OS: almalinux8
kernel: kernel-4.18.0-425.19.2.el8_7
time: 2024-07-09 07:49:24
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
kpatch-description: wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-41674
kpatch-cvss: 7.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-41674
kpatch-patch-url: https://git.kernel.org/linus/aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
kpatch-description: ath9k: fix use-after-free in ath9k_hif_usb_rx_cbMIME-Version: 1.0
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1679
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1679
kpatch-patch-url: https://git.kernel.org/linus/0ac4827f78c7ffe8eef074bc010e7e34bc22f533
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref_get.patch
kpatch-description: media: em28xx: initialize refcount before kref_get
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3239
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3239
kpatch-patch-url: https://git.kernel.org/linus/554188a95b1e2f0f8e434b51aa4af0bf9f270581
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
kpatch-description: devlink: Fix use-after-free after a failed reload
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3625
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3625
kpatch-patch-url: https://git.kernel.org/linus/6b4db2e528f650c7fb712961aac36455468d5902
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
kpatch-description: ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-30594
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-30594
kpatch-patch-url: https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-25265-0810-x86-elf-Disable-automatic-READ_IMPLIES_EXEC-on-64-bi.patch
kpatch-description: x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-25265
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-25265
kpatch-patch-url: https://git.kernel.org/linus/9fccc5c0c99f238aa1b0460fccbdb30a887e7036
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
kpatch-description: igmp: Add ip_mc_list lock in ip_check_mc_rcu
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-20141
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20141
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
kpatch-description: af_key: Do not call xfrm_probe_algs in parallel
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3028
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3028
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ba953a9d89a00c078b85f4b190bc1dde66fe16b5
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_reassemble_sdu.patch
kpatch-description: Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3564
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3564
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page.patch
kpatch-description: mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3623
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-the-LISTEN-status.patch
kpatch-description: net/ulp: prevent ULP without clone op from entering the LISTEN status
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-0461
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-0461
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs.patch
kpatch-description: wifi: cfg80211: fix BSS refcounting bugs
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-42720
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-42720
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-1195-cifs-fix-use-after-free-caused-by-invalid-pointer-hostname.patch
kpatch-description: cifs: fix use-after-free caused by invalid pointer `hostname`
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-1195
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1195
kpatch-patch-url: https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
kpatch-description: tcp/udp: Fix memory leak in ipv6_renew_options()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3524
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3524
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
kpatch-description: drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3707
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3707
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4a61648af68f5ba4884f0e3b494ee1cabc4b6620
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf_fweh_event_worker.patch
kpatch-description: wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3628
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3628
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
kpatch-description: usb: mon: make mmapped memory read only
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-43750
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-43750
kpatch-patch-url: https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0001-video-of_display_timing.h-include-errno.h.patch
kpatch-description: video: of_display_timing.h: include errno.h
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0002-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
kpatch-description: fbcon: Disallow setting font bigger than screen size
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0003-fbcon-Prevent-that-screen-size-is-smaller-than-font-.patch
kpatch-description: fbcon: Prevent that screen size is smaller than font size
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0004-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
kpatch-description: fbmem: Check virtual screen sizes in fb_set_var()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
kpatch-description: vt: drop old FONT ioctls
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33656
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0001-net-fix-a-concurrency-bug-in-l2tp_tunnel_register.patch
kpatch-description: net: fix a concurrency bug in l2tp_tunnel_register()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-4129
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-4129
kpatch-patch-url: https://github.com/torvalds/linux/commit/69e16d01d1de4f1249869de342915f608feb55d5
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0002-l2tp-Serialize-access-to-sk_user_data-with-sk_callba.patch
kpatch-description: l2tp: Serialize access to sk_user_data with sk_callback_lock
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-4129
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-4129
kpatch-patch-url: https://github.com/torvalds/linux/commit/b68777d54fac21fc833ec26ea1a2a84f975ab035
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0003-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk.patch
kpatch-description: l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-4129
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-4129
kpatch-patch-url: https://github.com/torvalds/linux/commit/af295e854a4e3813ffbdef26dbb6a4d6226c3ea1
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0001-vt-use-tty_insert_flip_string-in-respond_string.patch
kpatch-description: vt: use tty_insert_flip_string in respond_string
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/de53ce0427cd20886b0d53555dc576702cbb1ff8
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0002-vt-keyboard-use-tty_insert_flip_string-in-puts_queue.patch
kpatch-description: vt: keyboard, use tty_insert_flip_string in puts_queue
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/c35f638fc2adbb9c439ce68b559d406387cbdbe8
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0003-tty-drivers-tty-stop-using-tty_schedule_flip.patch
kpatch-description: tty: drivers/tty/, stop using tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/5f6a85158ccacc3f09744b3aafe8b11ab3b6c6f6
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0004-tty-the-rest-stop-using-tty_schedule_flip.patch
kpatch-description: tty: the rest, stop using tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/b68b914494df4f79b4e9b58953110574af1cb7a2
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip.patch
kpatch-description: tty: drop tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/5db96ef23bda6c2a61a51693c85b78b52d03f654
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0006-tty-extract-tty_flip_buffer_commit-from-tty_flip_buf.patch
kpatch-description: tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/716b10580283fda66f2b88140e3964f8a7f9da89
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0007-tty-use-new-tty_insert_flip_string_and_push_buffer-i.patch
kpatch-description: tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/a501ab75e7624d133a5a3c7ec010687c8b961d23
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip-kpatch.patch
kpatch-description: tty: drop tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/5db96ef23bda6c2a61a51693c85b78b52d03f654
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-22998-drm-virtio-Fix-NULL-vs-IS_ERR-checking-in-virtio_gpu_object_shmem_init.patch
kpatch-description: drm/virtio: Fix error code in virtio_gpu_object_shmem_init()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-22998
kpatch-cvss: 5.5
kpatch-cve-url: https://nvd.nist.gov/vuln/detail/CVE-2023-22998
kpatch-patch-url: https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-22998-2-drm-virtio-Correct-drm_gem_shmem_get_sg_table-error-.patch
kpatch-description: drm/virtio: Fix error code in virtio_gpu_object_shmem_init()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-22998
kpatch-cvss: 5.5
kpatch-cve-url: https://nvd.nist.gov/vuln/detail/CVE-2023-22998
kpatch-patch-url: https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
kpatch-name: rhel8/4.18.0-477.13.1.el8_8/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase.patch
kpatch-description: netfilter: nf_tables: deactivate anonymous set from preparation phase
kpatch-kernel: 4.18.0-477.13.1.el8_8
kpatch-cve: CVE-2023-32233
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-32233
kpatch-patch-url: https://git.kernel.org/linus/c1592a89942e9678f7d9c8030efa777c0d57edab
kpatch-name: rhel8/4.18.0-477.15.1.el8_8/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf.patch
kpatch-description: net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
kpatch-kernel: 4.18.0-477.15.1.el8_8
kpatch-cve: CVE-2023-28466
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28466
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
kpatch-description: Bluetooth: L2CAP: Fix accepting connection request
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2022-42896
kpatch-cvss: 8.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-42896
kpatch-patch-url: https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-resp.patch
kpatch-description: net/sched: tcindex: update imperfect hash filters
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-1281
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1281
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
kpatch-name: skipped/CVE-2023-1829.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-1829
kpatch-skip-reason: Complex adaptation is required, mainline retired tcindex.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
kpatch-description: xfs: verify buffer contents when we skip log replay
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-2124
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2124
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
kpatch-description: i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-2194
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2194
kpatch-patch-url: https://github.com/torvalds/linux/commit/92fbb6d1296f
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
kpatch-description: perf: Fix check before add_event_to_groups() in perf_group_detach()
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-2235
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2235
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
kpatch-description: netfilter: nft_set_pipapo: fix improper element removal
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-4004
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4004
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=87b5a5c209405cb6b57424cdfa226a6dbd349232
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with.patch
kpatch-description: netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-3390
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3390
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1240eb93f0616b21c675416516ff3d74798fdc97
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
kpatch-description: ipvlan:Fix out-of-bounds caused by unclear skb->cb
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-3090
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3090
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35788-net-sched-flower-fix-possible-oob-write-in-fl-set-geneve-opt.patch
kpatch-description: net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-35788
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35788
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4d56304e5827c8cc8cc18c75343d283af7c4825c
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-20593-zenbleed.patch
kpatch-description: hw: amd: Cross-Process Information Leak
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-20593
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2023-20593
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=522b1d69219d8f083173819fde04f994aa051a98
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
kpatch-description: net/sched: cls_fw: Fix improper refcount update leads to use-after-free
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-3776
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3776
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0323bce598eea038714f941ce2b22541c46d488f
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
kpatch-description: netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-35001
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35001
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=025fd7efe2639773540a5e425b7bc0dc10b6b023
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
kpatch-description: bluetooth: Perform careful capability checks in hci_sock_ioctl()
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-2002
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2002
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8d59548bae309000442c297bff3e54ab535f0ab7
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1118-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
kpatch-description: media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1118
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1118
kpatch-patch-url: https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1989-Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_remove.patch
kpatch-description: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1989
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1989
kpatch-patch-url: https://git.kernel.org/linus/73f7b171b7c0
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
kpatch-description: memstick: r592: Fix UAF bug in r592_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3141
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3141
kpatch-patch-url: https://git.kernel.org/linus/632644227850
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3268-kernel-relay.c-fix-read_pos-error-when-multiple-readers.patch
kpatch-description: kernel/relay.c: fix read_pos error when multiple readers
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3268
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3268
kpatch-patch-url: https://git.kernel.org/linus/341a7213e5c1c
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3609-net-sched-cls-u32-fix-reference-counter-leak-leading-to-overflow.patch
kpatch-description: net/sched: cls_u32: Fix reference counter leak leading to overflow
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3609
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3609
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=04c55383fa5689357bcdd2c8036725a55ed632bc
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3611-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
kpatch-description: net/sched: sch_qfq: account for stab overhead in qfq_enqueue
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3611
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3611
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_route-No-longer-copy-tcf_result-on-update.patch
kpatch-description: net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4128 CVE-2023-4206
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4128
kpatch-patch-url: https://git.kernel.org/linus/b80b829e9e2c
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_fw-No-longer-copy-tcf_result-on-update.patch
kpatch-description: net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4128 CVE-2023-4207
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4128
kpatch-patch-url: https://git.kernel.org/linus/76e42ae83199
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_u32-No-longer-copy-tcf_result-on-update.patch
kpatch-description: net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4128 CVE-2023-4208
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4128
kpatch-patch-url: https://git.kernel.org/linus/3044b16e7c6f
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
kpatch-description: net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-31436
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-31436
kpatch-patch-url: https://git.kernel.org/linus/3037933448f60f9acb705997eae62013ecb81e0d
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
kpatch-description: media: saa7134: fix use after free bug in saa7134_finidev due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-35823
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35823
kpatch-patch-url: https://git.kernel.org/linus/30cf57da176c
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
kpatch-description: media: dm1105: Fix use after free bug in dm1105_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-35824
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35824
kpatch-patch-url: https://git.kernel.org/linus/5abda7a16698
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2021-43975-atlantic-fix-oob-read-and-write-in-hw-atl-utils-fw-rpc-wait.patch
kpatch-description: atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2021-43975
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-43975
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=b922f622592af76b57cbc566eaeccda0b31a3496
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-add-EXT4_INODE_HAS_XATTR_SPACE-macro-in-xattr.h.patch
kpatch-description: ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-2513
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2513
kpatch-patch-url: https://lore.kernel.org/all/20220616021358.2504451-2-libaokun1@huawei.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-fix-use-after-free-in-ext4-xattr-set-entry.patch
kpatch-description: ext4: fix use-after-free in ext4_xattr_set_entry
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-2513
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2513
kpatch-patch-url: https://github.com/torvalds/linux/commit/67d7d8ad99be
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28772-seq-buf-fix-overflow-in-seq-buf-putmem-hex.patch
kpatch-description: seq_buf: Fix overflow in seq_buf_putmem_hex()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-28772
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28772
kpatch-patch-url: https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1073-hid-betop-check-shape-of-output-reports.patch
kpatch-description: HID: betop: check shape of output reports
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1073
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1073
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=3782c0d6edf658b71354a64d60aa7a296188fc90
kpatch-name: skipped/CVE-2022-40982.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-40982
kpatch-skip-reason: Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-42895-bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
kpatch-description: Bluetooth: L2CAP: Fix attempting to access uninitialized memory
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-42895
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-42895
kpatch-patch-url: https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-30456-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
kpatch-description: KVM: nVMX: add missing consistency checks for CR0 and CR4
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-30456
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-30456
kpatch-patch-url: https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-33203-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to-race.patch
kpatch-description: net: qcom/emac: Fix use after free bug in emac_remove due to race condition
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-33203
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-33203
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
kpatch-name: skipped/CVE-2023-1206.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-1206
kpatch-skip-reason: This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
kpatch-description: hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1855
kpatch-cvss: 6.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1855
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
kpatch-description: fbcon: Check font dimension limits
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3161
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3161
kpatch-patch-url: https://git.kernel.org/linus/2b09d5d364986f724f17001ccfe4126b9b43a0be
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
kpatch-description: Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-3640
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3640
kpatch-patch-url: https://github.com/torvalds/linux/commit/0d0e2d032811280b927650ff3c15fe5020e82533
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfree_skb.patch
kpatch-description: can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-28388
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-28388
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3d3925ff6433f98992685a9679613a2cc97f3ce2
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
kpatch-description: sctp: fail if no bound addresses can be used for a given scope
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1074
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1074
