- linux-3.2.89-1 (debian7)
- 3.2.96-3
- 2018-05-03 16:19:49
- 2018-05-03 20:19:50
- 03052018_3
- CVE-2017-7482, CVSSv2 Score: 7.1
- Description:
rxrpc: Fix several cases where a padded len isn't checked in ticket decode
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-7482
- Patch: 3.2.0/3.2.93-1-0001-rxrpc-Fix-several-cases-where-a-padded-len-isn-t-c.patch
- From: linux-3.2.93-1
- CVE-2017-7889, CVSSv2 Score: 7.8
- Description:
mm: Tighten x86 /dev/mem with zeroing reads
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-7889
- Patch: 3.2.0/3.2.93-1-0002-mm-Tighten-x86-dev-mem-with-zeroing-reads.patch
- From: linux-3.2.93-1
- CVE-2017-10911, CVSSv2 Score: 7.7
- Description:
xen-blkback: don't leak stack data via response ring
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-10911
- Patch: 3.2.0/3.2.93-1-0003-xen-blkback-don-t-leak-stack-data-via-response-rin.patch
- From: linux-3.2.93-1
- CVE-2017-1000363, CVSSv2 Score: 4.6
- Description:
char: lp: fix possible integer overflow in lp_setup()
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000363
- Patch: 3.2.0/3.2.93-1-0004-char-lp-fix-possible-integer-overflow-in-lp_setup.patch
- From: linux-3.2.93-1
- CVE-2017-1000365, CVSSv2 Score: 2.9
- Description:
fs/exec.c: account for argv/envp pointers
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000365
- Patch: 3.2.0/3.2.93-1-0005-fs-exec.c-account-for-argv-envp-pointers-3.2.89-1.patch
- From: linux-3.2.93-1
- CVE-2017-1000380, CVSSv2 Score: 5.5
- Description:
ALSA: timer: Fix race between read and ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000380
- Patch: 3.2.0/3.2.93-1-0006-ALSA-timer-Fix-race-between-read-and-ioctl.patch
- From: linux-3.2.93-1
- CVE-2017-1000380, CVSSv2 Score: 5.5
- Description:
ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000380
- Patch: 3.2.0/3.2.93-1-0007-ALSA-timer-Fix-missing-queue-indices-reset-at-SNDR.patch
- From: linux-3.2.93-1
- CVE-2017-7542, CVSSv2 Score: 5.5
- Description:
ipv6: avoid overflow of offset in ip6_find_1stfragopt
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-7542
- Patch: 3.2.0/3.2.93-1-0008-ipv6-avoid-overflow-of-offset-in-ip6_find_1stfrago.patch
- From: linux-3.2.93-1
- CVE-2017-11176, CVSSv2 Score: 7.8
- Description:
mqueue: fix a use-after-free in sys_mq_notify()
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-11176
- Patch: 3.2.0/3.2.93-1-0009-mqueue-fix-a-use-after-free-in-sys_mq_notify.patch
- From: linux-3.2.93-1
- CVE-2017-1000111, CVSSv2 Score: 7
- Description:
packet: fix tp_reserve race in packet_set_ring
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000111
- Patch: 3.2.0/3.2.93-1-0010-packet-fix-tp_reserve-race-in-packet_set_ring.patch
- From: linux-3.2.93-1
- CVE-2017-14106, CVSSv2 Score: 5.5
- Description:
tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-14106
- Patch: 3.2.0/3.2.93-1-0011-tcp-initialize-rcv_mss-to-TCP_MIN_MSS-instead-of-0.patch
- From: linux-3.2.93-1
- CVE-2017-11600, CVSSv2 Score: 5.5
- Description:
xfrm: policy: check policy direction value
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-11600
- Patch: 3.2.0/3.2.93-1-0012-xfrm-policy-check-policy-direction-value.patch
- From: linux-3.2.93-1
- CVE-2017-12134, CVSSv2 Score: 7.5
- Description:
xen: fix bio vec merging
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-12134
- Patch: 3.2.0/3.2.93-1-0013-xen-fix-bio-vec-merging.patch
- From: linux-3.2.93-1
- CVE-2017-1000251, CVSSv2 Score: 6.8
- Description:
Bluetooth: Properly check L2CAP config option output buffer length
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000251
- Patch: 3.2.0/3.2.93-1-0014-bluetooth-properly-check-l2cap-config-option-output-.patch
- From: linux-3.2.93-1
- CVE-2017-12154, CVSSv2 Score: 4.3
- Description:
kvm: nVMX: Don't allow L2 to access the hardware CR8
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-12154
- Patch: 3.2.0/3.2.93-1-0015-kvm-nvmx-don-t-allow-l2-to-access-the-hardware-cr8.patch
- From: linux-3.2.93-1
- CVE-2017-12153, CVSSv2 Score: 4.4
- Description:
nl80211: check for the required netlink attributes presence
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-12153
- Patch: 3.2.0/3.2.93-1-0016-nl80211-check-for-the-required-netlink-attributes-presence.patch
- From: linux-3.2.93-1
- CVE-2017-14489, CVSSv2 Score: 5.5
- Description:
scsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-14489
- Patch: 3.2.0/3.2.93-1-0017-scsi-fix-the-issue-that-iscsi_if_rx-doesn-t-parse-nlmsg-properly.patch
- From: linux-3.2.93-1
- CVE-2017-14156, CVSSv2 Score: 3.3
- Description:
video: fbdev: aty: do not leak uninitialized padding in clk to userspace
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-14156
- Patch: 3.2.0/3.2.93-1-0018-video-fbdev-aty-do-not-leak-uninitialized-padding-in.patch
- From: linux-3.2.93-1
- CVE-2017-14340, CVSSv2 Score: 5.5
- Description:
xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-14340
- Patch: 3.2.0/3.2.93-1-0019-xfs-xfs_is_realtime_inode-should-be-false-if-no-rt-d.patch
- From: linux-3.2.93-1
- CVE-2017-1000112, CVSSv2 Score: 6.8
- Description:
net: Fix exploitable memory corruption due to UFO to non-UFO path switch.
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000112
- Patch: 3.2.0/CVE-2017-1000111-2.patch
- From: >= 3.16.43-2+deb8u5
- CVE-2017-15868, CVSSv2 Score: 7
- Description:
verify type of l2cap socket
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15868
- Patch: 3.2.0/3.2.96-1-CVE-2017-15868-0001-bluetooth-hidp-verify-l2cap-sockets.patch
- From: linux-3.2.96-1
- CVE-2017-15868, CVSSv2 Score: 7
- Description:
add check if bnep socket is l2cap socket
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15868
- Patch: 3.2.0/3.2.96-1-CVE-2017-15868-0002-bluetooth-bnep-bnep_add_connection-should-verify-tha.patch
- From: linux-3.2.96-1
- CVE-2017-16527, CVSSv2 Score: 6.6
- Description:
use-after-free of ALSA usb-audio data
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16527
- Patch: 3.2.0/3.2.96-1-CVE-2017-16527-0001-ALSA-usb-audio-Kill-stray-URB-at-exiting.patch
- From: linux-3.2.96-1
- CVE-2016-10208, CVSSv2 Score: 4.7
- Description:
ext4: validate s_first_meta_bg at mount time
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-10208
- Patch: 3.2.0/3.2.96-1-CVE-2016-10208-0001-ext4-validate-s_first_meta_bg-at-mount-time.patch
- From: linux-3.2.96-1
- CVE-2016-10208, CVSSv2 Score: 4.7
- Description:
ext4: fix fencepost in s_first_meta_bg validation
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-10208
- Patch: 3.2.0/3.2.96-1-CVE-2016-10208-0002-ext4-fix-fencepost-in-s_first_meta_bg-validation.patch
- From: linux-3.2.96-1
- CVE-2017-8824, CVSSv2 Score: 7.8
- Description:
dccp: CVE-2017-8824: use-after-free in DCCP code
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-8824
- Patch: 3.2.0/3.2.96-1-CVE-2017-8824-0001-dccp-cve-2017-8824-use-after-free-in-dccp-code.patch
- From: linux-3.2.96-1
- CVE-2017-8831, CVSSv2 Score: 4
- Description:
saa7164: fix endian conversion in saa7164_bus_set()
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-8831
- Patch: 3.2.0/3.2.96-1-CVE-2017-8831-0001-saa7164-fix-endian-conversion-in-saa7164_bus_set.patch
- From: linux-3.2.96-1
- CVE-2017-8831, CVSSv2 Score: 4
- Description:
saa7164: fix sparse warnings
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-8831
- Patch: 3.2.0/3.2.96-1-CVE-2017-8831-0002-saa7164-fix-sparse-warnings.patch
- From: linux-3.2.96-1
- CVE-2017-8831, CVSSv2 Score: 4
- Description:
saa7164: fix double fetch PCIe access condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-8831
- Patch: 3.2.0/3.2.96-1-CVE-2017-8831-0003-saa7164-fix-double-fetch-PCIe-access-condition.patch
- From: linux-3.2.96-1
- CVE-2017-12190, CVSSv2 Score: 6.2
- Description:
fix unbalanced page refcounting in bio_map_user_iov
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-12190
- Patch: 3.2.0/3.2.96-1-CVE-2017-12190-0001-fix-unbalanced-page-refcounting-in-bio_map_user_io.patch
- From: linux-3.2.96-1
- CVE-2017-13080, CVSSv2 Score: 8.1
- Description:
mac80211: accept key reinstall without changing anything
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-13080
- Patch: 3.2.0/3.2.96-1-CVE-2017-13080-0001-mac80211-accept-key-reinstall-without-changing-any.patch
- From: linux-3.2.96-1
- CVE-2017-14051, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix an integer overflow in sysfs code
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-14051
- Patch: 3.2.0/3.2.96-1-CVE-2017-14051-0001-scsi-qla2xxx-Fix-an-integer-overflow-in-sysfs-code.patch
- From: linux-3.2.96-1
- CVE-2017-15115, CVSSv2 Score: 4.4
- Description:
sctp: do not peel off an assoc from one netns to another one
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15115
- Patch: 3.2.0/3.2.96-1-CVE-2017-15115-0001-sctp-do-not-peel-off-an-assoc-from-one-netns-to-an.patch
- From: linux-3.2.96-1
- CVE-2017-15265, CVSSv2 Score: 5.5
- Description:
ALSA: seq: Fix use-after-free at creating a port
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15265
- Patch: 3.2.0/3.2.96-1-CVE-2017-15265-0001-ALSA-seq-Fix-use-after-free-at-creating-a-port.patch
- From: linux-3.2.96-1
- CVE-2017-15299, CVSSv2 Score: 5.5
- Description:
KEYS: don't let add_key() update an uninstantiated key
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15299
- Patch: 3.2.0/3.2.96-1-CVE-2017-15299-0001-KEYS-don-t-let-add_key-update-an-uninstantiated-ke.patch
- From: linux-3.2.96-1
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: race condition in packet_bind
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15649
- Patch: 3.2.0/3.2.96-1-CVE-2017-15649-0001-packet-race-condition-in-packet_bind.patch
- From: linux-3.2.96-1
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: hold bind lock when rebinding to fanout hook
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15649
- Patch: 3.2.0/3.2.96-1-CVE-2017-15649-0002-packet-hold-bind-lock-when-rebinding-to-fanout-hoo.patch
- From: linux-3.2.96-1
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: in packet_do_bind, test fanout with bind_lock held
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-15649
- Patch: 3.2.0/3.2.96-1-CVE-2017-15649-0003-packet-in-packet_do_bind-test-fanout-with-bind_loc.patch
- From: linux-3.2.96-1
- CVE-2017-16525, CVSSv2 Score: 4.6
- Description:
USB: serial: console: fix use-after-free after failed setup
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16525
- Patch: 3.2.0/3.2.96-1-CVE-2017-16525-0001-USB-serial-console-fix-use-after-free-after-failed.patch
- From: linux-3.2.96-1
- CVE-2017-16529, CVSSv2 Score: 4.6
- Description:
ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16529
- Patch: 3.2.0/3.2.96-1-CVE-2017-16529-0001-ALSA-usb-audio-Check-out-of-bounds-access-by-corru.patch
- From: linux-3.2.96-1
- CVE-2017-16531, CVSSv2 Score: 4.6
- Description:
USB: fix out-of-bounds in usb_set_configuration
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16531
- Patch: 3.2.0/3.2.96-1-CVE-2017-16531-0001-USB-fix-out-of-bounds-in-usb_set_configuration.patch
- From: linux-3.2.96-1
- CVE-2017-16532, CVSSv2 Score: 4.6
- Description:
usb: usbtest: fix NULL pointer dereference
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16532
- Patch: 3.2.0/3.2.96-1-CVE-2017-16532-0001-usb-usbtest-fix-NULL-pointer-dereference.patch
- From: linux-3.2.96-1
- CVE-2017-16533, CVSSv2 Score: 4.6
- Description:
HID: usbhid: fix out-of-bounds bug
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16533
- Patch: 3.2.0/3.2.96-1-CVE-2017-16533-0001-HID-usbhid-fix-out-of-bounds-bug.patch
- From: linux-3.2.96-1
- CVE-2017-16535, CVSSv2 Score: 4.6
- Description:
USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16535
- Patch: 3.2.0/3.2.96-1-CVE-2017-16535-0001-USB-core-fix-out-of-bounds-access-bug-in-usb_get_b.patch
- From: linux-3.2.96-1
- CVE-2017-16536, CVSSv2 Score: 4.6
- Description:
cx231xx-cards: fix NULL-deref on missing association descriptor
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16536
- Patch: 3.2.0/3.2.96-1-CVE-2017-16536-0001-cx231xx-cards-fix-NULL-deref-on-missing-associatio.patch
- From: linux-3.2.96-1
- CVE-2017-16537, CVSSv2 Score: 4.6
- Description:
media: imon: Fix null-ptr-deref in imon_probe
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16537
- Patch: 3.2.0/3.2.96-1-CVE-2017-16537-0001-media-imon-Fix-null-ptr-deref-in-imon_probe.patch
- From: linux-3.2.96-1
- CVE-2017-16643, CVSSv2 Score: 4.6
- Description:
Input: gtco - fix potential out-of-bound access
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16643
- Patch: 3.2.0/3.2.96-1-CVE-2017-16643-0001-Input-gtco-fix-potential-out-of-bound-access.patch
- From: linux-3.2.96-1
- CVE-2017-16649, CVSSv2 Score: 4.6
- Description:
net: cdc_ether: fix divide by 0 on bad descriptors
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16649
- Patch: 3.2.0/3.2.96-1-CVE-2017-16649-0001-net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch
- From: linux-3.2.96-1
- CVE-2017-16939, CVSSv2 Score: 6.2
- Description:
ipsec: Fix aborted xfrm policy dump crash
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-16939
- Patch: 3.2.0/3.2.96-1-CVE-2017-16939-0001-ipsec-fix-aborted-xfrm-policy-dump-crash.patch
- From: linux-3.2.96-1
- CVE-2017-1000407, CVSSv2 Score: 4.6
- Description:
KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000407
- Patch: 3.2.0/3.2.96-1-CVE-2017-1000407-0001-kvm-vmx-remove-i-o-port-0x80-bypass-on-intel-hosts.patch
- From: linux-3.2.96-1
- CVE-2017-17558, CVSSv2 Score: 7.2
- Description:
memory corruption in USB core subsystem
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-17558
- Patch: 3.2.0/CVE-2017-17558-0001-USB-core-prevent-malicious-bNumInterfaces-overflow.patch
- From: 3.2.96-1
- CVE-2017-17741, CVSSv2 Score: 2.1
- Description:
Fix stack out-of-bounds read in write_mmio
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-17741
- Patch: 3.2.0/CVE-2017-17741-0001-KVM-Fix-stack-out-of-bounds-read-in-write_mmio.patch
- From: 3.2.96-1
- CVE-2017-17805, CVSSv2 Score: 7.2
- Description:
crypto: salsa20 - fix blkcipher_walk API usage
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-17805
- Patch: 3.2.0/CVE-2017-17805-0001-crypto-salsa20-fix-blkcipher_walk-API-usage.patch
- From: 3.2.96-1
- CVE-2017-5754, CVSSv2 Score: 7.9
- Description:
add kernel page table isolation feature(aka KAISER)
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-5754
- Patch: 3.2.0/kcpti-debian7-v2.patch
- From: 3.2.96-3
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: fix cpu hotplug crash
- CVE: N/A
- Patch: 3.2.0/kcpti-fix-cpu-hotplug-crash-v2.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: ignore Xen PV guests
- CVE: N/A
- Patch: 3.2.0/kcpti-fix-Xen-PV-guests-crashes.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: map performance monitoring buffers
- CVE: N/A
- Patch: 3.2.0/kcpti-map-performance-monitoring-buffers.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: align trampoline stack to 16
- CVE: N/A
- Patch: 3.2.0/kcpti-align-trampoline-stack-to-16.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: free all shadow page table layers
- CVE: N/A
- Patch: 3.2.0/kcpti-free-all-shadow-page-table-layers.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: check present flag when removing global pte flag
- CVE: N/A
- Patch: 3.2.0/kcpti-respect-present-flag-during-kcpti_remove_page_.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: ignore AMD processors
- CVE: N/A
- Patch: 3.2.0/kcpti-ignore-AMD-processors.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: apply patch to Xen PV domains
- CVE: N/A
- Patch: 3.2.0/kcpti-apply-patch-to-Xen-PV-domains-v2.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: fix use after free
- CVE: N/A
- Patch: 3.2.0/kcpti-fix-use-after-free-in-kcpti_exit_pre.patch
- From: N/A
- Description:
- CVE:
- Patch: 3.2.0/kcpti-remove-irqentry-text.patch
- From:
- CVE-2018-1000199, CVSSv2 Score: n/a
- Description:
perf/hwbp: Simplify the perf-hwbp code, fix documentation
- CVE: https://access.redhat.com/security/cve/CVE-2018-1000199
- Patch: 3.2.0/perf-hwbp-Simplify-the-perf-hwbp-code-fix-documentat.patch
- From: >3.2.96-3
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 3.2.0/proc-restrict-pagemap-access.patch
- From: