- kernel-plus-3.10.0-862.2.3.el7.centos.plus (centos7-plus)
- 3.10.0-1160.83.1.el7.centos.plus
- 2023-02-02 08:46:22
- 2023-02-02 14:24:47
- K20230202_06
- CVE-2018-3639, CVSSv2 Score: 5.5
- Description:
Speculative Store Bypass mitigation
- CVE: https://access.redhat.com/security/cve/CVE-2018-3639
- Patch: 3.10.0/ssb_mitigation.patch
- From: 3.10.0-862.3.2.el7
- CVE-2017-11600, CVSSv2 Score: 5.5
- Description:
xfrm: policy: check policy direction value
- CVE: https://access.redhat.com/security/cve/cve-2017-11600
- Patch: 3.10.0/CVE-2017-11600.patch
- From: kenerl-3.10.0-862.6.3.el7
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: avoid collapses in tcp_prune_queue() if possible
- CVE: https://access.redhat.com/security/cve/cve-2018-5390
- Patch: 3.10.0/CLKRN-322-tcp-avoid-collapses-in-tcp_prune_queue-if-.patch
- From: >3.10.0-862.9.1.el7
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- CVE: https://access.redhat.com/security/cve/cve-2018-5390
- Patch: 3.10.0/CLKRN-322-tcp-detect-malicious-patterns-in-tcp_colla.patch
- From: >3.10.0-862.9.1.el7
- CVE-2017-13215, CVSSv2 Score: 5.3
- Description:
crypto: algif_skcipher - Load TX SG list after waiting
- CVE: https://access.redhat.com/security/cve/cve-2017-13215
- Patch: 3.10.0/CVE-2017-13215.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-5391, CVSSv2 Score: 7.5
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: https://access.redhat.com/security/cve/cve-2018-5391
- Patch: 3.10.0/Revert-net-increase-fragment-memory-usage-limits.patch
- From: 3.10.0-957.el7
- CVE-2018-10675, CVSSv2 Score: 5.5
- Description:
fix for use-after-free bug via crafted system calls in mm/mempolicy.c:do_get_mempolicy()
- CVE: https://access.redhat.com/security/cve/cve-2018-10675
- Patch: 3.10.0/CVE-2018-10675.patch
- From: kernel-2.6.32-358.93.1.el6, kernel-3.10.0-514.58.1.el7, kernel-3.10.0-862.11.6.el7
- CVE-2018-7566, CVSSv2 Score: 6.1
- Description:
ALSA: seq: Fix racy pool initializations
- CVE: https://access.redhat.com/security/cve/cve-2018-7566
- Patch: 3.10.0/sound-alsa-seq-Fix-racy-pool-initializations.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3690, CVSSv2 Score: 4
- Description:
introduce barrier_nospec() and array_index_nospec() (adaptation, 862.2.3.el7)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-3690
- Patch: 3.10.0/cve-2018-3690-dependency-862.2.3.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3693, CVSSv2 Score: 5.9
- Description:
fix regression when using the last syscall on x86 (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 3.10.0/cve-2018-3693.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3693, CVSSv2 Score: 5.9
- Description:
fix regression for ipv6 in latest kernels after spectre commit (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 3.10.0/net-ipv6-fix-nospec-related-regression-in-ipv6_addr_prefix.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 3.10.0/CVE-2018-3646-CVE-2018-3620-smt_disable.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 3.10.0/CVE-2018-3646-l1tf-cpu-setup-862.2.3.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-3646, CVSSv2 Score: 5.6
- Description:
Add ability to flush l1d cache on vmexit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 3.10.0/CVE-2018-3646-vmx-l1d-flush.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-14634, CVSSv2 Score: 7.8
- Description:
Limit arg stack to at most 75% of _STK_LIM
- CVE: https://access.redhat.com/security/cve/cve-2018-14634
- Patch: 3.10.0/limit-stack-arg-to-75-percent-of_STK_LIM.patch
- From: >kernel-3.10.0-862.11.6.el7
- CVE-2016-4913, CVSSv2 Score: 7.2
- Description:
get_rock_ridge_filename(): handle malformed NM entries
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-4913
- Patch: 3.10.0/CVE-2016-4913-get_rock_ridge_filename-handle-malformed-NM-entrie.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-0861, CVSSv2 Score: 7
- Description:
ALSA: pcm: prevent UAF in snd_pcm_info
- CVE: https://access.redhat.com/security/cve/cve-2017-0861
- Patch: 3.10.0/CVE-2017-0861-alsa-pcm-prevent-UAF-in-snd_pcm_info.patch
- From: 3.10.0-957.el7
- CVE-2017-10661, CVSSv2 Score: 7.6
- Description:
timerfd: Protect the might cancel mechanism proper
- CVE: https://access.redhat.com/security/cve/cve-2017-10661
- Patch: 3.10.0/CVE-2017-10661.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-10661, CVSSv2 Score: 7.6
- Description:
timerfd: Protect the might cancel mechanism proper (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2017-10661
- Patch: 3.10.0/CVE-2017-10661-kpatch-1.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-17805, CVSSv2 Score: 5.5
- Description:
crypto: salsa20 - fix blkcipher_walk API usage
- CVE: https://access.redhat.com/security/cve/cve-2017-17805
- Patch: 3.10.0/CVE-2017-17805.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2018-1092, CVSSv2 Score: 4.6
- Description:
ext4: fail ext4_iget for root directory if unallocated
- CVE: https://access.redhat.com/security/cve/cve-2018-1092
- Patch: 3.10.0/CVE-2018-1092-ext4-fail-ext4_iget-for-root-directory-if-unallocated.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-18344, CVSSv2 Score: 6.7
- Description:
posix-timer: Properly check sigevent->sigev_notify
- CVE: https://access.redhat.com/security/cve/cve-2017-18344
- Patch: 3.10.0/CVE-2017-18344.patch
- From: >3.10.0-862.9.1.el7
- CVE-2017-18232, CVSSv2 Score: 5.5
- Description:
fix possible deadlock with mutex within SCSI libsas (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18232
- Patch: 3.10.0/cve-2017-18232-scsi-libsas-direct-call-probe-and-destruct.patch
- From: 4.15.*
- CVE-2018-1118, CVSSv2 Score: 2.3
- Description:
vhost: Use kzalloc() to allocate vhost_msg_node
- CVE: https://access.redhat.com/security/cve/CVE-2018-1118
- Patch: 3.10.0/CVE-2018-1118-vhost-Use-kzalloc-to-allocate-vhost_msg_node.patch
- From: >kernel-3.10.0-514.26.2.el7
- CVE-2018-1130, CVSSv2 Score: 5.5
- Description:
net: dccp: check sk for closed state
- CVE: https://access.redhat.com/security/cve/cve-2018-1130
- Patch: 3.10.0/CVE-2018-1130-dccp-check-sk-for-closed-state.patch
- From: >kernel-3.10.0-514.26.2.el7
- CVE-2018-5344, CVSSv2 Score: 5.5
- Description:
loop: fix concurrent lo_open/lo_release
- CVE: https://access.redhat.com/security/cve/cve-2018-5344
- Patch: 3.10.0/CVE-2018-5344-loop-fix-concurrent-lo_open-lo_release.patch
- From: >kernel-3.10.0-327.36.3.el7
- CVE-2018-5803, CVSSv2 Score: 5.5
- Description:
sctp: verify size of a new chunk in _sctp_make_chunk()
- CVE: https://access.redhat.com/security/cve/cve-2018-5803
- Patch: 3.10.0/CVE-2018-5803-sctp-verify-size-of-a-new-chunk.patch
- From: >kernel-3.10.0-514.2.2.el7
- CVE-2018-5848, CVSSv2 Score: 5.3
- Description:
kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=1590799
- Patch: 3.10.0/CVE-2018-5848-wmi_set_ie-may-lead-to-memory-corruption.patch
- From: >kernel-3.10.0-327.36.3.el7
- CVE-2018-7757, CVSSv2 Score: 5.5
- Description:
scsi: libsas: fix memory leak
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7757
- Patch: 3.10.0/CVE-2018-7757-scsi-libsas-fix-memory-leak-in-sas_smp_get_phy_events.patch
- From: >kernel-3.10.0-123.1.2.el7
- CVE-2018-8781, CVSSv2 Score: 7
- Description:
drm: udl: Properly check framebuffer mmap offsets
- CVE: https://access.redhat.com/security/cve/cve-2018-8781
- Patch: 3.10.0/CVE-2018-8781-drm-udl-Properly-check-framebuffer-mmap-offsets.patch
- From: >= kernel-3.10.0-123.1.2.el7
- CVE-2018-10879, CVSSv2 Score: 4.2
- Description:
ext4: always verify the magic number in xattr blocks
- CVE: https://access.redhat.com/security/cve/cve-2018-10879
- Patch: 3.10.0/CVE-2018-10879-ext4-always-verify-the-magic-number-in-xattr-blocks.patch
- From: >kernel-3.10.0-123.20.1.el7
- CVE-2018-10879, CVSSv2 Score: 4.2
- Description:
ext4: always verify the magic number in xattr blocks
- CVE: https://access.redhat.com/security/cve/cve-2018-10879
- Patch: 3.10.0/CVE-2018-10879-ext4-add-corruption-check.patch
- From: kernel-3.10.0-957.el7
- CVE-2018-10881, CVSSv2 Score: 4.2
- Description:
ext4: clear i_data in ext4_inode_info when removing inline data
- CVE: https://access.redhat.com/security/cve/cve-2018-10881
- Patch: 3.10.0/CVE-2018-10881-ext4-clear-i_data-in-ext4_inode_info-when-removing-inline-data.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2018-10883, CVSSv2 Score: 4.8
- Description:
ext4: avoid running out of journal credits when appending to an inline file
- CVE: https://access.redhat.com/security/cve/cve-2018-10883
- Patch: 3.10.0/CVE-2018-10883-ext4-avoid-running-out-of-journal-credits-when-appending-to-an-inline-file.patch
- From: >kernel-3.10.0-229.20.1.el7
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 3.10.0/CVE-2018-10902-ALSA-rawmidi-shange-resize-buffers-atomically.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2018-13405, CVSSv2 Score: 4.4
- Description:
Fix up non-directory creation in SGID directories
- CVE: https://access.redhat.com/security/cve/cve-2018-13405
- Patch: 3.10.0/CVE-2018-13405-Fix-up-non-directory-creation-in-SGID-directories.patch
- From: kernel-3.10.0-957.el7
- CVE-2018-1000026, CVSSv2 Score: 5.8
- Description:
net: create skb_gso_validate_mac_len()
- CVE: https://access.redhat.com/security/cve/cve-2018-1000026
- Patch: 3.10.0/cve-2018-1000026-disable-gso-when-frag-too-big.patch
- From: kernel-3.10.0-957.el7
- CVE-2017-18208, CVSSv2 Score: 5.5
- Description:
mm/madvise.c: fix madvise() infinite loop under special circumstances
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-18208
- Patch: 3.10.0/CVE-2017-18208-fix-madvise-infinite-loop-under-speci.patch
- From: kernel-3.10.0-862.14.4.el7
- CVE-2018-1094, CVSSv2 Score: 4.6
- Description:
ext4: don't allow r/w mounts if metadata blocks overlap the superblock
- CVE: https://access.redhat.com/security/cve/cve-2018-1094
- Patch: 3.10.0/CVE-2018-1094-fs-ext4-don-t-allow-r-w-mounts-if-metadata-blocks-overlap-the-superblock.patch
- From: 3.10.0-957.el7
- CVE-2018-10322, CVSSv2 Score: 4.6
- Description:
xfs: move inode fork verifiers to xfs_dinode_verify
- CVE: https://access.redhat.com/security/cve/cve-2018-10322
- Patch: 3.10.0/CVE-2018-10322-fs-xfs-move-inode-fork-verifiers-to-xfs_dinode_verify.patch
- From: 3.10.0-957.el7
- CVE-2018-10322, CVSSv2 Score: 4.6
- Description:
xfs: enhance dinode verifier
- CVE: https://access.redhat.com/security/cve/cve-2018-10322
- Patch: 3.10.0/CVE-2018-10322-fs-xfs-enhance-dinode-verifier.patch
- From: 3.10.0-957.el7
- CVE-2018-10940, CVSSv2 Score: 4.4
- Description:
cdrom-information-leak-in-cdrom_ioctl_media_changed.patch
- CVE: https://access.redhat.com/security/cve/cve-2018-10940
- Patch: 3.10.0/CVE-2018-10940-cdrom-information-leak-in-cdrom_ioctl_media_changed-1.patch
- From: 3.10.0-957.el7
- CVE-2018-1120, CVSSv2 Score: 2.8
- Description:
proc: do not access cmdline nor environ from file-backed areas
- CVE: https://access.redhat.com/security/cve/cve-2018-1120
- Patch: 3.10.0/CVE-2018-1120-proc-do-not-access-cmdline-nor-environ-from-file-backed-areas.patch
- From: 3.10.0-957.el7
- CVE-2015-8830, CVSSv2 Score: 4.9
- Description:
AIO: properly check iovec sizes
- CVE: https://access.redhat.com/security/cve/CVE-2015-8830
- Patch: 3.10.0/CVE-2015-8830.patch
- From: 3.10.0-957.el7
- CVE-2018-10878, CVSSv2 Score: 4.8
- Description:
ext4: always check block group bounds in ext4_init_block_bitmap()
- CVE: https://access.redhat.com/security/cve/cve-2018-10878
- Patch: 3.10.0/CVE-2018-10878-ext4-always-check-block-group-bounds-in-ext4_init_block_bitmap.patch
- From: 3.10.0-957.el7
- CVE-2018-10878, CVSSv2 Score: 4.8
- Description:
ext4: make sure bitmaps and the inode table don't overlap with bg descriptors
- CVE: https://access.redhat.com/security/cve/cve-2018-10878
- Patch: 3.10.0/CVE-2018-10878-ext4-make-sure-bitmaps-and-the-inode-table-don-t-overlap-with-bg-descriptors.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
include/linux/mmdebug.h: add VM_WARN which maps to WARN()
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-linux-include-linux-mmdebug-h-add-VM_WARN-which-maps-to-WARN.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
include/linux/mmdebug.h: add VM_WARN_ONCE()
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-linux-include-linux-mmdebug-h-add-VM_WARN_ONCE.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-fs-hugetlbfs-check-for-pgoff-value-overflow.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-fs-hugetlbfs-check-for-pgoff-value-overflow-v3.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-fs-hugetlbfs-check-for-pgoff-value-overflow-v3-fix-fix.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
include/linux/mmdebug.h: fix VM_WARN[_*]() with CONFIG_DEBUG_VM=n
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-linux-include-linux-mmdebug-h-fix-VM_WARN-_-with-CONFIG_DEBUG_VM-n.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
mm/hugetlb.c: clean up VM_WARN usage
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-mm-hugetlb-c-clean-up-VM_WARN-usage.patch
- From: 3.10.0-957.el7
- CVE-2018-14633, CVSSv2 Score: 7
- Description:
scsi: target: iscsi: Use hex2bin instead of a re-implementation
- CVE: https://access.redhat.com/security/cve/cve-2018-14633
- Patch: 3.10.0/cve-2018-14633-iscsi-target-use-hex2bin-instead-of.patch
- From: kernel-3.10.0-957.1.3.el7
- CVE-2018-14633, CVSSv2 Score: 7
- Description:
scsi: target: iscsi: Use bin2hex instead of a re-implementation
- CVE: https://access.redhat.com/security/cve/cve-2018-14633
- Patch: 3.10.0/cve-2018-14633-iscsi-target-use-bin2hex-instead-of.patch
- From: kernel-3.10.0-957.1.3.el7
- CVE-2018-14646, CVSSv2 Score: 5.5
- Description:
rtnetlink: give a user socket to get_target_net()
- CVE: https://access.redhat.com/security/cve/cve-2018-14646
- Patch: 3.10.0/cve-2018-14646-rtnetlink-give-a-user-sock.patch
- From: kernel-3.10.0-957.1.3.el7
- CVE-2018-18690, CVSSv2 Score: 5.5
- Description:
[fs] xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE
- CVE: https://access.redhat.com/security/cve/CVE-2018-18690
- Patch: 3.10.0/fs-xfs-don-t-fail-when-converting-shortform-attr-to-long-form-during-ATTR_REPLACE.patch
- From: 3.10.0-957.el7
- CVE-2018-10882, CVSSv2 Score: 4.8
- Description:
[fs] ext4: add more inode number paranoia checks
- CVE: https://access.redhat.com/security/cve/CVE-2018-10882
- Patch: 3.10.0/fs-ext4-add-more-inode-number-paranoia-checks.patch
- From: 3.10.0-957.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Check reg_table_count before derefencing
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/14144-drm-drm-i915-cmdparser-Check-reg_table_count-before.patch
- From: 3.10.0-957.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Do not check past the cmd length
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/14145-drm-drm-i915-cmdparser-Do-not-check-past-the-cmd-le.patch
- From: 3.10.0-957.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Silence smatch for cmdparser
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/14146-drm-drm-i915-Silence-smatch-for-cmdparser.patch
- From: 3.10.0-957.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Don't use GPU relocations prior to cmdparser stalls
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/14147-drm-drm-i915-Don-t-use-GPU-relocations-prior-to-cmd.patch
- From: 3.10.0-957.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Move engine->needs_cmd_parser to engine->flags
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/14148-drm-drm-i915-Move-engine-needs_cmd_parser-to-engine.patch
- From: 3.10.0-957.el7
- CVE-2018-18559, CVSSv2 Score: 7
- Description:
net/packet: fix a race in packet_bind() and packet_notifier()
- CVE: https://access.redhat.com/security/cve/cve-2018-18559
- Patch: 3.10.0/CVE-2018-18559.patch
- From: 3.10.0-953.5.1.el7
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
- CVE: https://access.redhat.com/security/cve/cve-2018-18397
- Patch: 3.10.0/CVE-2018-18397-1.patch
- From: 3.10.0-957.5.1.el7
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem: allocate anonymous memory for MAP_PRIVATE shmem
- CVE: https://access.redhat.com/security/cve/cve-2018-18397
- Patch: 3.10.0/CVE-2018-18397-2.patch
- From: 3.10.0-957.5.1.el7
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas
- CVE: https://access.redhat.com/security/cve/cve-2018-18397
- Patch: 3.10.0/CVE-2018-18397-3.patch
- From: 3.10.0-957.5.1.el7
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem: add i_size checks
- CVE: https://access.redhat.com/security/cve/cve-2018-18397
- Patch: 3.10.0/CVE-2018-18397-4.patch
- From: 3.10.0-957.5.1.el7
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
- CVE: https://access.redhat.com/security/cve/cve-2018-18397
- Patch: 3.10.0/CVE-2018-18397-5.patch
- From: 3.10.0-957.5.1.el7
- CVE-2018-9568, CVSSv2 Score: 7
- Description:
net: Set sk_prot_creator when cloning sockets to the right proto
- CVE: https://access.redhat.com/security/cve/cve-2018-9568
- Patch: 3.10.0/CVE-2018-9568.patch
- From: 3.10.0-957.10.1.el7
- CVE-2018-17972, CVSSv2 Score: 3.3
- Description:
proc: restrict kernel stack dumps to root
- CVE: https://access.redhat.com/security/cve/cve-2018-17972
- Patch: 3.10.0/CVE-2018-17972.patch
- From: 3.10.0-957.10.1.el7
- CVE-2019-6974, CVSSv2 Score: 7.3
- Description:
use-after-free vulnerability in the way the Linux kernel's KVM hypervisor implements its device control API
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6974
- Patch: 3.10.0/cve-2019-6974.patch
- From:
- CVE-2019-7221, CVSSv2 Score: 7.5
- Description:
use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor emulates a preemption timer for L2 guests when nested (=1) virtualization is enabled
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-7221
- Patch: 3.10.0/cve-2019-7221.patch
- From:
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
[net] tcp: pass previous skb to tcp_shifted_skb()
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 3.10.0/net-tcp-pass-previous-skb-to-tcp_shifted_skb.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
[net] tcp: limit payload size of sacked skbs
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 3.10.0/net-tcp-limit-payload-size-of-sacked-skbs.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11478, CVSSv2 Score: 5.3
- Description:
[net] tcp: tcp_fragment() should apply sane memory limits
- CVE: https://access.redhat.com/security/cve/cve-2019-11478
- Patch: 3.10.0/net-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11479, CVSSv2 Score: 5.3
- Description:
[net] tcp: add tcp_min_snd_mss sysctl
- CVE: https://access.redhat.com/security/cve/cve-2019-11479
- Patch: 3.10.0/net-tcp-add-tcp_min_snd_mss-sysctl.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11479, CVSSv2 Score: 5.3
- Description:
[net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://access.redhat.com/security/cve/cve-2019-11479
- Patch: 3.10.0/net-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From: 3.10.0-957.21.3.el7
- CVE-2018-16871, CVSSv2 Score: 7.5
- Description:
nfsd: COPY and CLONE operations require the saved filehandle to be set
- CVE: https://access.redhat.com/security/cve/cve-2018-16871
- Patch: 3.10.0/cve-2018-16871-nfsd-copy-and-clone-operations-require-filehandle.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2019-11085, CVSSv2 Score: 8.8
- Description:
drm/i915/gvt: Fix mmap range check
- CVE: https://access.redhat.com/security/cve/cve-2019-11085
- Patch: 3.10.0/cve-2019-11085-drm-i915-fix-mmap-range-check-862.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2019-11811, CVSSv2 Score: 7.8
- Description:
ipmi_si: fix use-after-free of resource->name
- CVE: https://access.redhat.com/security/cve/cve-2019-11811
- Patch: 3.10.0/cve-2019-11811-ipmi-si-fix-use-after-free-of-resource-name-862.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
sunrpc: use-after-free in svc_process_common()
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10772-sunrpc-use-SVC_NET-in-svcauth_gss_-functions.patch
- From: kernel-3.10.0-957.27.2.el7
- Description:
- CVE:
- Patch: 3.10.0/10782-x86-kvm-x86-mmu-Make-mmu_set_spte-return-emulate-va.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/10783-x86-kvm-x86-mmu-Move-initialization-of-parent_ptes-.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/10784-x86-kvm-x86-mmu-Move-parent_pte-handling-from-kvm_m.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/10786-x86-kvm-x86-mmu-Remove-unused-parameter-parent_pte-.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/10833-x86-kvm-x86-extend-usage-of-RET_MMIO_PF_-constants-862.patch
- From:
- CVE-2018-9363, CVSSv2 Score: 6.1
- Description:
Bluetooth: hidp: buffer overflow in hidp_process_report
- CVE: https://access.redhat.com/security/cve/CVE-2018-9363
- Patch: 3.10.0/Bluetooth-hidp-buffer-overflow-in-hidp_process_repor.patch
- From: 3.10.0-1062.el7
- CVE-2018-12130 CVE-2018-12126 CVE-2018-12127 and CVE-2019-11091, CVSSv2 Score: 6.2
- Description:
MDS CPU Side-channel Attacks mitigation
- CVE: https://access.redhat.com/security/cve/cve-2019-11091
- Patch: 3.10.0/mds-862.patch
- From: 3.10.0-957.12.2.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost-net: set packet weight of tx polling to 2 * vq size
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0001-vhost-net-set-packet-weight-of-tx-polling-to-2-vq-si.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: use packet weight for rx handler, too
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0002-vhost_net-use-packet-weight-for-rx-handler-too.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: introduce vhost_exceeds_weight()
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0003-vhost_net-introduce-vhost_exceeds_weight.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: fix possible infinite loop
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0004-vhost_net-fix-possible-infinite-loop.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost: vsock: add weight support
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0005-vsock-add-weight-support.patch
- From: 3.10.0-1062.el7
- CVE-2019-5489, CVSSv2 Score: 7.1
- Description:
mm/mincore.c: make mincore() more conservative
- CVE: https://access.redhat.com/security/cve/cve-2019-5489
- Patch: 3.10.0/0006-mincore.c-make-mincore-more-conservative.patch
- From: 3.10.0-1062.el6
- CVE-2018-9517, CVSSv2 Score: 4.7
- Description:
l2tp: pass tunnel pointer to ->session_create()
- CVE: https://access.redhat.com/security/cve/cve-2018-9517
- Patch: 3.10.0/0007-l2tp-pass-tunnel-pointer-to-session_create.patch
- From: 3.10.0-1062.el7
- CVE-2018-10853, CVSSv2 Score: 7.0
- Description:
KVM: x86: introduce linear_{read,write}_system
- CVE: https://access.redhat.com/security/cve/cve-2018-10853
- Patch: 3.10.0/0008-kvm-x86-introduce-linear_-read-write-_system.patch
- From: 3.10.0-1062.el7
- CVE-2018-10853, CVSSv2 Score: 7.0
- Description:
KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system
- CVE: https://access.redhat.com/security/cve/cve-2018-10853
- Patch: 3.10.0/0009-kvm-x86-pass-kvm_vcpu-to-kvm_read_guest_virt-and-kvm-957.21.3.patch
- From: 3.10.0-1062.el7
- CVE-2018-10853, CVSSv2 Score: 7.0
- Description:
kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access
- CVE: https://access.redhat.com/security/cve/cve-2018-10853
- Patch: 3.10.0/0010-kvm-x86-use-correct-privilege-level-for-sgdt-sidt-fx.patch
- From: 3.10.0-1062.el7
- Description:
- CVE:
- Patch: 3.10.0/0011-kernelcare-CVE-2018-10853-adaptation.patch
- From:
- CVE-2018-14625, CVSSv2 Score: 5.3
- Description:
vhost/vsock: fix use-after-free in network stack callers
- CVE: https://access.redhat.com/security/cve/cve-2018-14625
- Patch: 3.10.0/CVE-2018-14625.patch
- From: 3.10.0-1062.el7
- CVE-2018-14734, CVSSv2 Score: 5.3
- Description:
vhost/vsock: fix use-after-free in network stack callers
- CVE: https://access.redhat.com/security/cve/cve-2018-14734
- Patch: 3.10.0/CVE-2018-14734.patch
- From: 3.10.0-1062.el7
- CVE-2018-15594, CVSSv2 Score: 5.6
- Description:
3.10.0/CVE-2018-15594.patch
- CVE: https://access.redhat.com/security/cve/cve-2018-15594
- Patch: 3.10.0/CVE-2018-15594.patch
- From: 3.10.0-1062.el7
- CVE-2019-3459, CVSSv2 Score: 5.3
- Description:
Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-3459
- Patch: 3.10.0/CVE-2019-3459.patch
- From: 3.10.0-1062.el7
- CVE-2019-3460, CVSSv2 Score: 5.3
- Description:
Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt
- CVE: https://access.redhat.com/security/cve/cve-2019-3460
- Patch: 3.10.0/CVE-2019-3460.patch
- From: 3.10.0-1062.el7
- CVE-2019-3882, CVSSv2 Score: 4.7
- Description:
vfio/type1: Limit DMA mappings per container
- CVE: https://access.redhat.com/security/cve/cve-2019-3882
- Patch: 3.10.0/CVE-2019-3882.patch
- From: 3.10.0-1062.el7
- Description:
- CVE:
- Patch: 3.10.0/CVE-2019-3882-kpatch.patch
- From:
- CVE-2019-11599, CVSSv2 Score: 6.1
- Description:
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
- CVE: https://access.redhat.com/security/cve/cve-2019-11599
- Patch: 3.10.0/CVE-2019-11599-862.14.4.patch
- From: 3.10.0-1062.el7
- CVE-2019-11810, CVSSv2 Score: 6.2
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 3.10.0/CVE-2019-11810.patch
- From: 3.10.0-1062.el7
- CVE-2019-11833, CVSSv2 Score: 5.5
- Description:
ext4: zero out the unused memory region in the extent tree block
- CVE: https://access.redhat.com/security/cve/cve-2019-11833
- Patch: 3.10.0/CVE-2019-11833.patch
- From: 3.10.0-1062.el7
- CVE-2018-7755, CVSSv2 Score: 5.9
- Description:
floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
- CVE: https://access.redhat.com/security/cve/cve-2018-7755
- Patch: 3.10.0/CVE-2018-7755.patch
- From: 3.10.0-1062.el7
- CVE-2018-9516, CVSSv2 Score: 3.1
- Description:
HID: debug: check length before copy_to_user()
- CVE: https://access.redhat.com/security/cve/CVE-2018-9516
- Patch: 3.10.0/CVE-2018-9516.patch
- From: 3.10.0-1062.el7
- CVE-2018-13053, CVSSv2 Score: 3.3
- Description:
alarmtimer: Prevent overflow for relative nanosleep
- CVE: https://access.redhat.com/security/cve/CVE-2018-13053
- Patch: 3.10.0/CVE-2018-13053.patch
- From: 3.10.0-1062.el7
- CVE-2018-13093, CVSSv2 Score: 5.5
- Description:
validate cached inodes are free when allocated in xfs
- CVE: https://access.redhat.com/security/cve/cve-2018-13093
- Patch: 3.10.0/CVE-2018-13093-lt-957.patch
- From: 3.10.0-1062.el7
- CVE-2018-13094, CVSSv2 Score: 5.0
- Description:
xfs: fixed incorrect xfs_da_shrink_inode call with NULL buffer
- CVE: https://access.redhat.com/security/cve/cve-2018-13094
- Patch: 3.10.0/CVE-2018-13094.patch
- From: 3.10.0-1062.el7
- CVE-2018-13095, CVSSv2 Score: 5.0
- Description:
xfs: fixed possible ifp->if_broot dereference based on the XFS_DINODE_FMT_BTREE format
- CVE: https://access.redhat.com/security/cve/cve-2018-13095
- Patch: 3.10.0/CVE-2018-13095-1.patch
- From: 3.10.0-1062.el7
- CVE-2018-13095, CVSSv2 Score: 5.0
- Description:
xfs: fix a null pointer dereference in xfs_bmap_extents_to_btree
- CVE: https://access.redhat.com/security/cve/cve-2018-13095
- Patch: 3.10.0/CVE-2018-13095-2.patch
- From: 3.10.0-1062.el7
- CVE-2018-13095, CVSSv2 Score: 5.0
- Description:
xfs: fix error handling in xfs_bmap_extents_to_btree
- CVE: https://access.redhat.com/security/cve/cve-2018-13095
- Patch: 3.10.0/CVE-2018-13095-3.patch
- From: 3.10.0-1062.el7
- CVE-2018-16658, CVSSv2 Score: 4.0
- Description:
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status
- CVE: https://access.redhat.com/security/cve/CVE-2018-16658
- Patch: 3.10.0/CVE-2018-16658.patch
- From: 3.10.0-1062.el7
- CVE-2018-16885, CVSSv2 Score: 4.7
- Description:
iovec: make sure the caller actually wants anything in memcpy_fromiovecend
- CVE: https://access.redhat.com/security/cve/CVE-2018-16885
- Patch: 3.10.0/CVE-2018-16885.patch
- From: 3.10.0-1062.el7
- CVE-2019-7222, CVSSv2 Score: 2.8
- Description:
KVM: x86: work around leak of uninitialized stack contents
- CVE: https://access.redhat.com/security/cve/CVE-2019-7222
- Patch: 3.10.0/CVE-2019-7222.patch
- From: 3.10.0-1062.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/gtt: Add read only pages to gen8_pte_encode
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/11082-drm-drm-i915-gtt-Add-read-only-pages-to-gen8_pte_en.patch
- From: 3.10.0-1062.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] erm/i915/gtt: Read-only pages for insert_entries on bdw+
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/11083-drm-erm-i915-gtt-Read-only-pages-for-insert_entries-862.patch
- From: 3.10.0-1062.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/gtt: Disable read-only support under GVT
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/11084-drm-drm-i915-gtt-Disable-read-only-support-under-GV.patch
- From: 3.10.0-1062.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Prevent writing into a read-only object via a GGTT mmap
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/11085-drm-drm-i915-Prevent-writing-into-a-read-only-objec-862.patch
- From: 3.10.0-1062.el7
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
[x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- CVE: https://access.redhat.com/security/cve/CVE-2019-1125
- Patch: 3.10.0/swapgs-fix.patch
- From: 3.10.0-1062.1.1.el7
- Description:
- CVE:
- Patch: 3.10.0/kpatch-map-kaiser-__kp_text.patch
- From:
- CVE-2019-9500, CVSSv2 Score: 6.5
- Description:
brcmfmac: assure SSID length from firmware is limited
- CVE: https://access.redhat.com/security/cve/cve-2019-9500
- Patch: 3.10.0/netdrv-brcmfmac-assure-SSID-length-from-firmware-is-.patch
- From: 3.10.0-1062.1.1.el7
- CVE-2019-14835, CVSSv2 Score: 7.2
- Description:
host: make sure log_num < in_num
- CVE: https://access.redhat.com/security/cve/CVE-2019-14835
- Patch: 3.10.0/CVE-2019-14835-vhost-make-sure-log_num-in_num.patch
- From: >3.10.0-1062.1.1.el7
- CVE-2018-20856, CVSSv2 Score: 7
- Description:
block: blk_init_allocated_queue() set q->fq as NULL in the fail case
- CVE: https://access.redhat.com/security/cve/cve-2018-20856
- Patch: 3.10.0/8944-block-block-blk_init_allocated_queue-set-q-fq-as-NUL-862.14.4.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-3846, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix possible buffer overflows at parsing bss descriptor
- CVE: https://access.redhat.com/security/cve/cve-2019-3846
- Patch: 3.10.0/8947-wireless-mwifiex-Fix-possible-buffer-overflows-at-pa.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-3846, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix possible buffer overflows at parsing bss descriptor
- CVE: https://access.redhat.com/security/cve/cve-2019-3846
- Patch: 3.10.0/8948-wireless-mwifiex-Abort-at-too-short-BSS-descriptor-e.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-10126, CVSSv2 Score: 9.8
- Description:
mwifiex: Fix skipped vendor specific IEs
- CVE: https://access.redhat.com/security/cve/cve-2019-10126
- Patch: 3.10.0/8951-wireless-mwifiex-Fix-skipped-vendor-specific-IEs.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-10126, CVSSv2 Score: 9.8
- Description:
mwifiex: Mark expected switch fall-through
- CVE: https://access.redhat.com/security/cve/cve-2019-10126
- Patch: 3.10.0/8952-wireless-mwifiex-Mark-expected-switch-fall-through.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-10126, CVSSv2 Score: 9.8
- Description:
mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()
- CVE: https://access.redhat.com/security/cve/cve-2019-10126
- Patch: 3.10.0/8953-wireless-mwifiex-Fix-heap-overflow-in-mwifiex_uap_pa.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-9506, CVSSv2 Score: 7
- Description:
Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- CVE: https://access.redhat.com/security/cve/cve-2019-9506
- Patch: 3.10.0/8955-net-Bluetooth-Align-minimum-encryption-key-size-for-.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-9506, CVSSv2 Score: 7
- Description:
Bluetooth: Fix regression with minimum encryption key size alignment
- CVE: https://access.redhat.com/security/cve/cve-2019-9506
- Patch: 3.10.0/8956-net-Bluetooth-Fix-regression-with-minimum-encryption.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-9506, CVSSv2 Score: 7
- Description:
Bluetooth: Fix faulty expression for minimum encryption key size check
- CVE: https://access.redhat.com/security/cve/cve-2019-9506
- Patch: 3.10.0/8957-net-Bluetooth-Fix-faulty-expression-for-minimum-encr.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2018-10880, CVSSv2 Score: 5.5
- Description:
ext4: never move the system.data xattr out of the inode body
- CVE: https://access.redhat.com/security/cve/CVE-2018-10880
- Patch: 3.10.0/ext4-never-move-the-system.data-xattr-out-of-the-ino.patch
- From: >3.10.0-957.1.3.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: Do not release the page inside mmu_set_spte() (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 3.10.0/CVE-2018-12207-01-x86-kvm-Do-not-release-the-page-inside-mmu_set_spte-957.21.3.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
CVE-2018-12207 prerequirement - code cleanup and simplification
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 3.10.0/CVE-2018-12207-02-cleanup-957.21.3.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 3.10.0/CVE-2018-12207-03-x86-kvm-change-kvm_mmu_page_get_gfn-BUG_ON-to-WARN_ON.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: vmx,svm: always run with EFER.NXE=1 when shadow paging is active (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 3.10.0/CVE-2018-12207-04-kvm-vmx-svm-always-run-with-EFER.NXE-1-when-shadow-paging-is-active.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: Convert kvm_lock to a mutex (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 3.10.0/CVE-2018-12207-05-kvm-Convert-kvm_lock-to-a-mutex.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 3.10.0/CVE-2018-12207-06-mitigation-862.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Rename gen7 cmdparser tables
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8987-drm-drm-i915-Rename-gen7-cmdparser-tables.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Disable Secure Batches for gen6+
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8988-drm-drm-i915-Disable-Secure-Batches-for-gen6-862.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Remove Master tables from cmdparser
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8989-drm-drm-i915-Remove-Master-tables-from-cmdparser.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Add support for mandatory cmdparsing
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8990-drm-drm-i915-Add-support-for-mandatory-cmdparsing-862.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8991-drm-drm-i915-Support-ro-ppgtt-mapped-cmdparser-shado-862.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Allow parsing of unsized batches
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8992-drm-drm-i915-Allow-parsing-of-unsized-batches.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Add gen9 BCS cmdparsing
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8993-drm-drm-i915-Add-gen9-BCS-cmdparsing.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Use explicit goto for error paths
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8994-drm-drm-i915-cmdparser-Use-explicit-goto-for-error-p.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Add support for backward jumps
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8995-drm-drm-i915-cmdparser-Add-support-for-backward-jump-957.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Ignore Length operands during command matching
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8996-drm-drm-i915-cmdparser-Ignore-Length-operands-during.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0154, CVSSv2 Score: 6.5
- Description:
[drm] drm/i915/gen8+: Add RC6 CTX corruption WA
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8997-drm-drm-i915-gen8-Add-RC6-CTX-corruption-WA-862.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0154, CVSSv2 Score: 6.5
- Description:
[drm] drm/i915: Lower RM timeout to avoid DSI hard hangs
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8998-drm-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hang.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0154, CVSSv2 Score: 6.5
- Description:
[drm] drm/i915/gen8+: Add RC6 CTX corruption WA
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8997-drm-drm-i915-gen8-Add-RC6-CTX-corruption-WA-kpatch-fix-862.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Fix jump whitelist clearing
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/9000-drm-drm-i915-cmdparser-Fix-jump-whitelist-clearing-1062.4.1.patch
- From: 3.10.0-1062.4.3.el7
- CVE-2019-14821, CVSSv2 Score: 7.0
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://access.redhat.com/security/cve/cve-2019-14821
- Patch: 3.10.0/9010-virt-KVM-coalesced_mmio-add-bounds-checking.patch
- From: kernel-3.10.0-1062.1.1.el7
- CVE-2019-15239, CVSSv2 Score: 7.4
- Description:
tcp: purge write queue in tcp_connect_init()
- CVE: https://access.redhat.com/security/cve/cve-2019-15239
- Patch: 3.10.0/CVE-2019-15239-pre-1062.1.1.patch
- From: kernel-3.10.0-1062.7.1.el7
- CVE-2019-14816, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14816
- Patch: 3.10.0/cve-2019-14816-mwifiex-fix-three-heap-overflow.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-14895, CVSSv2 Score: 8.0
- Description:
Heap Overflow in mwifiex_process_country_ie() function of Marvell Wifi Driver
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14895
- Patch: 3.10.0/cve-2019-14895-mwifiex-fix-possible-heap-overflow.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-14901, CVSSv2 Score: 8.8
- Description:
mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14901
- Patch: 3.10.0/cve-2019-14901-mwifiex-heap-overflow-in-tdls.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-17133, CVSSv2 Score: 8.8
- Description:
cfg80211: wext: avoid copying malformed SSIDs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17133
- Patch: 3.10.0/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-14898, CVSSv2 Score: 7.0
- Description:
[fs] userfaultfd_release: always remove uffd flags and clear vm_userfaultfd_ctx
- CVE: https://access.redhat.com/security/cve/cve-2019-14898
- Patch: 3.10.0/9112-fs-userfaultfd_release-always-remove-uffd-flags-and-.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-17666, CVSSv2 Score: 6.3
- Description:
[wireless] rtlwifi: Fix potential overflow on P2P code
- CVE: https://access.redhat.com/security/cve/cve-2019-17666
- Patch: 3.10.0/CVE-2019-17666-0001-rtlwifi-Fix-potential-overflow-on-P2P-code.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-19338, CVSSv2 Score: 5.5
- Description:
[x86] kvm: x86: do not modify masked bits of shared MSRs
- CVE: https://access.redhat.com/security/cve/cve-2019-19338
- Patch: 3.10.0/CVE-2019-19338-0003-KVM-x86-do-not-modify-masked-bits-of-shared-MSRs.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
[kernel] mm: optimize dev_pagemap reference counting around get_dev_pagemap
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 3.10.0/CVE-2019-11487-0001-kernel-mm-optimize-dev_pagemap-reference-counting-ar.patch
- From: 3.10.0-957.el7
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
[mm] gup: don't leak pte_devmap references in the gup slow paths
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 3.10.0/CVE-2019-11487-0002-mm-gup-don-t-leak-pte_devmap-references-in-the-gup-s.patch
- From: 3.10.0-1062.el7
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
[mm] mm/hugetlb.c: __get_user_pages ignores certain follow_hugetlb_page errors
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 3.10.0/CVE-2019-11487-0003-mm-hugetlb.c-__get_user_pages-ignores-certain-follow.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
[mm] mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 3.10.0/CVE-2019-11487-0004-mm-prevent-get_user_pages-from-overflowing-page-refc-862.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
[netdrv] brcmfmac: add subtype check for event handling in data path
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 3.10.0/0007-netdrv-brcmfmac-add-subtype-check-for-event-handling.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-19985 CVE-2018-20169, CVSSv2 Score: 6.4
- Description:
[usb] check usb_get_extra_descriptor for proper size
- CVE: https://access.redhat.com/security/cve/cve-2018-20169
- Patch: 3.10.0/0105-usb-check-usb_get_extra_descriptor-for-proper-size.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-19985 CVE-2018-20169, CVSSv2 Score: 6.4
- Description:
[usb] hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CVE: https://access.redhat.com/security/cve/cve-2018-20169
- Patch: 3.10.0/0106-usb-hso-Fix-OOB-memory-access-in-hso_probe-hso_get_c.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-11884, CVSSv2 Score: 6.8
- Description:
[net] bluetooth: hidp: fix buffer overflow
- CVE: https://access.redhat.com/security/cve/cve-2019-11884
- Patch: 3.10.0/0135-net-bluetooth-hidp-fix-buffer-overflow.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-10207, CVSSv2 Score: 4.7
- Description:
[bluetooth] Bluetooth: hci_uart: check for missing tty operations
- CVE: https://access.redhat.com/security/cve/cve-2019-10207
- Patch: 3.10.0/1106-bluetooth-Bluetooth-hci_uart-check-for-missing-tty-o.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-14283, CVSSv2 Score: 5.6
- Description:
[block] floppy: fix out-of-bounds read in copy_buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-14283
- Patch: 3.10.0/1107-block-floppy-fix-out-of-bounds-read-in-copy_buffer.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15214, CVSSv2 Score: 6.4
- Description:
[sound] ALSA: info: Fix racy addition/deletion of nodes
- CVE: https://access.redhat.com/security/cve/cve-2019-15214
- Patch: 3.10.0/1478-sound-ALSA-info-Fix-racy-addition-deletion-of-nodes.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15214, CVSSv2 Score: 6.4
- Description:
[sound] ALSA: core: Fix card races between register and disconnect
- CVE: https://access.redhat.com/security/cve/cve-2019-15214
- Patch: 3.10.0/1479-sound-ALSA-core-Fix-card-races-between-register-and-.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15221, CVSSv2 Score: 4.6
- Description:
[sound] ALSA: line6: Fix write on zero-sized buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-15221
- Patch: 3.10.0/1590-sound-ALSA-line6-Fix-write-on-zero-sized-buffer.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15221, CVSSv2 Score: 4.6
- Description:
[sound] ALSA: line6: Fix memory leak at line6_init_pcm() error path
- CVE: https://access.redhat.com/security/cve/cve-2019-15221
- Patch: 3.10.0/1607-sound-ALSA-line6-Fix-memory-leak-at-line6_init_pcm-e.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-7191, CVSSv2 Score: 6.2
- Description:
[net] tun: call dev_get_valid_name() before register_netdevice()
- CVE: https://access.redhat.com/security/cve/cve-2018-7191
- Patch: 3.10.0/1694-net-tun-call-dev_get_valid_name-before-register_netd.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-7191, CVSSv2 Score: 6.2
- Description:
[net] tun: allow positive return values on dev_get_valid_name() call
- CVE: https://access.redhat.com/security/cve/cve-2018-7191
- Patch: 3.10.0/1695-net-tun-allow-positive-return-values-on-dev_get_vali.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-10638, CVSSv2 Score: 3.7
- Description:
[fs] dcache: allow word-at-a-time name hashing with big-endian CPUs
- CVE: https://access.redhat.com/security/cve/cve-2019-10638
- Patch: 3.10.0/1696-fs-dcache-allow-word-at-a-time-name-hashing-with-big.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-10638, CVSSv2 Score: 3.7
- Description:
[lib] siphash: add cryptographically secure PRF
- CVE: https://access.redhat.com/security/cve/cve-2019-10638
- Patch: 3.10.0/1697-lib-siphash-add-cryptographically-secure-PRF.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-10638 CVE-2019-10639, CVSSv2 Score: 3.7
- Description:
[net] inet: switch IP ID generator to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-10638
- Patch: 3.10.0/1698-net-inet-switch-IP-ID-generator-to-siphash.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
[security] KEYS: Strip trailing spaces
- CVE: https://access.redhat.com/security/cve/cve-2017-17807
- Patch: 3.10.0/1721-security-KEYS-Strip-trailing-spaces.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
[security] KEYS: remove unnecessary get/put of explicit dest_keyring
- CVE: https://access.redhat.com/security/cve/cve-2017-17807
- Patch: 3.10.0/1722-security-KEYS-remove-unnecessary-get-put-of-explicit.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
[security] KEYS: add missing permission check for request_key() destination
- CVE: https://access.redhat.com/security/cve/cve-2017-17807
- Patch: 3.10.0/1723-security-KEYS-add-missing-permission-check-for-reque.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-12382, CVSSv2 Score: 5.5
- Description:
[drm] drm/edid: Fix a missing-check bug in drm_load_edid_firmware()
- CVE: https://access.redhat.com/security/cve/cve-2019-12382
- Patch: 3.10.0/1963-drm-drm-edid-Fix-a-missing-check-bug-in-drm_load_edi.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-11190, CVSSv2 Score: 4.7
- Description:
binfmt_elf: switch to new creds when switching to new mm
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11190
- Patch: 3.10.0/CVE-2019-11190.patch
- From: >4.8
- CVE-2019-3901, CVSSv2 Score: 5.6
- Description:
[kernel] perf/core: Fix perf_event_open() vs. execve() race
- CVE: https://access.redhat.com/security/cve/cve-2019-3901
- Patch: 3.10.0/2070-kernel-perf-core-Fix-perf_event_open-vs.-execve-race.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15916, CVSSv2 Score: 5.5
- Description:
[net] sysfs: Fix mem leak in netdev_register_kobject
- CVE: https://access.redhat.com/security/cve/cve-2019-15916
- Patch: 3.10.0/2160-net-sysfs-Fix-mem-leak-in-netdev_register_kobject.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
cfg80211: add and use strongly typed element iteration macros
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/CVE-2019-16746-0001-cfg80211-add-and-use-strongly-typed-element-iteratio.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
ieee80211: fix for_each_element_extid()
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/CVE-2019-16746-0002-ieee80211-fix-for_each_element_extid.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
cfg80211: Use const more consistently in for_each_element macros
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/CVE-2019-16746-0003-cfg80211-Use-const-more-consistently-in-for_each_ele.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
[net] mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://access.redhat.com/security/cve/cve-2019-5108
- Patch: 3.10.0/2275-net-mac80211-Do-not-send-Layer-2-Update-frame-before.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
[net] nl80211: validate beacon head
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/2282-net-nl80211-validate-beacon-head.patch
- From: kernel-3.10.0-1127.el7
- CVE-2015-9289, CVSSv2 Score: 3.3
- Description:
[media] cx24116: fix a buffer overflow when checking userspace params
- CVE: https://access.redhat.com/security/cve/cve-2015-9289
- Patch: 3.10.0/2347-media-cx24116-fix-a-buffer-overflow-when-checking-us.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15090, CVSSv2 Score: 6.7
- Description:
scsi: qedi: remove memset/memcpy to nfunc and use func instead
- CVE: https://access.redhat.com/security/cve/cve-2019-15090
- Patch: 3.10.0/1192-scsi-scsi-qedi-remove-memset-memcpy-to-nfunc-and-use.patch
- From: kernel-3.10.0-1127.el7
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: cope with NULL catmap
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 3.10.0/CVE-2020-10711.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2017-18595, CVSSv2 Score: 7.8
- Description:
tracing: Fix possible double free on failure of allocating trace buffer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18595
- Patch: 3.10.0/CVE-2017-18595.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix dereference after null check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19768
- Patch: 3.10.0/CVE-2019-19768.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 3.10.0/cve-2020-12888-862.patch
- From: kernel-3.10.0-1127.13.1.el7
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 3.10.0/cve-2020-12888-kpatch-1.patch
- From: kernel-3.10.0-1127.13.1.el7
- CVE-2020-10757, CVSSv2 Score: 7.8
- Description:
mm: Fix mremap not considering huge pmd devmap
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10757
- Patch: 3.10.0/CVE-2020-10757.patch
- From: 3.10.0-1127.18.2
- CVE-2019-19527, CVSSv2 Score: 4.6
- Description:
HID: hiddev: avoid opening a disconnected device
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19527
- Patch: 3.16.0/cve-2019-19527-usb-hid-avoid-opening-disconnected-device.patch
- From: 3.16.81-1
- CVE-2020-12653, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12653
- Patch: 3.10.0/CVE-2020-12653-mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd-post-514.patch
- From: 3.10.0-1127.18.2
- CVE-2020-12654, CVSSv2 Score: 7.1
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12654
- Patch: 3.10.0/CVE-2020-12654-mwifiex-fix-possible-buffer-overflows-in-mwifiex_ret-post-514.patch
- From: 3.10.0-1127.18.2
- CVE-2019-0136, CVSSv2 Score: 7.4
- Description:
mac80211: drop robust management frames from unknown TA
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0136
- Patch: 3.10.0/CVE-2019-0136-mac80211-drop-robust-management-frames-from-unknown-TA.patch
- From: 3.10.0-1127.el7
- CVE-2019-0136, CVSSv2 Score: 7.4
- Description:
mac80211: handle deauthentication/disassociation from TDLS peer
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0136
- Patch: 3.10.0/CVE-2019-0136-mac80211-handle-deauthentication-disassociation-from-TDLS-peer.patch
- From: 3.10.0-1127.el7
- CVE-2020-14305, CVSSv2 Score: 8.1
- Description:
kernel: memory corruption in Voice over IP nf_conntrack_h323 module
- CVE: https://access.redhat.com/security/cve/cve-2020-14305
- Patch: 3.10.0/CVE-2020-14305.patch
- From: kernel-3.10.0-1160.el7
- n/a, CVSSv2 Score: n/a
- Description:
KVM: fix overflow of zero page refcount with ksm running
- CVE: https://access.redhat.com/solutions/5624631
- Patch: 3.10.0/0162-virt-kvm-fix-overflow-of-zero-page-refcount-with-ksm.patch
- From: 3.10.0-1160.el7
- CVE-2020-9383, CVSSv2 Score: 7.1
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://access.redhat.com/security/cve/cve-2020-9383
- Patch: 3.10.0/CVE-2020-9383-0314-block-floppy-check-floppy-check-FDC-index-for-errors-before-assig.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20095, CVSSv2 Score: 5.2
- Description:
mwifiex: Fix mem leak in mwifiex_tm_cmd
- CVE: https://access.redhat.com/security/cve/cve-2019-20095
- Patch: 3.10.0/CVE-2019-20095-0410-wireless-mwifiex-Fix-mem-leak-in-mwifiex_tm_cmd.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-8647 CVE-2020-8649, CVSSv2 Score: 6.1
- Description:
vgacon: Fix a UAF in vgacon_invert_region
- CVE: https://access.redhat.com/security/cve/cve-2020-8647
- Patch: 3.10.0/CVE-2020-8647-CVE-2020-8649-0363-video-vgacon-Fix-a-UAF-in-vgacon_invert_region.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
ipv6: constify ip6_dst_lookup_{flow|tail}() sock arguments
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-0250-net-ipv6-constify-ip6_dst_lookup_-flow-tail-sock-arg.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-0251-net-ipv6-add-argument-to-ip6_dst_lookup_flow-862.14.4.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-0252-net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-ip6-862.14.4.patch
- From: kernel-3.10.0-1160.el7
- cve-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6_stub: ip6_dst_lookup_flow (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-kpatch-862.14.4.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: nVMX: Don't emulate instructions in guest mode
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 3.10.0/CVE-2020-2732-0267-x86-kvm-nvmx-Don-t-emulate-instructions-in-guest-mod.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: nVMX: Refactor IO bitmap checks into helper function
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 3.10.0/CVE-2020-2732-0268-x86-kvm-nvmx-Refactor-IO-bitmap-checks-into-helper-f.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: nVMX: Check IO instruction VM-exit conditions
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 3.10.0/CVE-2020-2732-0269-x86-kvm-nvmx-Check-IO-instruction-VM-exit-conditions.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: VMX: check descriptor table exits on instruction emulation
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 3.10.0/CVE-2020-2732-0270-x86-kvm-vmx-check-descriptor-table-exits-on-instruct.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: x86: clear stale x86_emulate_ctxt->intercept value
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 3.10.0/CVE-2020-2732-0271-x86-kvm-x86-clear-state-x86_emulate_ctxt-intercept-v.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10942, CVSSv2 Score: 5.3
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://access.redhat.com/security/cve/cve-2020-10942
- Patch: 3.10.0/CVE-2020-10942-0728-vhost-vhost-Check-docket-sk_family-instead-of-call-g.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-11565, CVSSv2 Score: 6.0
- Description:
mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
- CVE: https://access.redhat.com/security/cve/cve-2020-11565
- Patch: 3.10.0/CVE-2020-11565-0564-mm-mm-mempolicy-require-at-least-one-nedeid-for-MPOL.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20636, CVSSv2 Score: 6.7
- Description:
Input: add safety guards to input_set_keycode
- CVE: https://access.redhat.com/security/cve/cve-2019-20636
- Patch: 3.10.0/CVE-2019-20636-0469-input-Input-add-safety-guards-to-input_set_keycode.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10690, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-10690.patch
- From:
- CVE-2020-10732, CVSSv2 Score: 3.3
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info
- CVE: https://access.redhat.com/security/cve/cve-2020-10732
- Patch: 3.10.0/CVE-2020-10732-0756-fs-fs-binfmt_elf.c-allocate-initialized-memory-in-fi.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits
- CVE: https://access.redhat.com/security/cve/cve-2020-12826
- Patch: 3.10.0/CVE-2020-12826-0707-fs-signal-Extend-exec_id-to-64bits-957.27.2.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-12826
- Patch: 3.10.0/CVE-2020-12826-957.27.2-kpatch.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://access.redhat.com/security/cve/cve-2020-12770
- Patch: 3.10.0/CVE-2020-12770-0757-scsi-scsi-sg-add-sg_remove_request-in-sg_write.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10742, CVSSv2 Score: 6.0
- Description:
nfs: Correct an nfs page array calculation error
- CVE: https://access.redhat.com/security/cve/cve-2020-10742
- Patch: 3.10.0/CVE-2020-10742-0462-fs-nfs-Correct-an-nfs-page-array-calculation-error.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: properly handle multiple messages in selinux_netlink_send
- CVE: https://access.redhat.com/security/cve/cve-2020-10751
- Patch: 3.10.0/CVE-2020-10751-0749-security-selinux-properly-handle-multiple-messages-i.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-18808, CVSSv2 Score: 5.5
- Description:
crypto: ccp - Release all allocated memory
- CVE: https://access.redhat.com/security/cve/cve-2019-18808
- Patch: 3.10.0/CVE-2019-18808-0600-crypto-ccp-Release-all-allocate-memory-if-sh.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-17055, CVSSv2 Score: 4.0
- Description:
mISDN: enforce CAP_NET_RAW for raw sockets
- CVE: https://access.redhat.com/security/cve/cve-2019-17055
- Patch: 3.10.0/CVE-2019-17055-0329-isdn-mISDN-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-17053, CVSSv2 Score: 4.0
- Description:
ieee802154: enforce CAP_NET_RAW for raw sockets
- CVE: https://access.redhat.com/security/cve/cve-2019-17053
- Patch: 3.10.0/CVE-2019-17053-0248-net-ieee802154-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-16994, CVSSv2 Score: 4.7
- Description:
net: sit: fix memory leak in sit_init_net()
- CVE: https://access.redhat.com/security/cve/cve-2019-16994
- Patch: 3.10.0/CVE-2019-16994-0574-net-sit-fix-memory-leak-in-sit_init_net.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-16233, CVSSv2 Score: 4.1
- Description:
scsi: qla2xxx: fix a potential NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/cve-2019-16233
- Patch: 3.10.0/CVE-2019-16233-0442-scsi-scsi-qla2xxx-fix-a-potential-NULL-pointer-deref-862.14.4.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-16231, CVSSv2 Score: 4.1
- Description:
fjes: Handle workqueue allocation failure.
- CVE: https://access.redhat.com/security/cve/cve-2019-16231
- Patch: 3.10.0/CVE-2019-16231-0566-netdrv-fjes-Handle-workqueue-allocation-failure.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-15917, CVSSv2 Score: 7.0
- Description:
Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
- CVE: https://access.redhat.com/security/cve/cve-2019-15917
- Patch: 3.10.0/CVE-2019-15917-0273-bluetooth-Bluetooth-hci_ldsc-Postpone-HCI_UART_PROT.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-15807, CVSSv2 Score: 4.7
- Description:
scsi: libsas: delete sas port if expander discover failed
- CVE: https://access.redhat.com/security/cve/cve-2019-15807
- Patch: 3.10.0/CVE-2019-15807-0468-scsi-scsi-libsas-delete-sas-port-if-expander-discove.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-15217, CVSSv2 Score: 4.6
- Description:
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
- CVE: https://access.redhat.com/security/cve/cve-2019-15217
- Patch: 3.10.0/CVE-2019-15217-0621-media-media-usb-zr364xx-Fix-KASAN-null-ptr-deref-Rea.patch
- From: kernel-3.10.0-1160.el7
- CVE-2018-20836, CVSSv2 Score: 7.0
- Description:
scsi: libsas: fix a race condition when smp task timeout
- CVE: https://access.redhat.com/security/cve/cve-2018-20836
- Patch: 3.10.0/CVE-2018-20836-0184-scsi-scsi-lbsas-fix-a-race-condition-when-smp-task-.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20054, CVSSv2 Score: 5.1
- Description:
fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links
- CVE: https://access.redhat.com/security/cve/cve-2019-20054
- Patch: 3.10.0/CVE-2019-20054-0071-fs-fs-proc-proc_sysctl.c-fix-NULL-pointer-dereferenc.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20054, CVSSv2 Score: 5.1
- Description:
fs/proc/proc_sysctl.c: Fix a NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/cve-2019-20054
- Patch: 3.10.0/CVE-2019-20054-0072-fs-fs-proc-proc_sysctl.c-Fix-a-NULL-pointer-derefere.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19534, CVSSv2 Score: 4.6
- Description:
can: peak_usb: fix slab info leak
- CVE: https://access.redhat.com/security/cve/CVE-2019-19534
- Patch: 3.10.0/CVE-2019-19534-0183-netdrv-can-peak_usb-fix-slab-info-leak.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19447, CVSSv2 Score: 7.8
- Description:
ext4: work around deleting a file with i_nlink == 0 safely
- CVE: https://access.redhat.com/security/cve/CVE-2019-19447
- Patch: 3.10.0/CVE-2019-19447-0197-fs-ext4-work-around-deleting-a-file-with-i_nlink-O-s.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
- CVE: https://access.redhat.com/security/cve/CVE-2019-19332
- Patch: 3.10.0/CVE-2019-19332-0203-x86-kvm-OOB-memory-write-via-kvm_dev_ioctl_get_cpuid.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-9454 CVE-2017-18551, CVSSv2 Score: 6.5
- Description:
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
- CVE: https://access.redhat.com/security/cve/CVE-2019-9454
- Patch: 3.10.0/CVE-2017-18551-CVE-2019-9454-0413-i2c-i2c-core-smbus-prevent-stack-corruption-on-read-.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19524, CVSSv2 Score: 4.6
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://access.redhat.com/security/cve/CVE-2019-19524
- Patch: 3.10.0/CVE-2019-19524-0443-input-Input-ff-memless-kill-timer-in-destroy.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19058, CVSSv2 Score: 4.7
- Description:
iwlwifi: dbg_ini: fix memory leak in alloc_sgtable
- CVE: https://access.redhat.com/security/cve/CVE-2019-19058
- Patch: 3.10.0/CVE-2019-19058-0487-wireless-iwlwifi-dbg_ini-fix-memory-leaks-in-alloc_sg.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19063, CVSSv2 Score: 4.6
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://access.redhat.com/security/cve/CVE-2019-19063
- Patch: 3.10.0/CVE-2019-19063-0488-wireless-rtlwifi-prevent-memory-leak-in-rtl_usb_prob.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19062, CVSSv2 Score: 4.7
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://access.redhat.com/security/cve/CVE-2019-19062
- Patch: 3.10.0/CVE-2019-19062-0601-crypto-crypto-user-fix-memory-leak-in-crypto_report.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 3.10.0/CVE-2019-9458-0604-media-media-v4l-event-Prevent-freeing-event-subscrip.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 3.10.0/CVE-2019-9458-kpatch.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: validate the debug_want_extra_isize mount option at parse time
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0608-fs-ext4-validate-the-debug_want_extra_isize-mount-op.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: forbid i_extra_isize not divisible by 4
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0609-fs-ext4-forbid-i_extra_isize-not-divisible-by-4.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: add more paranoia checking in ext4_expand_extra_isize handling
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0610-fs-ext4-add-more-paranoia-checking-in-ext4_expand_ex.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: fix support for inode sizes > 1024 bytes
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0611-ext4-fix-support-for-inode-sizes-1024-bytes.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19523, CVSSv2 Score: 7.8
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://access.redhat.com/security/cve/CVE-2019-19523
- Patch: 3.10.0/CVE-2019-19523-0622-usb-USB-adutux-fix-use-after-free-on-disconnect-1062.18.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19530, CVSSv2 Score: 5.7
- Description:
usb: cdc-acm: make sure a refcount is taken early enough
- CVE: https://access.redhat.com/security/cve/CVE-2019-19530
- Patch: 3.10.0/CVE-2019-19530-0623-usb-usb-cdc-acm-make-sure-a-refcount-is-taken-early-1062.18.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19537, CVSSv2 Score: 4.2
- Description:
USB: core: Fix races in character device registration and deregistraion
- CVE: https://access.redhat.com/security/cve/CVE-2019-19537
- Patch: 3.10.0/CVE-2019-19537-0624-usb-USB-core-Fix-races-in-character-device-registrat.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12351, CVSSv2 Score: 7.5
- Description:
Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel
- CVE: https://access.redhat.com/security/cve/cve-2020-12351
- Patch: 3.10.0/CVE-2020-12351-Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch
- From: 3.10.0-1160.2.2.el7
- CVE-2020-12352, CVSSv2 Score: 5.3
- Description:
Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-12352
- Patch: 3.10.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 3.10.0-1160.2.2.el7
- CVE-2019-20811, CVSSv2 Score: 3.3
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 3.10.0/cve-2019-20811-call-dev_hold-if-kobject_init_and_add-success.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2019-20811, CVSSv2 Score: 3.3
- Description:
net-sysfs: Call dev_hold always in netdev_queue_add_kobject
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 3.10.0/cve-2019-20811-call-dev_hold-always-in-netdev_queue_add_kobject.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2019-20811, CVSSv2 Score: 3.3
- Description:
net-sysfs: Call dev_hold always in rx_queue_add_kobject
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 3.10.0/cve-2019-20811-call-dev_hold-always-in-rx_queue_add_kobject.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2020-14331, CVSSv2 Score: 6.6
- Description:
Fix for missing check in vgacon scrollback handling
- CVE: https://access.redhat.com/security/cve/CVE-2020-14331
- Patch: 3.10.0/cve-2020-14331-vgacon-overflow-fix.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2019-18282, CVSSv2 Score: 5.3
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/CVE-2019-18282
- Patch: 3.10.0/CVE-2019-18282.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2019-18282, CVSSv2 Score: 5.3
- Description:
net/flow_dissector: switch to siphash (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-18282
- Patch: 3.10.0/CVE-2019-18282-kpatch.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-10769, CVSSv2 Score: 5.5
- Description:
crypto: authenc - fix parsing key with misaligned rta_len
- CVE: https://access.redhat.com/security/cve/CVE-2020-10769
- Patch: 3.10.0/CVE-2020-10769.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://access.redhat.com/security/cve/CVE-2020-14314
- Patch: 3.10.0/CVE-2020-14314.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-24394, CVSSv2 Score: 7.1
- Description:
nfsd: apply umask on fs without ACL support
- CVE: https://access.redhat.com/security/cve/CVE-2020-24394
- Patch: 3.10.0/CVE-2020-24394.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://access.redhat.com/security/cve/CVE-2020-25212
- Patch: 3.10.0/CVE-2020-25212.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-25643, CVSSv2 Score: 6.6
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25643
- Patch: 3.10.0/CVE-2020-25643.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-15436, CVSSv2 Score: 6.7
- Description:
block: Fix use-after-free in blkdev_get()
- CVE: https://access.redhat.com/security/cve/CVE-2020-15436
- Patch: 3.10.0/CVE-2020-15436-block-fix-use-after-free-in-blkdev_get.patch
- From: 3.10.0-1160.15.2.el7
- CVE-2020-35513, CVSSv2 Score: 4.9
- Description:
nfsd: fix incorrect umasks
- CVE: https://access.redhat.com/security/cve/CVE-2020-35513
- Patch: 3.10.0/CVE-2020-35513-nfsd-fix-incorrect-umasks.patch
- From: 3.10.0-1160.15.2.el7
- CVE-2020-35513, CVSSv2 Score: 4.9
- Description:
nfsd: fix incorrect umasks (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-35513
- Patch: 3.10.0/CVE-2020-35513-kpatch.patch
- From: 3.10.0-1160.15.2.el7
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://www.saddns.net/
- Patch: 3.10.0/icmp-randomize-the-global-rate-limiter.patch
- From: >3.10.0-1160.2.2.el7
- CVE-2019-19532, CVSSv2 Score: 6.8
- Description:
HID: Fix assumption that devices have inputs
- CVE: https://access.redhat.com/security/cve/cve-2019-19532
- Patch: 3.10.0/CVE-2019-19532-HID-Fix-assumption-that-devices-have-inputs.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: Delete an error message
- CVE: https://access.redhat.com/security/cve/cve-2020-0427
- Patch: 3.10.0/CVE-2020-0427-0001-pinctrl-Delete-an-error-message.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: devicetree: Avoid taking direct reference to device name string
- CVE: https://access.redhat.com/security/cve/cve-2020-0427
- Patch: 3.10.0/CVE-2020-0427-0002-pinctrl-devicetree-Avoid-taking-direct-reference-to-.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/cve-2020-14351
- Patch: 3.10.0/CVE-2020-14351-0001-perf-core-Fix-race-in-the-perf_mmap_close-function-957.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25211, CVSSv2 Score: 6.7
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/cve-2020-25211
- Patch: 3.10.0/CVE-2020-25211-0001-netfilter-ctnetlink-add-a-range-check-for-l3-l4-prot.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25645, CVSSv2 Score: 7.5
- Description:
geneve: add transport ports in route lookup for geneve
- CVE: https://access.redhat.com/security/cve/cve-2020-25645
- Patch: 3.10.0/CVE-2020-25645-0001-geneve-add-transport-ports-in-route-lookup-for-genev-957.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0001-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0002-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0005-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0006-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] add SAM_STAT_BUSY sense reason
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/13625-target-add-SAM_STAT_BUSY-sense-reason.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5523-target-Make-EXTENDED_COPY-0xe4-failure-return-COPY-T.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] Don't override EXTENDED_COPY xcopy_pt_cmd SCSI status code
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5524-target-Don-t-override-EXTENDED_COPY-xcopy_pt_cmd-SCS.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] add XCOPY target/segment desc sense codes
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5537-target-add-XCOPY-target-segment-desc-sense-codes.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] bounds check XCOPY segment descriptor list
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5539-target-bounds-check-XCOPY-segment-descriptor-list.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] simplify XCOPY wwn->se_dev lookup helper
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5542-target-simplify-XCOPY-wwn-se_dev-lookup-helper.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] use XCOPY segment descriptor CSCD IDs
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5544-target-use-XCOPY-segment-descriptor-CSCD-IDs.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] check for XCOPY parameter truncation
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5545-target-check-for-XCOPY-parameter-truncation.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] support XCOPY requests without parameters
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5546-target-support-XCOPY-requests-without-parameters.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] Use correct SCSI status during EXTENDED_COPY exception
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5548-target-Use-correct-SCSI-status-during-EXTENDED_COPY-.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[target] Fix a deadlock between the XCOPY code and iSCSI session shutdown
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5615-target-Fix-a-deadlock-between-the-XCOPY-code-and-iSC.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
[xcopy] loop over devices using idr helper
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/5629-xcopy-loop-over-devices-using-idr-helper.patch
- From: kernel-3.10.0-957.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/CVE-2020-28374-0001-scsi-target-Fix-XCOPY-NAA-identifier-lookup.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup
- CVE: https://access.redhat.com/security/cve/cve-2020-28374
- Patch: 3.10.0/CVE-2020-28374-0001-scsi-target-Fix-XCOPY-NAA-identifier-lookup-kpatch-1.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-29661, CVSSv2 Score: 7.8
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/cve-2020-29661
- Patch: 3.10.0/CVE-2020-29661-0001-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-7053, CVSSv2 Score: 7.8
- Description:
drm/i915: Fix use-after-free when destroying GEM context
- CVE: https://access.redhat.com/security/cve/cve-2020-7053
- Patch: 3.10.0/CVE-2020-7053-0001-drm-i915-Fix-use-after-free-when-destroying-GEM-cont.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2021-20265, CVSSv2 Score: 5.1
- Description:
af_unix: fix struct pid memory leak
- CVE: https://access.redhat.com/security/cve/cve-2021-20265
- Patch: 3.10.0/CVE-2021-20265-0001-af_unix-fix-struct-pid-memory-leak-1062.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2021-20265, CVSSv2 Score: 5.1
- Description:
af_unix: fix struct pid memory leak (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20265
- Patch: 3.10.0/CVE-2021-20265-kpatch-1.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2021-27363 CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://access.redhat.com/security/cve/cve-2021-27364
- Patch: 3.10.0/CVE-2021-27363_27364-iscsi-Restrict-sessions-and-handles-to-admin-capabilities.patch
- From: >3.10.0-1160.15.2.el7
- n/a, CVSSv2 Score: n/a
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output (CVE-2021-27365 dependency)
- CVE: n/a
- Patch: 3.10.0/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs-output.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 3.10.0/CVE-2021-27365-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 3.10.0/CVE-2021-27365-iscsi-Verify-lengths-on-passthrough-PDUs-leq-862.3.3.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Replace pointless printk in fixup_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 3.10.0/CVE-2021-3347-0001-futex-Replace-pointless-printk-in-fixup_owner.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 3.10.0/CVE-2021-3347-0002-futex-Provide-and-use-pi_state_update_owner.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 3.10.0/CVE-2021-3347-0003-futex-Handle-faults-correctly-for-PI-futexes.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2020-27170, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-27170.patch
- From:
- CVE-2020-27171, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-27171.patch
- From:
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://access.redhat.com/security/cve/CVE-2020-8648
- Patch: 3.10.0/CVE-2020-8648-vt-selection-close-sel_buffer-race-lt-957.10.1.patch
- From: 3.10.0-1160.31.1.el7
- CVE-2020-12362, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12362.patch
- From:
- CVE-2020-12363, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12363.patch
- From:
- CVE-2020-12364, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12364.patch
- From:
- CVE-2021-33909, CVSSv2 Score: 7.0
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://access.redhat.com/security/cve/cve-2021-33909
- Patch: 3.10.0/CVE-2021-33909.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2020-11668, CVSSv2 Score: 7.1
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://access.redhat.com/security/cve/CVE-2020-11668
- Patch: 3.10.0/CVE-2020-11668-media-xirlink-cit-add-missing-descriptor-sanity-checks.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33033, CVSSv2 Score: 7.8
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://access.redhat.com/security/cve/CVE-2021-33033
- Patch: 3.10.0/CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-doi-refcounts.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33033, CVSSv2 Score: 7.8
- Description:
net: mac802154: Fix general protection fault
- CVE: https://access.redhat.com/security/cve/CVE-2021-33033
- Patch: 3.10.0/CVE-2021-33033-net-mac802154-fix-general-protection-fault.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 3.10.0/CVE-2021-33034-bluetooth-verify-amp-hci-chan-before-amp-destroy.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/numa: Move task_numa_free() to __put_task_struct()
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-numa-Move-task_numa_free-to-__put_task_struct-lt-957.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/numa: Fix task_numa_free() lockdep splat
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-numa-Fix-task_numa_free-lockdep-splat.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/numa: Simplify task_numa_compare()
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-numa-Simplify-task_numa_compare.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/fair: Don't free p->numa_faults with concurrent readers
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-fair-don-t-free-p-numa-faults-with-concurrent-readers-lt-957.patch
- From: 3.10.0-1160.36.2.el7
- Description:
- CVE:
- Patch: 3.10.0/CVE-2019-20934-support-capsule8-lt-957.patch
- From:
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/fair: Use RCU accessors consistently for ->numa_group
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-fair-Use-RCU-accessors-consistently-for-numa_group.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2020-27777, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-27777.patch
- From:
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 3.10.0/CVE-2021-22555.patch
- From: 3.10.0-1160.41.1.el7
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 3.10.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: 3.10.0-1160.41.1.el7
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 3.10.0/CVE-2021-29650-netfilter-x-tables-use-correct-memory-barriers.patch
- From: 3.10.0-1160.41.1.el7
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the
- CVE: https://access.redhat.com/security/cve/CVE-2021-32399
- Patch: 3.10.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the.patch
- From: 3.10.0-1160.41.1.el7
- CVE-2021-3715, CVSSv2 Score: 7.8
- Description:
net_sched: cls_route: remove the right filter from hashtable
- CVE: https://access.redhat.com/security/cve/CVE-2021-3715
- Patch: 3.10.0/CVE-2021-3715-net-sched-cls-route-remove-the-right-filter-from-hashtable.patch
- From: 3.10.0-1160.42.2.el7
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://access.redhat.com/security/cve/cve-2021-3653
- Patch: 3.10.0/CVE-2021-3653-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch
- From: 3.10.0-1160.45.1.el7
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-bionic/4.15.0-156.163/CVE-2021-3653-kpatch-66.75.patch
- From: 4.15.0-156.163
- CVE-2021-3656, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested
- CVE: https://access.redhat.com/security/cve/cve-2021-3656
- Patch: 3.10.0/CVE-2021-3656-KVM-nSVM-always-intercept-VMLOAD-VMSAVE.patch
- From: 3.10.0-1160.45.1.el7
- CVE-2021-37576, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-37576.patch
- From:
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 3.10.0/CVE-2020-36385-1202-RDMA-cma-Add-missing-locking-to-rdma_accept-lt-1062.patch
- From: 3.10.0-1160.49.1.el7
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 3.10.0/CVE-2020-36385-1203-RDMA-ucma-Fix-the-locking-of-ctx-file.patch
- From: 3.10.0-1160.49.1.el7
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix locking for ctx->events_reported
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 3.10.0/CVE-2020-36385-1204-RDMA-ucma-Fix-locking-for-ctx-events_reported.patch
- From: 3.10.0-1160.49.1.el7
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 3.10.0/CVE-2020-36385-1205-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-with-lt-1062.patch
- From: 3.10.0-1160.49.1.el7
- CVE-2020-25704, CVSSv2 Score: 6.2
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-25704
- Patch: 3.10.0/CVE-2020-25704-perf-core-Fix-a-memory-leak-in-perf_event_parse_addr_filter.patch
- From: 3.10.0-1160.53.1.el7
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
firewire: firedtv-avc: potential buffer overflow
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-42739
- Patch: 3.10.0/CVE-2021-42739-media-firewire-firedtv-avc-potential-buffer-overflow.patch
- From: 3.10.0-1160.53.1.el7
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-42739
- Patch: 3.10.0/CVE-2021-42739-media-firewire-firedtv-avc-fix-more-potential-buffer.patch
- From: 3.10.0-1160.53.1.el7
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
[media] firewire: don't break long lines
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-42739
- Patch: 3.10.0/CVE-2021-42739-media-firewire-don-t-break-long-lines.patch
- From: 3.10.0-1160.53.1.el7
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-42739
- Patch: 3.10.0/CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch
- From: 3.10.0-1160.53.1.el7
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://access.redhat.com/security/cve/CVE-2020-36322
- Patch: 3.10.0/CVE-2020-36322-750669-fuse-fix-bad-inode.patch
- From: 3.10.0-1160.53.1.el7
- CVE-2020-0465, CVSSv2 Score: 6.6
- Description:
HID: core: Sanitize event code and type when mapping input
- CVE: https://access.redhat.com/security/cve/CVE-2020-0465
- Patch: 3.10.0/CVE-2020-0465-HID-core-Sanitize-event-code-and-type-when-mapping-input.patch
- From: 3.10.0-1169.59.1
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
do_epoll_ctl(): clean the failure exits up a bit
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 3.10.0/CVE-2020-0466-do_epoll_ctl-clean-the-failure-exits-up-a-bit.patch
- From: 3.10.0-1160.59.1
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 3.10.0/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 3.10.0-1160.59.1
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 3.10.0/CVE-2021-0920-kpatch.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 3.10.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 3.10.0-1160.59.1
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/CVE-2021-3573
- Patch: 3.10.0/CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-object.patch
- From: 3.10.0-1160.59.1
- CVE-2021-3752, CVSSv2 Score: 7.0
- Description:
Bluetooth: fix use-after-free error in lock_sock_nested()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3752
- Patch: 3.10.0/CVE-2021-3752-Bluetooth-fix-use-after-free-error-in-lock_sock_ne.patch
- From: 3.10.0-1160.59.1
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 3.10.0/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 3.10.0-1160.59.1
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
drm/vmwgfx: Fix stale file descriptors on failed usercopy
- CVE: https://access.redhat.com/security/cve/CVE-2022-22942
- Patch: 3.10.0/CVE-2022-22942-pre-1062.patch
- From: 3.10.0-1160.59.1
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 3.10.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-pre-957-kpatch.patch
- From: 3.10.0-1160.59.1
- CVE-2021-4028, CVSSv2 Score: 7.0
- Description:
RDMA/cma: Do not change route.addr.src_addr.ss_family
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4028
- Patch: 3.10.0/CVE-2021-4028-RDMA-cma-Do-not-change-route.addr.src_addr.ss_family.patch
- From: 3.10.0-1160.62.1
- CVE-2021-4083, CVSSv2 Score: 7.0
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://access.redhat.com/security/cve/CVE-2021-4083
- Patch: 3.10.0/CVE-2021-4083-2-introduce-__fcheck_files-to-fix-rcu_dereference_chec-pre-862.11.6.patch
- From: 3.10.0-1160.62.1.el7
- CVE-2021-4083, CVSSv2 Score: 7.0
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://access.redhat.com/security/cve/CVE-2021-4083
- Patch: 3.10.0/CVE-2021-4083-3-fget-check-that-the-fd-still-exists-after-getting-a-.patch
- From: 3.10.0-1160.62.1.el7
- CVE-2021-4083, CVSSv2 Score: 7.0
- Description:
fget: check that the fd still exists after getting a ref to it (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-4083
- Patch: 3.10.0/CVE-2021-4083-3-fget-check-that-the-fd-still-exists-after-getting-a-kpatch.patch
- From: 3.10.0-1160.62.1.el7
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 3.10.0/CVE-2022-1016-lt-1062.patch
- From: >kernel-3.10.0-1160.62.1.el7
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
Bail out in case userspace uses unsupported registers.
- CVE: https://access.redhat.com/security/cve/cve-2022-1015
- Patch: 3.10.0/CVE-2022-1015.patch
- From: >kernel-3.10.0-1160.62.1.el7
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 3.10.0/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 3.10.0-1160.66.1.el7
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 3.10.0/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 5.4.17-2136.307.3.2.el8uek
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 3.10.0/CVE-2022-32250-nf_tables-disallow-non-stateful-expression-in-sets-earlier.patch
- From: 3.10.0-1160.71.1
- CVE-2022-21499, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-2588, CVSSv2 Score: 7.8
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: 3.10.0/CVE-2022-2588.patch
- From: 3.10.0-1160.80.1.el7
- CVE-2022-23816, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-23825, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-23825.patch
- From:
- CVE-2022-26373, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-29900, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From:
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: fix packet alignment padding
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 3.10.0/CVE-2022-2964-1510-net-usb-ax88179_178a-fix-packet-alignment-padding.patch
- From: kernel-3.10.0-1160.83.1.el7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 3.10.0/CVE-2022-2964-1511-ax88179_178a-Merge-memcpy-le32_to_cpus-to-get_unalig.patch
- From: kernel-3.10.0-1160.83.1.el7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 3.10.0/CVE-2022-2964-1512-net-usb-Merge-cpu_to_le32s-memcpy-to-put_unaligned_l.patch
- From: kernel-3.10.0-1160.83.1.el7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 3.10.0/CVE-2022-2964-1518-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-R.patch
- From: kernel-3.10.0-1160.83.1.el7
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix packet receiving
- CVE: https://access.redhat.com/security/cve/CVE-2022-2964
- Patch: 3.10.0/CVE-2022-2964-1519-net-usb-ax88179_178a-Fix-packet-receiving.patch
- From: kernel-3.10.0-1160.83.1.el7
- CVE-2021-26401, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 3.10.0/proc-restrict-pagemap-access.patch
- From:
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 3.10.0/x86-kvm-vmx_vcpu_run-wrapper-gt-862.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/paravirt-asm-definition.patch
- From: