- linux-4.19.289-2 (debian10-cloud)
- 4.19.304-1
- 2024-04-17 13:03:23
- 2024-04-23 08:04:49
- K20240417_03
- CVE-2023-25775, CVSSv2 Score: 5.6
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-25775
- Patch: debian10/4.19.304-1/CVE-2023-25775-patch-rdma-irdma-prevent-zero-length-stag-registration.patch
- From: 4.19.304-1
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-45871
- Patch: debian10/4.19.304-1/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 4.19.304-1
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-45871
- Patch: debian10/4.19.304-1/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 4.19.304-1
- CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-4206
- Patch: debian10/4.19.304-1/CVE-2023-4206-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.19.304-1
- CVE-2023-4207, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-4207
- Patch: debian10/4.19.304-1/CVE-2023-4207-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.19.304-1
- CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-4208
- Patch: debian10/4.19.304-1/CVE-2023-4208-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.19.304-1
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-4623
- Patch: debian10/4.19.304-1/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 4.19.304-1
- CVE-2023-51781, CVSSv2 Score: 7.8
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-51781
- Patch: debian10/4.19.304-1/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 4.19.304-1
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-3611
- Patch: debian10/4.19.304-1/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 4.19.304-1
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6931
- Patch: debian10/4.19.304-1/CVE-2023-6931-patch-perf-fix-perf-event-validate-size.patch
- From: 4.19.304-1
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6931
- Patch: debian10/4.19.304-1/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 4.19.304-1
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-42753
- Patch: debian10/4.19.304-1/CVE-2023-42753-patch-netfilter-ipset-add-the-missing-ip-set-hash-with-net0-macro.patch
- From: 4.19.304-1
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6932
- Patch: debian10/4.19.304-1/CVE-2023-6932-patch-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query.patch
- From: 4.19.304-1
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-5717
- Patch: debian10/4.19.304-1/CVE-2023-5717-patch-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 4.19.304-1
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-5717
- Patch: debian10/4.19.304-1/CVE-2023-5717-patch-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 4.19.304-1
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.15.0/kpatch-add-alt-asm-definitions-269.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.19.0/proc-restrict-pagemap-access.patch
- From: