* Fri Apr 24 2026 CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com> [4.18.0-553.122.1.el8_10]
- nvme: avoid double free special payload (Maurizio Lombardi) [RHEL-51303] {CVE-2024-41073}
- crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (CKI Backport Bot) [RHEL-166921] {CVE-2025-68724}
- net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (Jay Shin) [RHEL-166155] {CVE-2025-40252}
- kernel.h: Move ARRAY_SIZE() to a separate header (Jay Shin) [RHEL-166155] {CVE-2025-40252}
Resolves: RHEL-166155, RHEL-166921, RHEL-51303
Signed-off-by: CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com>
4 lines
533 B
Plaintext
4 lines
533 B
Plaintext
SHA512 (linux-4.18.0-553.122.1.el8_10.tar.xz) = f3915e6283d4e971cba5d6309c4b9e9f8f0689e069f24e97cd82c1b5a4a9a6522ce4c843fd363d2e7584102433b99053c6d8cea3c4e9f4ccecb178bb96b791ec
|
|
SHA512 (kernel-abi-stablelists-4.18.0-553.tar.bz2) = 1fe63df881c093e7e4c27f9a7911337fff42ec53bc9e4292906b368b4a43789c59cbbe6b2084554ac09b2f3aee7069f3362f30a74be3468b0436ec997727d8ce
|
|
SHA512 (kernel-kabi-dw-4.18.0-553.tar.bz2) = 8fb8a4d604e586fa3e918b92dc338459e86bedd46c00cd7716fc645d39451e035b3d027c84bea0428591433113ae18a38cac865742a6c3c4507465170427105a
|