- kernel-2.6.32-642.13.2.el6 (centos6)
- 2.6.32-754.55.1.el6
- 2025-02-24 20:11:20
- 2025-03-31 11:14:55
- K20250224_06
- CVE-2016-6136, CVSSv2 Score: 3.3
- Description:
[kernel] audit: fix a double fetch in audit_log_single_execve_arg()
- CVE: https://access.redhat.com/security/cve/CVE-2016-6136
- Patch: 2.6.32/kernel-audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch
- From: kernel-2.6.32-642.15.1.el6
- CVE-2016-9555, CVSSv2 Score: 7.1
- Description:
[net] sctp: validate chunk len before actually using it
- CVE: https://access.redhat.com/security/cve/CVE-2016-9555
- Patch: 2.6.32/net-sctp-validate-chunk-len-before-actually-using-it.patch
- From: kernel-2.6.32-642.15.1.el6
- CVE-2016-2069, CVSSv2 Score: N/A
- Description:
x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- CVE: https://access.redhat.com/security/cve/cve-2016-2069
- Patch: 2.6.32/x86-mm-Add-barriers-and-document-switch_mm-vs-flush-.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-2384, CVSSv2 Score: N/A
- Description:
ALSA: usb-audio: avoid freeing umidi object twice
- CVE: https://access.redhat.com/security/cve/cve-2016-2384
- Patch: 2.6.32/ALSA-usb-audio-avoid-freeing-umidi-object-twice.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-6480, CVSSv2 Score: N/A
- Description:
aacraid: Check size values after double-fetch from user
- CVE: https://access.redhat.com/security/cve/cve-2016-6480
- Patch: 2.6.32/aacraid-Check-size-values-after-double-fetch-from-us.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-7097, CVSSv2 Score: N/A
- Description:
posix_acl: Clear SGID bit when setting file permissions
- CVE: https://access.redhat.com/security/cve/cve-2016-7097
- Patch: 2.6.32/posix_acl-Clear-SGID-bit-when-setting-file-permissio.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-8399, CVSSv2 Score: N/A
- Description:
net: ping: check minimum size on ICMP header length
- CVE: https://access.redhat.com/security/cve/cve-2016-8399
- Patch: 2.6.32/net-ping-check-minimum-size-on-ICMP-header-length.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-10088, CVSSv2 Score: N/A
- Description:
sg_write()/bsg_write() is not fit to be called under KERNEL_DS
- CVE: https://access.redhat.com/security/cve/cve-2016-10088
- Patch: 2.6.32/sg_write-bsg_write-is-not-fit-to-be-called-under-KER.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-10142, CVSSv2 Score: N/A
- Description:
ipv6: stop sending PTB packets for MTU < 1280
- CVE: https://access.redhat.com/security/cve/cve-2016-10142
- Patch: 2.6.32/ipv6-stop-sending-PTB-packets-for-MTU-1280.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-7042, CVSSv2 Score: N/A
- Description:
KEYS: Fix short sprintf buffer in /proc/keys show function
- CVE: https://access.redhat.com/security/cve/cve-2016-7042
- Patch: 2.6.32/KEYS-Fix-short-sprintf-buffer-in-proc-keys-show-func.patch
- From: kernel-2.6.32-696.el6
- CVE-2017-2636, CVSSv2 Score: 7.8
- Description:
tty: n_hdlc: get rid of racy n_hdlc.tbuf
- CVE: https://access.redhat.com/security/cve/CVE-2017-2636
- Patch: 2.6.32/fix-CVE-2017-2636.patch
- From: 2.6.32-696.1.1.el6
- CVE-2016-10229, CVSSv2 Score: critical
- Description:
udp: properly support MSG_PEEK with truncated buffers
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-10229
- Patch: 2.6.32/CVE-2016-10229.patch
- From: >2.6.32-642.15.1.el6
- CVE-2016-7910, CVSSv2 Score:
- Description:
block: fix use-after-free in seq file
- CVE: https://access.redhat.com/security/cve/CVE-2016-7910
- Patch: 2.6.32/block-fix-use-after-free-in-seq-file.patch
- From: kernel-2.6.32-696.1.1.el6
- CVE-2017-6214, CVSSv2 Score: 6.5
- Description:
tcp: avoid infinite loop in tcp_splice_read()
- CVE: https://access.redhat.com/security/cve/CVE-2017-6214
- Patch: 2.6.32/tcp-avoid-infinite-loop-in-tcp_splice_read.patch
- From: kernel-2.6.32-696.3.1.el6
- CVE-2017-1000364, CVSSv2 Score: 7.4
- Description:
mm: enlarge stack guard gap
- CVE: https://access.redhat.com/security/cve/cve-2017-1000364
- Patch: 2.6.32/CVE-2017-1000364-upstream-no-openvz.patch
- From: 2.6.32-696.3.2.el6
- CVE-2017-7895, CVSSv2 Score: 6.5
- Description:
nfsd: stricter decoding of write-like NFSv2/v3 ops
- CVE: https://access.redhat.com/security/cve/cve-2017-7895
- Patch: 2.6.32/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch
- From: >kernel-2.6.32-673.26.1.lve1.4.26.el6
- CVE-2017-1000251, CVSSv2 Score: 7.5
- Description:
Bluetooth: Properly check L2CAP config option output buffer length
- CVE: https://access.redhat.com/security/cve/cve-2017-1000251
- Patch: 2.6.32/CVE-2017-1000251.patch
- From: 2.6.32-696.10.2.el6
- CVE-2017-1000253, CVSSv2 Score: 7.8
- Description:
fs/binfmt_elf.c: fix bug in loading of PIE binaries
- CVE: https://access.redhat.com/security/cve/cve-2017-1000253
- Patch: 2.6.32/fs-binfmt_elfc-fix-bug-in-loading-of-pie-binaries.patch
- From: >2.6.32-696.10.2.el6
- CVE-2017-7541, CVSSv2 Score: 6.8
- Description:
netdv: brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
- CVE: https://access.redhat.com/security/cve/CVE-2017-7541
- Patch: 2.6.32/netdv-brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80211_mgmt_tx.patch
- From: 2.6.32-696.13.2.el6
- CVE-2017-7308, CVSSv2 Score: 7
- Description:
net/packet: fix overflow in check for tp_reserve
- CVE: https://access.redhat.com/security/cve/cve-2017-7308
- Patch: 2.6.32/net-packet-fix-overflow-in-check-for-tp_reserve.patch
- From: >kernel-2.6.32-696.6.3.el6
- CVE-2017-1000111, CVSSv2 Score: unknown
- Description:
net-packet: fix race in packet_set_ring on PACKET_RESERVE
- CVE: http://seclists.org/oss-sec/2017/q3/279
- Patch: 2.6.32/CVE-2017-1000111.patch
- From: >kernel-2.6.32-696.6.3.el6
- CVE-2017-1000112, CVSSv2 Score: unknown
- Description:
udp: consistently apply ufo or fragmentation
- CVE: http://seclists.org/oss-sec/2017/q3/277
- Patch: 2.6.32/CVE-2017-1000112-before-696.patch
- From: >2.6.32-696.6.3.el6
- CVE-2017-14106, CVSSv2 Score: 5.5
- Description:
tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0
- CVE: https://access.redhat.com/security/cve/CVE-2017-14106
- Patch: 2.6.32/tcp-initialize-rcv_mss-to-TCP_MIN_MSS-instead-of-0.patch
- From: vzkernel-2.6.32-042stab124.2
- CVE-2016-8633, CVSSv2 Score: 6.8
- Description:
firewire: net: guard against rx buffer overflows
- CVE: https://access.redhat.com/security/cve/CVE-2016-8633
- Patch: 2.6.32/CVE-2016-8633.patch
- From: >kernel-2.6.32-696.13.2.el6
- CVE-2017-5754, CVSSv2 Score: 7.9
- Description:
add kernel page table isolation feature(aka KAISER)
- CVE: https://access.redhat.com/security/cve/cve-2017-5754
- Patch: 2.6.32/kcpti.patch
- From: 2.6.32-696.18.7.el6
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: check present flag when removing global pte flag
- CVE: N/A
- Patch: 2.6.32/kcpti-respect-present-flag-during-kcpti_remove_page_.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: ignore AMD processors
- CVE: N/A
- Patch: 2.6.32/kcpti-ignore-AMD-processors.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: apply patch to Xen PV domains
- CVE: N/A
- Patch: 2.6.32/kcpti-apply-patch-to-Xen-PV-domains.patch
- From: N/A
- CVE-2017-16939, CVSSv2 Score: 6.2
- Description:
ipsec: Fix aborted xfrm policy dump crash (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2017-16939
- Patch: 2.6.32/ipsec-Fix-aborted-xfrm-policy-dump-crash.patch
- From: vzkernel-2.6.32-042stab126.2
- CVE-2017-5753, CVSSv2 Score: 8.2
- Description:
spectre: prevent speculative execution
- CVE: https://access.redhat.com/security/cve/CVE-2017-5753
- Patch: 2.6.32/CVE-2017-5753-642.patch
- From: 2.6.32-696.18.7.el6
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 2.6.32/kcpti-rework-patching-of-paranoid_exit.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 2.6.32/kcpti-fix-use-after-free-in-kcpti_exit_pre.patch
- From: N/A
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: Prevent overrun when parsing v6 header options
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-Prevent-overrun-when-parsing-v6-header-options.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: Check ip6_find_1stfragopt() return value properly.
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-Check-ip6_find_1stfragopt-return-value-properly.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt()
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-xfrm-Handle-errors-reported-by-xfrm6_find_1stfragopt.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
gre: fix a possible skb leak
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-gre-fix-a-possible-skb-leak.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: Fix leak in ipv6_gso_segment().
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-Fix-leak-in-ipv6_gso_segment.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-7542, CVSSv2 Score: 5.5
- Description:
ipv6: avoid overflow of offset in ip6_find_1stfragopt
- CVE: https://access.redhat.com/security/cve/CVE-2017-7542
- Patch: 2.6.32/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-7542, CVSSv2 Score: 5.5
- Description:
ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
- CVE: https://access.redhat.com/security/cve/cve-2017-7542
- Patch: 2.6.32/net-ipv6-accept-64k-1-packet-length-in-ip6_find_1stfragopt.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-11176, CVSSv2 Score: 7.8
- Description:
mqueue: fix a use-after-free in sys_mq_notify()
- CVE: https://access.redhat.com/security/cve/cve-2017-11176
- Patch: 2.6.32/kernel-mqueue-fix-a-use-after-free-in-sys_mq_notify.patch
- From: 2.6.32-696.20.1.el6
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 2.6.32/kcpti-fix-patch-during-cr3-switch.patch
- From: N/A
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] microcode: Share native MSR accessing variants
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0001-x86-microcode-Share-native-MSR-accessing-variants.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] cpuid: Cleanup cpuid_regs definitions
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0002-x86-cpuid-Cleanup-cpuid_regs-definitions.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] cpuid: Provide get_scattered_cpuid_leaf()
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0003-x86-cpuid-Provide-get_scattered_cpuid_leaf.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] feature: Enable the x86 feature to control Speculation
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0004-x86-feature-Enable-the-x86-feature-to-control-Specul.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] feature: Report presence of IBPB and IBRS control
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0005-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0006-x86-cpu-AMD-Control-indirect-branch-predictor-when-S.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] [kvm] Pad RSB on VM transition
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0007-x86-kvm-Pad-RSB-on-VM-transition.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] x86: clear registers on VM exit
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0008-kvm-x86-clear-registers-on-VM-exit.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] vmx: Set IBPB when running a different VCPU
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0009-kvm-vmx-Set-IBPB-when-running-a-different-VCPU.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0010-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0011-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0012-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] x86: add SPEC_CTRL to MSR and CPUID lists
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0013-kvm-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] enter: MACROS to set/clear IBRS and set IBPB
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0014-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0015-x86-spec_ctrl-use-per-cpu-knob-instead-of-ALTERNATIV.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: swap rdx with rsi for nmi nesting detection
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0016-x86-spec_ctrl-swap-rdx-with-rsi-for-nmi-nesting-dete.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] enter: Use IBRS on syscall and interrupts
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0017-x86-enter-Use-IBRS-on-syscall-and-interrupts.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: save IBRS MSR value in save_paranoid for NMI
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0018-x86-spec_ctrl-save-IBRS-MSR-value-in-save_paranoid-f.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: implement spec ctrl C methods
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0019-x86-spec_ctrl-implement-spec-ctrl-C-methods.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] idle: Disable IBRS entering idle and enable it on wakeup
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0020-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] idle: Disable IBRS when offlining cpu and re-enable
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0021-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] mm: Set IBPB upon context switch
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0022-x86-mm-Set-IBPB-upon-context-switch.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] mm: Only set IBPB when the new thread cannot ptrace
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0023-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Stuff RSB for entry to kernel for non-SMEP platform
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0024-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Remove STUFF_RSB in error and interrupt code
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0025-x86-entry-Remove-STUFF_RSB-in-error-and-interrupt-co.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: move stuff_RSB in spec_ctrl.h
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0026-x86-spec_ctrl-move-stuff_RSB-in-spec_ctrl.h.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] KVM/spec_ctrl: allow IBRS to stay enabled in host userland
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0027-x86-KVM-spec_ctrl-allow-IBRS-to-stay-enabled-in-host.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] Remove __cpuinitdata from some data & function
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0028-x86-Remove-__cpuinitdata-from-some-data-function.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: consolidate the spec control boot detection
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0029-x86-spec_ctrl-consolidate-the-spec-control-boot-dete.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: add debugfs ibrs_enabled ibpb_enabled
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0030-x86-spec_ctrl-add-debugfs-ibrs_enabled-ibpb_enabled.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: rescan cpuid after a late microcode update
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0031-x86-spec_ctrl-rescan-cpuid-after-a-late-microcode-up.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] syscall: Clear unused extra registers on 32-bit compatible syscall entrance
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0032-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: add noibrs noibpb boot options
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0033-x86-spec_ctrl-add-noibrs-noibpb-boot-options.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: Prevent unwanted speculation without IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0034-x86-spec_ctrl-Prevent-unwanted-speculation-without-I.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: reload spec_ctrl cpuid in all microcode load paths
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0035-x86-spec_ctrl-reload-spec_ctrl-cpuid-in-all-microcod.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Fix 32-bit program crash with 64-bit kernel on AMD boxes
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0036-x86-entry-Fix-32-bit-program-crash-with-64-bit-kerne.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Add back STUFF_RSB to interrupt and error paths
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0037-x86-entry-Add-back-STUFF_RSB-to-interrupt-and-error-.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: ibrs_enabled() is expected to return > 1
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0038-x86-spec_ctrl-ibrs_enabled-is-expected-to-return-1.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0039-x86-spec_ctrl-always-initialize-save_reg-in-ENABLE_I.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: allow the IBP disable feature to be toggled at runtime
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0040-x86-spec_ctrl-allow-the-IBP-disable-feature-to-be-to.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: use IBRS_ENABLED instead of 1
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0041-x86-spec_ctrl-use-IBRS_ENABLED-instead-of-1.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0042-x86-spec_ctrl-set-IBRS-during-CPU-init-if-in-ibrs_en.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0043-x86-spec_ctrl-cleanup-s-flush-sync-naming-when-sendi.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0044-x86-spec_ctrl-introduce-SPEC_CTRL_PCP_ONLY_IBPB.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0045-x86-spec_ctrl-introduce-ibpb_enabled-2-for-IBPB-inst.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0046-x86-spec_ctrl-undo-speculation-barrier-for-ibrs_enab.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: use enum when setting ibrs/ibpb_enabled
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0047-x86-spec_ctrl-use-enum-when-setting-ibrs-ibpb_enable.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: remove irqs_disabled() check from intel_idle()
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0048-x86-spec_ctrl-remove-irqs_disabled-check-from-intel_.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0049-x86-spec_ctrl-allow-use_ibp_disable-only-if-both-SPE.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0050-x86-spec_ctrl-set-IBRS-during-resume-from-RAM-if-ibr.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: skip IBRS/CR3 restore when paranoid exception returns to userland
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0051-x86-spec_ctrl-skip-IBRS-CR3-restore-when-paranoid-ex.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: disable ibrs while in intel_idle()
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0052-x86-spec_ctrl-disable-ibrs-while-in-intel_idle.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: skip CAP_SYS_PTRACE check to skip audit
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0053-x86-spec_ctrl-skip-CAP_SYS_PTRACE-check-to-skip-audi.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: enable IBRS and stuff_RSB before calling NMI C code
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0054-x86-spec_ctrl-enable-IBRS-and-stuff_RSB-before-calli.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: Eliminate redundnat FEATURE Not Present messages
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0055-x86-spec_ctrl-Eliminate-redundnat-FEATURE-Not-Presen.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0056-x86-spec_ctrl-svm-spec_ctrl-at-vmexit-needs-per-cpu-.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: show added cpuid flags in /proc/cpuinfo after late microcode update
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0057-x86-spec_ctrl-show-added-cpuid-flags-in-proc-cpuinfo.patch
- From: kernel-2.6.32-696.20.1.el6
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: rhel-common/x86-cpu-intel-Introduce-macros-for-Intel-family-numb.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: rhel-common/x86-cpu-intel-Add-Knights-Mill-to-Intel-family.patch
- From: N/A
- CVE-2017-7645, CVSSv2 Score: 7.5
- Description:
nfsd: check for oversized NFSv2/v3 arguments
- CVE: https://access.redhat.com/security/cve/CVE-2017-7645
- Patch: 2.6.32/nfsd-check-for-oversized-NFSv2-v3-arguments.patch
- From: kernel-3.10.0-514.26.1.el7
- CVE-2017-18017, CVSSv2 Score: 6.5
- Description:
netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
- CVE: https://access.redhat.com/security/cve/cve-2017-18017
- Patch: 2.6.32/cve-2017-18017-netfilter-xt_TCPMSS-add-more-sanity-checks.patch
- From: 2.6.32-696.28.1.el6
- CVE-2017-1000410, CVSSv2 Score: 5.0
- Description:
bluetooth: Prevent stack info leak from the EFS element.
- CVE: https://access.redhat.com/security/cve/cve-2017-1000410
- Patch: 2.6.32/bluetooth-prevent-stack-info-leak-from-the-efs-element-ver2-pre-696.10.2.patch
- From: 2.6.32-696.28.1.el6
- CVE-2017-13166, CVSSv2 Score: 4.6
- Description:
media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic
- CVE: https://access.redhat.com/security/cve/cve-2017-13166
- Patch: 2.6.32/v4l-media-refactor-compat-ioctl32-logic.patch
- From: 2.6.32-696.28.1.el6
- CVE-2017-13166, CVSSv2 Score: 4.6
- Description:
media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic fixup
- CVE: https://access.redhat.com/security/cve/cve-2017-13166
- Patch: 2.6.32/v4l-media-refactor-compat-ioctl32-logic-fixup.patch
- From: 2.6.32-696.28.1.el6
- CVE-2018-3639, CVSSv2 Score: 5.6
- Description:
Spectre v4 (store by-passing) mitigation.
- CVE: https://access.redhat.com/security/cve/CVE-2018-3639
- Patch: 2.6.32/cve-2018-3639-spectre4-mitigation.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2012-6701, CVSSv2 Score: 3.6
- Description:
make AIO use the proper rw_verify_area() area helpers
- CVE: https://access.redhat.com/security/cve/CVE-2012-6701
- Patch: 2.6.32/cve-2012-6701-make-AIO-use-the-proper-rw_verify_area-helpers.patch
- From: kernel-2.6.32-754.el6
- CVE-2016-8650, CVSSv2 Score: 4.9
- Description:
mpi - Fix NULL ptr dereference in mpi_powm()
- CVE: https://access.redhat.com/security/cve/CVE-2016-8650
- Patch: 2.6.32/cve-2016-8650-parsing-certain-certificates-triggers-NULL-ptr-dereference.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-2671, CVSSv2 Score: 7.8
- Description:
ping - implement proper locking
- CVE: https://access.redhat.com/security/cve/CVE-2017-2671
- Patch: 2.6.32/cve-2017-2671-ping-implement-proper-locking.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-7889, CVSSv2 Score: 7.8
- Description:
mm - tighten x86 /dev/mem with zeroing reads
- CVE: https://access.redhat.com/security/cve/CVE-2017-7889
- Patch: 2.6.32/cve-2017-7889-tighten-x86-dev-mem-with-zeroing-reads.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-8890, CVSSv2 Score: 6.5
- Description:
dccp/tcp - do not inherit mc_list from parent
- CVE: https://access.redhat.com/security/cve/CVE-2017-8890
- Patch: 2.6.32/cve-2017-8890-net-do-not-inherit-mc-from-parent.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-9075, CVSSv2 Score: 6.5
- Description:
sctp - do not inherit ipv6_{mc|ac|fl}_list from parent
- CVE: https://access.redhat.com/security/cve/CVE-2017-9075
- Patch: 2.6.32/cve-2017-9075-sctp-do-not-inherit-ipv6-mcast-from-parent.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-9076, CVSSv2 Score: i 6.5
- Description:
ipv6/dccp - do not inherit ipv6_mc_list from parent
- CVE: https://access.redhat.com/security/cve/CVE-2017-9076
- Patch: 2.6.32/cve-2017-9076-do-not-inherit-mc_list-from-parent.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-12190, CVSSv2 Score: 6.2
- Description:
fix unbalanced page refcounting in bio_map_user_iov
- CVE: https://access.redhat.com/security/cve/CVE-2017-12190
- Patch: 2.6.32/cve-2017-12190-fix-unbalanced-page-refcounting.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-12190, CVSSv2 Score: 6.9
- Description:
more bio_map_user_iov() leak fixes
- CVE: https://access.redhat.com/security/cve/CVE-2017-12190
- Patch: 2.6.32/cve-2017-12190-more-bio_map_user_iov-leak-fixes.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-15121, CVSSv2 Score: 5.5
- Description:
mm - teach truncate_inode_pages_range() to handle non page aligned ranges
- CVE: https://access.redhat.com/security/cve/CVE-2017-15121
- Patch: 2.6.32/cve-2017-15121-mm-teach-truncate_inode_pages_range-to-handle-non-page-aligned-ranges.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-18203, CVSSv2 Score: 4.7
- Description:
dm: fix race between dm_get_from_kobject() and __dm_destroy()
- CVE: https://access.redhat.com/security/cve/CVE-2017-18203
- Patch: 2.6.32/cve-2017-18203-fix-race-between-dm_get_from_kobject-and-dm_destroy.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-1130, CVSSv2 Score: 5.5
- Description:
dccp - check sk for closed state in dccp_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2018-1130
- Patch: 2.6.32/cve-2018-1130-dccp-check-sk-for-closed-state.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-5803, CVSSv2 Score: 5.5
- Description:
sctp - verify size of a new chunk in _sctp_make_chunk()
- CVE: https://access.redhat.com/security/cve/CVE-2018-5803
- Patch: 2.6.32/cve-2018-5803-sctp-verify-size-of-a-new-chunk-in-sctp_make_chunk.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-7566, CVSSv2 Score: 6.1
- Description:
ALSA: seq: Fix racy pool initializations
- CVE: https://access.redhat.com/security/cve/cve-2018-7566
- Patch: 2.6.32/cve-2018-7566-alsa-seq-fix-racy-pool-init.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-10675, CVSSv2 Score: 5.5
- Description:
fix for use-after-free bug via crafted system calls in mm/mempolicy.c:do_get_mempolicy()
- CVE: https://access.redhat.com/security/cve/cve-2018-10675
- Patch: 2.6.32/CVE-2018-10675.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack
- CVE: https://access.redhat.com/security/cve/CVE-2018-8897
- Patch: 2.6.32/x86-entry-64-Don-t-use-IST-entry-for-BP-stack.patch
- From: 2.6.32-696.28.1.el6
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2018-8897
- Patch: 2.6.32/x86-entry-64-Don-t-use-IST-entry-for-BP-stack-kpatch-1.patch
- From: 2.6.32-696.28.1.el6
- CVE-2018-3693, CVSSv2 Score: 5.5
- Description:
prevents spectre v1 by sanitizing pointers from user-space and syscall numbers, \
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 2.6.32/cve-2018-3693-no-spec-on-user-input.patch
- From: kernel-2.6.32-754.2.1.el6
- CVE-2018-3693, CVSSv2 Score: 5.5
- Description:
addresses CVE-2018-3693 for 32bit processes.
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 2.6.32/cve-2018-3693-32bit.patch
- From: kernel-2.6.32-754.2.1.el6
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 2.6.32/CVE-2018-3646-CVE-2018-3620-smt_disable.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 2.6.32/CVE-2018-3646-l1tf-cpu-setup.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-3646, CVSSv2 Score: 5.6
- Description:
Add ability to flush l1d cache on vmexit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 2.6.32/CVE-2018-3646-vmx-l1d-flush.patch
- From: 2.6.32-754.3.5.el6
- CVE-2017-15265, CVSSv2 Score: 5.5
- Description:
[sound] alsa: seq: Fix use-after-free at creating a port
- CVE: https://access.redhat.com/security/cve/CVE-2017-15265
- Patch: 2.6.32/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch
- From: 2.6.32-754.3.5.el6
- CVE-2017-0861, CVSSv2 Score: 7
- Description:
[sound] alsa: pcm: prevent UAF in snd_pcm_info (CVE-2017-0861)
- CVE: https://access.redhat.com/security/cve/CVE-2017-0861
- Patch: 2.6.32/sound-alsa-pcm-prevent-UAF-in-snd_pcm_info-CVE-2017-0861.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-10901, CVSSv2 Score: 7.8
- Description:
[kvm] VMX: Fix host GDT.LIMIT corruption (CVE-2018-10301)
- CVE: https://access.redhat.com/security/cve/CVE-2018-10901
- Patch: 2.6.32/kvm-VMX-Fix-host-GDT-LIMIT-corruption-CVE-2018-10301.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-10901, CVSSv2 Score: 7.8
- Description:
[kvm] VMX: Fix host GDT.LIMIT corruption (CVE-2018-10301) (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2018-10901
- Patch: 2.6.32/kvm-VMX-Fix-host-GDT-LIMIT-corruption-CVE-2018-10301-696.16.1-kpatch-1.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
[net] tcp: avoid collapses in tcp_prune_queue() if possible
- CVE: https://access.redhat.com/security/cve/CVE-2018-5390
- Patch: 2.6.32/CVE-2018-5390-0001-net-tcp-avoid-collapses-in-tcp_prune_queue-if-possible.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
[net] tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- CVE: https://access.redhat.com/security/cve/CVE-2018-5390
- Patch: 2.6.32/CVE-2018-5390-0002-net-tcp-detect-malicious-patterns-in-tcp_collapse_ofo_queue.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-14634, CVSSv2 Score: 7.8
- Description:
Limit arg stack to at most 75% of _STK_LIM
- CVE: https://access.redhat.com/security/cve/cve-2018-14634
- Patch: 2.6.32/limit-stack-arg-to-75-percent-of_STK_LIM.patch
- From: >kernel-2.6.32-754.3.5.el6
- CVE-2018-5391, CVSSv2 Score: 7.5
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: https://access.redhat.com/security/cve/cve-2018-5391
- Patch: 2.6.32/Revert-net-increase-fragment-memory-usage-limits.patch
- From: >2.6.32-754.3.5.el6
- CVE-2018-5391, CVSSv2 Score: 7.5
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: https://access.redhat.com/security/cve/cve-2018-5391
- Patch: 2.6.32/Revert-net-increase-fragment-memory-usage-limits-kpatch-1.patch
- From: >v2.6.32-754.3.5.el6
- CVE-2015-6937, CVSSv2 Score: 7.1
- Description:
RDS: verify the underlying transport exists before creating a connection
- CVE: https://access.redhat.com/security/cve/cve-2015-6937
- Patch: 2.6.32/rds-verify-the-underlying-transport-exists-before-creating-a.patch
- From: vzkernel-2.6.32-042stab112.15
- CVE-2015-7990, CVSSv2 Score: 7.1
- Description:
Complete earlier incomplete fix to CVE-2015-6937
- CVE: https://access.redhat.com/security/cve/CVE-2015-7990
- Patch: 2.6.32/fix-incomplete-CVE-2015-6937.patch
- From: >vzkernel-2.6.32-042stab112.15
- CVE-2015-8539, CVSSv2 Score: 7.2
- Description:
KEYS: Fix handling of stored error in a negatively instantiated user key
- CVE: https://access.redhat.com/security/cve/CVE-2015-8539
- Patch: 2.6.32/KEYS-Fix-handling-of-stored-error-in-a-negatively-in.patch
- From: >kernel-2.6.32-642.13.1.el6
- CVE-2017-7472, CVSSv2 Score: 5.5
- Description:
keyctl_set_reqkey_keyring() leaks thread keyrings
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 2.6.32/CVE-2017-7472.patch
- From: vzkernel-2.6.32-042stab123.2
- CVE-2017-15274, CVSSv2 Score: 5.5
- Description:
KEYS: fix dereferencing NULL payload with nonzero length
- CVE: https://access.redhat.com/security/cve/cve-2017-15274
- Patch: 2.6.32/keys-fix-dereferencing-null-payload-with-nonzero-length.patch
- From: 2.6.32-042stab125.5
- CVE-2017-8824, CVSSv2 Score: 7.8
- Description:
dccp: fix use-after-free (CVE-2017-8824)
- CVE: https://access.redhat.com/security/cve/cve-2017-8824
- Patch: 2.6.32/dccp-fix-use-after-free.patch
- From: kernel-2.6.32-773.26.1.lve1.4.46.el6
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 2.6.32/cve-2018-10902.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 3.10.0/CVE-2018-10902-ALSA-rawmidi-shange-resize-buffers-atomically-2-pre-514.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2019-11190, CVSSv2 Score: 4.7
- Description:
binfmt_elf: switch to new creds when switching to new mm
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11190
- Patch: 2.6.32/CVE-2019-11190.patch
- From: >4.8
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
zombieload mitigation
- CVE: https://access.redhat.com/security/cve/cve-2018-12126 https://access.redhat.com/security/cve/cve-2018-12130 https://access.redhat.com/security/cve/cve-2018-12127
- Patch: 2.6.32/zombieload-mitigation-696.16.1.patch
- From: 2.6.32-754.14.2.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: limit payload size of sacked skbs
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/cve-2019-11477-limit-payload-size-of-sacked-bits.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-11478, CVSSv2 Score: 5.3
- Description:
tcp: tcp_fragment() should apply sane memory limits
- CVE: https://access.redhat.com/security/cve/cve-2019-11478
- Patch: 2.6.32/cve-2019-11478-tcp_fragments-to-apply-sane-memlims.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-11479, CVSSv2 Score: 5.3
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://access.redhat.com/security/cve/cve-2019-11479
- Patch: 2.6.32/cve-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From: kernel-2.6.32-754.15.3.el6
- N/A, CVSSv2 Score: N/A
- Description:
kpatch adaptation - sysctl handle for minimal MSS
- CVE: N/A
- Patch: 2.6.32/cve-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing-kpatch-2.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: limit payload size of sacked skbs
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/cve-2019-11477-move-mss-below.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-3896, CVSSv2 Score: 7.0
- Description:
idr: fix backtrack logic in idr_remove_all
- CVE: https://access.redhat.com/security/cve/cve-2019-3896
- Patch: 2.6.32/cve-2019-3896-fix-backtrack-logic-in-idr_remove_all.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-3896, CVSSv2 Score: 7.0
- Description:
idr: fix top layer handling
- CVE: https://access.redhat.com/security/cve/cve-2019-3896
- Patch: 2.6.32/cve-2019-3896-idr-fix-top-layer-handling.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
[net] tcp: pass previous skb to tcp_shifted_skb()
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/cve-2019-11477-tcp_pass_previous_skb_to_tcp_shifted_skb-754.patch
- From: 3.10.0-957.21.3.el7
- CVE-2017-17805, CVSSv2 Score: 5.5
- Description:
[crypto] salsa20 - fix blkcipher_walk API usage
- CVE: https://access.redhat.com/security/cve/CVE-2017-17805
- Patch: 2.6.32/crypto-salsa20-fix-blkcipher_walk-API-usage.patch
- From: 2.6.32-754.18.2.el6
- CVE-2019-5489, CVSSv2 Score: 7.1
- Description:
[mm] mincore.c: make mincore() more conservative
- CVE: https://access.redhat.com/security/cve/CVE-2019-5489
- Patch: 2.6.32/mm-mincore.c-make-mincore-more-conservative.patch
- From: 2.6.32-754.18.2.el6
- CVE-2018-17972, CVSSv2 Score: 3.3
- Description:
[fs] proc: restrict kernel stack dumps to root
- CVE: https://access.redhat.com/security/cve/CVE-2018-17972
- Patch: 2.6.32/proc-restrict-kernel-stack-dumps-to-root.patch
- From: 2.6.32-754.18.2.el6
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
[x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- CVE: https://access.redhat.com/security/cve/CVE-2019-1125
- Patch: 2.6.32/x86-speculation-Prepare-entry-code-for-Spectre-v1-sw-696.16.1.patch
- From: 2.6.32-754.18.2.el6
- N/A, CVSSv2 Score:
- Description:
map kpatch code that patch .entry.text section code
- CVE:
- Patch: 2.6.32/kpatch_map_kaiser_kp_text-kcpti.patch
- From:
- CVE-2018-9568, CVSSv2 Score: 7
- Description:
net: Set sk_prot_creator when cloning sockets to the right proto
- CVE: https://access.redhat.com/security/cve/cve-2018-9568
- Patch: 2.6.32/CVE-2018-9568-el6.patch
- From: 2.6.32-754.22.1.el6
- CVE-2019-11810, CVSSv2 Score: 6.2
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 2.6.32/CVE-2019-11810.patch
- From: kernel-2.6.32-754.22.1.el6
- CVE-2019-14835, CVSSv2 Score: 7.2
- Description:
host: make sure log_num < in_num
- CVE: https://access.redhat.com/security/cve/CVE-2019-14835
- Patch: 2.6.32/CVE-2019-14835-vhost-make-sure-log_num-in_num.patch
- From: >2.6.32-754.22.1.el6
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 2.6.32/CVE-2018-12207-mitigation.patch
- From: kernel-2.6.32-754.23.1.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [1/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1171-drm-drm-i915-gtt-Add-read-only-pages-to-gen8_pte_enc.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [2/13] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1172-drm-erm-i915-gtt-Read-only-pages-for-insert_entries-.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [3/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1173-drm-drm-i915-gtt-Disable-read-only-support-under-GVT.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [4/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1174-drm-drm-i915-Rename-gen7-cmdparser-tables.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [5/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1175-drm-drm-i915-Disable-Secure-Batches-for-gen6.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [6/13] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1176-drm-drm-i915-Remove-Master-tables-from-cmdparser.patch
- From: 2.6.32-754.24.3.el6
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 2.6.32/i915/0324-drm-i915-skl-Fix-rc6-based-gpu-system-hang.patch
- From: N/A
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [7/13] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1177-drm-drm-i915-Add-support-for-mandatory-cmdparsing.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [8/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1178-drm-drm-i915-Support-ro-ppgtt-mapped-cmdparser-shado.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [9/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1179-drm-drm-i915-Allow-parsing-of-unsized-batches.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [10/13] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1180-drm-drm-i915-Add-gen9-BCS-cmdparsing.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [11/13] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1181-drm-drm-i915-cmdparser-Add-support-for-backward-jump.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [12/13] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1182-drm-drm-i915-cmdparser-Ignore-Length-operands-during.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0154, CVSSv2 Score: 6.5
- Description:
fixed possible hw level crash if MMIO registers were read while the i915 GPU was in a low-power state [1/2] (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-0154
- Patch: 2.6.32/i915/1183-drm-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-0154, CVSSv2 Score: 6.5
- Description:
fixed possible hw level crash if MMIO registers were read while the i915 GPU was in a low-power state [2/2]
- CVE: https://access.redhat.com/security/cve/cve-2019-0154
- Patch: 2.6.32/i915/1184-drm-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hang.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
introduce vhost_exceeds_weight() (adaptation for CVE-2019-3900 dependency)
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 2.6.32/cve-2019-3900-vhost.patch
- From:
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
fix possible infinite loop in drivers/vhost/net.c (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 2.6.32/cve-2019-3900-net.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption or privilege escalation for i915 gpu [13/13]
- CVE: https://access.redhat.com/security/cve/cve-2019-0155
- Patch: 2.6.32/i915/1195-drm-drm-i915-cmdparser-Fix-jump-whitelist-clearing-le-754.23.1.patch
- From: 2.6.32-754.24.3.el6
- CVE-2019-14821, CVSSv2 Score: 7.0
- Description:
KVM: MMIO: Lock coalesced device when checking for available entry
- CVE: https://access.redhat.com/security/cve/cve-2019-14821
- Patch: 2.6.32/CVE-2019-14821-1.patch
- From: 2.6.32-754.25.1.el6
- CVE-2019-14821, CVSSv2 Score: 7.0
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://access.redhat.com/security/cve/cve-2019-14821
- Patch: 2.6.32/CVE-2019-14821-2.patch
- From: 2.6.32-754.25.1.el6
- CVE-2019-17055, CVSSv2 Score: 3.3
- Description:
mISDN: enforce CAP_NET_RAW for raw sockets
- CVE: https://linux.oracle.com/cve/CVE-2019-17055.html
- Patch: 2.6.32/CVE-2019-17055.patch
- From: 2.6.39-400.317.1.el6uek
- CVE-2019-17133, CVSSv2 Score: 8.8
- Description:
cfg80211: wext: avoid copying malformed SSIDs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17133
- Patch: 2.6.32/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID.patch
- From: kernel-2.6.32-754.28.1.el6
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: cope with NULL catmap
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 2.6.32/CVE-2020-10711.patch
- From: kernel-2.6.32-754.29.2.el6
- CVE-2017-12192, CVSSv2 Score: 5.5
- Description:
keys: prevent KEYCTL_READ on negative key
- CVE: https://access.redhat.com/security/cve/CVE-2017-12192
- Patch: 3.10.0/security-keys-prevent-KEYCTL_READ-on-negative-key.patch
- From: 3.10.0-693.17.1.el7
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2020-11565, CVSSv2 Score: 7.8
- Description:
mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-11565
- Patch: 2.6.32/cve-2020-11565-mempolicy-require-at-least-one-nodeid.patch
- From: kernel-2.6.32-754.29.1.el6
- CVE-2020-10942, CVSSv2 Score: 5.3
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://access.redhat.com/security/cve/cve-2020-10942
- Patch: 2.6.32/cve-2020-10942-vhost-check-docket-sk_family.patch
- From: kernel-2.6.32-754.29.1.el6
- CVE-2019-14897 CVE-2019-14896, CVSSv2 Score: 9.8
- Description:
more overflows in marvell wifi driver
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14896
- Patch: 2.6.32/cve-2019-14896-14897-fix-two-buffer-overflows-at-parsing-bss-desc.patch
- From: kernel-2.6.32-754.33.1
- CVE-2017-2647, CVSSv2 Score: 1.9
- Description:
kernel: Null pointer dereference in search_keyring
- CVE: https://access.redhat.com/security/cve/CVE-2017-2647
- Patch: 2.6.32/kernel-Null-pointer-dereference-in-search_keyring.patch
- From: vzkernel-2.6.32-042stab120.20
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
prevent page refcount overflow
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 2.6.32/cve-2019-11487.patch
- From: kernel-2.6.32-754.35.1.el6
- CVE-2014-4508, CVSSv2 Score:
- Description:
Out of scope as the patch is for x86_32 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2014-4508.patch
- From:
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 2.6.32/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sys.patch
- From: 2.6.32-754.35.3.el6
- CVE-2021-27364 CVE-2021-27363, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://access.redhat.com/security/cve/cve-2021-27364
- Patch: 2.6.32/CVE-2021-27363-CVE-2021-27364-scsi-iscsi-Restrict-sessions-and-handles-to-admin-ca.patch
- From: 2.6.32-754.35.3.el6
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Verify lengths on passthrough PDU
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 2.6.32/CVE-2021-27365-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: 2.6.32-754.35.3.el6
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 2.6.32/CVE-2021-27365-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PA.patch
- From: 2.6.32-754.35.3.el6
- CVE-2020-29661, CVSSv2 Score: 7.8
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29661
- Patch: 2.6.32/CVE-2020-29661-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 2.6.32-754.39.1
- CVE-2021-20265, CVSSv2 Score: 5.1
- Description:
af_unix: fix struct pid memory leak
- CVE: https://access.redhat.com/security/cve/cve-2021-20265
- Patch: 2.6.32/CVE-2021-20265-0001-af_unix-fix-struct-pid-memory-leak.patch
- From: 2.6.32-754.39.1.el6
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 2.6.32/CVE-2021-22555.patch
- From: v5.12
- CVE-2020-12362, CVSSv2 Score:
- Description:
Mitigation is made with intel firmware update, el8 kernels also need 'i915.enable_guc' specified in cmdline to be affected
- CVE:
- Patch: skipped/CVE-2020-12362.patch
- From:
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 2.6.32/CVE-2021-3347-futex-Handle-faults-correctly-for-PI-futexes.patch
- From: >2.6.32-754.35.1
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 2.6.32/CVE-2021-3347-futex-Provide-and-use-pi_state_update_owner.patch
- From: >2.6.32-754.35.1
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - use memdup_user() to duplicate memory from user-space
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 2.6.32/CVE-2021-3612-1-Input-joydev-use-memdup_user-to-duplicate.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - fix possible ERR_PTR() dereferencing
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 2.6.32/CVE-2021-3612-2-Input-joydev-fix-possible-ERR_PTR-derefer.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent potential read overflow in ioctl
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 2.6.32/CVE-2021-3612-3-Input-joydev-prevent-potential-read-overf.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent use of not validated data in JSIOCSBTNMAP ioctl
- CVE: https://access.redhat.com/security/cve/cve-2021-3612
- Patch: 2.6.32/CVE-2021-3612-4-Input-joydev-prevent-use-of.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-28972, CVSSv2 Score: 6.7
- Description:
PCI: rpadlpar: Fix potential drc_name corruption in store functions
- CVE: https://access.redhat.com/security/cve/cve-2021-28972
- Patch: 2.6.32/CVE-2021-28972-PCI-rpadlpar-Fix-potential.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3178, CVSSv2 Score: 5.7
- Description:
nfsd: make local functions static
- CVE: https://access.redhat.com/security/cve/cve-2021-3178
- Patch: 2.6.32/CVE-2021-3178-1-nfsd-make-local-functions-static.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3178, CVSSv2 Score: 5.7
- Description:
nfsd: make local functions static
- CVE: https://access.redhat.com/security/cve/cve-2021-3178
- Patch: 2.6.32/CVE-2021-3178-1-nfsd-make-local-functions-static-kpatch.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3178, CVSSv2 Score: 5.7
- Description:
nfsd: fix compose_entry_fh() failure exits
- CVE: https://access.redhat.com/security/cve/cve-2021-3178
- Patch: 2.6.32/CVE-2021-3178-2-nfsd-fix-compose_entry_fh-failure-exits.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3178, CVSSv2 Score: 5.7
- Description:
nfsd4: readdirplus shouldn't return parent of export
- CVE: https://access.redhat.com/security/cve/cve-2021-3178
- Patch: 2.6.32/CVE-2021-3178-3-nfsd4-readdirplus-shouldn-t.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-38205, CVSSv2 Score: 3.3
- Description:
net: xilinx_emaclite: Do not print real IOMEM pointer
- CVE: https://access.redhat.com/security/cve/cve-2021-38205
- Patch: 2.6.32/CVE-2021-38205-net-xilinx_emaclite-Do-not.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
hso: fix a use after free condition
- CVE: https://access.redhat.com/security/cve/cve-2021-37159
- Patch: 2.6.32/CVE-2021-37159-hso-fix-a-use-after-free-c.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition
- CVE: https://access.redhat.com/security/cve/cve-2021-21299
- Patch: 2.6.32/CVE-2021-32399-bluetooth-eliminate-the-po.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-3573, CVSSv2 Score: 6.7
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/cve-2021-3573
- Patch: 2.6.32/CVE-2021-3573-Bluetooth-use-correct-lock-.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://access.redhat.com/security/cve/cve-2021-38160
- Patch: 2.6.32/CVE-2021-38160-2-virtio_console-Assure-used.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-34693, CVSSv2 Score: 4.0
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://access.redhat.com/security/cve/cve-2021-34693
- Patch: 2.6.32/CVE-2021-34693-can-bcm-fix-infoleak-in-st.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Put a lock around every call to the rdma_cm layer
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1201-RDMA-ucma-Put-a-lock-around-every-call-to-the-rdma_cm_layer.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: n/a
- Description:
RDMA/ucma: Put a lock around every call to the rdma_cm layer (adaptation)
- CVE: n/a
- Patch: 2.6.32/CVE-2020-36385-1201-RDMA-ucma-Put-a-lock-around-every-call-to-the-rdma_cm_layer-kpatch.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1202-RDMA-ucma-Add-missing-locking-to-rdma_accept.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1203-RDMA-ucma-Fix-the-locking-of-ctx-file.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1205-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-with.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
epoll: Keep a reference on files added to the check list
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 2.6.32/CVE-2020-0466-epoll-Keep-a-reference-on-files-added-to-the-check.patch
- From: 2.6.32-754.35.1.el6
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 2.6.32/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 2.6.32-754.35.1.el6
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 3.10.0/CVE-2021-0920-kpatch.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 2.6.32/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 2.6.32-754.35.8.el6
- CVE-2022-0492, CVSSv2 Score: 7.8
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0492
- Patch: 2.6.32/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 2.6.32-754.35.1.el6
- CVE-2022-0492, CVSSv2 Score: 7.8
- Description:
cgroup-v1: Require capabilities to set release_agent (adaptation)
- CVE: n/a
- Patch: 2.6.32/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent-kpatch.patch
- From: 2.6.32-754.35.1.el6
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://access.redhat.com/security/cve/cve-2021-22543
- Patch: 2.6.32/CVE-2021-22543-KVM-do-not-allow-mapping-valid-but-non-reference-co.patch
- From: 2.6.32-754.48.1.el6
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 2.6.32/CVE-2022-4378-0001-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 2.6.32-754.50.1.el6
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 2.6.32/CVE-2022-4378-0002-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 2.6.32-754.50.1.el6
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://access.redhat.com/security/cve/CVE-2023-3611
- Patch: rhel6/kernel-2.6.32-754.53.1.el6/CVE-2023-3611.patch
- From: kernel-2.6.32-754.53.1.el6
- CVE-2023-3776, CVSSv2 Score: 7.0
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2023-3776
- Patch: rhel6/kernel-2.6.32-754.53.1.el6/CVE-2023-3776.patch
- From: kernel-2.6.32-754.53.1.el6
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://access.redhat.com/security/cve/CVE-2023-4921
- Patch: rhel6/kernel-2.6.32-754.53.1.el6/CVE-2023-4921.patch
- From: kernel-2.6.32-754.53.1.el6
- CVE-2023-31436, CVSSv2 Score: 7.0
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in
- CVE: https://access.redhat.com/security/cve/CVE-2023-31436
- Patch: rhel6/kernel-2.6.32-754.53.1.el6/CVE-2023-31436.patch
- From: kernel-2.6.32-754.53.1.el6
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://access.redhat.com/security/cve/cve-2024-53104
- Patch: rhel6/kernel-2.6.32-754.55.1.el6/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 2.6.32-754.55.1.el6
- N/A, CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 2.6.32/proc-restrict-pagemap-access.patch
- From:
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 2.6.32/kpatch-add-paravirt-asm-definitions-696.16.1.patch
- From: N/A
- N/A, CVSSv2 Score:
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 2.6.32/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 2.6.32/ignore_do_signal.patch
- From: N/A