- kernel-uek-5.4.17-2136.329.3.1.el7uek (oel7-uek6)
- 5.4.17-2136.335.4.el7uek
- 2024-09-21 12:34:43
- 2024-10-03 12:50:04
- K20240921_02
- CVE-2024-1086, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel8-uek6/5.4.17-2136.329.3.2.el8uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
- From: 5.4.17-2136.329.3.2
- CVE-2024-0340, CVSSv2 Score: 4.4
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://linux.oracle.com/cve/CVE-2024-0340.html
- Patch: oel8-uek6/5.4.17-2136.330.7.1.el8uek/CVE-2024-0340-vhost-use-kzalloc-instead-of-kmalloc-followed-by-memset.patch
- From: 5.4.17-2136.330.7.1
- CVE-2024-0607, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://linux.oracle.com/cve/CVE-2024-0607.html
- Patch: oel8-uek6/5.4.17-2136.330.7.1.el8uek/CVE-2024-0607-nf_tables-fix-pointer-math-issue-in-nft_byteorder_eval.patch
- From: 5.4.17-2136.330.7.1
- N/A, CVSSv2 Score: N/A
- Description:
kpatch: entry: add asm headers
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-entry-add-asm-headers.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alternative2 asm definition
- CVE: https://www.kernel.org
- Patch: 5.4.0/kpatch-add-alt2-asm-definitions.patch
- From: N/A
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://ubuntu.com/security/CVE-2024-2201
- Patch: 5.4.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-5.4.patch
- From: kernel-uek-5.4.17-2136.330.7.1.el8uek
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41090
- Patch: 5.15.0/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 5.15.0/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-208.159.3.2
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://linux.oracle.com/cve/CVE-2024-36971.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36971-net-fix-__dst_negative_advice-race.patch
- From: 5.4.17-2136.334.6
- CVE-2024-38583, CVSSv2 Score:
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-36015, CVSSv2 Score: 5.5
- Description:
ppdev: Add an error check in register_device
- CVE: https://linux.oracle.com/cve/CVE-2024-36015.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36015-ppdev-add-an-error-check-in-register-device-5.4.17-2136.333.5.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38582, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential hang in nilfs_detach_log_writer()
- CVE: https://linux.oracle.com/cve/CVE-2024-38582.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38582-nilfs2-fix-potential-hang-in-nilfs-detach-log-writer-5.4.17-2136.333.5.1.el8uek.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39480, CVSSv2 Score: 7.8
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://linux.oracle.com/cve/CVE-2024-39480.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39480-kdb-Fix-buffer-overflow-during-tab-complete.patch
- From: 5.4.17-2136.334.6
- CVE-2024-38612, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix invalid unregister error path
- CVE: https://linux.oracle.com/cve/CVE-2024-38612.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38612-ipv6-sr-fix-invalid-unregister-error-path-2136.330.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36016, CVSSv2 Score: 6.4
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://linux.oracle.com/cve/CVE-2024-36016.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38598, CVSSv2 Score: 5.5
- Description:
md: fix resync softlockup when bitmap size is less than array
- CVE: https://linux.oracle.com/cve/CVE-2024-38598.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38598-md-fix-resync-softlockup-when-bitmap-size-is-less-than-array.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://linux.oracle.com/cve/CVE-2024-38579.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38599, CVSSv2 Score: 5.5
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://linux.oracle.com/cve/CVE-2024-38599.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38567, CVSSv2 Score: 5.5
- Description:
wifi: carl9170: add a proper sanity check for endpoints
- CVE: https://linux.oracle.com/cve/CVE-2024-38567.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38567-wifi-carl9170-add-a-proper-sanity-check-for-endpoints.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38549, CVSSv2 Score: 5.5
- Description:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
- CVE: https://linux.oracle.com/cve/CVE-2024-38549.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38549-drm-mediatek-add-0-size-check-to-mtk-drm-gem-obj.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36014, CVSSv2 Score: 5.5
- Description:
drm/arm/malidp: fix a possible null pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-36014.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36014-drm-arm-malidp-fix-a-possible-null-pointer-dereference.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38633, CVSSv2 Score: 5.5
- Description:
serial: max3100: Update uart_driver_registered on driver
- CVE: https://linux.oracle.com/cve/CVE-2024-38633.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38633-serial-max3100-update-uart-driver-registered-on-driver.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://linux.oracle.com/cve/CVE-2024-36286.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38659, CVSSv2 Score: 5.5
- Description:
enic: Validate length of nl attributes in enic_set_vf_port
- CVE: https://linux.oracle.com/cve/CVE-2024-38659.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38659-enic-validate-length-of-nl-attributes-in-enic-set-vf-port.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38661, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38661.patch
- From:
- CVE-2024-35976, CVSSv2 Score: 5.5
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://linux.oracle.com/cve/CVE-2024-35976.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38552, CVSSv2 Score: 4.4
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://linux.oracle.com/cve/CVE-2024-38552.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38560, CVSSv2 Score: 5.1
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://linux.oracle.com/cve/CVE-2024-38560.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38596, CVSSv2 Score: 4.7
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-38596.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38596-af-unix-fix-data-races-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38637, CVSSv2 Score: 4.4
- Description:
greybus: lights: check return of get_channel_from_mode
- CVE: https://linux.oracle.com/cve/CVE-2024-38637.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38637-greybus-lights-check-return-of-get-channel-from-mode.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37353, CVSSv2 Score: 4.4
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://linux.oracle.com/cve/CVE-2024-37353.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when-request-irq.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38618, CVSSv2 Score: 4.4
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://linux.oracle.com/cve/CVE-2024-38618.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39503, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix race between namespace cleanup and gc
- CVE: https://linux.oracle.com/cve/CVE-2024-39503.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39503-netfilter-ipset-fix-race-between-namespace-cleanup-and-gc.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39503, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix race between namespace cleanup and gc
- CVE: https://linux.oracle.com/cve/CVE-2024-39503.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39503-netfilter-ipset-fix-race-between-namespace-cleanup-and-gc-kpatch.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://linux.oracle.com/cve/CVE-2024-37356.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-37356, CVSSv2 Score: 6.6
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://linux.oracle.com/cve/CVE-2024-37356.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha-kpatch.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38565, CVSSv2 Score: 5.5
- Description:
wifi: ar5523: enable proper endpoint verification
- CVE: https://linux.oracle.com/cve/CVE-2024-38565.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38565-wifi-ar5523-enable-proper-endpoint-verification.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38578, CVSSv2 Score: 5.5
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://linux.oracle.com/cve/CVE-2024-38578.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38601, CVSSv2 Score: 5.5
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://linux.oracle.com/cve/CVE-2024-38601.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38634, CVSSv2 Score: 5.5
- Description:
serial: max3100: Lock port->lock when calling
- CVE: https://linux.oracle.com/cve/CVE-2024-38634.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38634-serial-max3100-lock-port-lock-when-calling.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39276, CVSSv2 Score: 5.5
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in
- CVE: https://linux.oracle.com/cve/CVE-2024-39276.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39467, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on i_xattr_nid in
- CVE: https://linux.oracle.com/cve/CVE-2024-39467.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://linux.oracle.com/cve/CVE-2024-39471.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39488, CVSSv2 Score:
- Description:
ARM related CVE.
- CVE:
- Patch: skipped/CVE-2024-39488.patch
- From:
- CVE-2024-33621, CVSSv2 Score: 4.4
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://linux.oracle.com/cve/CVE-2024-33621.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix gss_free_in_token_pages()
- CVE: https://linux.oracle.com/cve/CVE-2024-36288.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36288-sunrpc-fix-gss_free_in_token_pages.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
- CVE: https://linux.oracle.com/cve/CVE-2024-36288.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36288-sunrpc-fix-loop-termination-condition-in.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://linux.oracle.com/cve/CVE-2024-36270.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled-on-the.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://linux.oracle.com/cve/CVE-2024-38558.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38559, CVSSv2 Score: 4.4
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://linux.oracle.com/cve/CVE-2024-38559.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38635, CVSSv2 Score:
- Description:
soundwire: Skipped as code which CVE fixes doesn't exists in older releaes
- CVE:
- Patch: skipped/CVE-2024-38635.patch
- From:
- CVE-2024-39301, CVSSv2 Score: 5.5
- Description:
net/9p: fix uninit-value in p9_client_rpc()
- CVE: https://linux.oracle.com/cve/CVE-2024-39301.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39301-net-9p-fix-uninit-value-in-p9-client-rpc.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38615, CVSSv2 Score: 5.5
- Description:
cpufreq: exit() callback is optional
- CVE: https://linux.oracle.com/cve/CVE-2024-38615.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38613, CVSSv2 Score:
- Description:
Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38613.patch
- From:
- CVE-2024-38589, CVSSv2 Score: 5.5
- Description:
netrom: fix possible dead-lock in nr_rt_ioctl()
- CVE: https://linux.oracle.com/cve/CVE-2024-38589.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38589-netrom-fix-possible-dead-lock-in-nr-rt-ioctl.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38627, CVSSv2 Score: 5.5
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-38627.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39292, CVSSv2 Score:
- Description:
User Mode Linux patch
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-38621, CVSSv2 Score: 5.5
- Description:
media: stk1160: fix bounds checking in stk1160_copy_video()
- CVE: https://linux.oracle.com/cve/CVE-2024-38621.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38621-media-stk1160-fix-bounds-checking-in-stk1160-copy-video.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-39489, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix memleak in seg6_hmac_init_algo
- CVE: https://linux.oracle.com/cve/CVE-2024-39489.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-39489-ipv6-sr-fix-memleak-in-seg6-hmac-init-algo.patch
- From: 5.4.17-2136.334.6.el8uek
- CVE-2024-38780, CVSSv2 Score: 5.5
- Description:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
- CVE: https://linux.oracle.com/cve/CVE-2024-38780.html
- Patch: oel8-uek6/5.4.17-2136.334.6.el8uek/CVE-2024-38780-dma-buf-sw-sync-don-t-enable-irq-from-sync-print-obj.patch
- From: 5.4.17-2136.334.6.el8uek
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 5.4.17/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A