kpatch-patch-url: https://git.kernel.org/linus/458e279f861d3f61796894cd158b780765a1569f
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
kpatch-description: xfrm: add NULL check in xfrm_update_ae_params
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3772
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2023-3772
kpatch-patch-url: https://git.kernel.org/linus/00374d9b6d9f
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-45869-kvm-x86-mmu-fix-race-condition-in-direct-page-fault.patch
kpatch-description: KVM: x86/mmu: Fix race condition in direct_page_fault
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-45869
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45869
kpatch-patch-url: https://git.kernel.org/linus/47b0c2e4c220f2251fd8dcfbb44479819c715e15
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IB.patch
kpatch-description: x86/speculation: Allow enabling STIBP with legacy IBRS
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1998
kpatch-cvss: 5.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1998
kpatch-patch-url: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IB-kpatch.patch
kpatch-description: x86/speculation: Allow enabling STIBP with legacy IBRS
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1998
kpatch-cvss: 5.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1998
kpatch-patch-url: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req.patch
kpatch-description: ovl: fix use after free in struct ovl_aio_req
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1252
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1252
kpatch-patch-url: https://git.kernel.org/linus/9a254403760041528bc8f69fe2f5e1ef86950991
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-kpatch.patch
kpatch-description: ovl: fix use after free in struct ovl_aio_req
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1252
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1252
kpatch-patch-url: https://git.kernel.org/linus/9a254403760041528bc8f69fe2f5e1ef86950991
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-1-drm-vmwgfx-clean-up-some-error-pointer-checking.patch
kpatch-description: drm/vmwgfx: Remove rcu locks from user resources
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-38457 CVE-2022-40133
kpatch-cvss: 6.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-38457
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-40133
kpatch-patch-url: https://git.kernel.org/linus/a309c7194e8a2f8bd4539b9449917913f6c2cd50
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-drm-vmwgfx-Remove-rcu-locks-from-user-resources.patch
kpatch-description: drm/vmwgfx: Remove rcu locks from user resources
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-38457 CVE-2022-40133
kpatch-cvss: 6.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-38457
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-40133
kpatch-patch-url: https://git.kernel.org/linus/a309c7194e8a2f8bd4539b9449917913f6c2cd50
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
kpatch-description: HID: asus: use spinlock to safely schedule workers
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1079
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1079
kpatch-patch-url: https://git.kernel.org/linus/4ab3a086d10eeec1424f2e8a968827a6336203df
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
kpatch-description: HID: asus: use spinlock to safely schedule workers
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1079
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1079
kpatch-patch-url: https://git.kernel.org/linus/4ab3a086d10eeec1424f2e8a968827a6336203df
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31084-media-dvb-core-Fix-kernel-WARNING-for-blocking-opera.patch
kpatch-description: media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-31084
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-31084
kpatch-patch-url: https://git.kernel.org/linus/b8c75e4a1b325ea0a9433fa8834be97b5836b946
kpatch-name: skipped/CVE-2023-0597.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-0597
kpatch-skip-reason: Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
kpatch-cvss:
kpatch-name: skipped/CVE-2022-4744.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-4744
kpatch-skip-reason: Not possible to trigger in rhel8
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28328-media-dvb-usb-az6027-fix-null-ptr-deref-in-az6027_i2.patch
kpatch-description: media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-28328
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28328
kpatch-patch-url: https://lore.kernel.org/linux-media/20221120065918.2160782-1-zhongbaisong@huawei.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
kpatch-description: r8152: Rate limit overflow messages
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-3594
kpatch-cvss: 5.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3594
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0458-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
kpatch-description: prlimit: do_prlimit needs to have a speculation check
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-0458
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-0458
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-45887-patch-media-ttusb-dec-fix-memory-leak-in-ttusb-dec-exit-dvb.patch
kpatch-description: media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-45887
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3594
kpatch-patch-url: https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
kpatch-description: net: sched: atm: dont intepret cls results when asked to drop
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-23455
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-23455
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
kpatch-description: net: mpls: fix stale pointer if allocation fails during device rename
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-26545
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-26545
kpatch-patch-url: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4155-kvm-sev-only-access-ghcb-fields-once.patch
kpatch-description: net: sched: atm: dont intepret cls results when asked to drop
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4155
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-23455
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7588dbcebcbf0193ab5b76987396d0254270b04a
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-use-after-free-bugs-caused-by-do-submit-urb.patch
kpatch-description: media: usb: siano: Fix use after free bugs caused by do_submit_urb
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4132
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4132
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebad8e731c1c06adf04621d6fd327b860c0861b5
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-warning-due-to-null-work-func-t-function.patch
kpatch-description: media: usb: siano: Fix use after free bugs caused by do_submit_urb
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4132
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4132
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebad8e731c1c06adf04621d6fd327b860c0861b5
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc-graft.patch
kpatch-description: net: sched: fix race condition in qdisc_graft()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-0590
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-0590
kpatch-patch-url: https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3212-gfs2-don-t-deref-jdesc-in-evict-pre-477.patch
kpatch-description: gfs2: Don't deref jdesc in evict
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3212
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3212
kpatch-patch-url: https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-fix-an-information-leak-in-tipc_topsrv_kern_subscr.patch
kpatch-description: tipc: fix an information leak in tipc_topsrv_kern_subscr
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1382
kpatch-cvss: 5.5
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2023-1382
kpatch-patch-url: https://git.kernel.org/linus/e558e148938442dd49628cd7ef61c360832bef31
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-set-con-sock-in-tipc_conn_alloc.patch
kpatch-description: tipc: set con sock in tipc_conn_alloc
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1382
kpatch-cvss: 5.5
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2023-1382
kpatch-patch-url: https://git.kernel.org/linus/e87a077d09c05985a0edac7c6c49bb307f775d12
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-add-an-extra-conn_get-in-tipc_conn_alloc.patch
kpatch-description: tipc: add an extra conn_get in tipc_conn_alloc
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1382
kpatch-cvss: 5.5
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2023-1382
kpatch-patch-url: https://git.kernel.org/linus/4058e3b74ab3eabe0835cee9a0c6deda79e8a295
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
kpatch-description: net/tls: tls_is_tx_ready() checked list_entry
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1075
kpatch-cvss: 3.3
kpatch-cve-url: https://ubuntu.com/security/CVE-2023-1075
kpatch-patch-url: https://git.kernel.org/linus/ffe2a22562444720b05bdfeb999c03e810d84cbb
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-33951-CVE-2023-33952-drm-vmwgfx-Do-not-drop-the-reference-to-the-handle-t.patch
kpatch-description: drm/vmwgfx: Do not drop the reference to the handle too soon
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-33951 CVE-2023-33952
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2023-33951
kpatch-patch-url: https://github.com/torvalds/linux/commit/9ef8d83
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-1-mm-thp-fix-wrong-cache-flush-in-remove_migration_pmd.patch
kpatch-description: mm: thp: fix wrong cache flush in remove_migration_pmd()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4732
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4732
kpatch-patch-url: https://lore.kernel.org/linux-mm/20220131160254.43211-2-songmuchun@bytedance.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-2-mm-thp-simplify-copying-of-huge-zero-page-pmd-when-f.patch
kpatch-description: mm/thp: simplify copying of huge zero page pmd when fork
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4732
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4732
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fc7a5f6fd04bc18f309d9f979b32ef7d1d0a997
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-mm-userfaultfd-fix-uffd-wp-special-cases-for-fork-pre-477.21.1.patch
kpatch-description: mm/userfaultfd: fix uffd-wp special cases for
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4732
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4732
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8f34f1eac3820fc2722e5159acceb22545b30b0d
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-2163-bpf-fix-incorrect-verifier-pruning-due-to-missing-register-precision.patch
kpatch-description: bpf: Fix incorrect verifier pruning due to missing register precision taints
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-2163
kpatch-cvss: 8.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2163
kpatch-patch-url: https://git.kernel.org/linus/71b547f561247897a0a14f3082730156c0533fed
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled.patch
kpatch-description: net: tun: fix bugs for oversize packet when napi frags enabled
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-3812
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3812
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0517e59572118ccfb7c626d81dca9
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-1192-cifs-Fix-UAF-in-cifs_demultiplex_thread.patch
kpatch-description: cifs: Fix UAF in cifs_demultiplex_thread()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-1192
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1192
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
kpatch-description: nvmet-tcp: Fix a possible UAF in queue intialization setup
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-5178
kpatch-cvss: 8.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5178
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d920abd1e7c4884f9ecd0749d1921b7ab19ddfbd
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7808-media-dvbdev-remove-double-unlock.patch
kpatch-description: media: dvbdev: remove double-unlock
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/122d0e8dd050cc5dc3fb9e9b5f2dee3c5276ce35
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7810-media-dvbdev-Fix-memleak-in-dvb_register_device.patch
kpatch-description: media: dvbdev: Fix memleak in dvb_register_device
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/167faadfcf9339088910e9e85a1b711fcbbef8e9
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7811-media-dvbdev-fix-error-logic-at-dvb_register_device.patch
kpatch-description: media: dvbdev: fix error logic at dvb_register_device()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/1fec2ecc252301110e4149e6183fa70460d29674
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-media-dvbdev-adopts-refcnt-to-avoid-UAF.patch
kpatch-description: media: dvbdev: adopts refcnt to avoid UAF
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7813-media-dvbdev-fix-refcnt-bug.patch
kpatch-description: media: dvbdev: fix refcnt bug
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/3a664569b71b0a52be5ffb9fb87cc4f83d29bd71
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-kpatch.patch
kpatch-description: media: dvbdev: adopts refcnt to avoid UAF (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-media-dvb-core-Fix-use-after-free-due-to-race-at-dvb_register_device.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race at dvb_register_device()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/627bb528b086b4136315c25d6a447a98ea9448d3
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-kpatch.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race at dvb_register_device() (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/627bb528b086b4136315c25d6a447a98ea9448d3
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7817-media-dvb_net-avoid-speculation-from-net-slot.patch
kpatch-description: media: dvb_net: avoid speculation from net slot
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45886
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45886
kpatch-patch-url: https://github.com/torvalds/linux/commit/abc0226df64dc137b48b911c1fe4319aec5891bb
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-media-dvb-core-Fix-UAF-due-to-race-condition-at-dvb_net.patch
kpatch-description: media: dvb-core: Fix use-after-free due on race condition at dvb_net
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45886
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45886
kpatch-patch-url: https://github.com/torvalds/linux/commit/4172385b0c9ac366dcab78eda48c26814b87ed1a
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-kpatch.patch
kpatch-description: media: dvb-core: Fix use-after-free due on race condition at dvb_net (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45886
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45886
kpatch-patch-url: https://github.com/torvalds/linux/commit/4172385b0c9ac366dcab78eda48c26814b87ed1a
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7819-media-dvb_ca_en50221-off-by-one-in-dvb_ca_en50221_io_do_ioctl.patch
kpatch-description: media: dvb_ca_en50221: off by one in dvb_ca_en50221_io_do_ioctl()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/6706fe55af6fc2bcb069a77620ae38662bf09d1c
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7821-media-dvb_ca_en50221-avoid-speculation-from-CA-slot.patch
kpatch-description: media: dvb_ca_en50221: avoid speculation from CA slot
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/d382c5be4cc24597d5d12800558e537bbc12a71a
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7822-media-dvb_ca_en50221-fix-a-size-write-bug.patch
kpatch-description: media: dvb_ca_en50221: fix a size write bug
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/a4315e5be7020aac9b24a8151caf4bb85224cd0e
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-media-dvb-core-Fix-use-after-free-due-to-race-condition-at-dvb_ca_en50221.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/280a8ab81733da8bc442253c700a52c4c0886ffd
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-kpatch.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/280a8ab81733da8bc442253c700a52c4c0886ffd
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-t.patch
kpatch-description: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-2162
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2162
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
kpatch-description: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-42753
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-42753
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050d91c03b28ca479df13dfb02bcd2c60dd6a878
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
kpatch-description: af_unix: Fix null-ptr-deref in unix_stream_sendpage().
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-4622
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4622
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c
kpatch-name: skipped/CVE-2023-20569.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-20569
kpatch-skip-reason: A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-5633-drm-vmwgfx-Fix-possible-invalid-drm-gem-put-calls.patch
kpatch-description: drm/vmwgfx: Fix possible invalid drm gem put calls
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-5633
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5633
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9e96bf1905479f18e83a3a4c314a8dfa56ede2c
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-5633-drm-vmwgfx-Keep-a-gem-reference-to-user-bos-in-surfa-2.patch
kpatch-description: drm/vmwgfx: Keep a gem reference to user bos in surfaces
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-5633
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5633
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=91398b413d03660fd5828f7b4abc64e884b98069
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2022-36402-drm-vmwgfx-Fix-shader-stage-validation.patch
kpatch-description: drm/vmwgfx: Fix shader stage validation
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2022-36402
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-36402
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=14abdfae508228a7307f7491b5c4215ae70c6542
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch-hfsc-Ensure-inner-classes-have-fsc-curve.patch
kpatch-description: net/sched: sch_hfsc: Ensure inner classes have fsc curve
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4623
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch_hfsc-upgrade-rt-to-sc-when-it-becomes-.patch
kpatch-description: net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4623
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a13b67c9a015c4e21601ef9aa4ec9c5d972df1b4
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
kpatch-description: igb: set max size RX buffer when store bad packet is enabled
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-45871
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45871
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
kpatch-description: igb: set max size RX buffer when store bad packet is enabled
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-45871
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45871
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq-dequeue.patch
kpatch-description: net: sched: sch_qfq: Fix UAF in qfq_dequeue()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4921
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4921
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
kpatch-description: net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4921
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4921
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-3545-nfp-fix-use-after-free-in-area-cache-get.patch
kpatch-description: nfp: fix use-after-free in area_cache_get()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2022-3545
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3545
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-41858-7989-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
kpatch-description: drivers: net: slip: fix NPD bug in sl_tx_timeout()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2022-41858
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-41858
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1838-7974-Fix-double-fget-in-vhost_net_set_backend.patch
kpatch-description: Fix double fget() in vhost_net_set_backend()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-1838
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1838
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb4554c2232e44d595920f4d5c66cf8f7d13f9bc
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1073-8006-HID-check-empty-report_list-in-hid_validate_values.patch
kpatch-description: HID: check empty report_list in hid_validate_values()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-1073
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1073
kpatch-patch-url: https://github.com/torvalds/linux/commit/b12fece4c648.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6606-8022-smb-client-fix-OOB-in-smbCalcSize.patch
kpatch-description: smb: client: fix OOB in smbCalcSize()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6606
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6606
kpatch-patch-url: https://github.com/torvalds/linux/commit/b35858b3786d.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8023-smb-client-fix-potential-OOB-in-cifs_dump_detail.patch
kpatch-description: smb: client: fix potential OOB in cifs_dump_detail()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6610
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6610
kpatch-patch-url: https://github.com/torvalds/linux/commit/b50492b05fd02887b46aef079592207fb5c97a4c.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8024-smb-client-fix-potential-OOB-in-smb2_dump_detail.patch
kpatch-description: smb: client: fix potential OOB in smb2_dump_detail()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6610
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6610
kpatch-patch-url: https://github.com/torvalds/linux/commit/567320c46a60a3c39b69aa1df802d753817a3f86.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7993-x86-sev-es-Fix-SEV-ES-OUT-IN-immediate-opcode-vc-han.patch
kpatch-description: x86/sev-es: Fix SEV-ES OUT/IN immediate opcode vc handling
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/patch/?id=a8f7e08a81708920a928664a865208fdf451c49f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7994-x86-sev-Disable-MMIO-emulation-from-user-mode-pre477.patch
kpatch-description: x86/sev: Disable MMIO emulation from user mode
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://github.com/torvalds/linux/commit/a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7995-x86-sev-Check-IOBM-for-IOIO-exceptions-from-user-spa.patch
kpatch-description: x86/sev: Check IOBM for IOIO exceptions from user-space
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://github.com/torvalds/linux/commit/b9cb9c45583b.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7996-x86-sev-Check-for-user-space-IOIO-pointing-to-kernel-pre477.patch
kpatch-description: x86/sev: Check for user-space IOIO pointing to kernel space
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://github.com/torvalds/linux/commit/63e44bc52047.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8030-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva-pre513.patch
kpatch-description: Fix a kernel panic when host sends an invalid H2C PDU length
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6535
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6535
kpatch-patch-url: https://github.com/torvalds/linux/commit/efa56305908b.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6536-8031-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
kpatch-description: nvmet-tcp: fix a crash in nvmet_req_complete()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6536
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6536
kpatch-patch-url: https://github.com/torvalds/linux/commit/0849a5441358cef02586fb2d60f707c0db195628.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6356-CVE-2023-6535-CVE-2023-6536-8032-nvmet-tcp-remove-boilerplate-code-pre513.patch
kpatch-description: nvmet-tcp: remove boilerplate code
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6356
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6356
kpatch-patch-url: https://github.com/torvalds/linux/commit/75011bd0f9c5.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8033-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation-pre513.patch
kpatch-description: nvmet-tcp: Fix the H2C expected PDU len calculation
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6535
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6535
kpatch-patch-url: https://github.com/torvalds/linux/commit/9a1abc24850e.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7991-perf-Disallow-mis-matched-inherited-group-reads.patch
kpatch-description: perf: Disallow mis-matched inherited group reads
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-5717
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5717
kpatch-patch-url: https://github.com/torvalds/linux/commit/32671e3799ca.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
kpatch-description: perf: Disallow mis-matched inherited group reads (adaptation)
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-5717
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5717
kpatch-patch-url: https://github.com/torvalds/linux/commit/32671e3799ca2e4590773fd0e63aaa4229e50c06
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7992-perf-core-Fix-potential-NULL-deref.patch
kpatch-description: perf/core: Fix potential NULL deref
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-5717
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5717
kpatch-patch-url: https://github.com/torvalds/linux/commit/a71ef31485bb.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6817-8019-netfilter-nft_set_pipapo-skip-inactive-elements-duri.patch
kpatch-description: netfilter: nft_set_pipapo: skip inactive elements during set walk
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6817
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6817
kpatch-patch-url: https://github.com/torvalds/linux/commit/317eb968509.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-40283-7990-Bluetooth-L2CAP-Fix-use-after-free-in-l2cap_sock_rea.patch
kpatch-description: Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-40283
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-40283
kpatch-patch-url: https://github.com/torvalds/linux/commit/1728137b33c0.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2024-0646-8028-net-tls-update-curr-on-splice-as-well.patch
kpatch-description: net: tls, update curr on splice as well
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2024-0646
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0646
kpatch-patch-url: https://github.com/torvalds/linux/commit/c5a595000e26.patch
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-0565-smb-client-fix-oob-in-receive-encrypted-standard.patch
kpatch-description: smb: client: fix OOB in receive_encrypted_standard()
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2024-0565
kpatch-cvss: 7.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0565
kpatch-patch-url: https://git.kernel.org/linus/eec04ea119691e65227a97ce53c0da6b9b74b0b7
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
kpatch-description: perf: Fix perf_event_validate_size()
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-6931
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6931
kpatch-patch-url: https://git.kernel.org/linus/382c27f4ed28f803b1f1473ac2d8db0afc795a1b
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
kpatch-description: perf: Fix perf_event_validate_size() lockdep splat
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-6931
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6931
kpatch-patch-url: https://git.kernel.org/linus/7e2c1e4b34f07d9aa8937fab88359d4a0fce468e
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-51042-drm-amdgpu-Fix-potential-fence-use-after-free-v2.patch
kpatch-description: drm/amdgpu: Fix potential fence use-after-free v2
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-51042
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-51042
kpatch-patch-url: https://git.kernel.org/linus/2e54154b9f27
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2021-33631-ext4-fix-kernel-BUG-in-ext4_write_inline_data_end.patch
kpatch-description: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2021-33631
kpatch-cvss: 7.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33631
kpatch-patch-url: https://git.kernel.org/linus/5c099c4fdc438014d5893629e70a8ba934433ee8
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6546-tty-n_gsm-fix-the-UAF-caused-by-race-condition-in-gsm_cleanup_mux.patch
kpatch-description: tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-6546
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6546
kpatch-patch-url: https://git.kernel.org/linus/3c4f8333b582487a2d1e02171f1465531cde53e3
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
kpatch-description: netfilter: nf_tables: reject QUEUE/DROP verdict parameters
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2024-1086
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-1086
kpatch-patch-url: https://git.kernel.org/linus/f342de4e2f33e0e39165d8639387aa6c19dff660
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
kpatch-description: drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2022-38096
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-38096
kpatch-patch-url: https://git.kernel.org/linus/517621b7060096e48e42f545fa6646fc00252eac
kpatch-name: skipped/CVE-2023-4244.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-4244
kpatch-skip-reason: An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6176-net-tls-do-not-free-tls_rec-on-async-operation-in-bpf_exec_tx_verdict.patch
kpatch-description: net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6176
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6176
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
kpatch-description: ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6932
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6932
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e2b706c691905fe78468c361aaabc719d0a496f1
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanup.patch
kpatch-description: Bluetooth: Fix double free in hci_conn_cleanup
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-28464
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28464
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a85fb91e3d728bdfc80833167e8162cce8bc7004
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
kpatch-description: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-0841
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0841
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=79d72c68c58784a3e1cd2378669d51bfd0cb7498
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
kpatch-description: ida: Fix crash in ida_free when the bitmap is empty
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6915
kpatch-cvss: 6.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6915
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=af73483f4e8b6f5c68c9aa63257bdd929a9c194a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation.patch
kpatch-description: drm/qxl: fix UAF on handle creation
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39198
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39198
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c611589b4259ed63b9b77be6872b1ce07ec0ac16
kpatch-name: 5.11.0/CVE-2021-4204-UBUNTU-SAUCE-bpf-prevent-helper-argument-PTR_TO_ALLOC_MEM-to-have-offset-other-than-0.patch
kpatch-description: UBUNTU: SAUCE: bpf: prevent helper argument PTR_TO_ALLOC_MEM to have offset other than 0
kpatch-kernel: 5.11.0-46.51~20.04.2
kpatch-cve: CVE-2021-4204
kpatch-cvss: 6.4
kpatch-cve-url: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4204
kpatch-patch-url: https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-25742-CVE-2024-25743-3942-x86-sev-Harden-VC-instruction-emulation-somewhat-425.patch
kpatch-description: x86/sev: Harden #VC instruction emulation somewhat
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-25742 CVE-2024-25743
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-25742
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-25743
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/patch/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-51779-2946-Bluetooth-af_bluetooth-Fix-Use-After-Free-in-bt_sock-425.patch
kpatch-description: Bluetooth: af_bluetooth: Fix Use-After-Free in
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-51779
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-51779
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2e07e8348ea454615e268222ae3fc240421be768
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-24023-3694-Bluetooth-Add-more-enc-key-size-check.patch
kpatch-description: Bluetooth: Add more enc key size check
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-24023
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-24023
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04a342cc49a8522e99c9b3346371c329d841dcd2
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2019-13631-0684-Input-gtco-bounds-check-collection-indent-level.patch
kpatch-description: Input: gtco - bounds check collection indent level
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2019-13631
kpatch-cvss: 5.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2019-13631
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2a017fd82c5402b3c8df5e3d6e5165d9e6147dc1
kpatch-name: skipped/CVE-2023-52581.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52581
kpatch-skip-reason: The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
kpatch-description: netfilter: nfnetlink_osf: avoid OOB read
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39189
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39189
kpatch-patch-url: https://github.com/torvalds/linux/commit/f4f8a7803119005e87b716874bec07c751efafec
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
kpatch-description: netfilter: xt_sctp: validate the flag_info count
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39193
kpatch-cvss: 6.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39193
kpatch-patch-url: https://github.com/torvalds/linux/commit/e99476497687ef9e850748fe6d232264f30bc8f9
kpatch-name: skipped/CVE-2023-4133.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-4133
kpatch-skip-reason: Complex adaptation required to add timer_shutdown_sync() in timers subsystem.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-fix-error-paths-in-set-con2fb-map-425.patch
kpatch-description: fbcon: Fix error paths in set_con2fb_map
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-38409
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-38409
kpatch-patch-url: https://github.com/torvalds/linux/commit/edf79dd2172233452ff142dcc98b19d955fc8974
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-set-con2fb-map-needs-to-set-con2fb-map-425.patch
kpatch-description: fbcon: set_con2fb_map needs to set con2fb_map!
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-38409
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-38409
kpatch-patch-url: https://github.com/torvalds/linux/commit/fffb0b52d5258554c645c966c6cbef7de50b851d
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-42755-net-sched-cls-rsvp-always-try-to-match-inside-the-linear-part-of-skb-477.patch
kpatch-description: net/sched: cls_rsvp: always try to match inside the linear part of skb
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-42755
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-42755
kpatch-patch-url: https://github.com/torvalds/linux/commit/265b4da82dbf5df04bee5a5d46b7474b1aaf326a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
kpatch-description: netfilter: nf_tables: bail out on mismatching
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6622
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6622
kpatch-patch-url: https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-remove-docstring-reference-to-kset.patch
kpatch-description: kobject: Remove docstring reference to kset
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-45863
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45863
kpatch-patch-url: https://github.com/torvalds/linux/commit/8fd7c302b37099670b5d793375da10a40da7edf5
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const.patch
kpatch-description: kobject: modify kobject_get_path() to take a const
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-45863
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45863
kpatch-patch-url: https://github.com/torvalds/linux/commit/33a0a1e3b3d17445832177981dc7a1c6a5b009f8
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
kpatch-description: kobject: Fix slab-out-of-bounds in fill_kobj_path()
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-45863
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45863
kpatch-patch-url: https://github.com/torvalds/linux/commit/3bb2a01caa813d3a1845d378bbe4169ef280d394
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-add-a-route-cache-full-diagnostic-message.patch
kpatch-description: net: add a route cache full diagnostic message
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/22c2ad616b74f3de2256b242572ab449d031d941
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-dst-use-a-smaller-percpu-counter-batch-for-dst-entries-accounting.patch
kpatch-description: net/dst: use a smaller percpu_counter batch for dst entries accounting
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/cf86a086a18095e33e0637cb78cda1fcf5280852
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-max-size-check-inline-with-ipv4.patch
kpatch-description: ipv6: remove max_size check inline with ipv4
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/af6d10345ca76670c1b7c37799f0d5576ccef277
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-extra-counter-pull-before-gc.patch
kpatch-description: ipv6: Remove extra counter pull before gc
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/9259f6b573cf17c00f50c4b626983a5347b1abe9
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of.patch
kpatch-description: media: technisat-usb2: break out of loop at end of
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2019-15505
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2019-15505
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c4df39e504b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-25775-rdma-irdma-prevent-zero-length-stag-registration-425.patch
kpatch-description: RDMA/irdma: Prevent zero-length STAG registration
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-25775
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-25775
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bb6d73d9add68ad270888db327514384dfa44958
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-51780-atm-fix-use-after-free-in-do-vcc-ioctl.patch
kpatch-description: atm: Fix Use-After-Free in do_vcc_ioctl
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-51780
kpatch-cvss: 8.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-51780
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
kpatch-description: smb: client: fix potential OOBs in
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52434
kpatch-cvss: 8.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52434
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
kpatch-description: smb: client: fix parsing of SMB3.1.1 POSIX create
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52434
kpatch-cvss: 8.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52434
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76025cc2285d9ede3d717fe4305d66f8be2d9346
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer.patch
kpatch-description: mISDN: fix use-after-free bugs in l1oip timer
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2022-3565
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3565
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer-kpatch.patch
kpatch-description: verify struct l1oip layout
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2022-3565
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3565
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
kpatch-description: Bluetooth: L2CAP: Fix u8 overflow
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2022-45934
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45934
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcd70260ef56e0aee8a4fc6cd214a419900b0765
kpatch-name: skipped/CVE-2022-0500.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-0500
kpatch-skip-reason: Complex adaptation required. Requires changes a lot of constants
kpatch-cvss:
kpatch-name: skipped/CVE-2022-23222.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-23222
kpatch-skip-reason: Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
kpatch-description: team: fix null-ptr-deref when team device type is changed
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52574
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52574
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=492032760127251e5540a5716a70996bacf2a3fd
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
kpatch-description: team: fix null-ptr-deref when team device type is changed
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52574
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52574
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=492032760127251e5540a5716a70996bacf2a3fd
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
kpatch-description: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-3567
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3567
kpatch-patch-url: https://git.kernel.org/linus/226fae124b2dac217ea5436060d623ff3385bc34
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
kpatch-description: vc_screen: don't clobber return value in vcs_read
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-3567
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3567
kpatch-patch-url: https://git.kernel.org/linus/ae3419fbac845b4d3f3a9fae4cc80c68d82cdf6e
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
kpatch-description: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52448
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52448
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
kpatch-description: sched/membarrier: reduce the ability to hammer on sys_membarrier
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-26602
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26602
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
kpatch-description: ipv4: fix null-deref in ipv4_link_failure
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-42754
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-42754
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0113d9c9d1ccc07f5a3710dac4aa24b6d711278c
kpatch-name: skipped/CVE-2023-52489.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52489
kpatch-skip-reason: The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26609.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26609
kpatch-skip-reason: CVE has been marked as REJECTED on the NVD website.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52580-net-core-Fix-ETH_P_1588-flow-dissector.patch
kpatch-description: net/core: Fix ETH_P_1588 flow dissector
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52580
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52580
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=75ad80ed88a182ab2ad5513e448cf07b403af5c3
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52620-netfilter-nf_tables-disallow-timeout-for-anonymous-s.patch
kpatch-description: netfilter: nf_tables: disallow timeout for anonymous sets
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52620
kpatch-cvss: 2.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52620
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e26d3009efda338f19016df4175f354a9bd0a4ab
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-26671-blk-mq-fix-IO-hang-from-sbitmap-wakeup-race.patch
kpatch-description: blk-mq: fix IO hang from sbitmap wakeup race
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-26671
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26671
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5266caaf5660529e3da53004b8b7174cab6374ed
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
kpatch-description: tty: keyboard, do not speculate on func_table index
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f3af1b68fc96b14b93d1013ce7965723dc53ebbc
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
kpatch-description: tty/vt: fix write/write race in ioctl(KDSKBSENT)
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=46ca3f735f345c9d87383dd3a09fa5d43870770e
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
kpatch-description: vt: keyboard, simplify vt_kdgkbsent
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6ca03f90527e499dd5e32d6522909e2ad390896b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
kpatch-description: vt: keyboard, extend func_buf_lock to readers
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=82e61c3909db51d91b9d3e2071557b6435018b80
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
kpatch-description: vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9788c950ed4ad2020a7f2e8231abaf77e49d871a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
kpatch-description: vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=07edff9265204e15c9fc8d07cc69e38c4c484e15
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
kpatch-description: vt_kdsetmode: extend console locking
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2021-3753
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-3753
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2287a51ba822384834dafc1c798453375d1107c7
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-31083-Bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag.patch
kpatch-description: Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-31083
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-31083
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c33663af9ad115f90c076a1828129a3fbadea98
kpatch-name: skipped/CVE-2023-37453.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-37453
kpatch-skip-reason: Introduced in the v4.18.0-513.5.1.el8 by 45bf39f8df7f
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
kpatch-description: net: xfrm: Fix xfrm_address_filter OOB read
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39194
kpatch-cvss: 3.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39194
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dfa73c17d55b921e1d4e154976de35317e43a93a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6121-nvmet-nul-terminate-the-NQNs-passed-in-the-connect-c.patch
kpatch-description: nvmet: nul-terminate the NQNs passed in the connect command
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6121
kpatch-cvss: 4.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6121
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1c22e0295a5eb571c27b53c7371f95699ef705ff
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-be.patch
kpatch-description: kvm: initialize all of the kvm_debugregs structure before sending it to userspace
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-1513
kpatch-cvss: 3.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1513
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2c10b61421a28e95a46ab489fd56c0f442ff6952
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47153-i2c-i801-don-t-generate-an-interrupt-on-bus-reset.patch
kpatch-description: i2c: i801: Don't generate an interrupt on bus reset
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47153
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47153
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=e4d8716c3dcec47f1557024add24e1f3c09eb24b
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2020-36777-media-dvbdev-fix-memory-leak-in-dvb_media_device_free.patch
kpatch-description: media: dvbdev: Fix memory leak in dvb_media_device_free()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2020-36777
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-36777
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bf9a40ae8d722f281a2721779595d6df1c33a0bf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-memory-leak-in-smsc75xx-bind.patch
kpatch-description: net: usb: fix memory leak in smsc75xx_bind
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47171
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47171
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=46a8b29c6306d8bbfd92b614ef65a47c900d8e70
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-possible-use-after-free-in-smsc75xx_bind.patch
kpatch-description: net: usb: fix possible use-after-free in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47171
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47171
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=56b786d86694e079d8aad9b314e015cd4ac02a3d
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-default-implementations-for-request-callbacks.patch
kpatch-description: crypto: akcipher - default implementations for request callbacks
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-6240
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6240
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=78a0324f4a5328088fea9426cfe1d1851276c475
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-testmgr-split-akcipher-tests-by-a-key-type.patch
kpatch-description: crypto: testmgr - split akcipher tests by a key type
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-6240
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6240
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=0507de9404992edafa3d1d86450a37d6a726399d
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-disable-signing-and-decryption.patch
kpatch-description: crypto: akcipher - Disable signing and decryption
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-6240
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6240
kpatch-patch-url: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/3755/diffs?commit_id=3709c35cf173f886689e201914911b464881c947
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52520-platform-x86-think-lmi-fix-reference-leak.patch
kpatch-description: platform/x86: think-lmi: Fix reference leak
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52520
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52520
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
kpatch-description: wifi: iwlwifi: fix a memory corruption
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26610
kpatch-cvss: 6.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26610
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
kpatch-description: net/sched: act_ct: fix skb leak and crash on ooo frags
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52610
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52610
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=3f14b377d01d8357eba032b4cabc8c1149b458b6
kpatch-name: skipped/CVE-2023-52598.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52598
kpatch-skip-reason: Out of scope as the patch is for s390 arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: skipped/CVE-2022-48669.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-48669
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: skipped/CVE-2023-52607.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52607
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
kpatch-description: uio: Fix use-after-free in uio_open
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52439
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52439
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=0c9ae0b8605078eafc3bea053cc78791e97ba2e2
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
kpatch-description: i2c: i801: Fix block process call transactions
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26593
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26593
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=c1c9d0f6f7f1dbf29db996bd8e166242843a5f21
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2019-25162-i2c-fix-a-potential-use-after-free.patch
kpatch-description: i2c: Fix a potential use after free
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2019-25162
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2019-25162
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=e4c72c06c367758a14f227c847f9d623f1994ecf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context.patch
kpatch-description: media: pvrusb2: fix use after free on context disconnection
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52445
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52445
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=ded85b0c0edd8f45fec88783d7555a5b982449c1
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-23307-md-raid5-fix-atomicity-violation-in.patch
kpatch-description: md/raid5: fix atomicity violation in raid5_cache_count
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-23307
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-23307
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dfd2bf436709b2bccb78c2dda550dde93700efa7
kpatch-name: skipped/CVE-2023-52606.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52606
kpatch-skip-reason: CVE patch is for powerpc arch only
kpatch-cvss:
kpatch-name: skipped/CVE-2024-25744.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-25744
kpatch-skip-reason: This CVE modifies the functions which won't be available or doesn't make sense to patch as they are used during bootup time or init. Therefore we cannot patch this CVE.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47185-tty-tty_buffer-Fix-the-softlockup-issue-in-flush_to_.patch
kpatch-description: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47185
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47185
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in-the.patch
kpatch-description: vt: fix memory overlapping when deleting chars in the buffer
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2022-48627
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-48627
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39cdb68c64d84e71a4a717000b6e5de208ee60cc
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52477-usb-hub-Guard-against-accesses-to-uninitialized-BOS-425.patch
kpatch-description: usb: hub: Guard against accesses to uninitialized BOS descriptors
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52477
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52477
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f74a7afc224acd5e922c7a2e52244d891bbe44ee
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52513-RDMA-siw-Fix-connection-failure-handling.patch
kpatch-description: RDMA/siw: Fix connection failure handling
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52513
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52513
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=53a3f777049771496f791504e7dc8ef017cba590
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52528-net-usb-smsc75xx-Fix-uninit-value-access-in-__smsc75.patch
kpatch-description: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52528
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52528
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9c65989920f7c28775ec4e0c11b483910fb67b8
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
kpatch-description: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52594
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52594
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2adc886244dff60f948497b59affb6c6ebb3c348
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
kpatch-description: wifi: rt2x00: restart beacon queue when hardware reset
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52595
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52595
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26872-RDMA-srpt-Do-not-register-event-handler-until-srpt-d.patch
kpatch-description: RDMA/srpt: Do not register event handler until srpt device is fully setup
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26872
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26872
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c21a8870c98611e8f892511825c9607f1e2cd456
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26892-wifi-mt76-mt7921e-fix-use-after-free-in-free_irq.patch
kpatch-description: wifi: mt76: mt7921e: fix use-after-free in free_irq()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26892
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26892
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c957280ef6ab6bdf559a91ae693a6b34310697e3
kpatch-name: skipped/CVE-2023-52565.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52565
kpatch-skip-reason: The given kernel version isn't vulnerable.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-properly-check-all-write-ioctls-for-permissions.patch
kpatch-description: mtd: properly check all write ioctls for permissions
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47055
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47055
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7e6b19bc76471ba03725fe58e0c218a3d6266c3
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-require-write-permissions-for-locking-and-badblo.patch
kpatch-description: mtd: require write permissions for locking and badblock ioctls
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47055
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47055
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1e97743fd180981bef5f01402342bb54bf1c6366
kpatch-name: skipped/CVE-2024-26897.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26897
kpatch-skip-reason: WiFi - Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
kpatch-description: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27052
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27052
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=1213acb478a7181cd73eeaf00db430f1e45b1361
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
kpatch-description: RDMA/qedr: Fix qedr_create_user_qp error flow
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26743
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26743
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=5ba4e6d5863c53e937f49932dee0ecb004c65928
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-425.patch
kpatch-description: wifi: mac80211: fix race condition on enabling
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26779
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26779
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix.patch
kpatch-description: do_sys_name_to_handle(): use kzalloc() to fix
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26901
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26901
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=3948abaa4e2be938ccdfc289385a27342fb13d43
kpatch-name: skipped/CVE-2024-26919.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26919
kpatch-skip-reason: The given kernel version isn't vulnerable.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4056-USB-core-Add-hub_get-and-hub_put-routines.patch
kpatch-description: USB: core: Add hub_get() and hub_put() routines
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26933
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26933
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee113b860aa169e9a4d2c167c95d0f1961c6e1b8
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26934-usb-core-fix-deadlock-in-4.18.0-477.27.1.el8_8.patch
kpatch-description: USB: core: Fix deadlock in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26934
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26934
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=80ba43e9f799cbdd83842fc27db667289b3150f5
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26964-4060-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
kpatch-description: USB: core: Add hub_get() and hub_put() routines
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26964
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26964
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be95cc6d71dfd0cba66e3621c65413321b398052
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
kpatch-description: fat: fix uninitialized field in nostale filehandles
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26973
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26973
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fde2497d2bc3a063d8af88b258dbadc86bd7b57c
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
kpatch-description: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26993
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26993
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=a90bca2228c0646fc29a72689d308e5fe03e6d78
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-mem.patch
kpatch-description: vhost: use kzalloc() instead of kmalloc() followed by memset()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-0340
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0340
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4d8df0f5f79f747d75a7d356d9b9ea40a4e4c8a9
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-.patch
kpatch-description: x86/fpu: Stop relying on userspace for info to
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26603
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26603
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=d877550eaf2dc9090d782864c96939397a3c6835
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26615-net-smc-fix-illegal-rmb_desc-access-in-SMC-D-connect-477.27.patch
kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26615
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with.patch
kpatch-description: netfilter: nf_tables: disallow anonymous set with timeout flag
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26642
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26642
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=16603605b667b70da974bea8216c93e7db043bf1
kpatch-name: skipped/CVE-2024-26643.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26643
kpatch-skip-reason: The given kernel version isn't vulnerable (Netfilter).
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26664.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26664
kpatch-skip-reason: The given kernel version isn't vulnerable.
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26693.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26693
kpatch-skip-reason: The given kernel version isn't vulnerable (WiFi).
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26694.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26694
kpatch-skip-reason: The given kernel version isn't vulnerable (WiFi).
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in.patch
kpatch-description: USB: usb-storage: Prevent divide-by-0 error in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27059
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27059
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=014bcf41d946b36a8f0b8e9b5d9529efbb822f49
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47013-net-emac-emac-mac-fix-a-use-after-free-in.patch
kpatch-description: net:emac/emac-mac: Fix a use after free in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47013
kpatch-cvss: 5.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47013
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=6d72e7c767acbbdd44ebc7d89c6690b405b32b57
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-46934-i2c-validate-user-data-in-compat-ioctl.patch
kpatch-description: i2c: validate user data in compat ioctl
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-46934
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-46934
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bb436283e25aaf1533ce061605d23a9564447bdf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a.patch
kpatch-description: xhci: process isoc TD properly when there was a
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26659
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26659
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=5372c65e1311a16351ef03dd096ff576e6477674
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a-kpatch.patch
kpatch-description: xhci: process isoc TD properly when there was a transaction error mid TD kpatch
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26659
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26659
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=5372c65e1311a16351ef03dd096ff576e6477674
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-handle-isoc-babble-and-buffer-overrun-events.patch
kpatch-description: xhci: handle isoc Babble and Buffer Overrun events
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26659
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26659
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=7c4650ded49e5b88929ecbbb631efb8b0838e811
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-372.patch
kpatch-description: net/mlx5e: Prevent deadlock while disabling aRFS
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27014
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27014
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fef965764cf562f28afb997b626fc7c3cec99693
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-372-kpatch.patch
kpatch-description: net/mlx5e: Prevent deadlock while disabling aRFS
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27014
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27014
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fef965764cf562f28afb997b626fc7c3cec99693
kpatch-name: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
kpatch-description: x86 xen add xenpv restore regs and return to usermode
kpatch-kernel: N/A
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: N/A
kpatch-name: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
kpatch-description: kpatch add alt asm definitions
kpatch-kernel: N/A
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: N/A
kpatch-name: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
kpatch-description: kpatch add paravirt asm definitions
kpatch-kernel: N/A
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: N/A
uname: 4.18.0-553.8.1.el8_10
Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]