OS: almalinux8
kernel: kernel-4.18.0-425.19.2.el8_7
time: 2024-09-10 21:22:46
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
kpatch-description: wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-41674
kpatch-cvss: 7.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-41674
kpatch-patch-url: https://git.kernel.org/linus/aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
kpatch-description: ath9k: fix use-after-free in ath9k_hif_usb_rx_cbMIME-Version: 1.0
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1679
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1679
kpatch-patch-url: https://git.kernel.org/linus/0ac4827f78c7ffe8eef074bc010e7e34bc22f533
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref_get.patch
kpatch-description: media: em28xx: initialize refcount before kref_get
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3239
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3239
kpatch-patch-url: https://git.kernel.org/linus/554188a95b1e2f0f8e434b51aa4af0bf9f270581
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
kpatch-description: devlink: Fix use-after-free after a failed reload
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3625
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3625
kpatch-patch-url: https://git.kernel.org/linus/6b4db2e528f650c7fb712961aac36455468d5902
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
kpatch-description: ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-30594
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-30594
kpatch-patch-url: https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-25265-0810-x86-elf-Disable-automatic-READ_IMPLIES_EXEC-on-64-bi.patch
kpatch-description: x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-25265
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-25265
kpatch-patch-url: https://git.kernel.org/linus/9fccc5c0c99f238aa1b0460fccbdb30a887e7036
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
kpatch-description: igmp: Add ip_mc_list lock in ip_check_mc_rcu
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-20141
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-20141
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
kpatch-description: af_key: Do not call xfrm_probe_algs in parallel
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3028
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3028
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ba953a9d89a00c078b85f4b190bc1dde66fe16b5
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_reassemble_sdu.patch
kpatch-description: Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3564
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3564
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page.patch
kpatch-description: mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3623
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-the-LISTEN-status.patch
kpatch-description: net/ulp: prevent ULP without clone op from entering the LISTEN status
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-0461
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-0461
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs.patch
kpatch-description: wifi: cfg80211: fix BSS refcounting bugs
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-42720
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-42720
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-1195-cifs-fix-use-after-free-caused-by-invalid-pointer-hostname.patch
kpatch-description: cifs: fix use-after-free caused by invalid pointer `hostname`
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-1195
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1195
kpatch-patch-url: https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
kpatch-description: tcp/udp: Fix memory leak in ipv6_renew_options()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3524
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3524
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
kpatch-description: drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3707
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3707
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4a61648af68f5ba4884f0e3b494ee1cabc4b6620
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf_fweh_event_worker.patch
kpatch-description: wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-3628
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3628
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
kpatch-description: usb: mon: make mmapped memory read only
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-43750
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-43750
kpatch-patch-url: https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0001-video-of_display_timing.h-include-errno.h.patch
kpatch-description: video: of_display_timing.h: include errno.h
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0002-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
kpatch-description: fbcon: Disallow setting font bigger than screen size
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0003-fbcon-Prevent-that-screen-size-is-smaller-than-font-.patch
kpatch-description: fbcon: Prevent that screen size is smaller than font size
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33655-0004-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
kpatch-description: fbmem: Check virtual screen sizes in fb_set_var()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33655
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33655
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
kpatch-description: vt: drop old FONT ioctls
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2021-33656
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0001-net-fix-a-concurrency-bug-in-l2tp_tunnel_register.patch
kpatch-description: net: fix a concurrency bug in l2tp_tunnel_register()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-4129
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-4129
kpatch-patch-url: https://github.com/torvalds/linux/commit/69e16d01d1de4f1249869de342915f608feb55d5
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0002-l2tp-Serialize-access-to-sk_user_data-with-sk_callba.patch
kpatch-description: l2tp: Serialize access to sk_user_data with sk_callback_lock
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-4129
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-4129
kpatch-patch-url: https://github.com/torvalds/linux/commit/b68777d54fac21fc833ec26ea1a2a84f975ab035
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-4129-0003-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk.patch
kpatch-description: l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-4129
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-4129
kpatch-patch-url: https://github.com/torvalds/linux/commit/af295e854a4e3813ffbdef26dbb6a4d6226c3ea1
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0001-vt-use-tty_insert_flip_string-in-respond_string.patch
kpatch-description: vt: use tty_insert_flip_string in respond_string
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/de53ce0427cd20886b0d53555dc576702cbb1ff8
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0002-vt-keyboard-use-tty_insert_flip_string-in-puts_queue.patch
kpatch-description: vt: keyboard, use tty_insert_flip_string in puts_queue
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/c35f638fc2adbb9c439ce68b559d406387cbdbe8
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0003-tty-drivers-tty-stop-using-tty_schedule_flip.patch
kpatch-description: tty: drivers/tty/, stop using tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/5f6a85158ccacc3f09744b3aafe8b11ab3b6c6f6
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0004-tty-the-rest-stop-using-tty_schedule_flip.patch
kpatch-description: tty: the rest, stop using tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/b68b914494df4f79b4e9b58953110574af1cb7a2
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip.patch
kpatch-description: tty: drop tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/5db96ef23bda6c2a61a51693c85b78b52d03f654
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0006-tty-extract-tty_flip_buffer_commit-from-tty_flip_buf.patch
kpatch-description: tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/716b10580283fda66f2b88140e3964f8a7f9da89
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0007-tty-use-new-tty_insert_flip_string_and_push_buffer-i.patch
kpatch-description: tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/a501ab75e7624d133a5a3c7ec010687c8b961d23
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2022-1462-0005-tty-drop-tty_schedule_flip-kpatch.patch
kpatch-description: tty: drop tty_schedule_flip()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2022-1462
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-1462
kpatch-patch-url: https://github.com/torvalds/linux/commit/5db96ef23bda6c2a61a51693c85b78b52d03f654
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-22998-drm-virtio-Fix-NULL-vs-IS_ERR-checking-in-virtio_gpu_object_shmem_init.patch
kpatch-description: drm/virtio: Fix error code in virtio_gpu_object_shmem_init()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-22998
kpatch-cvss: 5.5
kpatch-cve-url: https://nvd.nist.gov/vuln/detail/CVE-2023-22998
kpatch-patch-url: https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
kpatch-name: rhel8/4.18.0-477.10.1.el8_8/CVE-2023-22998-2-drm-virtio-Correct-drm_gem_shmem_get_sg_table-error-.patch
kpatch-description: drm/virtio: Fix error code in virtio_gpu_object_shmem_init()
kpatch-kernel: 4.18.0-477.10.1.el8_8
kpatch-cve: CVE-2023-22998
kpatch-cvss: 5.5
kpatch-cve-url: https://nvd.nist.gov/vuln/detail/CVE-2023-22998
kpatch-patch-url: https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
kpatch-name: rhel8/4.18.0-477.13.1.el8_8/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase.patch
kpatch-description: netfilter: nf_tables: deactivate anonymous set from preparation phase
kpatch-kernel: 4.18.0-477.13.1.el8_8
kpatch-cve: CVE-2023-32233
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-32233
kpatch-patch-url: https://git.kernel.org/linus/c1592a89942e9678f7d9c8030efa777c0d57edab
kpatch-name: rhel8/4.18.0-477.15.1.el8_8/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_getsockopt_conf-and-do_tls_setsockopt_conf.patch
kpatch-description: net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
kpatch-kernel: 4.18.0-477.15.1.el8_8
kpatch-cve: CVE-2023-28466
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28466
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
kpatch-description: Bluetooth: L2CAP: Fix accepting connection request
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2022-42896
kpatch-cvss: 8.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-42896
kpatch-patch-url: https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-resp.patch
kpatch-description: net/sched: tcindex: update imperfect hash filters
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-1281
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1281
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
kpatch-name: skipped/CVE-2023-1829.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-1829
kpatch-skip-reason: Complex adaptation is required, mainline retired tcindex.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
kpatch-description: xfs: verify buffer contents when we skip log replay
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-2124
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2124
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
kpatch-description: i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-2194
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2194
kpatch-patch-url: https://github.com/torvalds/linux/commit/92fbb6d1296f
kpatch-name: rhel8/4.18.0-477.21.1.el8_8/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
kpatch-description: perf: Fix check before add_event_to_groups() in perf_group_detach()
kpatch-kernel: 4.18.0-477.21.1.el8_8
kpatch-cve: CVE-2023-2235
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2235
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-4004-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
kpatch-description: netfilter: nft_set_pipapo: fix improper element removal
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-4004
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4004
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=87b5a5c209405cb6b57424cdfa226a6dbd349232
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3390-netfilter-nf-tables-incorrect-error-path-handling-with.patch
kpatch-description: netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-3390
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3390
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1240eb93f0616b21c675416516ff3d74798fdc97
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
kpatch-description: ipvlan:Fix out-of-bounds caused by unclear skb->cb
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-3090
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3090
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35788-net-sched-flower-fix-possible-oob-write-in-fl-set-geneve-opt.patch
kpatch-description: net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-35788
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35788
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4d56304e5827c8cc8cc18c75343d283af7c4825c
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-20593-zenbleed.patch
kpatch-description: hw: amd: Cross-Process Information Leak
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-20593
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2023-20593
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=522b1d69219d8f083173819fde04f994aa051a98
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-3776-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
kpatch-description: net/sched: cls_fw: Fix improper refcount update leads to use-after-free
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-3776
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3776
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0323bce598eea038714f941ce2b22541c46d488f
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
kpatch-description: netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-35001
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35001
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=025fd7efe2639773540a5e425b7bc0dc10b6b023
kpatch-name: rhel8/4.18.0-477.27.1.el8_8/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
kpatch-description: bluetooth: Perform careful capability checks in hci_sock_ioctl()
kpatch-kernel: 4.18.0-477.27.1.el8_8
kpatch-cve: CVE-2023-2002
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2002
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8d59548bae309000442c297bff3e54ab535f0ab7
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1118-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
kpatch-description: media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1118
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1118
kpatch-patch-url: https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1989-Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_remove.patch
kpatch-description: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1989
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1989
kpatch-patch-url: https://git.kernel.org/linus/73f7b171b7c0
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
kpatch-description: memstick: r592: Fix UAF bug in r592_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3141
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3141
kpatch-patch-url: https://git.kernel.org/linus/632644227850
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3268-kernel-relay.c-fix-read_pos-error-when-multiple-readers.patch
kpatch-description: kernel/relay.c: fix read_pos error when multiple readers
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3268
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3268
kpatch-patch-url: https://git.kernel.org/linus/341a7213e5c1c
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3609-net-sched-cls-u32-fix-reference-counter-leak-leading-to-overflow.patch
kpatch-description: net/sched: cls_u32: Fix reference counter leak leading to overflow
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3609
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3609
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=04c55383fa5689357bcdd2c8036725a55ed632bc
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3611-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
kpatch-description: net/sched: sch_qfq: account for stab overhead in qfq_enqueue
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3611
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3611
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_route-No-longer-copy-tcf_result-on-update.patch
kpatch-description: net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4128 CVE-2023-4206
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4128
kpatch-patch-url: https://git.kernel.org/linus/b80b829e9e2c
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_fw-No-longer-copy-tcf_result-on-update.patch
kpatch-description: net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4128 CVE-2023-4207
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4128
kpatch-patch-url: https://git.kernel.org/linus/76e42ae83199
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4128-net-sched-cls_u32-No-longer-copy-tcf_result-on-update.patch
kpatch-description: net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4128 CVE-2023-4208
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4128
kpatch-patch-url: https://git.kernel.org/linus/3044b16e7c6f
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
kpatch-description: net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-31436
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-31436
kpatch-patch-url: https://git.kernel.org/linus/3037933448f60f9acb705997eae62013ecb81e0d
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
kpatch-description: media: saa7134: fix use after free bug in saa7134_finidev due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-35823
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35823
kpatch-patch-url: https://git.kernel.org/linus/30cf57da176c
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
kpatch-description: media: dm1105: Fix use after free bug in dm1105_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-35824
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-35824
kpatch-patch-url: https://git.kernel.org/linus/5abda7a16698
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2021-43975-atlantic-fix-oob-read-and-write-in-hw-atl-utils-fw-rpc-wait.patch
kpatch-description: atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2021-43975
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-43975
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=b922f622592af76b57cbc566eaeccda0b31a3496
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-add-EXT4_INODE_HAS_XATTR_SPACE-macro-in-xattr.h.patch
kpatch-description: ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-2513
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2513
kpatch-patch-url: https://lore.kernel.org/all/20220616021358.2504451-2-libaokun1@huawei.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-2513-ext4-fix-use-after-free-in-ext4-xattr-set-entry.patch
kpatch-description: ext4: fix use-after-free in ext4_xattr_set_entry
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-2513
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2513
kpatch-patch-url: https://github.com/torvalds/linux/commit/67d7d8ad99be
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28772-seq-buf-fix-overflow-in-seq-buf-putmem-hex.patch
kpatch-description: seq_buf: Fix overflow in seq_buf_putmem_hex()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-28772
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28772
kpatch-patch-url: https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1073-hid-betop-check-shape-of-output-reports.patch
kpatch-description: HID: betop: check shape of output reports
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1073
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1073
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=3782c0d6edf658b71354a64d60aa7a296188fc90
kpatch-name: skipped/CVE-2022-40982.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-40982
kpatch-skip-reason: Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-42895-bluetooth-l2cap-fix-attempting-to-access-uninitialized-memory.patch
kpatch-description: Bluetooth: L2CAP: Fix attempting to access uninitialized memory
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-42895
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-42895
kpatch-patch-url: https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-30456-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
kpatch-description: KVM: nVMX: add missing consistency checks for CR0 and CR4
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-30456
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-30456
kpatch-patch-url: https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-33203-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to-race.patch
kpatch-description: net: qcom/emac: Fix use after free bug in emac_remove due to race condition
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-33203
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-33203
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
kpatch-name: skipped/CVE-2023-1206.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-1206
kpatch-skip-reason: This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
kpatch-description: hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1855
kpatch-cvss: 6.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1855
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
kpatch-description: fbcon: Check font dimension limits
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3161
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3161
kpatch-patch-url: https://git.kernel.org/linus/2b09d5d364986f724f17001ccfe4126b9b43a0be
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
kpatch-description: Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-3640
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3640
kpatch-patch-url: https://github.com/torvalds/linux/commit/0d0e2d032811280b927650ff3c15fe5020e82533
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfree_skb.patch
kpatch-description: can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-28388
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-28388
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3d3925ff6433f98992685a9679613a2cc97f3ce2
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
kpatch-description: sctp: fail if no bound addresses can be used for a given scope
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1074
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1074
kpatch-patch-url: https://git.kernel.org/linus/458e279f861d3f61796894cd158b780765a1569f
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
kpatch-description: xfrm: add NULL check in xfrm_update_ae_params
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3772
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2023-3772
kpatch-patch-url: https://git.kernel.org/linus/00374d9b6d9f
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-45869-kvm-x86-mmu-fix-race-condition-in-direct-page-fault.patch
kpatch-description: KVM: x86/mmu: Fix race condition in direct_page_fault
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-45869
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45869
kpatch-patch-url: https://git.kernel.org/linus/47b0c2e4c220f2251fd8dcfbb44479819c715e15
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IB.patch
kpatch-description: x86/speculation: Allow enabling STIBP with legacy IBRS
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1998
kpatch-cvss: 5.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1998
kpatch-patch-url: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1998-x86-speculation-Allow-enabling-STIBP-with-legacy-IB-kpatch.patch
kpatch-description: x86/speculation: Allow enabling STIBP with legacy IBRS
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1998
kpatch-cvss: 5.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1998
kpatch-patch-url: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req.patch
kpatch-description: ovl: fix use after free in struct ovl_aio_req
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1252
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1252
kpatch-patch-url: https://git.kernel.org/linus/9a254403760041528bc8f69fe2f5e1ef86950991
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1252-ovl-fix-use-after-free-in-struct-ovl_aio_req-kpatch.patch
kpatch-description: ovl: fix use after free in struct ovl_aio_req
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1252
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1252
kpatch-patch-url: https://git.kernel.org/linus/9a254403760041528bc8f69fe2f5e1ef86950991
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-1-drm-vmwgfx-clean-up-some-error-pointer-checking.patch
kpatch-description: drm/vmwgfx: Remove rcu locks from user resources
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-38457 CVE-2022-40133
kpatch-cvss: 6.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-38457
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-40133
kpatch-patch-url: https://git.kernel.org/linus/a309c7194e8a2f8bd4539b9449917913f6c2cd50
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-38457-CVE-2022-40133-drm-vmwgfx-Remove-rcu-locks-from-user-resources.patch
kpatch-description: drm/vmwgfx: Remove rcu locks from user resources
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-38457 CVE-2022-40133
kpatch-cvss: 6.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-38457
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-40133
kpatch-patch-url: https://git.kernel.org/linus/a309c7194e8a2f8bd4539b9449917913f6c2cd50
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
kpatch-description: HID: asus: use spinlock to safely schedule workers
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1079
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1079
kpatch-patch-url: https://git.kernel.org/linus/4ab3a086d10eeec1424f2e8a968827a6336203df
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
kpatch-description: HID: asus: use spinlock to safely schedule workers
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1079
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1079
kpatch-patch-url: https://git.kernel.org/linus/4ab3a086d10eeec1424f2e8a968827a6336203df
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-31084-media-dvb-core-Fix-kernel-WARNING-for-blocking-opera.patch
kpatch-description: media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-31084
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-31084
kpatch-patch-url: https://git.kernel.org/linus/b8c75e4a1b325ea0a9433fa8834be97b5836b946
kpatch-name: skipped/CVE-2023-0597.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-0597
kpatch-skip-reason: Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
kpatch-cvss:
kpatch-name: skipped/CVE-2022-4744.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-4744
kpatch-skip-reason: Not possible to trigger in rhel8
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-28328-media-dvb-usb-az6027-fix-null-ptr-deref-in-az6027_i2.patch
kpatch-description: media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-28328
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28328
kpatch-patch-url: https://lore.kernel.org/linux-media/20221120065918.2160782-1-zhongbaisong@huawei.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
kpatch-description: r8152: Rate limit overflow messages
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-3594
kpatch-cvss: 5.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3594
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0458-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
kpatch-description: prlimit: do_prlimit needs to have a speculation check
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-0458
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-0458
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2022-45887-patch-media-ttusb-dec-fix-memory-leak-in-ttusb-dec-exit-dvb.patch
kpatch-description: media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2022-45887
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3594
kpatch-patch-url: https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
kpatch-description: net: sched: atm: dont intepret cls results when asked to drop
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-23455
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-23455
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
kpatch-description: net: mpls: fix stale pointer if allocation fails during device rename
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-26545
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-26545
kpatch-patch-url: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4155-kvm-sev-only-access-ghcb-fields-once.patch
kpatch-description: net: sched: atm: dont intepret cls results when asked to drop
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4155
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-23455
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7588dbcebcbf0193ab5b76987396d0254270b04a
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-use-after-free-bugs-caused-by-do-submit-urb.patch
kpatch-description: media: usb: siano: Fix use after free bugs caused by do_submit_urb
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4132
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4132
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebad8e731c1c06adf04621d6fd327b860c0861b5
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4132-media-usb-siano-fix-warning-due-to-null-work-func-t-function.patch
kpatch-description: media: usb: siano: Fix use after free bugs caused by do_submit_urb
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4132
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4132
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebad8e731c1c06adf04621d6fd327b860c0861b5
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc-graft.patch
kpatch-description: net: sched: fix race condition in qdisc_graft()
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-0590
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-0590
kpatch-patch-url: https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-3212-gfs2-don-t-deref-jdesc-in-evict-pre-477.patch
kpatch-description: gfs2: Don't deref jdesc in evict
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-3212
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3212
kpatch-patch-url: https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-fix-an-information-leak-in-tipc_topsrv_kern_subscr.patch
kpatch-description: tipc: fix an information leak in tipc_topsrv_kern_subscr
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1382
kpatch-cvss: 5.5
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2023-1382
kpatch-patch-url: https://git.kernel.org/linus/e558e148938442dd49628cd7ef61c360832bef31
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-set-con-sock-in-tipc_conn_alloc.patch
kpatch-description: tipc: set con sock in tipc_conn_alloc
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1382
kpatch-cvss: 5.5
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2023-1382
kpatch-patch-url: https://git.kernel.org/linus/e87a077d09c05985a0edac7c6c49bb307f775d12
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1382-tipc-add-an-extra-conn_get-in-tipc_conn_alloc.patch
kpatch-description: tipc: add an extra conn_get in tipc_conn_alloc
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1382
kpatch-cvss: 5.5
kpatch-cve-url: https://security-tracker.debian.org/tracker/CVE-2023-1382
kpatch-patch-url: https://git.kernel.org/linus/4058e3b74ab3eabe0835cee9a0c6deda79e8a295
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
kpatch-description: net/tls: tls_is_tx_ready() checked list_entry
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-1075
kpatch-cvss: 3.3
kpatch-cve-url: https://ubuntu.com/security/CVE-2023-1075
kpatch-patch-url: https://git.kernel.org/linus/ffe2a22562444720b05bdfeb999c03e810d84cbb
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-33951-CVE-2023-33952-drm-vmwgfx-Do-not-drop-the-reference-to-the-handle-t.patch
kpatch-description: drm/vmwgfx: Do not drop the reference to the handle too soon
kpatch-kernel: kernel-4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-33951 CVE-2023-33952
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/cve-2023-33951
kpatch-patch-url: https://github.com/torvalds/linux/commit/9ef8d83
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-1-mm-thp-fix-wrong-cache-flush-in-remove_migration_pmd.patch
kpatch-description: mm: thp: fix wrong cache flush in remove_migration_pmd()
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4732
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4732
kpatch-patch-url: https://lore.kernel.org/linux-mm/20220131160254.43211-2-songmuchun@bytedance.com/
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-2-mm-thp-simplify-copying-of-huge-zero-page-pmd-when-f.patch
kpatch-description: mm/thp: simplify copying of huge zero page pmd when fork
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4732
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4732
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5fc7a5f6fd04bc18f309d9f979b32ef7d1d0a997
kpatch-name: rhel8/4.18.0-513.5.1.el8_9/CVE-2023-4732-mm-userfaultfd-fix-uffd-wp-special-cases-for-fork-pre-477.21.1.patch
kpatch-description: mm/userfaultfd: fix uffd-wp special cases for
kpatch-kernel: 4.18.0-513.5.1.el8_9
kpatch-cve: CVE-2023-4732
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4732
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8f34f1eac3820fc2722e5159acceb22545b30b0d
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-2163-bpf-fix-incorrect-verifier-pruning-due-to-missing-register-precision.patch
kpatch-description: bpf: Fix incorrect verifier pruning due to missing register precision taints
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-2163
kpatch-cvss: 8.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2163
kpatch-patch-url: https://git.kernel.org/linus/71b547f561247897a0a14f3082730156c0533fed
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-3812-net-tun-fix-bugs-for-oversize-packet-when-napi-frags-enabled.patch
kpatch-description: net: tun: fix bugs for oversize packet when napi frags enabled
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-3812
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3812
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0517e59572118ccfb7c626d81dca9
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-1192-cifs-Fix-UAF-in-cifs_demultiplex_thread.patch
kpatch-description: cifs: Fix UAF in cifs_demultiplex_thread()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-1192
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1192
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2023-5178-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
kpatch-description: nvmet-tcp: Fix a possible UAF in queue intialization setup
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2023-5178
kpatch-cvss: 8.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5178
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d920abd1e7c4884f9ecd0749d1921b7ab19ddfbd
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7808-media-dvbdev-remove-double-unlock.patch
kpatch-description: media: dvbdev: remove double-unlock
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/122d0e8dd050cc5dc3fb9e9b5f2dee3c5276ce35
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7810-media-dvbdev-Fix-memleak-in-dvb_register_device.patch
kpatch-description: media: dvbdev: Fix memleak in dvb_register_device
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/167faadfcf9339088910e9e85a1b711fcbbef8e9
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7811-media-dvbdev-fix-error-logic-at-dvb_register_device.patch
kpatch-description: media: dvbdev: fix error logic at dvb_register_device()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/1fec2ecc252301110e4149e6183fa70460d29674
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-media-dvbdev-adopts-refcnt-to-avoid-UAF.patch
kpatch-description: media: dvbdev: adopts refcnt to avoid UAF
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7813-media-dvbdev-fix-refcnt-bug.patch
kpatch-description: media: dvbdev: fix refcnt bug
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/3a664569b71b0a52be5ffb9fb87cc4f83d29bd71
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7812-kpatch.patch
kpatch-description: media: dvbdev: adopts refcnt to avoid UAF (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-media-dvb-core-Fix-use-after-free-due-to-race-at-dvb_register_device.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race at dvb_register_device()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/627bb528b086b4136315c25d6a447a98ea9448d3
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45884-7814-kpatch.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race at dvb_register_device() (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45884
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45884
kpatch-patch-url: https://github.com/torvalds/linux/commit/627bb528b086b4136315c25d6a447a98ea9448d3
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7817-media-dvb_net-avoid-speculation-from-net-slot.patch
kpatch-description: media: dvb_net: avoid speculation from net slot
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45886
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45886
kpatch-patch-url: https://github.com/torvalds/linux/commit/abc0226df64dc137b48b911c1fe4319aec5891bb
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-media-dvb-core-Fix-UAF-due-to-race-condition-at-dvb_net.patch
kpatch-description: media: dvb-core: Fix use-after-free due on race condition at dvb_net
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45886
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45886
kpatch-patch-url: https://github.com/torvalds/linux/commit/4172385b0c9ac366dcab78eda48c26814b87ed1a
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45886-7818-kpatch.patch
kpatch-description: media: dvb-core: Fix use-after-free due on race condition at dvb_net (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45886
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45886
kpatch-patch-url: https://github.com/torvalds/linux/commit/4172385b0c9ac366dcab78eda48c26814b87ed1a
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7819-media-dvb_ca_en50221-off-by-one-in-dvb_ca_en50221_io_do_ioctl.patch
kpatch-description: media: dvb_ca_en50221: off by one in dvb_ca_en50221_io_do_ioctl()
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/6706fe55af6fc2bcb069a77620ae38662bf09d1c
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7821-media-dvb_ca_en50221-avoid-speculation-from-CA-slot.patch
kpatch-description: media: dvb_ca_en50221: avoid speculation from CA slot
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/d382c5be4cc24597d5d12800558e537bbc12a71a
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7822-media-dvb_ca_en50221-fix-a-size-write-bug.patch
kpatch-description: media: dvb_ca_en50221: fix a size write bug
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/a4315e5be7020aac9b24a8151caf4bb85224cd0e
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-media-dvb-core-Fix-use-after-free-due-to-race-condition-at-dvb_ca_en50221.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/280a8ab81733da8bc442253c700a52c4c0886ffd
kpatch-name: rhel8/4.18.0-513.9.1.el8_9/CVE-2022-45919-7823-kpatch.patch
kpatch-description: media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (adaptation)
kpatch-kernel: 4.18.0-513.9.1.el8_9
kpatch-cve: CVE-2022-45919
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45919
kpatch-patch-url: https://github.com/torvalds/linux/commit/280a8ab81733da8bc442253c700a52c4c0886ffd
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-t.patch
kpatch-description: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-2162
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-2162
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
kpatch-description: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-42753
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-42753
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050d91c03b28ca479df13dfb02bcd2c60dd6a878
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
kpatch-description: af_unix: Fix null-ptr-deref in unix_stream_sendpage().
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-4622
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4622
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c
kpatch-name: skipped/CVE-2023-20569.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-20569
kpatch-skip-reason: A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-5633-drm-vmwgfx-Fix-possible-invalid-drm-gem-put-calls.patch
kpatch-description: drm/vmwgfx: Fix possible invalid drm gem put calls
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-5633
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5633
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f9e96bf1905479f18e83a3a4c314a8dfa56ede2c
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2023-5633-drm-vmwgfx-Keep-a-gem-reference-to-user-bos-in-surfa-2.patch
kpatch-description: drm/vmwgfx: Keep a gem reference to user bos in surfaces
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2023-5633
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5633
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=91398b413d03660fd5828f7b4abc64e884b98069
kpatch-name: rhel8/4.18.0-513.11.1.el8_9/CVE-2022-36402-drm-vmwgfx-Fix-shader-stage-validation.patch
kpatch-description: drm/vmwgfx: Fix shader stage validation
kpatch-kernel: 4.18.0-513.11.1.el8_9
kpatch-cve: CVE-2022-36402
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-36402
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=14abdfae508228a7307f7491b5c4215ae70c6542
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch-hfsc-Ensure-inner-classes-have-fsc-curve.patch
kpatch-description: net/sched: sch_hfsc: Ensure inner classes have fsc curve
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4623
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4623-net-sched-sch_hfsc-upgrade-rt-to-sc-when-it-becomes-.patch
kpatch-description: net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4623
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a13b67c9a015c4e21601ef9aa4ec9c5d972df1b4
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
kpatch-description: igb: set max size RX buffer when store bad packet is enabled
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-45871
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45871
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
kpatch-description: igb: set max size RX buffer when store bad packet is enabled
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-45871
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45871
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq-dequeue.patch
kpatch-description: net: sched: sch_qfq: Fix UAF in qfq_dequeue()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4921
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4921
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-4921-net-sched-sch-qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
kpatch-description: net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-4921
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-4921
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-3545-nfp-fix-use-after-free-in-area-cache-get.patch
kpatch-description: nfp: fix use-after-free in area_cache_get()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2022-3545
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3545
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2022-41858-7989-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
kpatch-description: drivers: net: slip: fix NPD bug in sl_tx_timeout()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2022-41858
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-41858
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1838-7974-Fix-double-fget-in-vhost_net_set_backend.patch
kpatch-description: Fix double fget() in vhost_net_set_backend()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-1838
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1838
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb4554c2232e44d595920f4d5c66cf8f7d13f9bc
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-1073-8006-HID-check-empty-report_list-in-hid_validate_values.patch
kpatch-description: HID: check empty report_list in hid_validate_values()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-1073
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1073
kpatch-patch-url: https://github.com/torvalds/linux/commit/b12fece4c648.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6606-8022-smb-client-fix-OOB-in-smbCalcSize.patch
kpatch-description: smb: client: fix OOB in smbCalcSize()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6606
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6606
kpatch-patch-url: https://github.com/torvalds/linux/commit/b35858b3786d.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8023-smb-client-fix-potential-OOB-in-cifs_dump_detail.patch
kpatch-description: smb: client: fix potential OOB in cifs_dump_detail()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6610
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6610
kpatch-patch-url: https://github.com/torvalds/linux/commit/b50492b05fd02887b46aef079592207fb5c97a4c.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6610-8024-smb-client-fix-potential-OOB-in-smb2_dump_detail.patch
kpatch-description: smb: client: fix potential OOB in smb2_dump_detail()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6610
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6610
kpatch-patch-url: https://github.com/torvalds/linux/commit/567320c46a60a3c39b69aa1df802d753817a3f86.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7993-x86-sev-es-Fix-SEV-ES-OUT-IN-immediate-opcode-vc-han.patch
kpatch-description: x86/sev-es: Fix SEV-ES OUT/IN immediate opcode vc handling
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/patch/?id=a8f7e08a81708920a928664a865208fdf451c49f
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7994-x86-sev-Disable-MMIO-emulation-from-user-mode-pre477.patch
kpatch-description: x86/sev: Disable MMIO emulation from user mode
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://github.com/torvalds/linux/commit/a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7995-x86-sev-Check-IOBM-for-IOIO-exceptions-from-user-spa.patch
kpatch-description: x86/sev: Check IOBM for IOIO exceptions from user-space
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://github.com/torvalds/linux/commit/b9cb9c45583b.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-46813-7996-x86-sev-Check-for-user-space-IOIO-pointing-to-kernel-pre477.patch
kpatch-description: x86/sev: Check for user-space IOIO pointing to kernel space
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-46813
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-46813
kpatch-patch-url: https://github.com/torvalds/linux/commit/63e44bc52047.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8030-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva-pre513.patch
kpatch-description: Fix a kernel panic when host sends an invalid H2C PDU length
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6535
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6535
kpatch-patch-url: https://github.com/torvalds/linux/commit/efa56305908b.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6536-8031-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
kpatch-description: nvmet-tcp: fix a crash in nvmet_req_complete()
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6536
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6536
kpatch-patch-url: https://github.com/torvalds/linux/commit/0849a5441358cef02586fb2d60f707c0db195628.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6356-CVE-2023-6535-CVE-2023-6536-8032-nvmet-tcp-remove-boilerplate-code-pre513.patch
kpatch-description: nvmet-tcp: remove boilerplate code
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6356
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6356
kpatch-patch-url: https://github.com/torvalds/linux/commit/75011bd0f9c5.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6535-8033-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation-pre513.patch
kpatch-description: nvmet-tcp: Fix the H2C expected PDU len calculation
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6535
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6535
kpatch-patch-url: https://github.com/torvalds/linux/commit/9a1abc24850e.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7991-perf-Disallow-mis-matched-inherited-group-reads.patch
kpatch-description: perf: Disallow mis-matched inherited group reads
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-5717
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5717
kpatch-patch-url: https://github.com/torvalds/linux/commit/32671e3799ca.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
kpatch-description: perf: Disallow mis-matched inherited group reads (adaptation)
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-5717
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5717
kpatch-patch-url: https://github.com/torvalds/linux/commit/32671e3799ca2e4590773fd0e63aaa4229e50c06
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-5717-7992-perf-core-Fix-potential-NULL-deref.patch
kpatch-description: perf/core: Fix potential NULL deref
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-5717
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-5717
kpatch-patch-url: https://github.com/torvalds/linux/commit/a71ef31485bb.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-6817-8019-netfilter-nft_set_pipapo-skip-inactive-elements-duri.patch
kpatch-description: netfilter: nft_set_pipapo: skip inactive elements during set walk
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-6817
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6817
kpatch-patch-url: https://github.com/torvalds/linux/commit/317eb968509.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2023-40283-7990-Bluetooth-L2CAP-Fix-use-after-free-in-l2cap_sock_rea.patch
kpatch-description: Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2023-40283
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-40283
kpatch-patch-url: https://github.com/torvalds/linux/commit/1728137b33c0.patch
kpatch-name: rhel8/4.18.0-513.18.1.el8_9/CVE-2024-0646-8028-net-tls-update-curr-on-splice-as-well.patch
kpatch-description: net: tls, update curr on splice as well
kpatch-kernel: 4.18.0-513.18.1.el8_9
kpatch-cve: CVE-2024-0646
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0646
kpatch-patch-url: https://github.com/torvalds/linux/commit/c5a595000e26.patch
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-0565-smb-client-fix-oob-in-receive-encrypted-standard.patch
kpatch-description: smb: client: fix OOB in receive_encrypted_standard()
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2024-0565
kpatch-cvss: 7.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0565
kpatch-patch-url: https://git.kernel.org/linus/eec04ea119691e65227a97ce53c0da6b9b74b0b7
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
kpatch-description: perf: Fix perf_event_validate_size()
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-6931
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6931
kpatch-patch-url: https://git.kernel.org/linus/382c27f4ed28f803b1f1473ac2d8db0afc795a1b
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
kpatch-description: perf: Fix perf_event_validate_size() lockdep splat
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-6931
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6931
kpatch-patch-url: https://git.kernel.org/linus/7e2c1e4b34f07d9aa8937fab88359d4a0fce468e
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-51042-drm-amdgpu-Fix-potential-fence-use-after-free-v2.patch
kpatch-description: drm/amdgpu: Fix potential fence use-after-free v2
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-51042
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-51042
kpatch-patch-url: https://git.kernel.org/linus/2e54154b9f27
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2021-33631-ext4-fix-kernel-BUG-in-ext4_write_inline_data_end.patch
kpatch-description: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2021-33631
kpatch-cvss: 7.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-33631
kpatch-patch-url: https://git.kernel.org/linus/5c099c4fdc438014d5893629e70a8ba934433ee8
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2023-6546-tty-n_gsm-fix-the-UAF-caused-by-race-condition-in-gsm_cleanup_mux.patch
kpatch-description: tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2023-6546
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6546
kpatch-patch-url: https://git.kernel.org/linus/3c4f8333b582487a2d1e02171f1465531cde53e3
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
kpatch-description: netfilter: nf_tables: reject QUEUE/DROP verdict parameters
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2024-1086
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-1086
kpatch-patch-url: https://git.kernel.org/linus/f342de4e2f33e0e39165d8639387aa6c19dff660
kpatch-name: rhel8/4.18.0-513.24.1.el8_9/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
kpatch-description: drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
kpatch-kernel: 4.18.0-513.24.1.el8_9
kpatch-cve: CVE-2022-38096
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-38096
kpatch-patch-url: https://git.kernel.org/linus/517621b7060096e48e42f545fa6646fc00252eac
kpatch-name: skipped/CVE-2023-4244.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-4244
kpatch-skip-reason: An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6176-net-tls-do-not-free-tls_rec-on-async-operation-in-bpf_exec_tx_verdict.patch
kpatch-description: net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6176
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6176
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
kpatch-description: ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6932
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6932
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e2b706c691905fe78468c361aaabc719d0a496f1
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-28464-bluetooth-fix-double-free-in-hci-conn-cleanup.patch
kpatch-description: Bluetooth: Fix double free in hci_conn_cleanup
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-28464
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-28464
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a85fb91e3d728bdfc80833167e8162cce8bc7004
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
kpatch-description: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-0841
kpatch-cvss: 6.6
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0841
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=79d72c68c58784a3e1cd2378669d51bfd0cb7498
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6915-ida-fix-crash-in-ida-free-when-the-bitmap-is.patch
kpatch-description: ida: Fix crash in ida_free when the bitmap is empty
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6915
kpatch-cvss: 6.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6915
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=af73483f4e8b6f5c68c9aa63257bdd929a9c194a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39198-drm-qxl-fix-uaf-on-handle-creation.patch
kpatch-description: drm/qxl: fix UAF on handle creation
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39198
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39198
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c611589b4259ed63b9b77be6872b1ce07ec0ac16
kpatch-name: 5.11.0/CVE-2021-4204-UBUNTU-SAUCE-bpf-prevent-helper-argument-PTR_TO_ALLOC_MEM-to-have-offset-other-than-0.patch
kpatch-description: UBUNTU: SAUCE: bpf: prevent helper argument PTR_TO_ALLOC_MEM to have offset other than 0
kpatch-kernel: 5.11.0-46.51~20.04.2
kpatch-cve: CVE-2021-4204
kpatch-cvss: 6.4
kpatch-cve-url: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4204
kpatch-patch-url: https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-25742-CVE-2024-25743-3942-x86-sev-Harden-VC-instruction-emulation-somewhat-425.patch
kpatch-description: x86/sev: Harden #VC instruction emulation somewhat
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-25742 CVE-2024-25743
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-25742
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-25743
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/patch/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-51779-2946-Bluetooth-af_bluetooth-Fix-Use-After-Free-in-bt_sock-425.patch
kpatch-description: Bluetooth: af_bluetooth: Fix Use-After-Free in
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-51779
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-51779
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2e07e8348ea454615e268222ae3fc240421be768
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-24023-3694-Bluetooth-Add-more-enc-key-size-check.patch
kpatch-description: Bluetooth: Add more enc key size check
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-24023
kpatch-cvss: 6.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-24023
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04a342cc49a8522e99c9b3346371c329d841dcd2
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2019-13631-0684-Input-gtco-bounds-check-collection-indent-level.patch
kpatch-description: Input: gtco - bounds check collection indent level
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2019-13631
kpatch-cvss: 5.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2019-13631
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2a017fd82c5402b3c8df5e3d6e5165d9e6147dc1
kpatch-name: skipped/CVE-2023-52581.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52581
kpatch-skip-reason: The patch for this CVE already present in kernel-5.14.0-362.24.1.el9_3 version. The kernel-5.14.0-362.18.1.el9_3 version and below are not vulnerable because they don't have commit 5f68718b34a5 (netfilter: nf_tables: GC transaction API to avoid race with control plane) which introduced the vulnerability.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39189-netfilter-nfnetlink-osf-avoid-oob-read.patch
kpatch-description: netfilter: nfnetlink_osf: avoid OOB read
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39189
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39189
kpatch-patch-url: https://github.com/torvalds/linux/commit/f4f8a7803119005e87b716874bec07c751efafec
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39193-netfilter-xt-sctp-validate-the-flag-info-count.patch
kpatch-description: netfilter: xt_sctp: validate the flag_info count
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39193
kpatch-cvss: 6.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39193
kpatch-patch-url: https://github.com/torvalds/linux/commit/e99476497687ef9e850748fe6d232264f30bc8f9
kpatch-name: skipped/CVE-2023-4133.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-4133
kpatch-skip-reason: Complex adaptation required to add timer_shutdown_sync() in timers subsystem.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-fix-error-paths-in-set-con2fb-map-425.patch
kpatch-description: fbcon: Fix error paths in set_con2fb_map
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-38409
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-38409
kpatch-patch-url: https://github.com/torvalds/linux/commit/edf79dd2172233452ff142dcc98b19d955fc8974
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-38409-fbcon-set-con2fb-map-needs-to-set-con2fb-map-425.patch
kpatch-description: fbcon: set_con2fb_map needs to set con2fb_map!
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-38409
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-38409
kpatch-patch-url: https://github.com/torvalds/linux/commit/fffb0b52d5258554c645c966c6cbef7de50b851d
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-42755-net-sched-cls-rsvp-always-try-to-match-inside-the-linear-part-of-skb-477.patch
kpatch-description: net/sched: cls_rsvp: always try to match inside the linear part of skb
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-42755
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-42755
kpatch-patch-url: https://github.com/torvalds/linux/commit/265b4da82dbf5df04bee5a5d46b7474b1aaf326a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
kpatch-description: netfilter: nf_tables: bail out on mismatching
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6622
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6622
kpatch-patch-url: https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-remove-docstring-reference-to-kset.patch
kpatch-description: kobject: Remove docstring reference to kset
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-45863
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45863
kpatch-patch-url: https://github.com/torvalds/linux/commit/8fd7c302b37099670b5d793375da10a40da7edf5
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-modify-kobject-get-path-to-take-a-const.patch
kpatch-description: kobject: modify kobject_get_path() to take a const
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-45863
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45863
kpatch-patch-url: https://github.com/torvalds/linux/commit/33a0a1e3b3d17445832177981dc7a1c6a5b009f8
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-45863-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
kpatch-description: kobject: Fix slab-out-of-bounds in fill_kobj_path()
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-45863
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-45863
kpatch-patch-url: https://github.com/torvalds/linux/commit/3bb2a01caa813d3a1845d378bbe4169ef280d394
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-add-a-route-cache-full-diagnostic-message.patch
kpatch-description: net: add a route cache full diagnostic message
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/22c2ad616b74f3de2256b242572ab449d031d941
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-net-dst-use-a-smaller-percpu-counter-batch-for-dst-entries-accounting.patch
kpatch-description: net/dst: use a smaller percpu_counter batch for dst entries accounting
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/cf86a086a18095e33e0637cb78cda1fcf5280852
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-max-size-check-inline-with-ipv4.patch
kpatch-description: ipv6: remove max_size check inline with ipv4
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/af6d10345ca76670c1b7c37799f0d5576ccef277
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52340-ipv6-remove-extra-counter-pull-before-gc.patch
kpatch-description: ipv6: Remove extra counter pull before gc
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52340
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52340
kpatch-patch-url: https://github.com/torvalds/linux/commit/9259f6b573cf17c00f50c4b626983a5347b1abe9
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of.patch
kpatch-description: media: technisat-usb2: break out of loop at end of
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2019-15505
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2019-15505
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c4df39e504b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-25775-rdma-irdma-prevent-zero-length-stag-registration-425.patch
kpatch-description: RDMA/irdma: Prevent zero-length STAG registration
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-25775
kpatch-cvss: 9.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-25775
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bb6d73d9add68ad270888db327514384dfa44958
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-51780-atm-fix-use-after-free-in-do-vcc-ioctl.patch
kpatch-description: atm: Fix Use-After-Free in do_vcc_ioctl
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-51780
kpatch-cvss: 8.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-51780
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
kpatch-description: smb: client: fix potential OOBs in
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52434
kpatch-cvss: 8.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52434
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52434-smb-client-fix-parsing-of-smb3-1-1-posix-create.patch
kpatch-description: smb: client: fix parsing of SMB3.1.1 POSIX create
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52434
kpatch-cvss: 8.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52434
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76025cc2285d9ede3d717fe4305d66f8be2d9346
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer.patch
kpatch-description: mISDN: fix use-after-free bugs in l1oip timer
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2022-3565
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3565
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2022-3565-misdn-fix-use-after-free-bugs-in-l1oip-timer-kpatch.patch
kpatch-description: verify struct l1oip layout
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2022-3565
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-3565
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2022-45934-bluetooth-l2cap-fix-u8-overflow.patch
kpatch-description: Bluetooth: L2CAP: Fix u8 overflow
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2022-45934
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-45934
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcd70260ef56e0aee8a4fc6cd214a419900b0765
kpatch-name: skipped/CVE-2022-0500.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-0500
kpatch-skip-reason: Complex adaptation required. Requires changes a lot of constants
kpatch-cvss:
kpatch-name: skipped/CVE-2022-23222.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-23222
kpatch-skip-reason: Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha.patch
kpatch-description: team: fix null-ptr-deref when team device type is changed
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52574
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52574
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=492032760127251e5540a5716a70996bacf2a3fd
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52574-0725-team-fix-null-ptr-deref-when-team-device-type-is-cha-kpatch.patch
kpatch-description: team: fix null-ptr-deref when team device type is changed
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52574
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52574
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=492032760127251e5540a5716a70996bacf2a3fd
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
kpatch-description: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-3567
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3567
kpatch-patch-url: https://git.kernel.org/linus/226fae124b2dac217ea5436060d623ff3385bc34
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
kpatch-description: vc_screen: don't clobber return value in vcs_read
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-3567
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-3567
kpatch-patch-url: https://git.kernel.org/linus/ae3419fbac845b4d3f3a9fae4cc80c68d82cdf6e
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52448-gfs2-fix-kernel-null-pointer-dereference-in.patch
kpatch-description: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52448
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52448
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
kpatch-description: sched/membarrier: reduce the ability to hammer on sys_membarrier
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-26602
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26602
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-42754-ipv4-fix-null-deref-in-ipv4-link-failure.patch
kpatch-description: ipv4: fix null-deref in ipv4_link_failure
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-42754
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-42754
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0113d9c9d1ccc07f5a3710dac4aa24b6d711278c
kpatch-name: skipped/CVE-2023-52489.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52489
kpatch-skip-reason: The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26609.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26609
kpatch-skip-reason: CVE has been marked as REJECTED on the NVD website.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52580-net-core-Fix-ETH_P_1588-flow-dissector.patch
kpatch-description: net/core: Fix ETH_P_1588 flow dissector
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52580
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52580
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=75ad80ed88a182ab2ad5513e448cf07b403af5c3
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-52620-netfilter-nf_tables-disallow-timeout-for-anonymous-s.patch
kpatch-description: netfilter: nf_tables: disallow timeout for anonymous sets
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-52620
kpatch-cvss: 2.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52620
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e26d3009efda338f19016df4175f354a9bd0a4ab
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2024-26671-blk-mq-fix-IO-hang-from-sbitmap-wakeup-race.patch
kpatch-description: blk-mq: fix IO hang from sbitmap wakeup race
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2024-26671
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26671
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5266caaf5660529e3da53004b8b7174cab6374ed
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0001-tty-keyboard-do-not-speculate-on-func_table-index.patch
kpatch-description: tty: keyboard, do not speculate on func_table index
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f3af1b68fc96b14b93d1013ce7965723dc53ebbc
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0002-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
kpatch-description: tty/vt: fix write/write race in ioctl(KDSKBSENT)
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=46ca3f735f345c9d87383dd3a09fa5d43870770e
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
kpatch-description: vt: keyboard, simplify vt_kdgkbsent
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6ca03f90527e499dd5e32d6522909e2ad390896b
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
kpatch-description: vt: keyboard, extend func_buf_lock to readers
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=82e61c3909db51d91b9d3e2071557b6435018b80
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0010-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
kpatch-description: vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9788c950ed4ad2020a7f2e8231abaf77e49d871a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2020-25656-0011-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
kpatch-description: vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2020-25656
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-25656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=07edff9265204e15c9fc8d07cc69e38c4c484e15
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
kpatch-description: vt_kdsetmode: extend console locking
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2021-3753
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-3753
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2287a51ba822384834dafc1c798453375d1107c7
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-31083-Bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag.patch
kpatch-description: Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-31083
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-31083
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9c33663af9ad115f90c076a1828129a3fbadea98
kpatch-name: skipped/CVE-2023-37453.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-37453
kpatch-skip-reason: Introduced in the v4.18.0-513.5.1.el8 by 45bf39f8df7f
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
kpatch-description: net: xfrm: Fix xfrm_address_filter OOB read
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39194
kpatch-cvss: 3.2
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39194
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dfa73c17d55b921e1d4e154976de35317e43a93a
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-6121-nvmet-nul-terminate-the-NQNs-passed-in-the-connect-c.patch
kpatch-description: nvmet: nul-terminate the NQNs passed in the connect command
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-6121
kpatch-cvss: 4.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6121
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1c22e0295a5eb571c27b53c7371f95699ef705ff
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-be.patch
kpatch-description: kvm: initialize all of the kvm_debugregs structure before sending it to userspace
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-1513
kpatch-cvss: 3.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-1513
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2c10b61421a28e95a46ab489fd56c0f442ff6952
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39192-netfilter-xt_u32-validate-user-space-input.patch
kpatch-description: netfilter: xt_u32: validate user space input
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39192
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39192
kpatch-patch-url: https://git.kernel.org/linus/69c5d284f67089b4750d28ff6ac6f52ec224b330
kpatch-name: rhel8/4.18.0-553.el8_10/CVE-2023-39192-netfilter-xt_u32-validate-user-space-input-kpatch.patch
kpatch-description: netfilter: xt_u32: validate user space input
kpatch-kernel: 4.18.0-553.el8_10
kpatch-cve: CVE-2023-39192
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-39192
kpatch-patch-url: https://git.kernel.org/linus/69c5d284f67089b4750d28ff6ac6f52ec224b330
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47153-i2c-i801-don-t-generate-an-interrupt-on-bus-reset.patch
kpatch-description: i2c: i801: Don't generate an interrupt on bus reset
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47153
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47153
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=e4d8716c3dcec47f1557024add24e1f3c09eb24b
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2020-36777-media-dvbdev-fix-memory-leak-in-dvb_media_device_free.patch
kpatch-description: media: dvbdev: Fix memory leak in dvb_media_device_free()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2020-36777
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-36777
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bf9a40ae8d722f281a2721779595d6df1c33a0bf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-memory-leak-in-smsc75xx-bind.patch
kpatch-description: net: usb: fix memory leak in smsc75xx_bind
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47171
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47171
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=46a8b29c6306d8bbfd92b614ef65a47c900d8e70
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47171-net-usb-fix-possible-use-after-free-in-smsc75xx_bind.patch
kpatch-description: net: usb: fix possible use-after-free in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47171
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47171
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=56b786d86694e079d8aad9b314e015cd4ac02a3d
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-default-implementations-for-request-callbacks.patch
kpatch-description: crypto: akcipher - default implementations for request callbacks
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-6240
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6240
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=78a0324f4a5328088fea9426cfe1d1851276c475
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-testmgr-split-akcipher-tests-by-a-key-type.patch
kpatch-description: crypto: testmgr - split akcipher tests by a key type
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-6240
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6240
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=0507de9404992edafa3d1d86450a37d6a726399d
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-6240-crypto-akcipher-disable-signing-and-decryption.patch
kpatch-description: crypto: akcipher - Disable signing and decryption
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-6240
kpatch-cvss: 6.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-6240
kpatch-patch-url: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/3755/diffs?commit_id=3709c35cf173f886689e201914911b464881c947
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52520-platform-x86-think-lmi-fix-reference-leak.patch
kpatch-description: platform/x86: think-lmi: Fix reference leak
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52520
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52520
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
kpatch-description: wifi: iwlwifi: fix a memory corruption
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26610
kpatch-cvss: 6.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26610
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52610-net-sched-act-ct-fix-skb-leak-and-crash-on-ooo-frags.patch
kpatch-description: net/sched: act_ct: fix skb leak and crash on ooo frags
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52610
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52610
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=3f14b377d01d8357eba032b4cabc8c1149b458b6
kpatch-name: skipped/CVE-2023-52598.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52598
kpatch-skip-reason: Out of scope as the patch is for s390 arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: skipped/CVE-2022-48669.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2022-48669
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: skipped/CVE-2023-52607.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52607
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52439-uio-fix-use-after-free-in-uio-open.patch
kpatch-description: uio: Fix use-after-free in uio_open
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52439
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52439
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=0c9ae0b8605078eafc3bea053cc78791e97ba2e2
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
kpatch-description: i2c: i801: Fix block process call transactions
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26593
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26593
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=c1c9d0f6f7f1dbf29db996bd8e166242843a5f21
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2019-25162-i2c-fix-a-potential-use-after-free.patch
kpatch-description: i2c: Fix a potential use after free
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2019-25162
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2019-25162
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=e4c72c06c367758a14f227c847f9d623f1994ecf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context.patch
kpatch-description: media: pvrusb2: fix use after free on context disconnection
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52445
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52445
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=ded85b0c0edd8f45fec88783d7555a5b982449c1
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-23307-md-raid5-fix-atomicity-violation-in.patch
kpatch-description: md/raid5: fix atomicity violation in raid5_cache_count
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-23307
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-23307
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dfd2bf436709b2bccb78c2dda550dde93700efa7
kpatch-name: skipped/CVE-2023-52606.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52606
kpatch-skip-reason: CVE patch is for powerpc arch only
kpatch-cvss:
kpatch-name: skipped/CVE-2024-25744.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-25744
kpatch-skip-reason: This CVE modifies the functions which won't be available or doesn't make sense to patch as they are used during bootup time or init. Therefore we cannot patch this CVE.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47185-tty-tty_buffer-Fix-the-softlockup-issue-in-flush_to_.patch
kpatch-description: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47185
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47185
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2022-48627-vt-fix-memory-overlapping-when-deleting-chars-in-the.patch
kpatch-description: vt: fix memory overlapping when deleting chars in the buffer
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2022-48627
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-48627
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39cdb68c64d84e71a4a717000b6e5de208ee60cc
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52477-usb-hub-Guard-against-accesses-to-uninitialized-BOS-425.patch
kpatch-description: usb: hub: Guard against accesses to uninitialized BOS descriptors
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52477
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52477
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f74a7afc224acd5e922c7a2e52244d891bbe44ee
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52513-RDMA-siw-Fix-connection-failure-handling.patch
kpatch-description: RDMA/siw: Fix connection failure handling
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52513
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52513
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=53a3f777049771496f791504e7dc8ef017cba590
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52528-net-usb-smsc75xx-Fix-uninit-value-access-in-__smsc75.patch
kpatch-description: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52528
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52528
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9c65989920f7c28775ec4e0c11b483910fb67b8
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
kpatch-description: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52594
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52594
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2adc886244dff60f948497b59affb6c6ebb3c348
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
kpatch-description: wifi: rt2x00: restart beacon queue when hardware reset
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52595
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52595
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26872-RDMA-srpt-Do-not-register-event-handler-until-srpt-d.patch
kpatch-description: RDMA/srpt: Do not register event handler until srpt device is fully setup
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26872
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26872
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c21a8870c98611e8f892511825c9607f1e2cd456
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26892-wifi-mt76-mt7921e-fix-use-after-free-in-free_irq.patch
kpatch-description: wifi: mt76: mt7921e: fix use-after-free in free_irq()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26892
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26892
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c957280ef6ab6bdf559a91ae693a6b34310697e3
kpatch-name: skipped/CVE-2023-52565.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52565
kpatch-skip-reason: The given kernel version isn't vulnerable.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-properly-check-all-write-ioctls-for-permissions.patch
kpatch-description: mtd: properly check all write ioctls for permissions
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47055
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47055
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7e6b19bc76471ba03725fe58e0c218a3d6266c3
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47055-mtd-require-write-permissions-for-locking-and-badblo.patch
kpatch-description: mtd: require write permissions for locking and badblock ioctls
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47055
kpatch-cvss: N/A
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47055
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1e97743fd180981bef5f01402342bb54bf1c6366
kpatch-name: skipped/CVE-2024-26897.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26897
kpatch-skip-reason: WiFi - Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for.patch
kpatch-description: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27052
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27052
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=1213acb478a7181cd73eeaf00db430f1e45b1361
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
kpatch-description: RDMA/qedr: Fix qedr_create_user_qp error flow
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26743
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26743
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=5ba4e6d5863c53e937f49932dee0ecb004c65928
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-425.patch
kpatch-description: wifi: mac80211: fix race condition on enabling
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26779
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26779
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix.patch
kpatch-description: do_sys_name_to_handle(): use kzalloc() to fix
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26901
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26901
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=3948abaa4e2be938ccdfc289385a27342fb13d43
kpatch-name: skipped/CVE-2024-26919.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26919
kpatch-skip-reason: The given kernel version isn't vulnerable.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26933-4056-USB-core-Add-hub_get-and-hub_put-routines.patch
kpatch-description: USB: core: Add hub_get() and hub_put() routines
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26933
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26933
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee113b860aa169e9a4d2c167c95d0f1961c6e1b8
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26934-usb-core-fix-deadlock-in-4.18.0-477.27.1.el8_8.patch
kpatch-description: USB: core: Fix deadlock in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26934
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26934
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=80ba43e9f799cbdd83842fc27db667289b3150f5
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26964-4060-usb-xhci-Add-error-handling-in-xhci_map_urb_for_dma.patch
kpatch-description: USB: core: Add hub_get() and hub_put() routines
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26964
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26964
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be95cc6d71dfd0cba66e3621c65413321b398052
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
kpatch-description: fat: fix uninitialized field in nostale filehandles
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26973
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26973
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fde2497d2bc3a063d8af88b258dbadc86bd7b57c
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26993-fs-sysfs-fix-reference-leak-in.patch
kpatch-description: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26993
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26993
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=a90bca2228c0646fc29a72689d308e5fe03e6d78
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-mem.patch
kpatch-description: vhost: use kzalloc() instead of kmalloc() followed by memset()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-0340
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-0340
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4d8df0f5f79f747d75a7d356d9b9ea40a4e4c8a9
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-.patch
kpatch-description: x86/fpu: Stop relying on userspace for info to
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26603
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26603
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=d877550eaf2dc9090d782864c96939397a3c6835
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26615-net-smc-fix-illegal-rmb_desc-access-in-SMC-D-connect-477.27.patch
kpatch-description: net/smc: fix illegal rmb_desc access in SMC-D connection dump
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26615
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26615
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=dbc153fd3c142909e564bb256da087e13fbf239c
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with.patch
kpatch-description: netfilter: nf_tables: disallow anonymous set with timeout flag
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26642
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26642
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=16603605b667b70da974bea8216c93e7db043bf1
kpatch-name: skipped/CVE-2024-26643.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26643
kpatch-skip-reason: The given kernel version isn't vulnerable (Netfilter).
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26664.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26664
kpatch-skip-reason: The given kernel version isn't vulnerable.
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26693.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26693
kpatch-skip-reason: The given kernel version isn't vulnerable (WiFi).
kpatch-cvss:
kpatch-name: skipped/CVE-2024-26694.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26694
kpatch-skip-reason: The given kernel version isn't vulnerable (WiFi).
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in.patch
kpatch-description: USB: usb-storage: Prevent divide-by-0 error in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27059
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27059
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=014bcf41d946b36a8f0b8e9b5d9529efbb822f49
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-47013-net-emac-emac-mac-fix-a-use-after-free-in.patch
kpatch-description: net:emac/emac-mac: Fix a use after free in
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-47013
kpatch-cvss: 5.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47013
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=6d72e7c767acbbdd44ebc7d89c6690b405b32b57
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2021-46934-i2c-validate-user-data-in-compat-ioctl.patch
kpatch-description: i2c: validate user data in compat ioctl
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2021-46934
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-46934
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bb436283e25aaf1533ce061605d23a9564447bdf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a.patch
kpatch-description: xhci: process isoc TD properly when there was a
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26659
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26659
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=5372c65e1311a16351ef03dd096ff576e6477674
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-process-isoc-td-properly-when-there-was-a-kpatch.patch
kpatch-description: xhci: process isoc TD properly when there was a transaction error mid TD kpatch
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26659
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26659
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=5372c65e1311a16351ef03dd096ff576e6477674
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26659-xhci-handle-isoc-babble-and-buffer-overrun-events.patch
kpatch-description: xhci: handle isoc Babble and Buffer Overrun events
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26659
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26659
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=7c4650ded49e5b88929ecbbb631efb8b0838e811
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-372.patch
kpatch-description: net/mlx5e: Prevent deadlock while disabling aRFS
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27014
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27014
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fef965764cf562f28afb997b626fc7c3cec99693
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27014-net-mlx5e-Prevent-deadlock-while-disabling-aRFS-from-372-kpatch.patch
kpatch-description: net/mlx5e: Prevent deadlock while disabling aRFS
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27014
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27014
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fef965764cf562f28afb997b626fc7c3cec99693
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27056-0001-adapt-protect-TXQ-list-manipulation-upto-425.19.2.patch
kpatch-description: wifi: iwlwifi: mvm: protect TXQ list manipulation
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27056
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27056
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=923bf981eb6ecc027227716e30701bdcc1845fbf
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-27056-0002-adapt-ensure-offloading-TID-queue-exists-upto-477.10.1.patch
kpatch-description: wifi: iwlwifi: mvm: ensure offloading TID queue exists
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-27056
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27056
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=78f65fbf421a61894c14a1b91fe2fb4437b3fe5f
kpatch-name: skipped/CVE-2021-47118.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2021-47118
kpatch-skip-reason: No sense in patching an early boot function; inventing a runtime-wise patch is not impossible but isn't worth the effort for 4.4 score CVE
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0001-net-add-atomic_long_t-to-net_device_stats-fields.patch
kpatch-description: net: add atomic_long_t to net_device_stats fields
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52578
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52578
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6c1c5097781f
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0002-net-bridge-use-DEV_STATS_INC-from-372.patch
kpatch-description: net: bridge: use DEV_STATS_INC()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52578
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52578
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=44bdb313da57322c9b3c108eb66981c6ec6509f4
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0003-net-Fix-unwanted-sign-extension-in-netdev_stats_to_s.patch
kpatch-description: net: Fix unwanted sign extension in netdev_stats_to_stats64()
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52578
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52578
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9b55d3f0a69af649c62cbc2633e6d695bb3cc583
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2023-52578-0004-net-add-atomic_long_t-to-net_device_stats-fields-kpatch.patch
kpatch-description: net: add atomic_long_t to net_device_stats fields
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2023-52578
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52578
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6c1c5097781f
kpatch-name: rhel8/4.18.0-553.5.1.el8_10/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
kpatch-description: RDMA/srpt: Support specifying the srpt_service_guid
kpatch-kernel: 4.18.0-553.5.1.el8_10
kpatch-cve: CVE-2024-26744
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26744
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=fdfa083549de5d50ebf7f6811f33757781e838c0
kpatch-name: skipped/CVE-2023-52669.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52669
kpatch-skip-reason: CVE patch is for s390 arch only
kpatch-cvss:
kpatch-name: skipped/CVE-2023-52675.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52675
kpatch-skip-reason: CVE patch is for powerpc arch only
kpatch-cvss:
kpatch-name: skipped/CVE-2023-52686.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52686
kpatch-skip-reason: CVE patch is for powerpc arch only
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52703-net-usb-kalmia-Don-t-pass-act_len-in-usb_bulk_msg-error-path.patch
kpatch-description: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52703
kpatch-cvss: 3.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52703
kpatch-patch-url: https://github.com/torvalds/linux/commit/c68f345b7c425b38656e1791a0486769a8797016
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52813-crypto-pcrypt-Fix-hungtask-for-PADATA_RESET.patch
kpatch-description: crypto: pcrypt - Fix hungtask for PADATA_RESET
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52813
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52813
kpatch-patch-url: https://github.com/torvalds/linux/commit/8f4f68e788c3a7a696546291258bfa5fdb215523
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52700-tipc-fix-kernel-warning-when-sending-SYN-message.patch
kpatch-description: tipc: fix kernel warning when sending SYN message
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52700
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52700
kpatch-patch-url: https://github.com/torvalds/linux/commit/11a4d6f67cf55883dc78e31c247d1903ed7feccc
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52835-perf-core-Bail-out-early-if-the-request-AUX-area-is-out-of-bound.patch
kpatch-description: perf/core: Bail out early if the request AUX area is out of bound
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52835
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52835
kpatch-patch-url: https://github.com/torvalds/linux/commit/54aee5f15b83437f23b2b2469bcf21bdd9823916
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52781-usb-config-fix-iteration-issue-in-usb_get_bos_descriptor-477.patch
kpatch-description: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52781
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52781
kpatch-patch-url: https://github.com/torvalds/linux/commit/974bba5c118f4c2baf00de0356e3e4f7928b4cbc
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52877-usb-typec-tcpm-Fix-NULL-pointer-dereference-in-tcpm_pd_svdm.patch
kpatch-description: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52877
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52877
kpatch-patch-url: https://github.com/torvalds/linux/commit/4987daf86c152ff882d51572d154ad12e4ff3a4b
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52667-net-mlx5e-fix-a-potential-double-free-in-fs_any_create_groups.patch
kpatch-description: net/mlx5e: fix a potential double-free in fs_any_create_groups
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52667
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52667
kpatch-patch-url: https://github.com/torvalds/linux/commit/aef855df7e1bbd5aa4484851561211500b22707e
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52878-can-dev-can_put_echo_skb-don-t-crash-kernel-if-can_priv::echo_skb-is-accessed-out-of-bounds.patch
kpatch-description: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52878
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52878
kpatch-patch-url: https://github.com/torvalds/linux/commit/6411959c10fe917288cbb1038886999148560057
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52464-EDAC_thunderx-Fix-possible-out-of-bounds-string-access.patch
kpatch-description: EDAC/thunderx: Fix possible out-of-bounds string access
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52464
kpatch-cvss: 2.9
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52464
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=475c58e1a471e9b873e3e39958c64a2d278275c8
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26907-RDMA_mlx5-Fix-fortify-source-warning-while-accessing-Eth-segment.patch
kpatch-description: RDMA/mlx5: Fix fortify source warning while accessing Eth segment
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26907
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26907
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=4d5e86a56615cc387d21c629f9af8fb0e958d350
kpatch-name: skipped/CVE-2024-27397.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-27397
kpatch-skip-reason: netfilter: Complex adaptation required.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52560-mm-damon-vaddr-test-fix-memory-leak-in.patch
kpatch-description: mm/damon/vaddr-test: fix memory leak in
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52560
kpatch-cvss: 3.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52560
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=45120b15743fa7c0aa53d5db6dfb4c8f87be4abd
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35959-net-mlx5e-fix-mlx5e-priv-init-cleanup-flow-upto-425.19.2.patch
kpatch-description: net/mlx5e: Fix mlx5e_priv_init() cleanup flow
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35959
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35959
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ecb829459a841198e142f72fadab56424ae96519
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47073-platform-x86-dell-smbios-wmi-fix-oops-on-rmmod.patch
kpatch-description: platform/x86: dell-smbios-wmi: Fix oops on rmmod
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47073
kpatch-cvss: 2.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47073
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3a53587423d25c87af4b4126a806a0575104b45e
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
kpatch-description: net/mlx5: Properly link new fs rules into the tree
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35960
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35960
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7c6782ad4911cbee874e85630226ed389ff2e453
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36004-i40e-do-not-use-wq-mem-reclaim-flag-for-workqueue.patch
kpatch-description: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-36004
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36004
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2cc7d150550cc981aceedf008f5459193282425c
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
kpatch-description: net: ena: Fix incorrect descriptor free behavior
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35958
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35958
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bf02d9fe00632d22fa91d34749c7aacf397b6cde
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26583-tls-disable-async-encrypt-decrypt.patch
kpatch-description: tls: disable async encrypt/decrypt
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26583 CVE-2024-26584 CVE-2024-26585
kpatch-cvss: 5.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26583
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26584
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26585
kpatch-patch-url: https://github.com/torvalds/linux/commit/aec7961916f3.patch
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26859-net-bnx2x-prevent-access-to-a-freed-page-in.patch
kpatch-description: net/bnx2x: Prevent access to a freed page in
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26859
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26859
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d27e2da94a42655861ca4baea30c8cd65546f25d
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-reject-connection-with-the-device-which-upto-513.24.1.patch
kpatch-description: Bluetooth: Reject connection with the device which
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2020-26555
kpatch-cvss: 5.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-26555
kpatch-patch-url: https://lore.kernel.org/lkml/20231001084934.GA16906@linux-691t/raw
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-coding-style.patch
kpatch-description: Bluetooth: hci_event: Fix coding style
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2020-26555
kpatch-cvss: 5.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-26555
kpatch-patch-url: https://lore.kernel.org/lkml/20231001084934.GA16906@linux-691t/raw
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-avoid-memcmp-out-of-bounds-warning.patch
kpatch-description: Bluetooth: avoid memcmp() out of bounds warning
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2020-26555
kpatch-cvss: 5.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-26555
kpatch-patch-url: https://lore.kernel.org/lkml/20231001084934.GA16906@linux-691t/raw
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-ignore-null-link-key.patch
kpatch-description: Bluetooth: hci_event: Ignore NULL link key
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2020-26555
kpatch-cvss: 5.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-26555
kpatch-patch-url: https://lore.kernel.org/lkml/20231001084934.GA16906@linux-691t/raw
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2020-26555-bluetooth-hci-event-fix-using-memcmp-when.patch
kpatch-description: Bluetooth: hci_event: Fix using memcmp when
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2020-26555
kpatch-cvss: 5.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2020-26555
kpatch-patch-url: https://lore.kernel.org/lkml/20231001084934.GA16906@linux-691t/raw
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed.patch
kpatch-description: hwrng: core - Fix page fault dead lock on mmap-ed
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52615
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52615
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=78aafb3884f6bc6636efcc1760c891c8500b9922
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-36007-mlxsw-spectrum-acl-tcam-fix-warning-during-rehash.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix warning during rehash
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-36007
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36007
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=743edc8547a92b6192aa1f1b6bb78233fa21dc9b
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-remove-duplicated-code.patch
kpatch-description: ipc/mqueue.c: remove duplicated code
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47069
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47069
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ed29f171518cbe11c81e8c20d393bb094a9e2ce7
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-c-update-document-memory-barriers.patch
kpatch-description: ipc/mqueue.c: update/document memory barriers
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47069
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47069
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-msg-c-update-and-document-memory-barriers.patch
kpatch-description: ipc/msg.c: update and document memory barriers
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47069
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47069
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0d97a82ba830d89a1e541cc9cd11f1e38c28e416
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-sem-c-document-and-update-memory-barriers.patch
kpatch-description: ipc/sem.c: document and update memory barriers
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47069
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47069
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8116b54e7e23ef948ecac0e0ab78d10888265cab
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47069-ipc-mqueue-msg-sem-avoid-relying-on-a-stack.patch
kpatch-description: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47069
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47069
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a11ddb37bf367e6b5239b95ca759e5389bb46048
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47236-net-cdc-eem-fix-tx-fixup-skb-leak.patch
kpatch-description: net: cdc_eem: fix tx fixup skb leak
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47236
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47236
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47353-udf-fix-null-pointer-dereference-in-udf-symlink.patch
kpatch-description: udf: Fix NULL pointer dereference in udf_symlink function
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47353
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47353
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47311-net-qcom-emac-fix-uaf-in-emac-remove.patch
kpatch-description: net: qcom/emac: fix UAF in emac_remove
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47311
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47311
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ad297cd2db8953e2202970e9504cab247b6c7cb4
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47310-net-ti-fix-uaf-in-tlan-remove-one.patch
kpatch-description: net: ti: fix UAF in tlan_remove_one
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47310
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47310
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0336f8ffece62f882ab3012820965a786a983f70
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-fix-possible-use-after-free-in-hfc-cleanup.patch
kpatch-description: mISDN: fix possible use-after-free in HFC_cleanup()
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47356
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47356
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=009fc857c5f6fda81f2f7dd851b2d54193a8e733
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47356-misdn-hfcpci-fix-use-after-free-bug-in.patch
kpatch-description: mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47356
kpatch-cvss: 6.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47356
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=175302f6b79ebbb207c2d58d6d3e679465de23b0
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47456-can-peak-pci-peak-pci-remove-fix-uaf.patch
kpatch-description: can: peak_pci: peak_pci_remove(): fix UAF
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47456
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47456
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=949fe9b35570361bc6ee2652f89a0561b26eec98
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-46972-ovl-fix-leaked-dentry.patch
kpatch-description: ovl: fix leaked dentry
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-46972
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-46972
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=71d58457a8afc650da5d3292a7f7029317654d95
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-sanity-check-for-maxpacket-4.18.0-425.19.2.el8_7.patch
kpatch-description: usbnet: sanity check for maxpacket
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47495
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47495
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=397430b50a363d8b7bdda00522123f82df6adc5e
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2021-47495-usbnet-fix-error-return-code-in-usbnet-probe-4.18.0-425.19.2.el8_7.patch
kpatch-description: usbnet: fix error return code in usbnet_probe()
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2021-47495
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47495
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6f7c88691191e6c52ef2543d6f1da8d360b27a24
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35835-net-mlx5e-fix-a-double-free-in-arfs-create-groups.patch
kpatch-description: net/mlx5e: fix a double-free in arfs_create_groups
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35835
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35835
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3c6d5189246f590e4e1f167991558bdb72a4738b
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr.patch
kpatch-description: wifi: mac80211: check/clear fast rx for non-4addr
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35789
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35789
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4f2bdb3c5e3189297e156b3ff84b140423d64685
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
kpatch-description: wifi: iwlwifi: dbg-tlv: ensure NUL termination
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35845
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35845
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea
kpatch-name: skipped/CVE-2024-35838.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-35838
kpatch-skip-reason: Current kernel is not vulnerable.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix memory leak when
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35852
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35852
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fb4e2b70a7194b209fc7320bbf33b375f7114bd5
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix memory leak during
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35853
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35853
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8ca3f7a7b61393804c46f170743c3b839df13977
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35854-mlxsw-spectrum-acl-tcam-fix-possible.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix possible
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35854
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35854
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=54225988889931467a9b55fdbef534079b665519
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35855-mlxsw-spectrum_acl_tcam-Fix-possible-use-after-free.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35855
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35855
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35888-erspan-make-sure-erspan-base-hdr-is-present-in.patch
kpatch-description: erspan: make sure erspan_base_hdr is present in
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35888
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35888
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=17af420545a750f763025149fa7b833a4fc8b8f0
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-35890-gro-fix-ownership-transfer.patch
kpatch-description: gro: fix ownership transfer
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-35890
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35890
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ed4cccef64c1d0d5b91e69f7a8a6697c3a865486
kpatch-name: skipped/CVE-2021-46909.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2021-46909
kpatch-skip-reason: CVE patch is for arch/arm which is not supported.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26656-drm-amdgpu-fix-use-after-free-bug-477.patch
kpatch-description: drm/amdgpu: fix use-after-free bug
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26656
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26656
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=22207fd5c80177b860279653d017474b2812af5e
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
kpatch-description: ppp_async: limit MRU to 64K
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26675
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26675
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cb88cb53badb8aeb3955ad6ce80b07b598e310b8
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and.patch
kpatch-description: ipv6: sr: fix possible use-after-free and
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26735
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26735
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5559cea2d5aa3018a5f00dd2aca3427ba09b386b
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in.patch
kpatch-description: Bluetooth: Avoid potential use-after-free in
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26801
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26801
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=2449007d3f73b2842c9734f45f0aadb522daf592
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth.patch
kpatch-description: net: ip_tunnel: prevent perpetual headroom growth
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26804
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26804
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=049d7989c67e8dd50f07a2096dbafdb41331fb9b
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
kpatch-description: mptcp: fix data re-injection from stale subflow
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26826
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26826
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b6c620dc43ccb4e802894e54b651cf81495e9598
kpatch-name: skipped/CVE-2024-26906.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26906
kpatch-skip-reason: x86/mm: Complex adaptation required to prevent BPF abuse.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-4.18.0-513.24.1.el8_9.patch
kpatch-description: crypto: qat - resolve race condition during AER
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26974
kpatch-cvss: 5.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26974
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7d42e097607c4d246d99225bf2b195b6167a210c
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26974-crypto-qat-fix-adf-dev-reset-sync-memory-leak-513.patch
kpatch-description: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26974
kpatch-cvss: 5.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26974
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7d42e097607c4d246d99225bf2b195b6167a210c
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid.patch
kpatch-description: Squashfs: check the inode number is not the invalid
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26982
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26982
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9253c54e01b6505d348afbc02abaa4d9f8a01395
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-id.patch
kpatch-description: wifi: nl80211: reject iftype change with mesh ID
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-27410
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27410
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f78c1375339a291cba492a70eaf12ec501d28a8e
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2024-26759-swap-fix-do-swap-page-race-with-swapoff-425.patch
kpatch-description: swap: fix do_swap_page() race with swapoff
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2024-26759
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26759
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=13ddaf26be324a7f951891ecd9ccd04466d27458
kpatch-name: rhel8/4.18.0-553.8.1.el8_10/CVE-2023-52881-tcp-do-not-accept-ack-of-bytes-we-never-sent-4.18.0-425.19.2.el8_7.patch
kpatch-description: tcp: do not accept ACK of bytes we never sent
kpatch-kernel: 4.18.0-553.8.1.el8_10
kpatch-cve: CVE-2023-52881
kpatch-cvss: 5.9
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52881
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27
kpatch-name: skipped/CVE-2023-52451.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52451
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_powe.patch
kpatch-description: drivers/amd/pm: fix a use-after-free in kv_parse_power_table
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52469
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52469
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=28dd788382c43b330480f57cd34cde0840896743
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36971-net-fix-__dst_negative_advice-race.patch
kpatch-description: net: fix __dst_negative_advice() race
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36971
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36971
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=92f1655aa2b2294d0b49925f3b875a634bd3b59e
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free-425.patch
kpatch-description: wifi: mac80211: fix potential key use-after-free
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52530
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52530
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=31db78a4923ef5e2008f2eed321811ca79e7f71b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26852-net-ipv6-avoid-possible-UAF-in-ip6_route_mpath_notif.patch
kpatch-description: net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26852
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26852
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=685f7d531264599b3f167f1e94bbd22f120e5fab
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft.patch
kpatch-description: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-27020
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27020
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f969eb84ce482331a991079ab7a5c4dc3b7f89bf
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26586-mlxsw-spectrum_acl_tcam-Fix-stack-corruption.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix stack corruption
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26586
kpatch-cvss: 7.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26586
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=483ae90d8f976f8339cf81066312e1329f2d3706
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52756-pwm-fix-double-shift-bug.patch
kpatch-description: pwm: Fix double shift bug
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52756
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52756
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d27abbfd4888d79dd24baf50e774631046ac4732
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52679-of-fix-double-free-in-of_parse_phandle_with_args_map.patch
kpatch-description: of: Fix double free in of_parse_phandle_with_args_map
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52679
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52679
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4dde83569832f9377362e50f7748463340c5db6b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52730-mmc-sdio-fix-possible-resource-leaks-in-some-error-paths.patch
kpatch-description: mmc: sdio: fix possible resource leaks in some error paths
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52730
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52730
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=605d9fb9556f8f5fb4566f4df1480f280f308ded
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52784-bonding-stop-the-device-in-bond-setup-by-slave-513.patch
kpatch-description: bonding: stop the device in bond_setup_by_slave()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52784
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52784
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3cffa2ddc4d3fcf70cde361236f5a614f81a09b2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52775-net-smc-avoid-data-corruption-caused-by-decline.patch
kpatch-description: net/smc: avoid data corruption caused by decline
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52775
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52775
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e6d71b437abc2f249e3b6a1ae1a7228e09c6e563
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52662-drm-vmwgfx-fix-a-memleak-in-vmw-gmrid-man-get-node.patch
kpatch-description: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52662
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52662
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=89709105a6091948ffb6ec2427954cbfe45358ce
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52764-media-gspca-cpia1-shift-out-of-bounds-in-set_flicker.patch
kpatch-description: media: gspca: cpia1: shift-out-of-bounds in set_flicker
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52764
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52764
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=099be1822d1f095433f4b08af9cc9d6308ec1953
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52707-00-wait-add-wake_up_pollfree.patch
kpatch-description: wait: add wake_up_pollfree()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52707
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52707
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=42288cb44c4b5fff7653bc392b583a2b8bd6a8c0
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52707-01-sched-psi-fix-use-after-free-in-ep_remove_wait_queue.patch
kpatch-description: sched/psi: Fix use-after-free in ep_remove_wait_queue()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52707
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52707
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52762-virtio-blk-fix-implicit-overflow-on-virtio_max_dma_size.patch
kpatch-description: virtio-blk: fix implicit overflow on virtio_max_dma_size
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52762
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52762
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fafb51a67fb883eb2dde352539df939a251851be
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-46939-tracing-restructure-trace-clock-global-to-never.patch
kpatch-description: tracing: Restructure trace_clock_global() to never
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-46939
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-46939
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=aafe104aa9096827a429bc1358f8260ee565b7cc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-46939-tracing-do-no-increment-trace-clock-global-by.patch
kpatch-description: tracing: Do no increment trace_clock_global() by
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-46939
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-46939
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=aafe104aa9096827a429bc1358f8260ee565b7cc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47257-net-ieee802154-fix-null-deref-in-parse-dev-addr.patch
kpatch-description: net: ieee802154: fix null deref in parse dev addr
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47257
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47257
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9fdd04918a452980631ecc499317881c1d120b70
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47284-isdn-misdn-netjet-fix-crash-in-nj-probe.patch
kpatch-description: isdn: mISDN: netjet: Fix crash in nj_probe:
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47284
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47284
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9f6f852550d0e1b7735651228116ae9d300f69b3
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52847-media-bttv-fix-use-after-free-error-due-to.patch
kpatch-description: media: bttv: fix use after free error due to
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52847
kpatch-cvss: 5.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52847
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=bd5b50b329e850d467e7bcc07b2b6bde3752fbda
kpatch-name: skipped/CVE-2024-26843.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-26843
kpatch-skip-reason: EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
kpatch-cvss:
kpatch-name: skipped/CVE-2024-35910.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-35910
kpatch-skip-reason: tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35937-wifi-cfg80211-check-a-msdu-format-more-carefully-477.27.1.patch
kpatch-description: wifi: cfg80211: check A-MSDU format more carefully
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35937
kpatch-cvss: 5.8
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35937
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9ad7974856926129f190ffbe3beea78460b3b7cc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47373-irqchip-gic-v3-its-Fix-potential-VPE-leak-on-error.patch
kpatch-description: irqchip/gic-v3-its: Fix potential VPE leak on error
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47373
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47373
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=280bef512933b2dda01d681d8cbe499b98fc5bdd
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47468-isdn-mISDN-Fix-sleeping-function-called-from-invalid.patch
kpatch-description: isdn: mISDN: Fix sleeping function called from invalid context
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47468
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47468
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=6510e80a0b81b5d814e3aea6297ba42f5e76f73c
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47548-ethernet-hisilicon-hns-hns_dsaf_misc-fix-a-possible-.patch
kpatch-description: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47548
kpatch-cvss: 6.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47548
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=a66998e0fbf213d47d02813b9679426129d0d114
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47579-ovl-fix-warning-in-ovl_create_real.patch
kpatch-description: ovl: fix warning in ovl_create_real()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47579
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47579
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47304-tcp-fix-tcp_init_transfer-to-not-reset-icsk_ca_initi.patch
kpatch-description: tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47304
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47304
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47408-netfilter-conntrack-serialize-hash-resizes-and-clean.patch
kpatch-description: netfilter: conntrack: serialize hash resizes and cleanups
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47408
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47408
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=e9edc188fc76499b0b9bd60364084037f6d03773
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47461-userfaultfd-fix-a-race-between-writeprotect-and-exit.patch
kpatch-description: userfaultfd: fix a race between writeprotect and exit_mmap()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47461
kpatch-cvss: 7.0
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47461
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=cb185d5f1ebf900f4ae3bf84cee212e6dd035aca
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47491-mm-khugepaged-skip-huge-page-collapse-for-special-fi.patch
kpatch-description: mm: khugepaged: skip huge page collapse for special files
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47491
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47491
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=a4aeaa06d45e90f9b279f0b09de84bd00006e733
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2021-47624-net-sunrpc-fix-reference-count-leaks-in-rpc_sysfs_xp.patch
kpatch-description: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2021-47624
kpatch-cvss: 6.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2021-47624
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=776d794f28c95051bc70405a7b1fa40115658a18
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48632-i2c-mlxbf-prevent-stack-overflow-in-mlxbf_i2c_smbus_.patch
kpatch-description: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2022-48632
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-48632
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=de24aceb07d426b6f1c59f33889d6a964770547b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27011-netfilter-nf-tables-fix-memleak-in-map-from-abort-513.patch
kpatch-description: netfilter: nf_tables: fix memleak in map from abort
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-27011
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27011
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=86a1471d7cde792941109b93b558b5dc078b9ee9
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27019-netfilter-nf-tables-fix-potential-data-race-in.patch
kpatch-description: netfilter: nf_tables: Fix potential data-race in
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-27019
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27019
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d78d867dcea69c328db30df665be5be7d0148484
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27025-nbd-null-check-for-nla-nest-start.patch
kpatch-description: nbd: null check for nla_nest_start
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-27025
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27025
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-27388-sunrpc-fix-some-memleaks-in-gssx-dec-option-array.patch
kpatch-description: SUNRPC: fix some memleaks in gssx_dec_option_array
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-27388
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-27388
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3cfcfc102a5e57b021b786a755a38935e357797d
kpatch-name: skipped/CVE-2024-27395.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-27395
kpatch-skip-reason: Fixed function is sleepy and called from a kthread, which may prevent patching/unpatching.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-31076-genirq-cpuhotplug-x86-vector-prevent-vector-leak.patch
kpatch-description: genirq/cpuhotplug, x86/vector: Prevent vector leak
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-31076
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-31076
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-33621-ipvlan-dont-use-skb-sk-in.patch
kpatch-description: ipvlan: Dont Use skb->sk in
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-33621
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-33621
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b3dc6e8003b500861fa307e9a3400c52e78e4d3a
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35824-misc-lis3lv02d-i2c-fix-regulators-getting.patch
kpatch-description: misc: lis3lv02d_i2c: Fix regulators getting
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35824
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35824
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ac3e0384073b2408d6cb0d972fee9fcc3776053d
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting.patch
kpatch-description: vt: fix unicode buffer corruption when deleting
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35823
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35823
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1581dafaf0d34bc9c428a794a22110d7046d186d
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35847-irqchip-gic-v3-its-prevent-double-free-on-error.patch
kpatch-description: irqchip/gic-v3-its: Prevent double free on error
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35847
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35847
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c26591afd33adce296c022e3480dea4282b7ef91
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35893-net-sched-act-skbmod-prevent-kernel-infoleak.patch
kpatch-description: net/sched: act_skbmod: prevent kernel-infoleak
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35893
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35893
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d313eb8b77557a6d5855f42d2234bd592c7b50dd
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35801-x86-fpu-keep-xfd-state-in-sync-with-msr-ia32-xfd.patch
kpatch-description: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35801
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35801
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=10e4b5166df9ff7a2d5316138ca668b42d004422
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35807-ext4-fix-corruption-during-on-line-resize-513.patch
kpatch-description: ext4: fix corruption during on-line resize
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35807
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35807
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35896-netfilter-validate-user-input-for-expected-length.patch
kpatch-description: netfilter: validate user input for expected length
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35896
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35896
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0c83842df40f86e529db6842231154772c20edcc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35925-block-prevent-division-by-zero-in.patch
kpatch-description: block: prevent division by zero in blk_rq_stat_sum()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35925
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35925
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=93f52fbeaf4b676b21acfe42a5152620e6770d02
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35930-scsi-lpfc-fix-possible-memory-leak-in.patch
kpatch-description: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35930
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35930
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2ae917d4bcab80ab304b774d492e2fcd6c52c06b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35947-dyndbg-fix-old-bug-on-in-control-parser.patch
kpatch-description: dyndbg: fix old BUG_ON in >control parser
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35947
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35947
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35952-drm-ast-fix-soft-lockup.patch
kpatch-description: drm/ast: Fix soft lockup
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35952
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35952
kpatch-patch-url: https://github.com/torvalds/linux/commit/bc004f5038220b1891ef4107134ccae44be55109
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35924-usb-typec-ucsi-limit-read-size-on-v1-2-477.patch
kpatch-description: usb: typec: ucsi: Limit read size on v1.2
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35924
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35924
kpatch-patch-url: https://github.com/torvalds/linux/commit/b3db266fb031fba88c423d4bb8983a73a3db6527
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35912-wifi-iwlwifi-mvm-rfi-fix-potential-response.patch
kpatch-description: wifi: iwlwifi: mvm: rfi: fix potential response leaks
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35912
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35912
kpatch-patch-url: https://github.com/torvalds/linux/commit/06a093807eb7b5c5b29b6cff49f8174a4e702341
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35946-wifi-rtw89-fix-null-pointer-access-when-abort-477.patch
kpatch-description: wifi: rtw89: fix null pointer access when abort scan
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35946
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35946
kpatch-patch-url: https://github.com/torvalds/linux/commit/7e11a2966f51695c0af0b1f976a32d64dee243b2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35899-netfilter-nf-tables-flush-pending-destroy-work-513.patch
kpatch-description: netfilter: nf_tables: flush pending destroy work before exit_net release
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35899
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35899
kpatch-patch-url: https://github.com/torvalds/linux/commit/24cea9677025e0de419989ecb692acd4bb34cac2
kpatch-name: skipped/CVE-2024-35938.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-35938
kpatch-skip-reason: wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52653-sunrpc-fix-a-memleak-in-gss-import-v2-context.patch
kpatch-description: SUNRPC: fix a memleak in gss_import_v2_context
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52653
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52653
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e67b652d8e8591d3b1e569dbcdfcee15993e91fa
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48743-net-amd-xgbe-fix-skb-data-length-underflow.patch
kpatch-description: net: amd-xgbe: Fix skb data length underflow
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2022-48743
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-48743
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5aac9108a180fc06e28d4e7fb00247ce603b72ee
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48747-block-fix-wrong-offset-in-bio-truncate.patch
kpatch-description: block: Fix wrong offset in bio_truncate()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2022-48747
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-48747
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3ee859e384d453d6ac68bfd5971f630d9fa46ad3
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2022-48757-net-fix-information-leakage-in-proc-net-ptype.patch
kpatch-description: net: fix information leakage in /proc/net/ptype
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2022-48757
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2022-48757
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=47934e06b65637c88a762d9c98329ae6e3238888
kpatch-name: skipped/CVE-2023-52463.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52463
kpatch-skip-reason: Complex adaptation required. Issue can be reproduced with special UEFI implementation only.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52619-pstore-ram-fix-crash-when-setting-number-of-cpus.patch
kpatch-description: pstore/ram: Fix crash when setting number of cpus
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52619
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52619
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d49270a04623ce3c0afddbf3e984cb245aa48e9c
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
kpatch-description: SUNRPC: Fix a suspicious RCU usage warning
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52623
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52623
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=31b62908693c90d4d07db597e685d9f25a120073
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of.patch
kpatch-description: net: bridge: switchdev: Skip MDB replays of
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26837
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26837
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dc489f86257cab5056e747344f17a164f63bff4b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles_add_cache.patch
kpatch-description: cachefiles: fix memory leak in
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26840
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26840
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e21a2f17566cbd64926fb8f16323972f7a064444
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26870-nfsv4-2-fix-nfs4-listxattr-kernel-bug-at.patch
kpatch-description: NFSv4.2: fix nfs4_listxattr kernel BUG at
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26870
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26870
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=251a658bbfceafb4d58c76b77682c8bf7bcfad65
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26878-quota-fix-potential-null-pointer-dereference.patch
kpatch-description: quota: Fix potential NULL pointer dereference
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26878
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26878
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d0aa72604fbd80c8aabb46eda00535ed35570f1f
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26958-nfs-fix-uaf-in-direct-writes-477.patch
kpatch-description: nfs: fix UAF in direct writes
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26958
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26958
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=17f46b803d4f23c66cacce81db35fef3adb8f2af
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36000-mm-hugetlb-fix-missing-hugetlb-lock-for-resv.patch
kpatch-description: mm/hugetlb: fix missing hugetlb_lock for resv
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36000
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36000
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b76b46902c2d0395488c8412e1116c2486cdfcb2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag-from.patch
kpatch-description: netfilter: nf_tables: honor table dormant flag from
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36005
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36005
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8e30abc9ace4f0add4cd761dfdbfaebae5632dd2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36006-mlxsw-spectrum-acl-tcam-fix-incorrect-list-api.patch
kpatch-description: mlxsw: spectrum_acl_tcam: Fix incorrect list API
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36006
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36006
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b377add0f0117409c418ddd6504bd682ebe0bf79
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list.patch
kpatch-description: rtnetlink: Correct nested IFLA_VF_VLAN_LIST
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36017
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36017
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1aec77b2bb2ed1db0f5efc61c4c1ca3813307489
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36020-i40e-fix-vf-may-be-used-uninitialized-in-this.patch
kpatch-description: i40e: fix vf may be used uninitialized in this
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36020
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36020
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f37c4eac99c258111d414d31b740437e1925b8e8
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36025-scsi-qla2xxx-fix-off-by-one-in.patch
kpatch-description: scsi: qla2xxx: Fix off by one in
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36025
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36025
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled.patch
kpatch-description: netfilter: tproxy: bail out if IP has been disabled
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36270
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36270
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=21a673bddc8fd4873c370caf9ae70ffc6d47e8d3
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock.patch
kpatch-description: netfilter: nfnetlink_queue: acquire rcu_read_lock()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36286
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-36286
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=dc21c6cc3d6986d938efbf95de62473982c98dec
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream.patch
kpatch-description: drm/amd/display: Implement bounds check for stream encoder creation in DCN301
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26660
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26660
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=58fca355ad37dcb5f785d9095db5f748b79c5dc2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-exit-use-the-correct-exit-code-in-proc-pid-stat.patch
kpatch-description: exit: Use the correct exit_code in /proc/<pid>/stat
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26686
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26686
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7601df8031fd67310af891897ef6cc0df4209305
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-fs-proc-do-task-stat-use-for-each-thread.patch
kpatch-description: fs/proc: do_task_stat: use __for_each_thread()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26686
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26686
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7601df8031fd67310af891897ef6cc0df4209305
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-fs-proc-do-task-stat-move.patch
kpatch-description: fs/proc: do_task_stat: move
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26686
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26686
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7601df8031fd67310af891897ef6cc0df4209305
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26686-fs-proc-do-task-stat-use-sig-stats-lock-to.patch
kpatch-description: fs/proc: do_task_stat: use sig->stats_lock to
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26686
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26686
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=7601df8031fd67310af891897ef6cc0df4209305
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26698-hv_netvsc-Fix-race-condition-between-netvsc_probe-an.patch
kpatch-description: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26698
kpatch-cvss: 4.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26698
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e0526ec5360a48ad3ab2e26e802b0532302a7e11
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong.patch
kpatch-description: ext4: fix double-free of blocks due to wrong
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26704
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26704
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=55583e899a5357308274601364741a83e78d6ac4
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
kpatch-description: arp: Prevent overflow in arp_req_get().
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26733
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26733
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a7d6027790acea24446ddd6632d394096c0f4667
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26740-net-sched-act-mirred-use-the-backlog-for-mirred-477.patch
kpatch-description: net/sched: act_mirred: use the backlog for mirred ingress
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26740
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26740
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=52f671db18823089a02f07efc04efdb2272ddc17
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group.patch
kpatch-description: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26772
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26772
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=832698373a25950942c04a512daa652c18a9b513
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
kpatch-description: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26773
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26773
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4530b3660d396a646aad91a787b6ab37cf604b53
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26802-stmmac-clear-variable-when-destroying-workqueue.patch
kpatch-description: stmmac: Clear variable when destroying workqueue
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26802
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26802
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8af411bbba1f457c33734795f024d0ef26d0963f
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-21823-vfio-add-the-spr-dsa-and-spr-iax-devices-to-the-513.patch
kpatch-description: VFIO: Add the SPR_DSA and SPR_IAX devices to the
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-21823
kpatch-cvss: 7.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-21823
kpatch-patch-url: https://github.com/torvalds/linux/commit/796aec4a5b5850967af0c42d4e84df2d748d570b.patch
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-4.18.0-513.18.1.el8_9.patch
kpatch-description: tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36016
kpatch-cvss: 6.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36016
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=47388e807f85948eefc403a8a5fdc5b406a65d5a
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
kpatch-description: cppc_cpufreq: Fix possible null pointer dereference
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-38573
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38573
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cf7de25878a1f4508c69dc9f6819c21ba177dbfe
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
kpatch-description: tipc: fix UAF in error path
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36886
kpatch-cvss: 7.1
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36886
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=080cbb890286cd794f1ee788bbc5463e2deb7c2b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv.patch
kpatch-description: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36905
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36905
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=94062790aedb505bdda209b10bea47b294d6394f
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52791-i2c-core-fix-atomic-xfer-check-for-non-preempt.patch
kpatch-description: i2c: core: Fix atomic xfer check for non-preempt
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52791
kpatch-cvss: 5.5
kpatch-cve-url: https://www.cve.org/CVERecord?id=CVE-2023-52791
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=aa49c90894d06e18a1ee7c095edbd2f37c232d02
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52832-wifi-mac80211-don-t-return-unset-power-in.patch
kpatch-description: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52832
kpatch-cvss: 5.5
kpatch-cve-url: https://www.cve.org/CVERecord?id=CVE-2023-52832
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e160ab85166e77347d0cbe5149045cb25e83937f
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52864-platform-x86-wmi-fix-opening-of-char-device.patch
kpatch-description: platform/x86: wmi: Fix opening of char device
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52864
kpatch-cvss: 5.5
kpatch-cve-url: https://www.cve.org/CVERecord?id=CVE-2023-52864
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=eba9ac7abab91c8f6d351460239108bef5e7a0b6
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-25739-ubi-check-for-too-small-leb-size-in-vtbl-code.patch
kpatch-description: ubi: Check for too small LEB size in VTBL code
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-25739
kpatch-cvss: 5.5
kpatch-cve-url: https://www.cve.org/CVERecord?id=CVE-2024-25739
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
kpatch-description: tcp: add sanity checks to rx zerocopy
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26640
kpatch-cvss: 5.5
kpatch-cve-url: https://www.cve.org/CVERecord?id=CVE-CVE-2024-26640
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=577e4432f3ac810049cb7e6b71f4d96ec7c6e894
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52796-ipvlan-add-ipvlan-route-v6-outbound-helper.patch
kpatch-description: ipvlan: add ipvlan_route_v6_outbound() helper
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52796
kpatch-cvss: 5.5
kpatch-cve-url: https://www.cve.org/CVERecord?id=CVE-2023-52796
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=18f039428c7df183b09c69ebf10ffd4e521035d2
kpatch-name: skipped/CVE-2023-52811.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2023-52811
kpatch-skip-reason: PowerPC: Unsupported.
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to.patch
kpatch-description: ext4: avoid online resizing failures due to
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52622
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52622
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5d1935ac02ca5aee364a449a35e2977ea84509b0
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-kpatch.patch
kpatch-description: ext4: avoid online resizing failures due to
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52622
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52622
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5d1935ac02ca5aee364a449a35e2977ea84509b0
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in.patch
kpatch-description: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36904
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36904
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f2db7230f73a80dbb179deab78f88a7947f0ab7e
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36917-block-fix-overflow-in-blk-ioctl-discard.patch
kpatch-description: block: fix overflow in blk_ioctl_discard()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36917
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36917
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=22d24a544b0d49bbcbd61c8c0eaf77d3c9297155
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
kpatch-description: tls: fix missing memory barrier in tls_init
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36489
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36489
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=91e61dd7a0af660408e87372d8330ceb218be302
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist.patch
kpatch-description: net: core: reject skb_copy(_expand) for fraglist GSO skbs
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36929
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36929
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d091e579b864fa790dd6a0cd537a22c383126681
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on.patch
kpatch-description: mptcp: ensure snd_nxt is properly initialized on connect
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36889
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36889
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fb7a0d334894206ae35f023a82cad5a290fd7386
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26669-net-sched-flower-fix-chain-template-offload-kpatch.patch
kpatch-description: net/sched: flower: Fix chain template offload
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26669
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26669
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=32f2a0afa95fae0d1ceec2ff06e0e816939964b8
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36954-tipc-fix-a-possible-memleak-in-tipc-buf-append.patch
kpatch-description: tipc: fix a possible memleak in tipc_buf_append
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36954
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36954
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=97bf6f81b29a8efaf5d0983251a7450e5794370d
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
kpatch-description: wifi: nl80211: don't free NULL coalescing rule
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36941
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36941
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=801ea33ae82d6a9d954074fbcf8ea9d18f1543a7
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36933-net-nsh-Use-correct-mac_offset-to-unwind-gso-skb-in-.patch
kpatch-description: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36933
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36933
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c83b49383b595be50647f0c764a48c78b5f3c4f8
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36933-nsh-restore-skb-protocol-data-mac-header-for.patch
kpatch-description: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36933
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36933
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=4b911a9690d72641879ea6d13cce1de31d346d79
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36950-firewire-ohci-mask-bus-reset-interrupts-between.patch
kpatch-description: firewire: ohci: mask bus reset interrupts between ISR and bottom half
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36950
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36950
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=752e3c53de0fa3b7d817a83050b6699b8e9c6ec9
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36940-pinctrl-core-fix-possible-memory-leak-in.patch
kpatch-description: pinctrl: core: fix possible memory leak in pinctrl_enable()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36940
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36940
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c7892ae13e461ed20154321eb792e07ebe38f5b3
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36940-pinctrl-core-delete-incorrect-free-in.patch
kpatch-description: pinctrl: core: delete incorrect free in pinctrl_enable()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36940
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36940
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5038a66dad0199de60e5671603ea6623eb9e5c79
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36960-drm-vmwgfx-fix-invalid-reads-in-fence-signaled.patch
kpatch-description: drm/vmwgfx: Fix invalid reads in fence signaled events
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36960
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36960
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
kpatch-description: net: sched: sch_multiq: fix possible OOB write in multiq_tune()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36978
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36978
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=affc18fdc694190ca7575b9a86632a73b9fe043d
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-477.patch
kpatch-description: net: bridge: xmit: make sure we have at least eth header len bytes
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-38538
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-38538
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36945-net-smc-fix-neighbour-and-rtable-leak-in.patch
kpatch-description: net/smc: fix neighbour and rtable leak in smc_ib_find_route()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36945
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36945
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-36979-net-bridge-mst-fix-vlan-use-after-free.patch
kpatch-description: net: bridge: mst: fix vlan use-after-free
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-36979
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-36979
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3a7c1661ae1383364cd6092d851f5e5da64d476b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-40921-net-bridge-mst-pass-vlan-group-directly-to.patch
kpatch-description: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-40921
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-40921
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=36c92936e868601fa1f43da6758cf55805043509
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-40920-net-bridge-mst-fix-suspicious-rcu-usage-in.patch
kpatch-description: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-40920
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-40920
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=546ceb1dfdac866648ec959cbc71d9525bd73462
kpatch-name: skipped/CVE-2021-47018.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2021-47018
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake.patch
kpatch-description: drm: Don't unref the same fb many times by mistake due to deadlock handling
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52486
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52486
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-clean-interrupt-before-enabling-queue-to.patch
kpatch-description: ionic: clean interrupt before enabling queue to avoid credit race
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-39502
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-39502
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=e8797a058466b60fc5a3291b92430c93ba90eaff
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-39502-ionic-fix-use-after-netif-napi-del.patch
kpatch-description: ionic: fix use after netif_napi_del()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-39502
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-39502
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=79f18a41dd056115d685f3b0a419c7cd40055e13
kpatch-name: skipped/CVE-2024-40974.patch
kpatch-description:
kpatch-kernel:
kpatch-cve: CVE-2024-40974
kpatch-skip-reason: Out of scope as the patch is for powerpc arch only, x86_64 is not affected
kpatch-cvss:
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops.patch
kpatch-description: vfio/pci: Lock external INTx masking ops
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26810
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26810
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=810cd4bb53456d0503cc4e7934e063835152c1b7
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26853-igc-avoid-returning-frame-twice-in-xdp-redirect-477.patch
kpatch-description: igc: avoid returning frame twice in XDP_REDIRECT
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26853
kpatch-cvss: 4.4
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26853
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ef27f655b438bed4c83680e4f01e1cde2739854b
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26614-tcp-make-sure-init-the-accept-queue-s-spinlocks-425.patch
kpatch-description: tcp: make sure init the accept_queue's spinlocks once
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26614
kpatch-cvss: 3.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26614
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=198bc90e0e734e5f98c3d2833e8390cac3df61b2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26614-ipv6-init-the-accept-queue-s-spinlocks-in.patch
kpatch-description: ipv6: init the accept_queue's spinlocks in inet6_create
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26614
kpatch-cvss: 3.3
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26614
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=435e202d645c197dcfd39d7372eb2a56529b6640
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26908-x86-xen-fix-memory-leak-in.patch
kpatch-description: x86/xen: Fix memory leak in
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26908
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26908
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26908-x86-xen-add-some-null-pointer-checking-to-smp-c.patch
kpatch-description: x86/xen: Add some null pointer checking to smp.c
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26908
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-26908
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-35876-x86-mce-make-sure-to-grab-mce-sysfs-mutex-in.patch
kpatch-description: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-35876
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-35876
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3ddf944b32f88741c303f0b21459dbb3872b8bc5
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52834-atl1c-work-around-the-dma-rx-overflow-issue.patch
kpatch-description: atl1c: Work around the DMA RX overflow issue
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52834
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52834
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=86565682e9053e5deb128193ea9e88531bbae9cf
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2023-52834-atl1c-work-around-the-dma-rx-overflow-issue-kpatch.patch
kpatch-description: atl1c: Work around the DMA RX overflow issue
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2023-52834
kpatch-cvss: 5.5
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2023-52834
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=86565682e9053e5deb128193ea9e88531bbae9cf
kpatch-name: 4.18.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file-2.patch
kpatch-description: x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
kpatch-kernel: kernel-4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-2201
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-2201
kpatch-patch-url: https://git.kernel.org/linus/0cd01ac5dcb1e18eb18df0f0d05b5de76522a437
kpatch-name: 4.18.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-2.patch
kpatch-description: x86/bhi: Add support for clearing branch history at syscall entry
kpatch-kernel: kernel-4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-2201
kpatch-cvss: 4.7
kpatch-cve-url: https://access.redhat.com/security/cve/CVE-2024-2201
kpatch-patch-url: https://git.kernel.org/linus/7390db8aea0d64e9deb28b8e1ce716f5020c7ee5
kpatch-name: rhel8/4.18.0-553.16.1.el8_10/CVE-2024-26960-mm-swap-fix-race-between-free-swap-and-cache-553.patch
kpatch-description: mm: swap: fix race between free_swap_and_cache()
kpatch-kernel: 4.18.0-553.16.1.el8_10
kpatch-cve: CVE-2024-26960
kpatch-cvss: 5.5
kpatch-cve-url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-26960
kpatch-patch-url: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=82b1c07a0af603e3c47b906c8e991dc96f01688e
kpatch-name: 4.18.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-el8-372.patch
kpatch-description: x86 xen add xenpv restore regs and return to usermode
kpatch-kernel: N/A
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: N/A
kpatch-name: 4.18.0/kpatch-add-alt-asm-definitions-el8-372.patch
kpatch-description: kpatch add alt asm definitions
kpatch-kernel: N/A
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: https://www.kernel.org
kpatch-patch-url: https://www.kernel.org
kpatch-name: 4.18.0/0003-kpatch-add-paravirt-asm-definitions.patch
kpatch-description: kpatch add paravirt asm definitions
kpatch-kernel: N/A
kpatch-cve: N/A
kpatch-cvss: N/A
kpatch-cve-url: N/A
kpatch-patch-url: N/A
uname: 4.18.0-553.16.1.el8_10
Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]