patch: rhel8/4.18.0-372.119.1.el8_6/CVE-2022-48799-perf-Fix-list-corruption-in-perf_cgroup_switch.patch
- From: 4.18.0-372.119.1.el8_6
- CVE-2023-52434
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52434
- Description:
smb: client: fix parsing of SMB3.1.1 POSIX create
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52610
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-52610
- Patch: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2023-52864
- Description:
platform/x86: wmi: Fix opening of char device
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52864
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52864-platform-x86-wmi-fix-opening-of-char-device.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35845
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://access.redhat.com/security/cve/CVE-2024-35845
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36016
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-4.18.0-513.18.1.el8_9.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36904
- Description:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
- CVE: https://access.redhat.com/security/cve/CVE-2024-36904
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-36941
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://access.redhat.com/security/cve/CVE-2024-36941
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-38570
- Description:
gfs2: Remove ill-placed consistency check
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-01-gfs2-Remove-ill-placed-consistency-check.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570
- Description:
gfs2: simplify gdlm_put_lock with out_free label
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-02-gfs2-simplify-gdlm_put_lock-with-out_free-label.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-513.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://access.redhat.com/security/cve/CVE-2024-38570
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-38570-03-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch-513.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48796
- Description:
iommu: Fix potential use-after-free during probe
- CVE: https://access.redhat.com/security/cve/CVE-2022-48796
- Patch: 4.18.0/CVE-2022-48796-iommu-fix-potential-use-after-free-during-probe.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2021-47138
- Description:
cxgb4: avoid accessing registers when clearing filters
- CVE: https://access.redhat.com/security/cve/CVE-2021-47138
- Patch: 4.18.0/CVE-2021-47138-cxgb4-avoid-accessing-registers-when-clearing-filters.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2021-47378
- Description:
nvme-rdma: destroy cm id before destroy qp to avoid use after free
- CVE: https://access.redhat.com/security/cve/CVE-2021-47378
- Patch: 4.18.0/CVE-2021-47378-nvme-rdma-destroy-cm-id-before-destroy-qp-to-avoid-use-after-free.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2022-48659
- Description:
mm/slub: fix to return errno if kmalloc() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-48659
- Patch: 4.18.0/CVE-2022-48659-mm-slub-fix-to-return-errno-if-kmalloc-fails.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-38540
- Description:
bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
- CVE: https://access.redhat.com/security/cve/CVE-2024-38540
- Patch: 4.18.0/CVE-2024-38540-bnxt-re-avoid-shift-undefined-behavior-in.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-38564
- Description:
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
- CVE: https://access.redhat.com/security/cve/CVE-2024-38564
- Patch: 4.18.0/CVE-2024-38564-bpf-add-bpf-prog-type-cgroup-skb-attach-type-enforcement-in.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-38586
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets
- CVE: https://access.redhat.com/security/cve/CVE-2024-38586
- Patch: 4.18.0/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2024-41014
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://access.redhat.com/security/cve/CVE-2024-41014
- Patch: 4.18.0/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 4.18.0-372.121.1.el8_6
- CVE-2021-47461
- Description:
userfaultfd: fix a race between writeprotect and exit_mmap()
- CVE: https://access.redhat.com/security/cve/CVE-2021-47461
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47461-userfaultfd-fix-a-race-between-writeprotect-and-exit.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26698
- Description:
hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
- CVE: https://access.redhat.com/security/cve/CVE-2024-26698
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26698-hv_netvsc-Fix-race-condition-between-netvsc_probe-an.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26982
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-35823
- Description:
vt: fix unicode buffer corruption when deleting
- CVE: https://access.redhat.com/security/cve/CVE-2024-35823
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2021-47492
- Description:
mm, thp: bail out early in collapse_file for writeback page
- CVE: https://access.redhat.com/security/cve/CVE-2021-47492
- Patch: rhel8/4.18.0-372.123.1.el8_6/CVE-2021-47492-mm-thp-bail-out-early-in-collapse_file-for-writebac.patch
- From: 4.18.0-372.123.1.el8
- CVE-2022-48687
- Description:
ipv6: sr: fix out-of-bounds read when setting HMAC data
- CVE: https://access.redhat.com/security/cve/CVE-2022-48687
- Patch: rhel8/4.18.0-372.123.1.el8_6/CVE-2022-48687-ipv6-sr-fix-out-of-bounds-read-when-setting-HMAC-da.patch
- From: 4.18.0-372.123.1.el8
- CVE-2021-47352
- Description:
virtio-net: Add validation for used length
- CVE: https://access.redhat.com/security/cve/CVE-2021-47352
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2021-47352-virtio-net-add-validation-for-used-length-4.18.0-425.19.2.el8_7.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-27020
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-27020
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-27019
- Description:
netfilter: nf_tables: Fix potential data-race in
- CVE: https://access.redhat.com/security/cve/CVE-2024-27019
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27019-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-35898
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- CVE: https://access.redhat.com/security/cve/CVE-2024-35898
- Patch: rhel8/4.18.0-372.123.1.el8_6/CVE-2024-35898-netfilter-nf_tables-Fix-potential-data-race-in-__nf.patch
- From: 4.18.0-372.123.1.el8
- CVE-2024-26704
- Description:
ext4: fix double-free of blocks due to wrong
- CVE: https://access.redhat.com/security/cve/CVE-2024-26704
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26772
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26772
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26773
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26773
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2022-48638
- Description:
cgroup: cgroup_get_from_id() must check the looked-up kn is a directory
- CVE: https://access.redhat.com/security/cve/CVE-2022-48638
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2022-48638-cgroup-cgroup_get_from_id-must-check-the-looked-up-k.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
exit: Use the correct exit_code in /proc/<pid>/stat
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-exit-use-the-correct-exit-code-in-proc-pid-stat.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: use __for_each_thread()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-fs-proc-do-task-stat-use-for-each-thread.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: move thread_group_cputime_adjusted() outside of lock_task_sighand()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-fs-proc-do-task-stat-move.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-26686
- Description:
fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
- CVE: https://access.redhat.com/security/cve/CVE-2024-26686
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-36889
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://access.redhat.com/security/cve/CVE-2024-36889
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-36889-mptcp-ensure-snd_nxt-is-properly-initialized-on-conn.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel8/4.18.0-372.124.1.el8_6/CVE-2024-41071-wifi-mac80211-Avoid-address-calculations-via-out-of-.patch
- From: 4.18.0-372.124.1.el8_6
- CVE-2024-36270
- Description:
netfilter: tproxy: bail out if IP has been disabled
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36270
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-26923
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://access.redhat.com/security/cve/CVE-2024-26923
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-26923-af-unix-fix-garbage-collector-racing-against-connect.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-26598
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
- CVE: https://access.redhat.com/security/cve/CVE-2024-26598
- Patch: rhel8/4.18.0-372.126.1.el8_6/CVE-2024-26598-KVM-arm64-vgic-its-Avoid-potential-UAF-in-LPI-trans.patch
- From: 4.18.0-372.126.1.el8_6
- CVE-2024-26830
- Description:
Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.
- CVE:
- Patch: skipped/CVE-2024-26830.patch
- From:
- CVE-2024-40998
- Description:
ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
- CVE: https://access.redhat.com/security/cve/CVE-2024-40998
- Patch: rhel8/4.18.0-553.22.1.el8_10/CVE-2024-40998-ext4-fix-uninitialized-ratelimit-state-lock-access-in-ext4-fill-super.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2022-48773
- Description:
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
- CVE: https://access.redhat.com/security/cve/CVE-2022-48773
- Patch: rhel8/4.18.0-372.127.1.el8_6/CVE-2022-48773-xprtrdma-fix-pointer-derefs-in-error-cases-of-rpcrd.patch
- From: 4.18.0-372.127.1.el8_6
- CVE-2024-26656
- Description:
drm/amdgpu: fix use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-26656
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug-477.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://access.redhat.com/security/cve/CVE-2024-46858
- Patch: rhel8/4.18.0-372.129.1.el8_6/CVE-2024-46858-mptcp-pm-Fix-uaf-in-__timer_delete_sync.patch
- From: 4.18.0-372.129.1.el8_6
- CVE-2022-48695
- Description:
scsi: mpt3sas: Fix use-after-free warning
- CVE: https://access.redhat.com/security/cve/CVE-2022-48695
- Patch: rhel8/4.18.0-372.129.1.el8_6/CVE-2022-48695-scsi-mpt3sas-Fix-use-after-free-warning.patch
- From: 4.18.0-372.129.1.el8_6
- CVE-2022-48786
- Description:
vsock: remove vsock from connected table when connect is interrupted by a signal
- CVE: https://access.redhat.com/security/cve/CVE-2022-48786
- Patch: rhel8/4.18.0-372.131.1.el8_6/CVE-2022-48786-vsock-remove-vsock-from-connected-table-when-connect.patch
- From: 4.18.0-372.131.1.el8_6
- CVE-2024-35890
- Description:
gro: fix ownership transfer
- CVE: https://access.redhat.com/security/cve/CVE-2024-35890
- Patch: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 4.18.0-553.8.1.el8_10
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://access.redhat.com/security/cve/CVE-2024-53104
- Patch: rhel8/4.18.0-553.40.1.el8_10/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UNDEFINED-477.patch
- From: 4.18.0-553.40.1.el8_10
- CVE-2021-46960
- Description:
cifs: Return correct error code from smb2_get_enc_key
- CVE: https://access.redhat.com/security/cve/cve-2021-46960
- Patch: 2021/CVE-2021-46960/CVE-2021-46960-cifs-Return-correct-error-code-from-smb2_get_enc_key.patch
- From: 4.18.0-372.139.1.el8_6
- CVE-2023-52922
- Description:
can: bcm: Fix UAF in bcm_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52922
- Patch: rhel8/4.18.0-553.45.1.el8_10/CVE-2023-52922-can-bcm-Fix-UAF-in-bcm_proc_show.patch
- From: 4.18.0-553.45.1.el8_10
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://access.redhat.com/security/cve/cve-2024-50302
- Patch: 2024/CVE-2024-50302/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://access.redhat.com/security/cve/cve-2024-53197
- Patch: 2024/CVE-2024-53197/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 4.18.0-553.44.1.el8_10
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel8/4.18.0-372.141.1.el8_6//CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 4.18.0-372.141.1.el8_6
- CVE-2024-53197
- Description:
ALSA: usb-audio: add minimal macros for __free(kfree) to work
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel8/4.18.0-372.141.1.el8_6//CVE-2024-53197-ALSA-usb-audio-add-minimal-macros-for-__free-kfree-to-work.patch
- From: 5.14.0-503.11.1.el9_5
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://access.redhat.com/security/cve/CVE-2024-53150
- Patch: rhel8/4.18.0-553.50.1.el8_10/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 4.18.0-553.50.1.el8_10
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://access.redhat.com/security/cve/CVE-2024-53141
- Patch: rhel8/4.18.0-553.52.1.el8_10/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 4.18.0-553.52.1.el8_10
- CVE-2022-49328
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2022-49328.patch
- From:
- CVE-2022-49696
- Description:
tipc: fix use-after-free Read in tipc_named_reinit
- CVE: https://access.redhat.com/security/cve/CVE-2022-49696
- Patch: rhel8/4.18.0-372.149.1.el8_6/CVE-2022-49696-tipc-fix-use-after-free-Read-in-tipc_named_reinit.patch
- From: 4.18.0-372.149.1.el8_6
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21764
- Patch: rhel8/4.18.0-553.58.1.el8_10/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc_alloc_skb.patch
- From: 4.18.0-553.58.1.el8_10
- CVE-2022-49114
- Description:
scsi: libfc: Fix use after free in fc_exch_abts_resp()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49114
- Patch: rhel8/4.18.0-372.150.1.el8_6/CVE-2022-49114-scsi-libfc-Fix-use-after-free-in-fc_exch_abts_resp.patch
- From: 4.18.0-372.150.1.el8_6
- CVE-2022-49122
- Description:
dm ioctl: prevent potential spectre v1 gadget
- CVE: https://access.redhat.com/security/cve/CVE-2022-49122
- Patch: rhel8/4.18.0-372.150.1.el8_6/CVE-2022-49122-dm-ioctl-prevent-potential-spectre-v1-gadget.patch
- From: 4.18.0-372.150.1.el8_6
- CVE-2022-49111
- Description:
Bluetooth: Fix use after free in hci_send_acl
- CVE: https://access.redhat.com/security/cve/CVE-2022-49111
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49111-bluetooth-fix-use-after-free-in-hci_send_acl.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-49846
- Description:
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()
- CVE: https://access.redhat.com/security/cve/CVE-2022-49846
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49846-udf-fix-a-slab-out-of-bounds-write-bug-in-udf_find_entry.patch
- From: 4.18.0-553.60.1.el8_10
- CVE-2022-50066
- Description:
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()
- CVE: https://access.redhat.com/security/cve/CVE-2022-50066
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-50066-net-atlantic-fix-aq_vec-index-out-of-range-error.patch
- From: kernel-eus-8.6-4.18.0-372.150.1.el8_6
- CVE-2022-49058
- Description:
cifs: potential buffer overflow in handling symlinks
- CVE: http://access.redhat.com/security/cve/cve-2022-49058
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49058-cifs-potential-buffer-overflow-in-handling-symlinks.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-49395
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2022-49395.patch
- From:
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://access.redhat.com/security/cve/cve-2025-22004
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://access.redhat.com/security/cve/CVE-2025-21905
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2025-37738
- Description:
ext4: ignore xattrs past end
- CVE: https://access.redhat.com/security/cve/CVE-2025-37738
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-37738-ext4-ignore-xattrs-past-end.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-49788
- Description:
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
- CVE: https://access.redhat.com/security/cve/cve-2022-49788
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2022-49788-misc-vmw_vmci-fix-an-infoleak-in-vmci_host_do_receive_datagram.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2022-50020
- Description:
ext4: avoid resizing to a partial cluster size
- CVE: https://access.redhat.com/security/cve/CVE-2022-50020
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2022-50020-ext4-avoid-resizing-to-a-partial-cluster-size.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2022-50022
- Description:
drivers:md:fix a potential use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-50022
- Patch: rhel8/4.18.0-372.157.1.el8_6/CVE-2022-50022-drivers-md-fix-a-potential-use-after-free-bug.patch
- From: 4.18.0-372.157.1.el8_6
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://access.redhat.com/security/cve/cve-2024-57980
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path-477.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove s_ctrl and g_ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Remove-s_ctrl-and-g_ctrl.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove s_ctrl and g_ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Remove-s_ctrl-and-g_ctrl-kpatch.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Set error_idx during ctrl_commit errors
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Set-error_idx-during-ctrl_commit-errors.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-477.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://access.redhat.com/security/cve/CVE-2024-58002
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2024-58002-convert-guard-mutex.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://access.redhat.com/security/cve/CVE-2025-21727
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21919
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://access.redhat.com/security/cve/CVE-2025-21919
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2025-21919-sched-fair-fix-potential-memory-corruption-in-child-cfs-rq-on-list.patch
- From: kernel-4.18.0-553.63.1.el8_10
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21928
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://access.redhat.com/security/cve/CVE-2025-23150
- Patch: rhel8/4.18.0-553.60.1.el8_10/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 4.18.0-553.62.1.el8_10
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://access.redhat.com/security/cve/CVE-2025-38086
- Patch: rhel8/4.18.0-553.63.1.el8_10/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii_nway_restart.patch
- From: 4.18.0-553.63.1.el8_10
- CVE-2025-38380
- Description:
i2c/designware: Fix an initialization issue
- CVE: https://access.redhat.com/security/cve/CVE-2025-38380
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38380-i2c-designware-Fix-an-initialization-issue.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2021-47670
- Description:
can: peak_usb: fix use after free bugs
- CVE: https://access.redhat.com/security/cve/CVE-2021-47670
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2021-47670-can-peak_usb-fix-use-after-free-bugs.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38177
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38177
- Patch: rhel8/4.18.0-372.158.1.el8_6/CVE-2025-38177-sch_hfsc-make-hfsc_qlen_notify-idempotent.patch
- From: 4.18.0-372.158.1.el8_6
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-sch_hfsc-Fix-qlen-accounting-bug-when-using-peek-in-hfsc_enqueue.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-37890
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://access.redhat.com/security/cve/CVE-2025-37890
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-37890-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://access.redhat.com/security/cve/CVE-2025-38079
- Patch: rhel8/4.18.0-553.66.1.el8_10/CVE-2025-38079-crypto-algif_hash-fix-double-free-in-hash_accept.patch
- From: 4.18.0-553.66.1.el8_10
- CVE-2022-49977
- Description:
ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead
- CVE: https://access.redhat.com/security/cve/CVE-2022-49977
- Patch: rhel8/4.18.0-553.64.1.el8_10/CVE-2022-49977-ftrace-Fix-NULL-pointer-dereference-in-is_ftrace_trampoline-when-ftrace-is-dead.patch
- From: 4.18.0-553.64.1.el8_10
- CVE-2025-38250
- Description:
Bluetooth: hci_core: Fix use-after-free in vhci_flush()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38250
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-38250-bluetooth-hci-core-fix-use-after-free-in-vhci-flush-513.24.1.patch
- From: 5.14.0-570.35.1.el9_6
- CVE-2025-38350
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_qfq-make-qfq_qlen_notify-idempotent-372.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_cbq: make cbq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_cbq-make-cbq_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_htb-make-htb_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_htb-make-htb_deactivate-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_ets-make-est_qlen_notify-idempotent.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-sch_drr-make-drr_qlen_notify-idempotent-372.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://access.redhat.com/security/cve/CVE-2025-38159
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://access.redhat.com/security/cve/CVE-2025-38332
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38352
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle_posix_cpu_timers-and-posix_cpu_timer_del.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://access.redhat.com/security/cve/CVE-2025-38464
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2022-50211
- Description:
md-raid10: fix KASAN warning
- CVE: https://access.redhat.com/security/cve/CVE-2022-50211
- Patch: rhel8/4.18.0-372.162.1.el8_6/CVE-2022-50211-md-raid10-fix-KASAN-warning.patch
- From: 4.18.0-372.162.1.el8_6
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-add-dev_net_rcu-helper.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21759
- Patch: rhel8/4.18.0-553.69.1.el8_10/CVE-2025-21759-ipv6-mcast-extend-RCU-protection-in-igmp6_send.patch
- From: kernel-4.18.0-553.69.1.el8_10
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://access.redhat.com/security/cve/CVE-2025-22058
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-22058-udp-Fix-memory-accounting-leak.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://access.redhat.com/security/cve/CVE-2025-38200
- Patch: rhel8/4.18.0-553.71.1.el8_10/CVE-2025-38200-i40e-fix-MMIO-write-access-to-an-invalid-page-in-i40e_clear_hw.patch
- From: kernel-4.18.0-553.71.1.el8_10
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Fix-race-condition-on-qfq_aggregate-372.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38477-net-sched-sch_qfq-Avoid-triggering-might_sleep-in-atomic-context-in-qfq_delete_class.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://access.redhat.com/security/cve/CVE-2025-38527
- Patch: rhel8/4.18.0-372.162.1.el8_6/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs_oplock_break.patch
- From: 4.18.0-372.162.1.el8_6
- CVE-2022-49969
- Description:
drm/amd/display: clear optc underflow before turn off odm clock
- CVE: https://access.redhat.com/security/cve/CVE-2022-49969
- Patch: rhel8/4.18.0-372.164.1.el8_6/CVE-2022-49969-drm-amd-display-clear-optc-underflow-before-turn-off-odm-clock.patch
- From: 4.18.0-372.164.1.el8_6
- CVE-2022-49985
- Description:
bpf: Don't use tnum_range on array range checking for poke descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2022-49985
- Patch: rhel8/4.18.0-553.74.1.el8_10/CVE-2022-49985-bpf-don-t-use-tnum_range-on-array-range-checking-for-poke-descriptors.patch
- From: 4.18.0-553.74.1.el8_10
- CVE-2022-50087
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-50087.patch
- From:
- CVE-2022-50229
- Description:
ALSA: bcd2000: Fix a UAF bug on the error path of probing
- CVE: https://access.redhat.com/security/cve/CVE-2022-50229
- Patch: rhel8/4.18.0-372.164.1.el8_6/CVE-2022-50229-alsa-bcd2000-fix-a-UAF-bug-on-the-error-path-of-probing.patch
- From: 4.18.0-372.164.1.el8_6
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://access.redhat.com/security/cve/CVE-2025-37914
- Patch: rhel8/4.18.0-553.70.1.el8_10/CVE-2025-37914-net_sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 4.18.0-553.70.1.el8_10
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://access.redhat.com/security/cve/CVE-2025-38211
- Patch: rhel8/4.18.0-553.72.1.el8_10/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 4.18.0-553.72.1.el8_10
- CVE-2025-38449
- Description:
requires a very complex adaptation
- CVE:
- Patch: skipped/CVE-2025-38449.patch
- From:
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38461
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38461-vsock-Fix-transport_-TOCTOU.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38498
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38498-do_change_type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38498
- Description:
use uniform permission checks for all mount propagation changes
- CVE: https://access.redhat.com/security/cve/CVE-2025-38498
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2024-36896
- Description:
Not affected: issue introduced since 4.18.0-477.*
- CVE:
- Patch: skipped/CVE-2024-36896.patch
- From:
- CVE-2023-53305 CVE-2022-50386
- Description:
Bluetooth: L2CAP: Fix use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50386
- Patch: rhel8/4.18.0-553.79.1.el8_10/CVE-2023-53305-bluetooth-l2cap-fix-use-after-free.patch
- From: 4.18.0-553.79.1.el8_10
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Limit packet length to skb->len
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2023-53125-net-usb-smsc75xx-Limit-packet-length-to-skb-len.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel8/4.18.0-553.75.1.el8_10/CVE-2023-53125-net-usb-smsc75xx-Move-packet-length-check-to-prevent-kernel-panic-in-skb_pull.patch
- From: kernel-4.18.0-553.75.1.el8_10
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39730
- Patch: rhel8/4.18.0-553.78.1.el8_10/CVE-2025-39730-NFS-Fix-filehandle-bounds-checking-in-nfs_fh_to_dentry-348.patch
- From: 4.18.0-553.78.1.el8_10
- CVE-2025-38556
- Description:
HID: core: Harden s32ton() against conversion to 0 bits
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38556-core-Harden-s32ton-against-conversion-to-0-bits.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-38556
- Description:
HID: core: fix shift-out-of-bounds in hid_report_raw_event
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel8/4.18.0-553.76.1.el8_10/CVE-2025-38556-HID-core-fix-shift-out-of-bounds-in-hid_report_raw_event.patch
- From: kernel-4.18.0-553.76.1.el8_10
- CVE-2025-22026
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-22026.patch
- From:
- CVE-2022-50137
- Description:
RDMA/irdma: Fix a window for use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50137
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50137-rdma-irdma-fix-a-window-for-use-after-free.patch
- From: 4.18.0-372.166.1.el8_6
- CVE-2022-50228
- Description:
KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0
- CVE: https://access.redhat.com/security/cve/CVE-2022-50228
- Patch: rhel8/4.18.0-553.79.1.el8_10/CVE-2022-50228-KVM-SVM-dont-BUG-if-userspace-injects-an-interrupt.patch
- From: 4.18.0-553.79.1.el8_10
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-37797
- Patch: rhel8/4.18.0-553.77.1.el8_10/CVE-2025-37797-net_sched-hfsc-Fix-a-UAF-vulnerability-in-class-handling.patch
- From: 4.18.0-553.77.1.el8_10
- CVE-2025-39751
- Description:
This CVE has been rejected or withdrawn by its CVE Numbering Authority as per NVD website
- CVE:
- Patch: skipped/CVE-2025-39751.patch
- From:
- CVE-2022-50070
- Description:
mptcp: do not queue data on closed subflows
- CVE: https://access.redhat.com/security/cve/CVE-2022-50070
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50070-mptcp-do-not-queue-data-on-closed-subflows.patch
- From: 4.18.0-372.166.1.el8_6
- CVE-2023-53178
- Description:
mm: fix zswap writeback race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-53178
- Patch: rhel8/4.18.0-553.83.1.el8_10/CVE-2023-53178-mm-fix-zswap-writeback-race-condition.patch
- From: 4.18.0-553.83.1.el8_10
- CVE-2023-53178
- Description:
mm: zswap: fix missing folio cleanup in writeback race path
- CVE: https://access.redhat.com/security/cve/CVE-2023-53178
- Patch: rhel8/4.18.0-553.83.1.el8_10/CVE-2023-53178-mm-zswap-fix-missing-folio-cleanup-in-writeback-race-path.patch
- From: 4.18.0-553.83.1.el8_10
- CVE-2023-53373
- Description:
crypto: seqiv - Handle EBUSY correctly
- CVE: https://access.redhat.com/security/cve/CVE-2023-53373
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2023-53373-crypto-seqiv-handle-ebusy-correctly.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2023-53386
- Description:
Bluetooth: Fix potential use-after-free when clear keys
- CVE: https://access.redhat.com/security/cve/CVE-2023-53386
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2023-53386-Bluetooth-Fix-potential-use-after-free-when-clear-keys.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39864
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2022-50367
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2022-50367
- Patch: rhel8/4.18.0-553.83.1.el8_10/CVE-2022-50367-fs-fix-uaf-gpf-bug-in-nilfs-mdt-destroy.patch
- From: 4.18.0-553.83.1.el8_10
- CVE-2025-39841
- Description:
scsi: lpfc: Fix buffer free/clear order in deferred receive path
- CVE: https://access.redhat.com/security/cve/CVE-2025-39841
- Patch: rhel8/4.18.0-553.81.1.el8_10/CVE-2025-39841-scsi-lpfc-fix-buffer-free-clear-order-in-deferred-receive-path.patch
- From: 4.18.0-553.81.1.el8_10
- CVE-2022-50408
- Description:
wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()
- CVE: https://access.redhat.com/security/cve/CVE-2022-50408
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50408-wifi-brcmfmac-fix-use-after-free-bug-in-brcmf_netdev_start_xmit.patch
- From: kernel-4.18.0-372.166.1.el8_6
- CVE-2022-48701
- Description:
ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48701
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-48701-ALSA-usb-audio-Fix-an-out-of-bounds-bug-in-__snd_usb.patch
- From: kernel-4.18.0-372.166.1.el8_6
- CVE-2022-50406
- Description:
iomap: iomap: fix memory corruption when recording errors during writeback
- CVE: https://access.redhat.com/security/cve/CVE-2022-50406
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50406-iomap-iomap-fix-memory-corruption-when-recording-err.patch
- From: kernel-4.18.0-372.166.1.el8_6
- CVE-2023-53185
- Description:
wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
- CVE: https://access.redhat.com/security/cve/CVE-2023-53185
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2023-53185-wifi-ath9k-don-t-allow-to-overwrite-ENDPOINT0-attrib.patch
- From: kernel-4.18.0-372.166.1.el8_6
- CVE-2023-53213
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://access.redhat.com/security/cve/CVE-2023-53213
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2023-53213-wifi-brcmfmac-slab-out-of-bounds-read-in-brcmf_get_a.patch
- From: kernel-4.18.0-372.166.1.el8_6
- CVE-2022-50050
- Description:
ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()
- CVE: https://access.redhat.com/security/cve/CVE-2022-50050
- Patch: rhel8/4.18.0-372.166.1.el8_6/CVE-2022-50050-ASoC-SOF-Intel-hda-Fix-potential-buffer-overflow-by-.patch
- From: kernel-4.18.0-372.166.1.el8_6
- CVE-2023-53257
- Description:
wifi: mac80211: check S1G action frame size
- CVE: https://access.redhat.com/security/cve/CVE-2023-53257
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53257-wifi-mac80211-check-S1G-action-frame-size.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://access.redhat.com/security/cve/CVE-2025-38718
- Patch: rhel8/4.18.0-553.77.1.el8_10/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 4.18.0-553.77.1.el8_10
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2025-39757-ALSA-usb-audio-Validate-UAC3-cluster-segment-descriptors.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel8/4.18.0-553.80.1.el8_10/CVE-2025-39757-ALSA-usb-audio-Fix-size-validation-in-convert_chmap_v3.patch
- From: 4.18.0-553.80.1.el8_10
- CVE-2025-39697
- Description:
The vulnerable commit isn't present in the kernel-eus-8.6 series.
- CVE:
- Patch: skipped/CVE-2025-39697.patch
- From:
- CVE-2022-50410
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-50410
- Patch: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-50410-nfsd-protect-against-send-buffer-overflow-in-nfsv2-read.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2025-38729
- Description:
ALSA: usb-audio: Validate UAC3 power domain descriptors, too
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-38729
- Patch: rhel8/4.18.0-553.84.1.el8_10/CVE-2025-38729-alsa-usb-audio-validate-uac3-power-domain-descriptors-too.patch
- From: 6.1.153-1
- CVE-2025-38729
- Description:
ALSA: usb-audio: Validate UAC3 power domain descriptors, too
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-38729
- Patch: rhel8/4.18.0-553.84.1.el8_10/CVE-2025-38729-alsa-usb-audio-validate-uac3-power-domain-descriptors-too-kpatch.patch
- From: 6.1.153-1
- CVE-2023-53232
- Description:
mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-53232.html
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-53232-mt76-mt7921-fix-kernel-panic-by-accessing-unallocated-eeprom-data.patch
- From: 4.18.0-477.10.1.el8_8
- CVE-2023-53365
- Description:
ip6mr: Fix skb_under_panic in ip6mr_cache_report()
- CVE: https://access.redhat.com/security/cve/CVE-2023-53365
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-53365-ip6mr-Fix-skb_under_panic-in-ip6mr_cache_report.patch
- From: 4.18.0-553.el8_10
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://access.redhat.com/security/cve/CVE-2025-39883
- Patch: rhel8/4.18.0-553.84.1.el8_10/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2022-50356
- Description:
net: sched: sfb: fix null pointer access issue when sfb_init() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-50356
- Patch: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-50356-net-sched-sfb-fix-null-pointer-access-issue-when-sfb_init-fails.patch
- From: 4.18.0-513.5.1.el8_9
- CVE-2022-50403
- Description:
ext4: fix undefined behavior in bit shift for ext4_check_flag_values
- CVE: https://access.redhat.com/security/cve/CVE-2022-50403
- Patch: rhel8/4.18.0-553.el8_10/CVE-2022-50403-ext4-fix-undefined-behavior-in-bit-shift-for-ext4_check_flag_values.patch
- From: 4.18.0-553.el8_10
- CVE-2023-53354
- Description:
skbuff: skb_segment, Call zero copy functions before using skbuff frags
- CVE: https://access.redhat.com/security/cve/CVE-2023-53354
- Patch: rhel8/4.18.0-553.el8_10/CVE-2023-53354-skbuff-skb_segment-Call-zero-copy-functions-before-using-skbuff-frags.patch
- From: 4.18.0-553.el8_10
- CVE-2023-53226
- Description:
wifi: mwifiex: Fix OOB and integer underflow when rx packets
- CVE: https://access.redhat.com/security/cve/CVE-2023-53226
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53226-wifi-mwifiex-Fix-OOB-and-integer-underflow-when-rx-packets.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2023-53226
- Description:
wifi: mwifiex: Fix missed return in oob checks failed path
- CVE: https://access.redhat.com/security/cve/CVE-2023-53226
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53226-wifi-mwifiex-Fix-missed-return-in-oob-checks-failed-path.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2023-53226
- Description:
wifi: mwifiex: Fix OOB and integer underflow when rx packets
- CVE: https://access.redhat.com/security/cve/CVE-2023-53226
- Patch: rhel8/4.18.0-553.82.1.el8_10/CVE-2023-53226-wifi-mwifiex-Fix-oob-check-condition-in-mwifiex_process_rx_packet.patch
- From: 4.18.0-553.82.1.el8_10
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38724
- Patch: rhel8/4.18.0-553.87.1.el8_10/CVE-2025-38724-nfsd-handle-get_client_locked-failure-in-nfsd4_setclientid_confirm-372.patch
- From: 4.18.0-553.87.1.el8_10
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://access.redhat.com/security/cve/CVE-2025-39955
- Patch: rhel8/4.18.0-372.173.1.el8_6/CVE-2025-39955-tcp-Clear-tcp_sk-sk-fastopen_rsk-in-tcp_disconnect.patch
- From: 4.18.0-372.173.1.el8_6
- CVE-2025-40186
- Description:
tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().
- CVE: https://access.redhat.com/security/cve/CVE-2025-40186
- Patch: rhel8/4.18.0-372.173.1.el8_6/CVE-2025-40186-tcp-Don-t-call-reqsk_fastopen_remove-in-tcp_conn_request.patch
- From: 4.18.0-372.173.1.el8_6
- CVE-2025-39825
- Description:
smb: client: fix race with concurrent opens in rename(2)
- CVE: https://access.redhat.com/security/cve/CVE-2025-39825
- Patch: rhel8/4.18.0-372.173.1.el8_6/CVE-2025-39825-smb-client-fix-race-with-concurrent-opens-in-rename-2.patch
- From: 4.18.0-372.173.1.el8_6
- CVE-2020-25656
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: 4.18.0-553.el8_10
- CVE-2020-25656
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2020-25656
- Patch: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: 4.18.0-553.el8_10
- CVE-2023-52832
- Description:
wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
- CVE: https://www.cve.org/CVERecord?id=CVE-2023-52832
- Patch: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52832-wifi-mac80211-don-t-return-unset-power-in.patch
- From: 4.18.0-553.16.1.el8_10
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://access.redhat.com/security/cve/CVE-2024-53122
- Patch: rhel8/4.18.0-553.34.1.el8_10/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 4.18.0-553.34.1.el8_10