- kernel-2.6.32-458.6.2.lve1.2.28.el6 (cl6)
- 2.6.32-954.3.5.lve1.4.87.el6
- 2022-08-31 03:55:53
- 2022-09-01 08:24:46
- K20220831_03
- CVE-2013-1935, CVSSv2 Score: 5.7
- Description:
kernel: kvm: pv_eoi guest updates with interrupts disabled
- CVE: https://access.redhat.com/security/cve/CVE-2013-1935
- Patch: 2.6.32/virt-kvm-fix-copy-to-user-with-irq-disabled.patch
- From: kernel-2.6.32-358-11.1.el6
- CVE-2013-1943, CVSSv2 Score: 6.9
- Description:
kernel: kvm: missing check in kvm_set_memory_region()
- CVE: https://access.redhat.com/security/cve/CVE-2013-1943
- Patch: 2.6.32/virt-kvm-validate-userspace_addr-of-memslot.patch
- From: kernel-2.6.32-358-11.1.el6
- CVE-2013-2017, CVSSv2 Score: 5.4
- Description:
kernel: veth: double-free flaw in case of congestion
- CVE: https://access.redhat.com/security/cve/CVE-2013-2017
- Patch: 2.6.32/net-veth-Dont-kfree_skb-after-dev_forward_skb.patch
- From: kernel-2.6.32-358-11.1.el6
- CVE-2013-2188, CVSSv2 Score: 4.7
- Description:
kernel: fs: filp leak on ro filesystem
- CVE: https://access.redhat.com/security/cve/CVE-2013-2188
- Patch: 2.6.32/fs-defer-do_filp_open-access-checks-to-may_open-kernel-2.6.32-458-lve.patch
- From: kernel-2.6.32-358-11.1.el6
- CVE-2012-6548, CVSSv2 Score: 1.9
- Description:
Kernel: udf: information leak on export
- CVE: https://access.redhat.com/security/cve/CVE-2012-6548
- Patch: 2.6.32/fs-udf-avoid-info-leak-on-export.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-0914, CVSSv2 Score: 2.1
- Description:
Kernel: sa_restorer information leak
- CVE: https://access.redhat.com/security/cve/CVE-2013-0914
- Patch: 2.6.32/kernel-signal-always-clear-sa_restorer-on-execve.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-1848, CVSSv2 Score: 6
- Description:
kernel: ext3: format string issues
- CVE: https://access.redhat.com/security/cve/CVE-2013-1848
- Patch: 2.6.32/fs-ext3-Fix-format-string-issues.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-2128, CVSSv2 Score: 4.9
- Description:
Kernel: net: oops from tcp_collapse() when using splice(2)
- CVE: https://access.redhat.com/security/cve/CVE-2013-2128
- Patch: 2.6.32/net-tcp-Fix-oops-from-tcp_collapse-when-using-splice.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-2634, CVSSv2 Score: 1.9
- Description:
kernel: Information leak in the Data Center Bridging (DCB) component
- CVE: https://access.redhat.com/security/cve/CVE-2013-2634
- Patch: 2.6.32/net-dcbnl-fix-various-netlink-info-leaks.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-2634, CVSSv2 Score: 1.9
- Description:
kernel: Information leak in the Data Center Bridging (DCB) component
- CVE: https://access.redhat.com/security/cve/CVE-2013-2634
- Patch: 2.6.32/net-rtnl-fix-info-leak-on-RTM_GETLINK-request-for-VF-devices.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-2852, CVSSv2 Score: 6
- Description:
kernel: b43: format string leaking into error msgs
- CVE: https://access.redhat.com/security/cve/CVE-2013-2852
- Patch: 2.6.32/wireless-b43-stop-format-string-leaking-into-error-msgs.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3222, CVSSv2 Score: 2.1
- Description:
Kernel: atm: update msg_namelen in vcc_recvmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2013-3222
- Patch: 2.6.32/net-atm-update-msg_namelen-in-vcc_recvmsg.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3224, CVSSv2 Score: 1.9
- Description:
Kernel: Bluetooth: possible info leak in bt_sock_recvmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2013-3224
- Patch: 2.6.32/net-bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3225, CVSSv2 Score: 1.9
- Description:
Kernel: Bluetooth: RFCOMM - missing msg_namelen update in rfcomm_sock_recvmsg
- CVE: https://access.redhat.com/security/cve/CVE-2013-3225
- Patch: 2.6.32/net-bluetooth-rfcomm-Fix-missing-msg_namelen-update-in-rfcomm_sock_recvmsg.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3301, CVSSv2 Score: 4.4
- Description:
Kernel: tracing: NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2013-3301
- Patch: 2.6.32/kernel-tracing-Fix-possible-NULL-pointer-dereferences.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3301, CVSSv2 Score: 4.4
- Description:
Kernel: tracing: NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2013-3301
- Patch: 2.6.32/kernel-tracing-Fix-possible-NULL-pointer-dereferences.kpatch-1.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3301, CVSSv2 Score: 4.4
- Description:
Kernel: tracing: NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2013-3301
- Patch: 2.6.32/kernel-tracing-Fix-panic-when-lseek-called-on-trace-opened-for-writing.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2013-3301, CVSSv2 Score: 4.4
- Description:
Kernel: tracing: NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2013-3301
- Patch: 2.6.32/kernel-tracing-Fix-panic-when-lseek-called-on-trace-opened-for-writing.kpatch-1.patch
- From: kernel-2.6.32-358-14.1.el6
- CVE-2012-6544, CVSSv2 Score: 2.1
- Description:
Kernel: Bluetooth: HCI & L2CAP information leaks
- CVE: https://access.redhat.com/security/cve/CVE-2012-6544
- Patch: 2.6.32/bluetooth-HCI-Fix-info-leak-in-getsockopt.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2012-6544, CVSSv2 Score: 2.1
- Description:
Kernel: Bluetooth: HCI & L2CAP information leaks
- CVE: https://access.redhat.com/security/cve/CVE-2012-6544
- Patch: 2.6.32/bluetooth-L2CAP-Fix-info-leak-via-getsockname.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2013-2146, CVSSv2 Score: 4.7
- Description:
Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB
- CVE: https://access.redhat.com/security/cve/CVE-2013-2146
- Patch: 2.6.32/x86-perf-x86-Fix-offcore_rsp-valid-mask-for-SNB-IVB.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2013-2146, CVSSv2 Score: 4.7
- Description:
Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB
- CVE: https://access.redhat.com/security/cve/CVE-2013-2146
- Patch: 2.6.32/x86-perf-x86-Fix-offcore_rsp-valid-mask-for-SNB-IVB.kpatch-1.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2013-2206, CVSSv2 Score: 5.4
- Description:
kernel: sctp: duplicate cookie handling NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/CVE-2013-2206
- Patch: 2.6.32/net-sctp-Use-correct-sideffect-command-in-duplicate-cookie-handling.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2013-2232, CVSSv2 Score: 6.2
- Description:
Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg
- CVE: https://access.redhat.com/security/cve/CVE-2013-2232
- Patch: 2.6.32/net-ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2013-2237, CVSSv2 Score: 1.7
- Description:
Kernel: net: af_key: initialize satype in key_notify_policy_flush
- CVE: https://access.redhat.com/security/cve/CVE-2013-2237
- Patch: 2.6.32/net-af_key-initialize-satype-in-key_notify_policy_flush.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2013-4162, CVSSv2 Score: 4.9
- Description:
Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK
- CVE: https://access.redhat.com/security/cve/CVE-2013-4162
- Patch: 2.6.32/net-ipv6-call-udp_push_pending_frames-when-uncorking-a-socket-with-AF_INET-pending-data.patch
- From: kernel-2.6.32-358.23.2.el6
- CVE-2013-4299, CVSSv2 Score: 4.3
- Description:
kernel: dm: dm-snapshot data leak
- CVE: https://access.redhat.com/security/cve/CVE-2013-4299
- Patch: 2.6.32/md-dm-snapshot-fix-data-corruption.patch
- From: kernel-2.6.32-358.23.2.el6
- CVE-2013-2141, CVSSv2 Score: 2.1
- Description:
Kernel: signal: information leak in tkill/tgkill
- CVE: https://access.redhat.com/security/cve/CVE-2013-2141
- Patch: 2.6.32/kernel-signal-stop-info-leak-via-the-tkill-and-the-tgkill-syscalls.patch
- From: kernel-2.6.32-431.1.2.el6
- CVE-2013-4470, CVSSv2 Score: 7.2
- Description:
Kernel: net: memory corruption with UDP_CORK and UFO
- CVE: https://access.redhat.com/security/cve/CVE-2013-4470
- Patch: 2.6.32/net-ip_output-do-skb-ufo-init-for-peeked-non-ufo-skb-as-well.patch
- From: kernel-2.6.32-431.1.2.el6
- CVE-2012-6542, CVSSv2 Score: 1.9
- Description:
Kernel: llc: information leak via getsockname
- CVE: https://access.redhat.com/security/cve/CVE-2012-6542
- Patch: 2.6.32/net-llc-fix-info-leak-via-getsockname.patch
- From: kernel-2.6.32-431.el6
- CVE-2012-6545, CVSSv2 Score: 2.1
- Description:
Kernel: Bluetooth: RFCOMM - information leak
- CVE: https://access.redhat.com/security/cve/CVE-2012-6545
- Patch: 2.6.32/bluetooth-rfcomm-Fix-info-leak-via-getsockname.patch
- From: kernel-2.6.32-431.el6
- CVE-2012-6545, CVSSv2 Score: 2.1
- Description:
Kernel: Bluetooth: RFCOMM - information leak
- CVE: https://access.redhat.com/security/cve/CVE-2012-6545
- Patch: 2.6.32/bluetooth-rfcomm-Fix-info-leak-in-RFCOMMGETDEVLIST-ioctl.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-0343, CVSSv2 Score: 3.2
- Description:
kernel: handling of IPv6 temporary addresses
- CVE: https://access.redhat.com/security/cve/CVE-2013-0343
- Patch: 2.6.32/for-279/net-ipv6-prevent-race-between-address-creation-and-removal.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-0343, CVSSv2 Score: 3.2
- Description:
kernel: handling of IPv6 temporary addresses
- CVE: https://access.redhat.com/security/cve/CVE-2013-0343
- Patch: 2.6.32/net-ipv6-remove-max_addresses-check-from-ipv6_create_tempaddr.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-1928, CVSSv2 Score: 1.7
- Description:
Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE
- CVE: https://access.redhat.com/security/cve/CVE-2013-1928
- Patch: 2.6.32/fs-compat_ioctl-VIDEO_SET_SPU_PALETTE-missing-error-check.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-1929, CVSSv2 Score: 6.2
- Description:
Kernel: tg3: buffer overflow in VPD firmware parsing
- CVE: https://access.redhat.com/security/cve/CVE-2013-1929
- Patch: 2.6.32/netdrv-tg3-fix-length-overflow-in-VPD-firmware-parsing.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2164, CVSSv2 Score: 1
- Description:
Kernel: information leak in cdrom driver
- CVE: https://access.redhat.com/security/cve/CVE-2013-2164
- Patch: 2.6.32/cdrom-use-kzalloc-for-failing-hardware.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2851, CVSSv2 Score: 6
- Description:
kernel: block: passing disk names as format strings
- CVE: https://access.redhat.com/security/cve/CVE-2013-2851
- Patch: 2.6.32/block-do-not-pass-disk-names-as-format-strings.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2234, CVSSv2 Score: 1.7
- Description:
Kernel: net: information leak in AF_KEY notify
- CVE: https://access.redhat.com/security/cve/CVE-2013-2234
- Patch: 2.6.32/net-af_key-fix-info-leaks-in-notify-messages.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2888, CVSSv2 Score: 6.2
- Description:
Kernel: HID: memory corruption flaw
- CVE: https://access.redhat.com/security/cve/CVE-2013-2888
- Patch: 2.6.32/hid-validate-HID-report-id-size.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2889, CVSSv2 Score: 6.2
- Description:
Kernel: HID: zeroplus: heap overflow flaw
- CVE: https://access.redhat.com/security/cve/CVE-2013-2889
- Patch: 2.6.32/hid-provide-a-helper-for-validating-hid-reports.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2889, CVSSv2 Score: 6.2
- Description:
Kernel: HID: zeroplus: heap overflow flaw
- CVE: https://access.redhat.com/security/cve/CVE-2013-2889
- Patch: 2.6.32/hid-zeroplus-validate-output-report-details.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-3231, CVSSv2 Score: 2.1
- Description:
Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg
- CVE: https://access.redhat.com/security/cve/CVE-2013-3231
- Patch: 2.6.32/net-llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-4345, CVSSv2 Score: 2.6
- Description:
kernel: ansi_cprng: off by one error in non-block size request
- CVE: https://access.redhat.com/security/cve/CVE-2013-4345
- Patch: 2.6.32/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-size-request.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-4387, CVSSv2 Score: 6.1
- Description:
Kernel: net: IPv6: panic when UFO=On for an interface
- CVE: https://access.redhat.com/security/cve/CVE-2013-4387
- Patch: 2.6.32/net-ipv6-udp-packets-following-an-UFO-enqueued-packet-need-also-be-handled-by-UFO.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-4591, CVSSv2 Score: 6.2
- Description:
kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached
- CVE: https://access.redhat.com/security/cve/CVE-2013-4591
- Patch: 2.6.32/fs-nfs-Check-for-buffer-length-in-__nfs4_get_acl_uncached.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-2892, CVSSv2 Score: 6.2
- Description:
Kernel: HID: pantherlord: heap overflow flaw
- CVE: https://access.redhat.com/security/cve/CVE-2013-2892
- Patch: 2.6.32/hid-pantherlord-heap-overflow-flaw.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-4592, CVSSv2 Score: 4
- Description:
kernel: kvm: memory leak when memory slot is moved with assigned device
- CVE: https://access.redhat.com/security/cve/CVE-2013-4592
- Patch: 2.6.32/virt-kvm-perform-an-invalid-memslot-step-for-gpa-base-change.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-4592, CVSSv2 Score: 4
- Description:
kernel: kvm: memory leak when memory slot is moved with assigned device
- CVE: https://access.redhat.com/security/cve/CVE-2013-4592
- Patch: 2.6.32/virt-kvm-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch
- From: kernel-2.6.32-431.el6
- CVE-2013-4470, CVSSv2 Score: 7.2
- Description:
Kernel: net: memory corruption with UDP_CORK and UFO
- CVE: https://access.redhat.com/security/cve/CVE-2013-4470
- Patch: 2.6.32/net-ip6_output-do-skb-ufo-init-for-peeked-non-ufo-skb-as-well.patch
- From: kernel-2.6.32-431.1.2.el6
- CVE-2013-6367, CVSSv2 Score: 5.2
- Description:
kvm: division by zero in apic_get_tmcct()
- CVE: https://access.redhat.com/security/cve/CVE-2013-6367
- Patch: 2.6.32/x86-kvm-fix-division-by-zero-in-apic_get_tmcct.patch
- From: kernel-2.6.32-431.1.2.el6
- CVE-2013-6368, CVSSv2 Score: 6.2
- Description:
kvm: cross page vapic_addr access
- CVE: https://access.redhat.com/security/cve/CVE-2013-6368
- Patch: 2.6.32/x86-kvm-fix-cross-page-vapic_addr-access.kpatch-1.patch
- From: kernel-2.6.32-431.1.2.el6
- CVE-2014-2523, CVSSv2 Score: 7.6
- Description:
netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
- CVE: https://access.redhat.com/security/cve/CVE-2014-2523
- Patch: 2.6.32/nf-conntrack-dccp-CVE-2014-2523
- From: >kernel-2.6.32-431.11.2.el6
- Description:
Add x86_match_cpu missed on earlier rhel6 kernels.
- CVE:
- Patch: 2.6.32/x86-match-cpu-358.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/net-af_netlink-Add-needed-scm_destroy-after-scm_send.patch
- From:
- CVE-2013-7263, CVE-2013-7265, CVSSv2 Score: 2.1
- Description:
inet: prevent leakage of uninitialized memory to user in recv syscalls
- CVE: https://access.redhat.com/security/cve/CVE-2013-7263
- Patch: 2.6.32/inet-prevent-leakage-of-uninitialized-memory-to-user-in-recv-syscalls.kpatch-1.patch
- From: kernel-2.6.32-431.5.1.el6
- CVE-2013-7263, CVE-2013-7265, CVSSv2 Score: 2.1
- Description:
inet: fix addr_len/msg->msg_namelen assignment in recv_error functions
- CVE: https://access.redhat.com/security/cve/CVE-2013-7263
- Patch: 2.6.32/for-358/inet-fix-addr_len-msg-msg_namelen-assignment-in-recv_error-and-rxpmtu-functions.kpatch-1.patch
- From: kernel-2.6.32-431.5.1.el6
- CVE-2013-2929, CVSSv2 Score: 1.9
- Description:
kernel: exec/ptrace: get_dumpable() incorrect tests
- CVE: https://access.redhat.com/security/cve/CVE-2013-2929
- Patch: 2.6.32/for-279/kernel-exec-ptrace-get_dumpable-incorrect-tests.kpatch-ovz1.patch
- From: kernel-2.6.32-431.5.1.el6
- CVE-2013-6381, CVSSv2 Score: 6.2
- Description:
Kernel: qeth: buffer overflow in snmp ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2013-6381
- Patch: 2.6.32/kernel-qeth-buffer-overflow-in-snmp-ioctl.kpatch-1.patch
- From: kernel-2.6.32-431.5.1.el6
- CVE-2013-4588, CVSSv2 Score: 6.6
- Description:
ipvs: Add boundary check on ioctl arguments
- CVE: https://access.redhat.com/security/cve/CVE-2013-4588
- Patch: 2.6.32/net-ipvs-Add-boundary-check-on-ioctl-arguments.patch
- From: kernel-2.6.32-431.5.1.el6
- CVE-2013-6405, CVSSv2 Score: 2.1
- Description:
ipv6: fix leaking uninitialized port number of offender sockaddr
- CVE: https://access.redhat.com/security/cve/CVE-2013-6405
- Patch: 2.6.32/net-ipv6-fix-leaking-uninitialized-port-number-of-offender-sockaddr.patch
- From: kernel-2.6.32-431.5.1.el6
- CVE-2013-1860, CVSSv2 Score: 6.9
- Description:
usb: cdc-wdm: Fix race between autosuspend and reading from the device
- CVE: https://access.redhat.com/security/cve/CVE-2013-1860
- Patch: 2.6.32/usb-cdc-wdm-Fix-race-between-autosuspend-and-reading-from-the-device.patch
- From: kernel-2.6.32-431.11.2.el6
- CVE-2013-1860, CVSSv2 Score: 6.9
- Description:
usb: cdc-wdm: fix buffer overflow
- CVE: https://access.redhat.com/security/cve/CVE-2013-1860
- Patch: 2.6.32/usb-cdc-wdm-fix-buffer-overflow.patch
- From: kernel-2.6.32-431.11.2.el6
- CVE-2013-7271, CVSSv2 Score: 2.1
- Description:
net: fix memory information leaks in recv protocol handlers
- CVE: https://access.redhat.com/security/cve/CVE-2013-7271
- Patch: 2.6.32/net-fix-memory-information-leaks-in-recv-protocol-handlers.patch
- From: kernel-2.6.32-431.11.2.el6
- Description:
selinux: handle TCP SYN-ACK packets correctly in selinux_ip_output()
- CVE:
- Patch: 2.6.32/security-selinux-handle-TCP-SYN-ACK-packets-correctly-in-selinux_ip_output.patch
- From: kernel-2.6.32-431.11.2.el6
- Description:
selinux: handle TCP SYN-ACK packets correctly in selinux_ip_postroute()
- CVE:
- Patch: 2.6.32/security-selinux-handle-TCP-SYN-ACK-packets-correctly-in-selinux_ip_postroute.patch
- From: kernel-2.6.32-431.11.2.el6
- Description:
selinux: look for IPsec labels on both inbound and outbound packets
- CVE:
- Patch: 2.6.32/security-selinux-look-for-IPsec-labels-on-both-inbound-and-outbound-packets.patch
- From: kernel-2.6.32-431.11.2.el6
- Description:
selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute()
- CVE:
- Patch: 2.6.32/security-selinux-process-labeled-IPsec-TCP-SYN-ACK-packets-properly-in-selinux_ip_postroute.patch
- From: kernel-2.6.32-431.11.2.el6
- Description:
selinux: fix broken peer recv check
- CVE:
- Patch: 2.6.32/security-selinux-fix-broken-peer-recv-check.patch
- From: kernel-2.6.32-431.11.2.el6
- CVE-2014-0055, CVSSv2 Score: 5.2
- Description:
vhost: validate vhost_get_vq_desc return value
- CVE: https://access.redhat.com/security/cve/CVE-2014-0055
- Patch: 2.6.32/vhost-validate-vhost_get_vq_desc-return-value.patch
- From: kernel-2.6.32-431.11.2.el6
- CVE-2014-0101, CVSSv2 Score: 7.1
- Description:
net: sctp: fix sctp_sf_do_5_1D_ce to verify if peer is AUTH capable
- CVE: https://access.redhat.com/security/cve/CVE-2014-0101
- Patch: 2.6.32/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-peer-is-AUTH-capable.patch
- From: kernel-2.6.32-431.11.2.el6
- CVE-2013-6383, CVSSv2 Score: 6.2
- Description:
aacraid: missing capable() check in compat ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2013-6383
- Patch: 2.6.32/aacraid-missing-capable-check-in-compat-ioctl.patch
- From: kernel-2.6.32-431.17.1.el6
- CVE-2014-0077, CVSSv2 Score: 5.5
- Description:
vhost: fix total length when packets are too short
- CVE: https://access.redhat.com/security/cve/CVE-2014-0077
- Patch: 2.6.32/vhost-fix-total-length-when-packets-are-too-short.patch
- From: kernel-2.6.32-431.17.1.el6
- CVE-2012-6657, CVSSv2 Score: 4.4
- Description:
net: guard tcp_set_keepalive() to tcp sockets
- CVE: https://access.redhat.com/security/cve/CVE-2012-6657
- Patch: 2.6.32/net-guard-tcp_set_keepalive-to-tcp-sockets.patch
- From: kernel-2.6.32-504.3.3.el6
- CVE-2014-3153, CVSSv2 Score: 7.2
- Description:
futex: Forbid uaddr == uaddr2 in futex_requeue(..., requeue_pi=1)
- CVE: https://access.redhat.com/security/cve/CVE-2014-3153
- Patch: 2.6.32/futex-prevent-requeue-pi-on-same-futex.patch-futex-F.patch
- From: >kernel-2.6.32-431.17.1.el6
- CVE-2014-3153, CVSSv2 Score: 7.2
- Description:
futex: Validate atomic acquisition in futex_lock_pi_atomic()
- CVE: https://access.redhat.com/security/cve/CVE-2014-3153
- Patch: 2.6.32/futex-Validate-atomic-acquisition-in-futex_lock_pi_a.patch
- From: >kernel-2.6.32-431.17.1.el6
- CVE-2014-3153, CVSSv2 Score: 7.2
- Description:
futex: Always cleanup owner tid in unlock_pi
- CVE: https://access.redhat.com/security/cve/CVE-2014-3153
- Patch: 2.6.32/futex-Always-cleanup-owner-tid-in-unlock_pi.patch
- From: >kernel-2.6.32-431.17.1.el6
- CVE-2014-3153, CVSSv2 Score: 7.2
- Description:
futex: Make lookup_pi_state more robust
- CVE: https://access.redhat.com/security/cve/CVE-2014-3153
- Patch: 2.6.32/futex-Make-lookup_pi_state-more-robust.patch
- From: >kernel-2.6.32-431.17.1.el6
- CVE-2014-4699, CVSSv2 Score: 6.9
- Description:
kernel: ptrace,x86: force IRET path after a ptrace_stop()
- CVE: https://security-tracker.debian.org/tracker/CVE-2014-4699
- Patch: 2.6.32/ptrace-x86-force-IRET-path-after-a-ptrace_stop.patch
- From: >kernel-2.6.32-431.20.3el6
- CVE-2014-0196, CVSSv2 Score: 6.9
- Description:
n_tty: Fix n_tty_write crash when echoing in raw mode
- CVE: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0196
- Patch: 2.6.32/for-279/n_tty-fix-n_tty_write-crash-when-echoing-in-raw-mode.patch
- From: >kernel-2.6.32-431.17.1.el6
- CVE-2014-3144 CVE-2014-3145, CVSSv2 Score: 5.4
- Description:
filter: prevent nla extensions to peek beyond the end of the message
- CVE: https://access.redhat.com/security/cve/CVE-2014-3145
- Patch: 2.6.32/filter-prevent-nla-extensions-to-peek-beyond-the-end-of-the-message.patch
- From: kernel-2.6.32-431.23.3.el6
- CVE-2014-1737, CVSSv2 Score: 7.2
- Description:
floppy: ignore kernel-only members in FDRAWCMD ioctl input
- CVE: https://access.redhat.com/security/cve/CVE-2014-1737
- Patch: 2.6.32/floppy-ignore-kernel-only-members-in-FDRAWCMD-ioctl-input.patch
- From: kernel-2.6.32-431.20.3.el6
- CVE-2014-1738, CVSSv2 Score: 4.9
- Description:
floppy: don't write kernel-only members to FDRAWCMD ioctl output
- CVE: https://access.redhat.com/security/cve/CVE-2014-1738
- Patch: 2.6.32/floppy-dont-write-kernel-only-members-to-FDRAWCMD-ioctl-output.patch
- From: kernel-2.6.32-431.20.3.el6
- CVE-2014-0203, CVSSv2 Score: 4.9
- Description:
fs: slab corruption due to the invalid last component type during do_filp_open()
- CVE: https://access.redhat.com/security/cve/CVE-2014-0203
- Patch: 2.6.32/fs-slab-corruption-due-to-the-invalid-last-component-type-during-do_filp_open.patch
- From: kernel-2.6.32-431.20.3.el6
- CVE-2014-6378, CVSSv2 Score: 4.4
- Description:
libertas: potential oops in debugfs
- CVE: https://access.redhat.com/security/cve/CVE-2014-6378
- Patch: 2.6.32/for-279/libertas-potential-oops-in-debugfs.patch
- From: kernel-2.6.32-431.20.3.el6
- CVE-2014-1874, CVSSv2 Score: 4.4
- Description:
SELinux: Fix kernel BUG on empty security contexts.
- CVE: https://access.redhat.com/security/cve/CVE-2014-1874
- Patch: 2.6.32/selinux-fix-kernel-bug-on-empty-security-contexts.patch
- From: kernel-2.6.32-431.20.3.el6
- CVE-2014-3519, CVSSv2 Score: to-be-assigned
- Description:
Fixed a critical vulnerability in the legacy simfs container filesystem (ploop is not affected)
- CVE: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3519
- Patch: 2.6.32/diff-fixed-critical-vulnerability-in-the-legacy-simfs-container-filesystem
- From: vzkernel-042stab090.5
- Description:
NULL pointer dereference in disk quota subsystem.
- CVE: https://openvz.org/Download/kernel/rhel6/042stab0092.1
- Patch: 2.6.32/diff-NULL-pointer-dereference-in-disk-quota-subsystem.diff
- From: vzkernel-2.6.32-042stab092.1
- Description:
Use-after-free in checkpoint-restore mount failure handling.
- CVE: https://openvz.org/Download/kernel/rhel6/042stab0092.1
- Patch: 2.6.32/diff-use-after-free-in-checkpoint-restore-mount-failure-handling.diff
- From: vzkernel-2.6.32-042stab092.1
- CVE-2014-4943, CVSSv2 Score: 7.2
- Description:
net: l2tp: don't fall back on UDP [get|set]sockopt()
- CVE: https://access.redhat.com/security/cve/CVE-2014-4943
- Patch: 2.6.32/for-279/net-l2tp-dont-fall-back-on-udp-get-set-sockopt.patch
- From:
- CVE-2014-5077, CVSSv2 Score:
- Description:
SCTP: Fix auth_capable inheritence on INIT collision
- CVE: https://access.redhat.com/security/cve/CVE-2014-5077
- Patch: 2.6.32/net-v2-net-sctp-inherit-auth_capable-on-INIT-collisions.patch
- From: >kernel-2.6.32-431.20.5.el6
- CVE-2014-2851, CVSSv2 Score: 6.2
- Description:
ipv4: current group_info should be put after using.
- CVE: https://access.redhat.com/security/cve/CVE-2014-2851
- Patch: 2.6.32/net-ipv4-current-group_info-should-be-put-after-using.patch
- From: kernel-2.6.32-431.23.3.el6
- CVE-2013-7339, CVSSv2 Score: 4.7
- Description:
rds: prevent dereference of a NULL device in rds_ib_laddr_check
- CVE: https://access.redhat.com/security/cve/CVE-2013-7339
- Patch: 2.6.32/rds-prevent-dereference-of-a-null-device-in-rds_ib_laddr_check.patch
- From: kernel-2.6.32-431.23.3.el6
- CVE-2014-2678, CVSSv2 Score: 4.7
- Description:
rds: prevent dereference of a NULL device in rds_iw_laddr_check
- CVE: https://access.redhat.com/security/cve/CVE-2014-2678
- Patch: 2.6.32/rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch
- From: kernel-2.6.32-431.23.3.el6
- CVE-2014-2672, CVSSv2 Score: 5.4
- Description:
ath9k: protect tid->sched check
- CVE: https://access.redhat.com/security/cve/CVE-2014-2672
- Patch: 2.6.32/for-358/ath9k-protect-tid-sched-check.patch
- From: kernel-2.6.32-431.23.3.el6
- CVE-2014-2706, CVSSv2 Score: 5.4
- Description:
mac80211: fix AP powersave TX vs. wakeup race
- CVE: https://access.redhat.com/security/cve/CVE-2014-2706
- Patch: 2.6.32/for-279/mac80211-fix-ap-powersave-tx-vs-wakeup-race.patch
- From: kernel-2.6.32-431.23.3.el6
- CVE-2014-3917, CVSSv2 Score: 4.7
- Description:
auditsc: audit_krule mask accesses need bounds checking
- CVE: https://access.redhat.com/security/cve/CVE-2014-3917
- Patch: 2.6.32/22597-kernel-auditsc-audit_krule-mask-accesses-need-bounds-checking.patch
- From: kernel-2.6.32-431.29.2.el6
- CVE-2014-4667, CVSSv2 Score: 5
- Description:
sctp: Fix sk_ack_backlog wrap-around problem
- CVE: https://access.redhat.com/security/cve/CVE-2014-4667
- Patch: 2.6.32/22575-net-sctp-Fix-sk_ack_backlog-wrap-around-problem.patch
- From: kernel-2.6.32-431.29.2.el6
- CVE-2014-9322, CVSSv2 Score: 7.2
- Description:
x86_64, traps: Stop using IST for #SS
- CVE: https://access.redhat.com/security/cve/CVE-2014-9322
- Patch: 2.6.32/x86_64-traps-Stop-using-IST-for-SS.patch
- From: kernel-2.6.32-504.3.3.el6
- CVE-2014-9322, CVSSv2 Score: 7.2
- Description:
x86_64, traps: Stop using IST for #SS
- CVE: https://access.redhat.com/security/cve/CVE-2014-9322
- Patch: 2.6.32/x86_64-traps-Stop-using-IST-for-SS.kpatch-1.patch
- From: kernel-2.6.32-504.3.3.el6
- CVE-2015-1805, CVSSv2 Score: 6.9
- Description:
kernel: pipe: iovec overrun leading to memory corruption
- CVE: https://access.redhat.com/security/cve/CVE-2015-1805
- Patch: 2.6.32/openvz/CVE-2015-1805.patch
- From: kernel-2.6.32-504.23.4.el6
- CVE-2013-2596, CVSSv2 Score: 6.0
- Description:
vm: add vm_iomap_memory() helper function
- CVE: https://access.redhat.com/security/cve/CVE-2013-2596
- Patch: 2.6.32/27110-mm-add-vm_iomap_memory-helper-function.patch
- From: kernel-2.6.32-504.el6
- CVE-2013-2596, CVSSv2 Score: 6.0
- Description:
vm: convert fb_mmap to vm_iomap_memory() helper
- CVE: https://access.redhat.com/security/cve/CVE-2013-2596
- Patch: 2.6.32/27112-video-fbmem-convert-fb_mmap-to-vm_iomap_memory-helper.patch
- From: kernel-2.6.32-504.el6
- CVE-2014-3122, CVSSv2 Score: 4.9
- Description:
mm: try_to_unmap_cluster() should lock_page() before mlocking
- CVE: https://access.redhat.com/security/cve/CVE-2014-3122
- Patch: 2.6.32/for-279/27113-mm-try_to_unmap_cluster-should-lock_page-before-mlocking-ovz.patch
- From: kernel-2.6.32-504.el6
- CVE-2014-4608, CVSSv2 Score: 6
- Description:
lib/lzo: Update LZO compression to current upstream version
- CVE: https://access.redhat.com/security/cve/CVE-2014-4608
- Patch: 2.6.32/27576-lib-lzo-Update-LZO-compression-to-current-upstream-version.patch
- From: kernel-2.6.32-504.el6
- CVE-2014-4608, CVSSv2 Score: 6
- Description:
lzo: properly check for overruns
- CVE: https://access.redhat.com/security/cve/CVE-2014-4608
- Patch: 2.6.32/27577-lib-lzo-properly-check-for-overruns.patch
- From: kernel-2.6.32-504.el6
- CVE-2014-3611, CVSSv2 Score: 5.5
- Description:
KVM: x86: Improve thread safety in pit
- CVE: https://access.redhat.com/security/cve/CVE-2014-3611
- Patch: 2.6.32/kvm-x86-Improve-thread-safety-in-pit.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-3645 CVE-2014-3646, CVSSv2 Score: 4.7
- Description:
kvm/vmx: handle invept and invvpid vm exits gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2014-3646
- Patch: 2.6.32/for-358/kvm-vmx-handle-invept-and-invvpid-vm-exit-gracefully.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-3645 CVE-2014-3646, CVSSv2 Score: 4.7
- Description:
kvm/vmx: handle invept and invvpid vm exits gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2014-3646
- Patch: 2.6.32/kvm-vmx-handle-invept-and-invvpid-vm-exit-gracefully-279-kpatch-1.patch
- From: kernel-3.10.0-123.9.2.el7
- CVE-2014-3185, CVSSv2 Score: 6.2
- Description:
USB: whiteheat: Added bounds checking for bulk command response
- CVE: https://access.redhat.com/security/cve/CVE-2014-3185
- Patch: 2.6.32/usb-whiteheat-added-bounds-checking-for-bulk-command-response.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-3673, CVSSv2 Score: 7.8
- Description:
net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3673
- Patch: 2.6.32/net-sctp-fix-skb_over_panic-when-receiving-malformed-ASCONF-chunks.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-3687, CVSSv2 Score: 7.8
- Description:
net: sctp: fix panic on duplicate ASCONF chunks
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3687
- Patch: 2.6.32/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-3688, CVSSv2 Score:
- Description:
net: sctp: fix remote memory pressure from excessive queueing
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3688
- Patch: 2.6.32/net-sctp-fix-remote-memory-pressure-from-excessive-queueing.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-7841, CVSSv2 Score:
- Description:
net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7841
- Patch: 2.6.32/net-sctp-fix-NULL-pointer-dereference-in-af-from_addr_param-on-malformed-packet.patch
- From: kernel-2.6.32-504.1.3.el6
- CVE-2014-6410, CVSSv2 Score: 4.9
- Description:
udf: Avoid infinite loop when processing indirect ICBs
- CVE: https://access.redhat.com/security/cve/CVE-2014-6410
- Patch: 2.6.32/udf-avoid-infinite-loop-when-processing-indirect-icbs.patch
- From: kernel-2.6.32-504.3.3.el6
- CVE-2014-5471, CVE-2014-5472, CVSSv2 Score: 6.2
- Description:
isofs: Fix unbounded recursion when processing relocated directories
- CVE: https://access.redhat.com/security/cve/CVE-2014-5472
- Patch: 2.6.32/isofs-fix-unbounded-recursion-when-processing-relocated.patch
- From: kernel-2.6.32-504.3.3.el6
- CVE-2014-4656, CVSSv2 Score: 4.9
- Description:
ALSA: control: Make sure that id->index does not overflow
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4656
- Patch: 2.6.32/alsa-control-Make-sure-that-id->index-does-not-overflow.patch
- From: linux-3.15.2
- CVE-2014-4656, CVSSv2 Score: 4.9
- Description:
ALSA: control: ALSA: control: Handle numid overflow
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4656
- Patch: 2.6.32/alsa-control-Handle-numid-overflow.patch
- From: linux-3.15.2
- CVE-2014-8159, CVSSv2 Score: 6.2
- Description:
kernel: infiniband: uverbs: unprotected physical memory access
- CVE: https://access.redhat.com/security/cve/CVE-2014-8159
- Patch: 2.6.32/kernel-infiniband-uverbs-unprotected-physical-memory-access.patch
- From: kernel-2.6.32-504.12.2.el6
- CVE-2014-7822, CVSSv2 Score: 4.9
- Description:
kernel: splice: lack of generic write checks
- CVE: https://access.redhat.com/security/cve/CVE-2014-7822
- Patch: 2.6.32/kernel-splice-lack-of-generic-write-checks.patch
- From: kernel-2.6.32-504.12.2.el6
- CVE-2014-8160, CVSSv2 Score: 5.8
- Description:
netfilter: conntrack: disable generic tracking for known protocols
- CVE: https://security-tracker.debian.org/tracker/CVE-2014-8160
- Patch: 2.6.32/netfilter-conntrack-disable-generic-tracking-for-kno.patch
- From: kernel-2.6.32-504.12.2.el6
- Description:
- CVE:
- Patch: 2.6.32/openvz/security-Add-PR_-GET-SET-_NO_NEW_PRIVS-to-prevent-execve-from-granting-privs-openvz.patch
- From:
- CVE-2014-3215, CVSSv2 Score: 6.9
- Description:
security: selinux: Permit bounded transitions under NO_NEW_PRIVS or NOSUID
- CVE: https://access.redhat.com/security/cve/CVE-2014-3215
- Patch: 2.6.32/security-selinux-Permit-bounded-transitions-under-NO_NEW_PRIVS-or-NOSUID.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2014-3690, CVSSv2 Score: 4.7
- Description:
kvm: vmx: invalid host cr4 handling across vm entries
- CVE: https://access.redhat.com/security/cve/CVE-2014-3690
- Patch: 2.6.32/x86-kvm-vmx-invalid-host-cr4-handling-across-vm-entries.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2015-1421, CVSSv2 Score: 7.1
- Description:
sctp: fix slab corruption from use after free on INIT collisions
- CVE: https://access.redhat.com/security/cve/CVE-2015-1421
- Patch: 2.6.32/net-sctp-fix-slab-corruption-from-use-after-free-on-INIT-collisions.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2014-3690, CVSSv2 Score: 4.7
- Description:
kvm: vmx: invalid host cr4 handling across vm entries
- CVE: https://access.redhat.com/security/cve/CVE-2014-3690
- Patch: 2.6.32/x86-kvm-vmx-invalid-host-cr4-handling-across-vm-entries.kpatch-1.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2014-7826 CVE-2014-7825, CVSSv2 Score: 4
- Description:
kernel: insufficient syscall number validation in perf and ftrace subsystems
- CVE: https://access.redhat.com/security/cve/CVE-2014-7826
- Patch: 2.6.32/kernel-trace-insufficient-syscall-number-validation-in-perf-and-ftrace-subsystems-358.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2014-9529, CVSSv2 Score: 4.9
- Description:
KEYS: close race between key lookup and freeing
- CVE: https://access.redhat.com/security/cve/CVE-2014-9529
- Patch: 2.6.32/security-keys-close-race-between-key-lookup-and-freeing.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2014-9584, CVSSv2 Score: 1.9
- Description:
isofs: Fix unchecked printing of ER records
- CVE: https://access.redhat.com/security/cve/CVE-2014-9584
- Patch: 2.6.32/isofs-fix-unchecked-printing-of-er-records.patch
- From: kernel-2.6.32-504.16.2.el6
- CVE-2014-8884, CVSSv2 Score: 1.8
- Description:
ttusb-dec: buffer overflow in ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2014-8884
- Patch: 2.6.32/media-ttusb-dec-buffer-overflow-in-ioctl.patch
- From: linux-2.6_2.6.32-48squeeze10
- CVE-2014-9419, CVSSv2 Score: 1.2
- Description:
x86_64, switch_to(): Load TLS descriptors before switching DS and ES
- CVE: https://access.redhat.com/security/cve/CVE-2014-9419
- Patch: 2.6.32/x86_64-switch_to-Load-TLS-descriptors-before-switching-DS-and-ES.patch
- From: kernel-2.6.32-504.23.4.el6
- CVE-2014-9420, CVSSv2 Score: 4.7
- Description:
isofs: Fix infinite looping over CE entries
- CVE: https://access.redhat.com/security/cve/CVE-2014-9420
- Patch: 2.6.32/isofs-Fix-infinite-looping-over-CE-entries.patch
- From: kernel-2.6.32-504.23.4.el6
- N/A, CVSSv2 Score: N/A
- Description:
Forbid to create a symlink or hardlink if user is not the owner of the targeted file
- CVE: N/A
- Patch: 2.6.32/cloudlinux-fs-restrictions-to-create-link-279.patch
- From: >kernel-2.6.32-531.29.2.lve1.3.11.10.el6
- N/A, CVSSv2 Score: N/A
- Description:
Forbid to create a symlink or hardlink if user is not the owner of the targeted file
- CVE: N/A
- Patch: 2.6.32/cloudlinux-kcare-Symlink-restriction-adaptation.patch
- From: >kernel-2.6.32-531.29.2.lve1.3.11.10.el6
- CVE-2015-5364 CVE-2015-5366, CVSSv2 Score: 7.1
- Description:
kernel: net: incorrect processing of checksums in UDP implementation
- CVE: https://access.redhat.com/security/cve/CVE-2015-5366
- Patch: 2.6.32/udp-fix-behavior-of-wrong-checksums.patch
- From: kernel-2.6.32-573.3.1.el6
- CVE-2011-5321, CVSSv2 Score: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5321
- Description:
TTY: drop driver reference in tty_open fail path
- CVE: 6.8
- Patch: 2.6.32/tty-drop-driver-reference-in-tty_open-fail-path.patch
- From: kernel-2.6.32-504.30.3.el6
- CVE-2015-3636, CVSSv2 Score: 6.6
- Description:
ipv4: Missing sk_nulls_node_init() in ping_unhash().
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-3636
- Patch: 2.6.32/ipv4-missing-sk_nulls_node_init-in-ping_unhash.patch
- From: kernel-2.6.32-504.30.3.el6
- CVE-2015-1593, CVSSv2 Score: 1.9
- Description:
ASLR: fix stack randomization on 64-bit systems
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-1593
- Patch: 2.6.32/aslr-fix-stack-randomization-on-64-bit-systems.patch
- From: kernel-2.6.32-504.30.3.el6
- CVE-2015-2830, CVSSv2 Score: 1.9
- Description:
x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-2830
- Patch: 2.6.32/openvz/x86-asm-entry-64-remove-a-bogus-ret_from_fork-optimi.patch
- From: kernel-2.6.32-504.30.3.el6
- CVE-2015-2830, CVSSv2 Score: 1.9
- Description:
x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-2830
- Patch: 2.6.32/openvz/x86-asm-entry-64-remove-a-bogus-ret_from_fork-kpatch-1.patch
- From: kernel-2.6.32-504.30.3.el6
- CVE-2015-2922, CVSSv2 Score: 3.3
- Description:
ipv6: Don't reduce hop limit for an interface
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-2922
- Patch: 2.6.32/ipv6-don-t-reduce-hop-limit-for-an-interface.patch
- From: kernel-2.6.32-504.30.3.el6
- CVE-2014-3940, CVSSv2 Score: 4.7
- Description:
mm: add !pte_present() check on existing hugetlb_entry callbacks
- CVE: https://access.redhat.com/security/cve/CVE-2014-3940
- Patch: 2.6.32/mm-add-pte_present-check-on-existing-hugetlb_entry-c.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-9683, CVSSv2 Score: 3.6
- Description:
eCryptfs: Remove buggy and unnecessary write in file name decode
- CVE: https://security-tracker.debian.org/tracker/CVE-2014-9683
- Patch: 2.6.32/ecryptfs-remove-buggy-and-unnecessary-write-in-file-.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-3339, CVSSv2 Score: 6.0
- Description:
fs: take i_mutex during prepare_binprm for set[ug]id executables
- CVE: https://access.redhat.com/security/cve/CVE-2015-3339
- Patch: 2.6.32/fs-take-i_mutex-during-prepare_binprm-for-set-u-g-id-executables.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-3184, CVSSv2 Score: 4.7
- Description:
HID: fix a couple of off-by-ones
- CVE: https://security-tracker.debian.org/tracker/CVE-2014-3184
- Patch: 2.6.32/hid-fix-a-couple-of-off-by-ones.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-8133, CVSSv2 Score: 1.9
- Description:
kernel: x86: espfix(64) bypass via set_thread_area and CLONE_SETTLS
- CVE: https://access.redhat.com/security/cve/CVE-2014-8133
- Patch: 2.6.32/x86-tls-Validate-TLS-entries-to-protect-espfix.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-8133, CVSSv2 Score: 1.9
- Description:
kernel: x86: espfix(64) bypass via set_thread_area and CLONE_SETTLS
- CVE: https://access.redhat.com/security/cve/CVE-2014-8133
- Patch: 2.6.32/x86-tls-Disallow-unusual-TLS-segments.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-8133, CVSSv2 Score: 1.9
- Description:
kernel: x86: espfix(64) bypass via set_thread_area and CLONE_SETTLS
- CVE: https://access.redhat.com/security/cve/CVE-2014-8133
- Patch: 2.6.32/x86-tls-Don-t-validate-lm-in-set_thread_area-after-all.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-8133, CVSSv2 Score: 1.9
- Description:
kernel: x86: espfix(64) bypass via set_thread_area and CLONE_SETTLS
- CVE: https://access.redhat.com/security/cve/CVE-2014-8133
- Patch: 2.6.32/x86-tls-Interpret-an-all-zero-struct-user_desc-as-no-segment.patch
- From: kernel-2.6.32-573.el6
- CVE-2014-8709, CVSSv2 Score: 1.8
- Description:
mac80211: fix fragmentation code, particularly for encryption
- CVE: https://access.redhat.com/security/cve/CVE-2014-8709
- Patch: 2.6.32/net-mac80211-fix-fragmentation-code-particularly-for-encryption-358.patch
- From: kernel-2.6.32-573.el6
- CVE-2015-0239, CVSSv2 Score: 6.2
- Description:
kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code
- CVE: https://access.redhat.com/security/cve/CVE-2015-0239
- Patch: 2.6.32/x86-kvm-SYSENTER-emulation-is-broken.patch
- From: kernel-2.6.32-573.el6
- N/A, CVSSv2 Score: N/A
- Description:
VFS: fix symlink protection relative path issue
- CVE: N/A
- Patch: 2.6.32/cloudlinux-vfs-fix-symlink-protection-realtive-path-issue.before-531_1_2.patch
- From: kernel-2.6.32-604.16.2.lve1.3.56.el6
- CVE-2015-6937, CVSSv2 Score: 7.1
- Description:
RDS: verify the underlying transport exists before creating a connection
- CVE: https://access.redhat.com/security/cve/cve-2015-6937
- Patch: 2.6.32/rds-verify-the-underlying-transport-exists-before-creating-a.patch
- From: vzkernel-2.6.32-042stab112.15
- CVE-2015-7990, CVSSv2 Score: 7.1
- Description:
Complete earlier incomplete fix to CVE-2015-6937
- CVE: https://access.redhat.com/security/cve/CVE-2015-7990
- Patch: 2.6.32/fix-incomplete-CVE-2015-6937.patch
- From: >vzkernel-2.6.32-042stab112.15
- CVE-2015-7872, CVSSv2 Score: 7.2
- Description:
keys: Fix race between key destruction and finding a keyring by name
- CVE: https://access.redhat.com/security/cve/CVE-2015-7872
- Patch: 2.6.32/34340-security-keys-Fix-race-between-key-destruction-and-finding-a-keyring-by-name-431.patch
- From: kernel-2.6.32-573.12.1.el6
- CVE-2015-7872, CVSSv2 Score: 7.2
- Description:
keys: Fix crash when attempt to garbage collect an uninstantiated keyring
- CVE: https://access.redhat.com/security/cve/CVE-2015-7872
- Patch: 2.6.32/34341-security-keys-Fix-crash-when-attempt-to-garbage-collect-an-uninstantiated-keyring.patch
- From: kernel-2.6.32-573.12.1.el6
- CVE-2015-7872, CVSSv2 Score: 7.2
- Description:
keys: Don't permit request_key() to construct a new keyring
- CVE: https://access.redhat.com/security/cve/CVE-2015-7872
- Patch: 2.6.32/34342-security-keys-Don-t-permit-request_key-to-construct-a-new-keyring.patch
- From: kernel-2.6.32-573.12.1.el6
- CVE-2015-5307, CVSSv2 Score: 5.2
- Description:
virt: guest to host DoS by triggering an infinite loop in microcode
- CVE: https://access.redhat.com/security/cve/CVE-2015-5307
- Patch: 2.6.32/34344-x86-virt-guest-to-host-DoS-by-triggering-an-infinite-loop-in-microcode-358.patch
- From: kernel-2.6.32-573.12.1.el6
- CVE-2015-8104, CVSSv2 Score: 5.2
- Description:
svm: unconditionally intercept DB
- CVE: https://access.redhat.com/security/cve/CVE-2015-8104
- Patch: 2.6.32/34345-kvm-svm-unconditionally-intercept-DB.patch
- From: kernel-2.6.32-573.12.1.el6
- CVE-2015-5307 CVE-2015-8104, CVSSv2 Score: 5.2
- Description:
CVE-2015-5307 and CVE-2015-8104 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2015-8104
- Patch: 2.6.32/34346-cve-2015-5307-cve-2015-8104-kpatch-1.patch
- From: kernel-2.6.32-573.12.1.el6
- CVE-2016-0774, CVSSv2 Score: 5.4
- Description:
Fix pipe buffer state corruption.
- CVE: https://access.redhat.com/security/cve/CVE-2016-0774
- Patch: 2.6.32/CVE-2016-0774.patch
- From: kernel-2.6.32-573.22.1.el6
- CVE-2015-8543, CVSSv2 Score: 4.6
- Description:
net: add validation for the socket syscall protocol argument
- CVE: https://access.redhat.com/security/cve/CVE-2015-8543
- Patch: 2.6.32/openvz/cve-2015-8543.patch
- From: vzkernel-2.6.32-042stab113.21
- CVE-2016-3134, CVSSv2 Score: 6.2
- Description:
netfilter: x_tables: deal with bogus nextoffset values
- CVE: https://access.redhat.com/security/cve/CVE-2016-3134
- Patch: 2.6.32/openvz/cve-2016-3134.patch
- From: vzkernel-2.6.32-042stab113.21
- CVE-2016-4997, CVE-2016-4998, CVSSv2 Score: N/A
- Description:
netfilter: x_tables: validate e->target_offset early
- CVE: http://www.openwall.com/lists/oss-security/2016/06/24/5
- Patch: 2.6.32/netfilter-x_tables-validate-e-target_offset-early.patch
- From: vzkernel-2.6.32-042stab116.2
- CVE-2016-4997, CVE-2016-4998, CVSSv2 Score: N/A
- Description:
netfilter: x_tables: make sure e->next_offset covers remaining blob size
- CVE: http://www.openwall.com/lists/oss-security/2016/06/24/5
- Patch: 2.6.32/netfilter-x_tables-make-sure-e-next_offset-covers-remaining-blob.patch
- From: vzkernel-2.6.32-042stab116.2
- CVE-2016-4997, CVE-2016-4998, CVSSv2 Score: N/A
- Description:
netfilter: x_tables: check for bogus target offset
- CVE: http://www.openwall.com/lists/oss-security/2016/06/24/5
- Patch: 2.6.32/netfilter-x_tables-check-for-bogus-target-offset.patch
- From: vzkernel-2.6.32-042stab116.2
- CVE-2016-4565, CVSSv2 Score: 6.9
- Description:
IB/security: Restrict use of the write() interface
- CVE: https://access.redhat.com/security/cve/CVE-2016-4565
- Patch: 2.6.32/IB-security-Restrict-use-of-the-write-interface-358.patch
- From: kernel-2.6.32-642.3.1.el6
- CVE-2016-5195, CVSSv2 Score: 6.9
- Description:
mm: remove gup_flags FOLL_WRITE games from __get_user_pages()
- CVE: https://access.redhat.com/security/cve/cve-2016-5195
- Patch: 2.6.32/0001-mm-remove-gup_flags-FOLL_WRITE-games-from-__get_user-358.patch
- From: >kernel-2.6.32-642.6.1.el6
- CVE-2016-7117, CVSSv2 Score: 6.8
- Description:
net: Fix use after free in the recvmmsg exit path
- CVE: https://access.redhat.com/security/cve/cve-2016-7117
- Patch: 2.6.32/cloudlinux-net-Fix-use-after-free-in-the-recvmmsg-exit-path.patch
- From: >kernel-2.6.32-673.26.1.lve1.4.18.el6
- CVE-2017-6074, CVSSv2 Score: 7.8
- Description:
dccp: fix freeing skb too early for IPV6_RECVPKTINFO
- CVE: https://access.redhat.com/security/cve/CVE-2017-6074
- Patch: 2.6.32/dccp-fix-freeing-skb-too-early-for-ipv6_recvpktinfo.patch
- From: kernel-2.6.32-642.13.2.el6
- CVE-2017-2636, CVSSv2 Score: 7.8
- Description:
tty: n_hdlc: get rid of racy n_hdlc.tbuf
- CVE: https://access.redhat.com/security/cve/CVE-2017-2636
- Patch: 2.6.32/fix-CVE-2017-2636.patch
- From: 2.6.32-696.1.1.el6
- CVE-2016-2069, CVSSv2 Score: N/A
- Description:
x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- CVE: https://access.redhat.com/security/cve/cve-2016-2069
- Patch: 2.6.32/x86-mm-Add-barriers-and-document-switch_mm-vs-flush-_279.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-2384, CVSSv2 Score: N/A
- Description:
ALSA: usb-audio: avoid freeing umidi object twice
- CVE: https://access.redhat.com/security/cve/cve-2016-2384
- Patch: 2.6.32/ALSA-usb-audio-avoid-freeing-umidi-object-twice.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-6480, CVSSv2 Score: N/A
- Description:
aacraid: Check size values after double-fetch from user
- CVE: https://access.redhat.com/security/cve/cve-2016-6480
- Patch: 2.6.32/aacraid-Check-size-values-after-double-fetch-from-us.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-7097, CVSSv2 Score: N/A
- Description:
posix_acl: Clear SGID bit when setting file permissions
- CVE: https://access.redhat.com/security/cve/cve-2016-7097
- Patch: 2.6.32/posix_acl-Clear-SGID-bit-when-setting-file-permissio_279.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-8399, CVSSv2 Score: N/A
- Description:
net: ping: check minimum size on ICMP header length
- CVE: https://access.redhat.com/security/cve/cve-2016-8399
- Patch: 2.6.32/net-ping-check-minimum-size-on-ICMP-header-length.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-10088, CVSSv2 Score: N/A
- Description:
sg_write()/bsg_write() is not fit to be called under KERNEL_DS
- CVE: https://access.redhat.com/security/cve/cve-2016-10088
- Patch: 2.6.32/sg_write-bsg_write-is-not-fit-to-be-called-under-KER.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-10142, CVSSv2 Score: N/A
- Description:
ipv6: stop sending PTB packets for MTU < 1280
- CVE: https://access.redhat.com/security/cve/cve-2016-10142
- Patch: 2.6.32/ipv6-stop-sending-PTB-packets-for-MTU-1280_379.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-7042, CVSSv2 Score: N/A
- Description:
KEYS: Fix short sprintf buffer in /proc/keys show function
- CVE: https://access.redhat.com/security/cve/cve-2016-7042
- Patch: 2.6.32/KEYS-Fix-short-sprintf-buffer-in-proc-keys-show-func.patch
- From: kernel-2.6.32-696.el6
- CVE-2016-10229, CVSSv2 Score: critical
- Description:
udp: properly support MSG_PEEK with truncated buffers
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-10229
- Patch: 2.6.32/CVE-2016-10229.before-431.5.1.patch
- From: >2.6.32-642.15.1.el6
- CVE-2017-7895, CVSSv2 Score: 6.5
- Description:
nfsd: stricter decoding of write-like NFSv2/v3 ops
- CVE: https://access.redhat.com/security/cve/cve-2017-7895
- Patch: 2.6.32/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch
- From: >kernel-2.6.32-673.26.1.lve1.4.26.el6
- CVE-2017-1000364, CVSSv2 Score: 7.4
- Description:
mm: enlarge stack guard gap
- CVE: https://access.redhat.com/security/cve/cve-2017-1000364
- Patch: 2.6.32/CVE-2017-1000364-upstream-before-5ecfda041e-279.patch
- From: 2.6.32-696.3.2.el6
- N/A, CVSSv2 Score: N/A
- Description:
fix ipset list shrinking for no reason
- CVE: N/A
- Patch: 2.6.32/ipset-fix-list-shrinking.patch
- From: N/A
- CVE-2017-1000253, CVSSv2 Score: 7.8
- Description:
fs/binfmt_elf.c: fix bug in loading of PIE binaries
- CVE: https://access.redhat.com/security/cve/cve-2017-1000253
- Patch: 2.6.32/fs-binfmt_elfc-fix-bug-in-loading-of-pie-binaries.patch
- From: >2.6.32-696.10.2.el6
- CVE-2017-8824, CVSSv2 Score: 7.8
- Description:
dccp: fix use-after-free (CVE-2017-8824)
- CVE: https://access.redhat.com/security/cve/cve-2017-8824
- Patch: 2.6.32/dccp-fix-use-after-free.patch
- From: kernel-2.6.32-773.26.1.lve1.4.46.el6
- CVE-2015-5157, CVSSv2 Score: 5.7
- Description:
Disable modification of LDT by userspace processes.
- CVE: https://access.redhat.com/security/cve/cve-2015-5157
- Patch: 2.6.32/kcare-mitigate-cve-2015-5157.patch
- From: kernel-2.6.32-573.26.1.el6
- CVE-2010-5313 CVE-2014-7842, CVSSv2 Score: 4
- Description:
kvm: inject #UD if instruction emulation fails and exit to userspace
- CVE: https://access.redhat.com/security/cve/CVE-2010-5313
- Patch: 2.6.32/virt-kvm-inject-UD-if-instruction-emulation-fails-and-exit-to-userspace.patch
- From: kernel-2.6.32-642.el6
- CVE-2010-5313 CVE-2014-7842, CVSSv2 Score: 4
- Description:
kvm: inject #UD if instruction emulation fails and exit to userspace (KernelCare adoptation)
- CVE: https://access.redhat.com/security/cve/CVE-2010-5313
- Patch: 2.6.32/virt-kvm-inject-UD-if-instruction-emulation-fails-and-exit-to-userspace.kpatch-1.patch
- From: kernel-2.6.32-642.el6
- CVE-2010-5313 CVE-2014-7842, CVSSv2 Score: 4
- Description:
kvm: x86: Don't report guest userspace emulation error to userspace
- CVE: https://access.redhat.com/security/cve/CVE-2010-5313
- Patch: 2.6.32/virt-kvm-x86-Don-t-report-guest-userspace-emulation-error-to-userspace.patch
- From: kernel-2.6.32-642.el6
- CVE-2014-8134, CVSSv2 Score: 1.9
- Description:
x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- CVE: https://access.redhat.com/security/cve/CVE-2014-8134
- Patch: 2.6.32/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch
- From: kernel-2.6.32-642.el6
- CVE-2014-8134, CVSSv2 Score: 1.9
- Description:
x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- CVE: https://access.redhat.com/security/cve/CVE-2014-8134
- Patch: 2.6.32/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.kpatch-1.patch
- From: kernel-2.6.32-642.el6
- CVE-2015-7509, CVSSv2 Score: 6
- Description:
ext4: make orphan functions be no-op in no-journal mode
- CVE: https://access.redhat.com/security/cve/CVE-2015-7509
- Patch: 2.6.32/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch
- From: kernel-2.6.32-642.el6
- CVE-2015-7509, CVSSv2 Score: 6
- Description:
ext4: avoid hang when mounting non-journal filesystems with orphan list
- CVE: https://access.redhat.com/security/cve/CVE-2015-7509
- Patch: 2.6.32/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch
- From: kernel-2.6.32-642.el6
- CVE-2016-4470, CVSSv2 Score: 6.9
- Description:
KEYS: potential uninitialized variable
- CVE: https://access.redhat.com/security/cve/CVE-2016-4470
- Patch: 2.6.32/KEYS-potential-uninitialized-variable-CVE-2016-4470.patch
- From: kernel-2.6.32-642.6.1.el6
- CVE-2016-5829, CVSSv2 Score: 6.9
- Description:
HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands
- CVE: https://access.redhat.com/security/cve/CVE-2016-5829
- Patch: 2.6.32/hid-hiddev-validate-num_values-for-hidiocgusages-hidiocsusages.patch
- From: kernel-2.6.32-642.6.1.el6
- CVE-2016-1583, CVSSv2 Score: 6.9
- Description:
proc: prevent stacking filesystems on top
- CVE: https://access.redhat.com/security/cve/cve-2016-1583
- Patch: 2.6.32/proc-prevent-stacking-filesystems-on-top.patch
- From: kernel-2.6.32-642.11.1.el6
- CVE-2016-6828, CVSSv2 Score: 3.6
- Description:
tcp: fix use after free in tcp_xmit_retransmit_queue()
- CVE: https://access.redhat.com/security/cve/CVE-2016-6828
- Patch: 2.6.32/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch
- From: vzkernel-2.6.32-042stab120.11
- CVE-2015-8539, CVSSv2 Score: 7.2
- Description:
KEYS: Fix handling of stored error in a negatively instantiated user key
- CVE: https://access.redhat.com/security/cve/CVE-2015-8539
- Patch: 2.6.32/KEYS-Fix-handling-of-stored-error-in-a-negatively-in.patch
- From: >kernel-2.6.32-642.13.1.el6
- CVE-2016-6136, CVSSv2 Score: 3.3
- Description:
[kernel] audit: fix a double fetch in audit_log_single_execve_arg()
- CVE: https://access.redhat.com/security/cve/CVE-2016-6136
- Patch: 2.6.32/kernel-audit-fix-a-double-fetch-in-audit_log_single_execve_arg-358.patch
- From: kernel-2.6.32-642.15.1.el6
- CVE-2016-9555, CVSSv2 Score: 7.1
- Description:
[net] sctp: validate chunk len before actually using it
- CVE: https://access.redhat.com/security/cve/CVE-2016-9555
- Patch: 2.6.32/net-sctp-validate-chunk-len-before-actually-using-it.patch
- From: kernel-2.6.32-642.15.1.el6
- CVE-2016-7910, CVSSv2 Score:
- Description:
block: fix use-after-free in seq file
- CVE: https://access.redhat.com/security/cve/CVE-2016-7910
- Patch: 2.6.32/block-fix-use-after-free-in-seq-file.patch
- From: kernel-2.6.32-696.1.1.el6
- CVE-2017-7472, CVSSv2 Score: 5.5
- Description:
keyctl_set_reqkey_keyring() leaks thread keyrings
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 2.6.32/CVE-2017-7472-pre-642.patch
- From: vzkernel-2.6.32-042stab123.2
- CVE-2017-6214, CVSSv2 Score: 6.5
- Description:
tcp: avoid infinite loop in tcp_splice_read()
- CVE: https://access.redhat.com/security/cve/CVE-2017-6214
- Patch: 2.6.32/tcp-avoid-infinite-loop-in-tcp_splice_read.patch
- From: kernel-2.6.32-696.3.1.el6
- CVE-2017-7308, CVSSv2 Score: 7
- Description:
net/packet: fix overflow in check for tp_reserve
- CVE: https://access.redhat.com/security/cve/cve-2017-7308
- Patch: 2.6.32/net-packet-fix-overflow-in-check-for-tp_reserve.patch
- From: >kernel-2.6.32-696.6.3.el6
- CVE-2017-1000111, CVSSv2 Score: unknown
- Description:
net-packet: fix race in packet_set_ring on PACKET_RESERVE
- CVE: http://seclists.org/oss-sec/2017/q3/279
- Patch: 2.6.32/CVE-2017-1000111.patch
- From: >kernel-2.6.32-696.6.3.el6
- CVE-2017-1000112, CVSSv2 Score: unknown
- Description:
udp: consistently apply ufo or fragmentation
- CVE: http://seclists.org/oss-sec/2017/q3/277
- Patch: 2.6.32/CVE-2017-1000112-before-696.patch
- From: >2.6.32-696.6.3.el6
- CVE-2017-1000251, CVSSv2 Score: 7.5
- Description:
Bluetooth: Properly check L2CAP config option output buffer length
- CVE: https://access.redhat.com/security/cve/cve-2017-1000251
- Patch: 2.6.32/CVE-2017-1000251.patch
- From: 2.6.32-696.10.2.el6
- CVE-2017-15274, CVSSv2 Score: 5.5
- Description:
KEYS: fix dereferencing NULL payload with nonzero length
- CVE: https://access.redhat.com/security/cve/cve-2017-15274
- Patch: 2.6.32/keys-fix-dereferencing-null-payload-with-nonzero-length-pre-117.patch
- From: 2.6.32-042stab125.5
- CVE-2017-14106, CVSSv2 Score: 5.5
- Description:
tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0
- CVE: https://access.redhat.com/security/cve/CVE-2017-14106
- Patch: 2.6.32/tcp-initialize-rcv_mss-to-TCP_MIN_MSS-instead-of-0.patch
- From: vzkernel-2.6.32-042stab124.2
- Description:
- CVE:
- Patch: 2.6.32/kernel-Provide-READ_ONCE-and-ASSIGN_ONCE.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/kernel-Change-ASSIGN_ONCE-val-x-to-WRITE_ONCE-x-val.patch
- From:
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: adjust context
- CVE: N/A
- Patch: 2.6.32/kcpti-adjust-context-ve.patch
- From: N/A
- CVE-2017-5754, CVSSv2 Score: 7.9
- Description:
add kernel page table isolation feature(aka KAISER)
- CVE: https://access.redhat.com/security/cve/cve-2017-5754
- Patch: 2.6.32/kcpti-pre-504.patch
- From: 2.6.32-696.18.7.el6
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: undo context adjustment
- CVE: N/A
- Patch: 2.6.32/kcpti-adjust-context-ve-undo.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: remove trace IDT mapping
- CVE: N/A
- Patch: 2.6.32/kcpti-remove-trace-idt-mapping.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: check present flag when removing global pte flag
- CVE: N/A
- Patch: 2.6.32/kcpti-respect-present-flag-during-kcpti_remove_page_.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: ignore AMD processors
- CVE: N/A
- Patch: 2.6.32/kcpti-ignore-AMD-processors.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: apply patch to Xen PV domains
- CVE: N/A
- Patch: 2.6.32/kcpti-apply-patch-to-Xen-PV-domains.patch
- From: N/A
- CVE-2017-16939, CVSSv2 Score: 6.2
- Description:
ipsec: Fix aborted xfrm policy dump crash (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2017-16939
- Patch: 2.6.32/ipsec-Fix-aborted-xfrm-policy-dump-crash.patch
- From: vzkernel-2.6.32-042stab126.2
- CVE-2017-5753, CVSSv2 Score: 8.2
- Description:
spectre: prevent speculative execution
- CVE: https://access.redhat.com/security/cve/CVE-2017-5753
- Patch: 2.6.32/CVE-2017-5753-358.patch
- From: 2.6.32-696.18.7.el6
- Description:
- CVE:
- Patch: 2.6.32/kcpti-rework-patching-of-paranoid_exit.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/kcpti-fix-use-after-free-in-kcpti_exit_pre.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/kcpti-fix-patch-during-cr3-switch.patch
- From:
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] msr: add 64bit _on_cpu access functions
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/x86-msr-add-64bit-_on_cpu-access-functions.patch
- From: kernel-2.6.32-504.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kernel] bitops: Introduce BIT_ULL
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/kernel-bitops-Introduce-BIT_ULL.patch
- From: kernel-2.6.32-504.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] microcode: Share native MSR accessing variants
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0001-x86-microcode-Share-native-MSR-accessing-variants.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] cpuid: Cleanup cpuid_regs definitions
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0002-x86-cpuid-Cleanup-cpuid_regs-definitions-573.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] cpuid: Provide get_scattered_cpuid_leaf()
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0003-x86-cpuid-Provide-get_scattered_cpuid_leaf-573.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] feature: Enable the x86 feature to control Speculation
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0004-x86-feature-Enable-the-x86-feature-to-control-Specul-vz-042stab092.1.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] feature: Report presence of IBPB and IBRS control
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0005-x86-feature-Report-presence-of-IBPB-and-IBRS-control.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0006-x86-cpu-AMD-Control-indirect-branch-predictor-when-S-431.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] [kvm] Pad RSB on VM transition
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0007-x86-kvm-Pad-RSB-on-VM-transition-573.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] x86: clear registers on VM exit
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0008-kvm-x86-clear-registers-on-VM-exit.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] vmx: Set IBPB when running a different VCPU
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0009-kvm-vmx-Set-IBPB-when-running-a-different-VCPU.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0010-kvm-vmx-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD-358.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0011-x86-svm-Set-IBPB-when-running-a-different-VCPU.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0012-kvm-svm-add-MSR_IA32_SPEC_CTRL-and-MSR_IA32_PRED_CMD-358.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[kvm] x86: add SPEC_CTRL to MSR and CPUID lists
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0013-kvm-x86-add-SPEC_CTRL-to-MSR-and-CPUID-lists.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] enter: MACROS to set/clear IBRS and set IBPB
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0014-x86-enter-MACROS-to-set-clear-IBRS-and-set-IBPB.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0015-x86-spec_ctrl-use-per-cpu-knob-instead-of-ALTERNATIV.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] enter: Use IBRS on syscall and interrupts
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0017-x86-enter-Use-IBRS-on-syscall-and-interrupts-573.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: save IBRS MSR value in save_paranoid for NMI
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0018-x86-spec_ctrl-save-IBRS-MSR-value-in-save_paranoid-f.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: implement spec ctrl C methods
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0019-x86-spec_ctrl-implement-spec-ctrl-C-methods.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] idle: Disable IBRS entering idle and enable it on wakeup
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0020-x86-idle-Disable-IBRS-entering-idle-and-enable-it-on.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] idle: Disable IBRS when offlining cpu and re-enable
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0021-x86-idle-Disable-IBRS-when-offlining-cpu-and-re-enab-431.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] mm: Set IBPB upon context switch
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0022-x86-mm-Set-IBPB-upon-context-switch.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] mm: Only set IBPB when the new thread cannot ptrace
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0023-x86-mm-Only-set-IBPB-when-the-new-thread-cannot-ptra-cl6-458.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Stuff RSB for entry to kernel for non-SMEP platform
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0024-x86-entry-Stuff-RSB-for-entry-to-kernel-for-non-SMEP-573.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Remove STUFF_RSB in error and interrupt code
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0025-x86-entry-Remove-STUFF_RSB-in-error-and-interrupt-co.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: move stuff_RSB in spec_ctrl.h
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0026-x86-spec_ctrl-move-stuff_RSB-in-spec_ctrl.h.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] KVM/spec_ctrl: allow IBRS to stay enabled in host userland
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0027-x86-KVM-spec_ctrl-allow-IBRS-to-stay-enabled-in-host.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] Remove __cpuinitdata from some data & function
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0028-x86-Remove-__cpuinitdata-from-some-data-function.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: consolidate the spec control boot detection
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0029-x86-spec_ctrl-consolidate-the-spec-control-boot-dete.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: add debugfs ibrs_enabled ibpb_enabled
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0030-x86-spec_ctrl-add-debugfs-ibrs_enabled-ibpb_enabled.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: rescan cpuid after a late microcode update
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0031-x86-spec_ctrl-rescan-cpuid-after-a-late-microcode-up-431.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] syscall: Clear unused extra registers on 32-bit compatible syscall entrance
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0032-x86-syscall-Clear-unused-extra-registers-on-32-bit-c.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: add noibrs noibpb boot options
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0033-x86-spec_ctrl-add-noibrs-noibpb-boot-options.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: Prevent unwanted speculation without IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0034-x86-spec_ctrl-Prevent-unwanted-speculation-without-I.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: reload spec_ctrl cpuid in all microcode load paths
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0035-x86-spec_ctrl-reload-spec_ctrl-cpuid-in-all-microcod-431.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Fix 32-bit program crash with 64-bit kernel on AMD boxes
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0036-x86-entry-Fix-32-bit-program-crash-with-64-bit-kerne.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] entry: Add back STUFF_RSB to interrupt and error paths
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0037-x86-entry-Add-back-STUFF_RSB-to-interrupt-and-error-.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: ibrs_enabled() is expected to return > 1
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0038-x86-spec_ctrl-ibrs_enabled-is-expected-to-return-1.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0039-x86-spec_ctrl-always-initialize-save_reg-in-ENABLE_I.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: allow the IBP disable feature to be toggled at runtime
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0040-x86-spec_ctrl-allow-the-IBP-disable-feature-to-be-to.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: use IBRS_ENABLED instead of 1
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0041-x86-spec_ctrl-use-IBRS_ENABLED-instead-of-1.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0042-x86-spec_ctrl-set-IBRS-during-CPU-init-if-in-ibrs_en.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0043-x86-spec_ctrl-cleanup-s-flush-sync-naming-when-sendi.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0044-x86-spec_ctrl-introduce-SPEC_CTRL_PCP_ONLY_IBPB.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0045-x86-spec_ctrl-introduce-ibpb_enabled-2-for-IBPB-inst.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0046-x86-spec_ctrl-undo-speculation-barrier-for-ibrs_enab.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: use enum when setting ibrs/ibpb_enabled
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0047-x86-spec_ctrl-use-enum-when-setting-ibrs-ibpb_enable.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: remove irqs_disabled() check from intel_idle()
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0048-x86-spec_ctrl-remove-irqs_disabled-check-from-intel_.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0049-x86-spec_ctrl-allow-use_ibp_disable-only-if-both-SPE.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0050-x86-spec_ctrl-set-IBRS-during-resume-from-RAM-if-ibr-431.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: skip IBRS/CR3 restore when paranoid exception returns to userland
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0051-x86-spec_ctrl-skip-IBRS-CR3-restore-when-paranoid-ex.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: disable ibrs while in intel_idle()
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0052-x86-spec_ctrl-disable-ibrs-while-in-intel_idle-358.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: skip CAP_SYS_PTRACE check to skip audit
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0053-x86-spec_ctrl-skip-CAP_SYS_PTRACE-check-to-skip-audi-cl6.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: Eliminate redundnat FEATURE Not Present messages
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0055-x86-spec_ctrl-Eliminate-redundnat-FEATURE-Not-Presen.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0056-x86-spec_ctrl-svm-spec_ctrl-at-vmexit-needs-per-cpu-.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2017-2671, CVSSv2 Score: 7.8
- Description:
ping - implement proper locking
- CVE: https://access.redhat.com/security/cve/CVE-2017-2671
- Patch: 2.6.32/cve-2017-2671-ping-implement-proper-locking.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-8890, CVSSv2 Score: 6.5
- Description:
dccp/tcp - do not inherit mc_list from parent
- CVE: https://access.redhat.com/security/cve/CVE-2017-8890
- Patch: 2.6.32/cve-2017-8890-net-do-not-inherit-mc-from-parent.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-9075, CVSSv2 Score: 6.5
- Description:
sctp - do not inherit ipv6_{mc|ac|fl}_list from parent
- CVE: https://access.redhat.com/security/cve/CVE-2017-9075
- Patch: 2.6.32/cve-2017-9075-sctp-do-not-inherit-ipv6-mcast-from-parent.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-9076, CVSSv2 Score: 6.5
- Description:
ipv6/dccp - do not inherit ipv6_mc_list from parent
- CVE: https://access.redhat.com/security/cve/CVE-2017-9076
- Patch: 2.6.32/cve-2017-9076-do-not-inherit-mc_list-from-parent.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-7566, CVSSv2 Score: 6.1
- Description:
ALSA: seq: Fix racy pool initializations
- CVE: https://access.redhat.com/security/cve/cve-2018-7566
- Patch: 2.6.32/cve-2018-7566-alsa-seq-fix-racy-pool-init-504.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-3693, CVSSv2 Score: 5.5
- Description:
prevents spectre v1 by sanitizing pointers from user-space and syscall numbers, \
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 2.6.32/cve-2018-3693-no-spec-on-user-input.patch
- From: kernel-2.6.32-754.2.1.el6
- CVE-2018-3693, CVSSv2 Score: 5.5
- Description:
addresses CVE-2018-3693 for 32bit processes.
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 2.6.32/cve-2018-3693-32bit.patch
- From: kernel-2.6.32-754.2.1.el6
- CVE-2018-3639, CVSSv2 Score: 5.6
- Description:
Spectre v4 (store by-passing) mitigation.
- CVE: https://access.redhat.com/security/cve/CVE-2018-3639
- Patch: 2.6.32/cve-2018-3639-spectre4-mitigation.patch
- From: kernel-2.6.32-358.18.1.el6
- CVE-2017-5715, CVSSv2 Score: 6.9
- Description:
[x86] spec_ctrl: show added cpuid flags in /proc/cpuinfo after late microcode update
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 2.6.32/spec_ctrl/0057-x86-spec_ctrl-show-added-cpuid-flags-in-proc-cpuinfo.patch
- From: kernel-2.6.32-696.20.1.el6
- CVE-2012-6701, CVSSv2 Score: 3.6
- Description:
make AIO use the proper rw_verify_area() area helpers
- CVE: https://access.redhat.com/security/cve/CVE-2012-6701
- Patch: 2.6.32/cve-2012-6701-make-AIO-use-the-proper-rw_verify_area-helpers.patch
- From: kernel-2.6.32-754.el6
- CVE-2016-8650, CVSSv2 Score: 4.9
- Description:
mpi - Fix NULL ptr dereference in mpi_powm()
- CVE: https://access.redhat.com/security/cve/CVE-2016-8650
- Patch: 2.6.32/cve-2016-8650-parsing-certain-certificates-triggers-NULL-ptr-dereference.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-7889, CVSSv2 Score: 7.8
- Description:
mm - tighten x86 /dev/mem with zeroing reads
- CVE: https://access.redhat.com/security/cve/CVE-2017-7889
- Patch: 2.6.32/cve-2017-7889-tighten-x86-dev-mem-with-zeroing-reads.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-12190, CVSSv2 Score: 6.2
- Description:
fix unbalanced page refcounting in bio_map_user_iov
- CVE: https://access.redhat.com/security/cve/CVE-2017-12190
- Patch: 2.6.32/cve-2017-12190-fix-unbalanced-page-refcounting.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-12190, CVSSv2 Score: 6.9
- Description:
more bio_map_user_iov() leak fixes
- CVE: https://access.redhat.com/security/cve/CVE-2017-12190
- Patch: 2.6.32/cve-2017-12190-more-bio_map_user_iov-leak-fixes.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-15121, CVSSv2 Score: 5.5
- Description:
mm - teach truncate_inode_pages_range() to handle non page aligned ranges
- CVE: https://access.redhat.com/security/cve/CVE-2017-15121
- Patch: 2.6.32/cve-2017-15121-mm-teach-truncate_inode_pages_range-to-handle-non-page-aligned-ranges.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-18203, CVSSv2 Score: 4.7
- Description:
dm: fix race between dm_get_from_kobject() and __dm_destroy()
- CVE: https://access.redhat.com/security/cve/CVE-2017-18203
- Patch: 2.6.32/cve-2017-18203-fix-race-between-dm_get_from_kobject-and-dm_destroy-pre-504.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-1130, CVSSv2 Score: 5.5
- Description:
dccp - check sk for closed state in dccp_sendmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2018-1130
- Patch: 2.6.32/cve-2018-1130-dccp-check-sk-for-closed-state.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-5803, CVSSv2 Score: 5.5
- Description:
sctp - verify size of a new chunk in _sctp_make_chunk()
- CVE: https://access.redhat.com/security/cve/CVE-2018-5803
- Patch: 2.6.32/cve-2018-5803-sctp-verify-size-of-a-new-chunk-in-sctp_make_chunk.patch
- From: kernel-2.6.32-754.el6
- CVE-2017-7645, CVSSv2 Score: 7.5
- Description:
nfsd: check for oversized NFSv2/v3 arguments
- CVE: https://access.redhat.com/security/cve/CVE-2017-7645
- Patch: 2.6.32/nfsd-check-for-oversized-NFSv2-v3-arguments-pre-431.patch
- From: kernel-3.10.0-514.26.1.el7
- CVE-2017-18017, CVSSv2 Score: 6.5
- Description:
netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
- CVE: https://access.redhat.com/security/cve/cve-2017-18017
- Patch: 2.6.32/cve-2017-18017-netfilter-xt_TCPMSS-add-more-sanity-checks-cl6.patch
- From: 2.6.32-696.28.1.el6
- CVE-2018-10675, CVSSv2 Score: 5.5
- Description:
fix for use-after-free bug via crafted system calls in mm/mempolicy.c:do_get_mempolicy()
- CVE: https://access.redhat.com/security/cve/cve-2018-10675
- Patch: 2.6.32/CVE-2018-10675.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack
- CVE: https://access.redhat.com/security/cve/CVE-2018-8897
- Patch: 2.6.32/x86-entry-64-Don-t-use-IST-entry-for-BP-stack.patch
- From: 2.6.32-696.28.1.el6
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2018-8897
- Patch: 2.6.32/x86-entry-64-Don-t-use-IST-entry-for-BP-stack-504.1.3-kpatch-1.patch
- From: 2.6.32-696.28.1.el6
- CVE-2017-11176, CVSSv2 Score: 7.8
- Description:
mqueue: fix a use-after-free in sys_mq_notify()
- CVE: https://access.redhat.com/security/cve/cve-2017-11176
- Patch: 2.6.32/kernel-mqueue-fix-a-use-after-free-in-sys_mq_notify.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: Prevent overrun when parsing v6 header options
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-Prevent-overrun-when-parsing-v6-header-options-pre-431.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: Check ip6_find_1stfragopt() return value properly.
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-Check-ip6_find_1stfragopt-return-value-properly-pre-431.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt()
- CVE: https://access.redhat.com/security/cve/cve-2017-9074
- Patch: 2.6.32/net-ipv6-xfrm-Handle-errors-reported-by-xfrm6_find_1stfragopt.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-7542, CVSSv2 Score: 5.5
- Description:
ipv6: avoid overflow of offset in ip6_find_1stfragopt
- CVE: https://access.redhat.com/security/cve/CVE-2017-7542
- Patch: 2.6.32/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt-pre-431.patch
- From: 2.6.32-696.20.1.el6
- CVE-2017-1000410, CVSSv2 Score: 5.0
- Description:
bluetooth: Prevent stack info leak from the EFS element.
- CVE: https://access.redhat.com/security/cve/cve-2017-1000410
- Patch: 2.6.32/bluetooth-prevent-stack-info-leak-from-the-efs-element-ver2-pre-696.10.2.patch
- From: 2.6.32-696.28.1.el6
- CVE-2017-13166, CVSSv2 Score: 4.6
- Description:
media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic
- CVE: https://access.redhat.com/security/cve/cve-2017-13166
- Patch: 2.6.32/v4l-media-refactor-compat-ioctl32-logic.patch
- From: 2.6.32-696.28.1.el6
- CVE-2017-13166, CVSSv2 Score: 4.6
- Description:
media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic fixup
- CVE: https://access.redhat.com/security/cve/cve-2017-13166
- Patch: 2.6.32/v4l-media-refactor-compat-ioctl32-logic-fixup.patch
- From: 2.6.32-696.28.1.el6
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 2.6.32/CVE-2018-3646-CVE-2018-3620-smt_disable-458.patch
- From: 2.6.32-754.3.5.el6
- Description:
- CVE:
- Patch: rhel-common/x86-cpu-intel-Introduce-macros-for-Intel-family-numb.patch
- From:
- Description:
- CVE:
- Patch: rhel-common/x86-cpu-intel-Add-Knights-Mill-to-Intel-family.patch
- From:
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 2.6.32/CVE-2018-3646-l1tf-cpu-setup.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-3646, CVSSv2 Score: 5.6
- Description:
Add ability to flush l1d cache on vmexit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 2.6.32/CVE-2018-3646-vmx-l1d-flush-458.patch
- From: 2.6.32-754.3.5.el6
- n/a, CVSSv2 Score: n/a
- Description:
ext4: use __GFP_NOFAIL in ext4_free_blocks()
- CVE: n/a
- Patch: 2.6.32/ext4-use-__GFP_NOFAIL-in-ext4_free_blocks.patch
- From: 2.6.32-954.3.5.lve1.4.58.el6
- n/a, CVSSv2 Score: n/a
- Description:
ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors
- CVE: n/a
- Patch: 2.6.32/ext4-handle-the-rest-of-ext4_mb_load_buddy.patch
- From: 2.6.32-954.3.5.lve1.4.58.el6
- CVE-2017-15265, CVSSv2 Score: 5.5
- Description:
[sound] alsa: seq: Fix use-after-free at creating a port
- CVE: https://access.redhat.com/security/cve/CVE-2017-15265
- Patch: 2.6.32/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch
- From: 2.6.32-754.3.5.el6
- CVE-2017-0861, CVSSv2 Score: 7
- Description:
[sound] alsa: pcm: prevent UAF in snd_pcm_info (CVE-2017-0861)
- CVE: https://access.redhat.com/security/cve/CVE-2017-0861
- Patch: 2.6.32/sound-alsa-pcm-prevent-UAF-in-snd_pcm_info-CVE-2017-0861.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-10901, CVSSv2 Score: 7.8
- Description:
[kvm] VMX: Fix host GDT.LIMIT corruption (CVE-2018-10301)
- CVE: https://access.redhat.com/security/cve/CVE-2018-10901
- Patch: 2.6.32/kvm-VMX-Fix-host-GDT-LIMIT-corruption-CVE-2018-10301.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-10901, CVSSv2 Score: 7.8
- Description:
[kvm] VMX: Fix host GDT.LIMIT corruption (CVE-2018-10301) (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2018-10901
- Patch: 2.6.32/kvm-VMX-Fix-host-GDT-LIMIT-corruption-CVE-2018-10301-696.16.1-kpatch-1.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
[net] tcp: avoid collapses in tcp_prune_queue() if possible
- CVE: https://access.redhat.com/security/cve/CVE-2018-5390
- Patch: 2.6.32/CVE-2018-5390-0001-net-tcp-avoid-collapses-in-tcp_prune_queue-if-possible.patch
- From: 2.6.32-754.3.5.el6
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
[net] tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- CVE: https://access.redhat.com/security/cve/CVE-2018-5390
- Patch: 2.6.32/CVE-2018-5390-0002-net-tcp-detect-malicious-patterns-in-tcp_collapse_ofo_queue.patch
- From: 2.6.32-754.3.5.el6
- CVE-2017-18344, CVSSv2 Score: 7.1
- Description:
posix-timer: Properly check sigevent->sigev_notify
- CVE: https://access.redhat.com/security/cve/cve-2017-18344
- Patch: 2.6.32/CVE-2017-18344.patch
- From: 2.6.32-954.3.5.lve1.4.58.el6
- CVE-2016-1583, CVSSv2 Score: 6.9
- Description:
eCryptFS: allocate open requests on stack
- CVE: https://access.redhat.com/security/cve/cve-2016-1583
- Patch: 2.6.32/ecryptfs-allocate-open-requests-on-stack.patch
- From: kernel-2.6.32-642.11.1.el6
- CVE-2016-1583, CVSSv2 Score: 6.9
- Description:
eCryptFS: forbid opening files without mmap handler
- CVE: https://access.redhat.com/security/cve/cve-2016-1583
- Patch: 2.6.32/ecryptfs-forbid-opening-without-mmap-handler.patch
- From: kernel-2.6.32-642.11.1.el6
- CVE-2016-8633, CVSSv2 Score: 6.8
- Description:
firewire: net: guard against rx buffer overflows
- CVE: https://access.redhat.com/security/cve/CVE-2016-8633
- Patch: 2.6.32/CVE-2016-8633.patch
- From: >kernel-2.6.32-696.13.2.el6
- CVE-2018-14634, CVSSv2 Score: 7.8
- Description:
Limit arg stack to at most 75% of _STK_LIM
- CVE: https://access.redhat.com/security/cve/cve-2018-14634
- Patch: 2.6.32/limit-stack-arg-to-75-percent-of_STK_LIM.patch
- From: >kernel-2.6.32-754.3.5.el6
- CVE-2019-11190, CVSSv2 Score: 4.7
- Description:
binfmt_elf: switch to new creds when switching to new mm
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11190
- Patch: 2.6.32/CVE-2019-11190.patch
- From: >4.8
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: enhance tcp collapsing
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/CKSIX-220-tcp-enhance-tcp-collapsing.patch
- From: >2.6.32-954.3.5.lve1.4.66.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: avoid order-1 allocations on wifi and tx path
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/CKSIX-220-tcp-avoid-order-1-allocations-on-wifi-and-tx-path.patch
- From: >2.6.32-954.3.5.lve1.4.66.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: enhance tcp_collapse_retrans() with skb_shift()
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/CKSIX-220-tcp-enhance-tcp_collapse_retrans-with-skb_shift.patch
- From: >2.6.32-954.3.5.lve1.4.66.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: limit payload size of sacked skbs
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/CKSIX-220-tcp-limit-payload-size-of-sacked-skbs.patch
- From: >2.6.32-954.3.5.lve1.4.66.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: enhance tcp collapsing
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/CKSIX-220-tcp-fix-fack_count-accounting-on-tcp_shift_skb_data.patch
- From: >2.6.32-954.3.5.lve1.4.66.el6
- CVE-2019-11478, CVSSv2 Score: 5.3
- Description:
tcp: tcp_fragment() should apply sane memory limits
- CVE: https://access.redhat.com/security/cve/cve-2019-11478
- Patch: 2.6.32/cve-2019-11478-tcp_fragments-to-apply-sane-memlims-v2.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-11479, CVSSv2 Score: 5.3
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://access.redhat.com/security/cve/cve-2019-11479
- Patch: 2.6.32/cve-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From: kernel-2.6.32-754.15.3.el6
- N/A, CVSSv2 Score: N/A
- Description:
kpatch adaptation - sysctl handle for minimal MSS
- CVE: N/A
- Patch: 2.6.32/cve-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing-kpatch-4.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
tcp: limit payload size of sacked skbs
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 2.6.32/cve-2019-11477-move-mss-below.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 2.6.32/cve-2018-10902.patch
- From: kernel-2.6.32-754.el6
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
zombieload mitigation
- CVE: https://access.redhat.com/security/cve/cve-2018-12126 https://access.redhat.com/security/cve/cve-2018-12130 https://access.redhat.com/security/cve/cve-2018-12127
- Patch: 2.6.32/zombieload-mitigation-696.16.1.patch
- From: 2.6.32-754.14.2.el6
- Description:
map kpatch code that patch .entry.text section code
- CVE:
- Patch: 2.6.32/kpatch_map_kaiser_kp_text-kcpti.patch
- From:
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 3.10.0/CVE-2018-10902-ALSA-rawmidi-shange-resize-buffers-atomically-2-pre-514.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2019-3896, CVSSv2 Score: 7.0
- Description:
idr: fix backtrack logic in idr_remove_all
- CVE: https://access.redhat.com/security/cve/cve-2019-3896
- Patch: 2.6.32/cve-2019-3896-fix-backtrack-logic-in-idr_remove_all.patch
- From: kernel-2.6.32-754.15.3.el6
- CVE-2019-3896, CVSSv2 Score: 7.0
- Description:
idr: fix top layer handling
- CVE: https://access.redhat.com/security/cve/cve-2019-3896
- Patch: 2.6.32/cve-2019-3896-idr-fix-top-layer-handling.patch
- From: kernel-2.6.32-754.15.3.el6
- N/A, CVSSv2 Score: N/A
- Description:
tcp: check skb tailroom before collapsing
- CVE: N/A
- Patch: 2.6.32/CKSIX-224.patch
- From: >2.6.32-954.3.5.lve1.4.66.el6
- CVE-2017-17805, CVSSv2 Score: 5.5
- Description:
[crypto] salsa20 - fix blkcipher_walk API usage
- CVE: https://access.redhat.com/security/cve/CVE-2017-17805
- Patch: 2.6.32/crypto-salsa20-fix-blkcipher_walk-API-usage.patch
- From: 2.6.32-754.18.2.el6
- CVE-2019-5489, CVSSv2 Score: 7.1
- Description:
[mm] mincore.c: make mincore() more conservative
- CVE: https://access.redhat.com/security/cve/CVE-2019-5489
- Patch: 2.6.32/mm-mincore.c-make-mincore-more-conservative.patch
- From: 2.6.32-754.18.2.el6
- CVE-2018-17972, CVSSv2 Score: 3.3
- Description:
[fs] proc: restrict kernel stack dumps to root
- CVE: https://access.redhat.com/security/cve/CVE-2018-17972
- Patch: 2.6.32/proc-restrict-kernel-stack-dumps-to-root.patch
- From: 2.6.32-754.18.2.el6
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
[x86] x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- CVE: https://access.redhat.com/security/cve/CVE-2019-1125
- Patch: 2.6.32/x86-speculation-Prepare-entry-code-for-Spectre-v1-sw-573.22.1.patch
- From: 2.6.32-754.18.2.el6
- Description:
- CVE:
- Patch: 2.6.32/tcp-fix-tcp_trim_head-pre-431.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/CKSIX-230-tcp-fix-retransmit-of-partially-acked-fram.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/CKSIX-230-tcp-fix-skb_availroom.patch
- From:
- CVE-2019-14835, CVSSv2 Score: 7.2
- Description:
host: make sure log_num < in_num
- CVE: https://access.redhat.com/security/cve/CVE-2019-14835
- Patch: 2.6.32/CVE-2019-14835-vhost-make-sure-log_num-in_num.patch
- From: >2.6.32-754.22.1.el6
- CVE-2019-11810, CVSSv2 Score: 6.2
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 2.6.32/CVE-2019-11810-pre-696.patch
- From: kernel-2.6.32-754.22.1.el6
- CVE-2018-9568, CVSSv2 Score: 7
- Description:
net: Set sk_prot_creator when cloning sockets to the right proto
- CVE: https://access.redhat.com/security/cve/cve-2018-9568
- Patch: 2.6.32/CVE-2018-9568-el6.patch
- From: 2.6.32-754.22.1.el6
- CVE-2019-17055, CVSSv2 Score: 3.3
- Description:
mISDN: enforce CAP_NET_RAW for raw sockets
- CVE: https://linux.oracle.com/cve/CVE-2019-17055.html
- Patch: 2.6.32/CVE-2019-17055.patch
- From: 2.6.39-400.317.1.el6uek
- CVE-2019-17133, CVSSv2 Score: 8.8
- Description:
cfg80211: wext: avoid copying malformed SSIDs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17133
- Patch: 2.6.32/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID-358.patch
- From: kernel-2.6.32-754.28.1.el6
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 2.6.32/CVE-2018-12207-mitigation-431.patch
- From: kernel-2.6.32-754.23.1.el6
- CVE-2019-14821, CVSSv2 Score: 7.0
- Description:
KVM: MMIO: Lock coalesced device when checking for available entry
- CVE: https://access.redhat.com/security/cve/cve-2019-14821
- Patch: 2.6.32/CVE-2019-14821-1-lt-504.patch
- From: 2.6.32-754.25.1.el6
- CVE-2019-14821, CVSSv2 Score: 7.0
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://access.redhat.com/security/cve/cve-2019-14821
- Patch: 2.6.32/CVE-2019-14821-2.patch
- From: 2.6.32-754.25.1.el6
- CVE-2017-6951, CVSSv2 Score: 5.5
- Description:
KEYS: Change the name of the dead type to ".dead" to prevent user access
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-6951
- Patch: 3.13.0/422472-KEYS-Change-the-name-of-the-dead-type-to-.dead-to-.patch
- From: kernel-3.13.0-130.179
- CVE-2017-6951, CVSSv2 Score: 5.5
- Description:
KEYS: Change the name of the dead type to ".dead" to prevent user access (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-6951
- Patch: 2.6.32/422472-KEYS-Change-the-name-of-the-dead-type-to-.dead-to-kpatch-1.patch
- From: kernel-3.13.0-130.179
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 2.6.32/CVE-2021-22555.patch
- From: v5.12
- CVE-2017-12192, CVSSv2 Score: 5.5
- Description:
keys: prevent KEYCTL_READ on negative key
- CVE: https://access.redhat.com/security/cve/CVE-2017-12192
- Patch: 3.10.0/security-keys-prevent-KEYCTL_READ-on-negative-key.patch
- From: 3.10.0-693.17.1.el7
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2017-2647, CVSSv2 Score: 1.9
- Description:
kernel: Null pointer dereference in search_keyring
- CVE: https://access.redhat.com/security/cve/CVE-2017-2647
- Patch: 2.6.32/kernel-Null-pointer-dereference-in-search_keyring_279.patch
- From: vzkernel-2.6.32-042stab120.20
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
prevent page refcount overflow
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 2.6.32/cve-2019-11487-358.patch
- From: kernel-2.6.32-754.35.1.el6
- CVE-2014-4508, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2014-4508.patch
- From:
- CVE-2020-29661, CVSSv2 Score: 7.8
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29661
- Patch: 2.6.32/CVE-2020-29661-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 2.6.32-754.39.1
- CVE-2021-20265, CVSSv2 Score: 5.1
- Description:
af_unix: fix struct pid memory leak
- CVE: https://access.redhat.com/security/cve/cve-2021-20265
- Patch: 2.6.32/CVE-2021-20265-0001-af_unix-fix-struct-pid-memory-leak.patch
- From: 2.6.32-754.39.1.el6
- CVE-2021-33909, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-33909.patch
- From:
- CVE-2020-12362, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12362.patch
- From:
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 2.6.32/CVE-2021-3347-futex-Handle-faults-correctly-for-PI-futexes.patch
- From: >2.6.32-754.35.1
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 2.6.32/CVE-2021-3347-futex-Provide-and-use-pi_state_update_owner.patch
- From: >2.6.32-754.35.1
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Put a lock around every call to the rdma_cm layer
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1201-RDMA-ucma-Put-a-lock-around-every-call-to-the-rdma_cm_layer-358.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: n/a
- Description:
RDMA/ucma: Put a lock around every call to the rdma_cm layer (adaptation)
- CVE: n/a
- Patch: 2.6.32/CVE-2020-36385-1201-RDMA-ucma-Put-a-lock-around-every-call-to-the-rdma_cm_layer-358-kpatch.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1202-RDMA-ucma-Add-missing-locking-to-rdma_accept-358.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1203-RDMA-ucma-Fix-the-locking-of-ctx-file.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://access.redhat.com/security/cve/CVE-2020-36385
- Patch: 2.6.32/CVE-2020-36385-1205-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-with.patch
- From: 2.6.32-754.35.8.el6
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition
- CVE: https://access.redhat.com/security/cve/cve-2021-21299
- Patch: 2.6.32/CVE-2021-32399-bluetooth-eliminate-the-po.patch
- From: 2.6.32-754.35.8.el6
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
epoll: Keep a reference on files added to the check list
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 2.6.32/CVE-2020-0466-epoll-Keep-a-reference-on-files-added-to-the-check-379.patch
- From: 2.6.32-754.35.1.el6
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 2.6.32/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 2.6.32-754.35.1.el6
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 3.10.0/CVE-2021-0920-kpatch.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 2.6.32/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 2.6.32-754.35.8.el6
- CVE-2022-0492, CVSSv2 Score: 7.8
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0492
- Patch: 2.6.32/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent-openvz.patch
- From: 2.6.32-954.3.5.lve1.4.89.el6
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://access.redhat.com/security/cve/cve-2021-22543
- Patch: 2.6.32/CVE-2021-22543-KVM-do-not-allow-mapping-valid-but-non-reference-co-954.patch
- From: 2.6.32-754.48.1.el6
- CVE-2020-11565, CVSSv2 Score: 7.8
- Description:
mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-11565
- Patch: 2.6.32/cve-2020-11565-mempolicy-require-at-least-one-nodeid.patch
- From: kernel-2.6.32-754.29.1.el6
- CVE-2020-10942, CVSSv2 Score: 5.3
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://access.redhat.com/security/cve/cve-2020-10942
- Patch: 2.6.32/cve-2020-10942-vhost-check-docket-sk_family.patch
- From: kernel-2.6.32-754.29.1.el6
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 2.6.32/proc-restrict-pagemap-access.patch
- From:
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 2.6.32/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/kpatch-add-paravirt-asm-definitions-696.20.1.patch
- From:
- Description:
- CVE:
- Patch: 2.6.32/ignore_do_signal.patch
- From: