- linux-5.10.221-1 (debian11-cloud)
- 5.10.223-1
- 2024-09-26 18:35:54
- 2024-10-02 07:50:48
- K20240926_10
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42154
- Patch: debian11/5.10.223-1/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.10.223-1
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42154
- Patch: debian11/5.10.223-1/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.10.223-1
- CVE-2024-42161, CVSSv2 Score: 7.8
- Description:
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42161
- Patch: debian11/5.10.223-1/CVE-2024-42161-bpf-avoid-uninitialized-value-in-bpf-core-read-bitfield.patch
- From: 5.10.223-1
- CVE-2024-42224, CVSSv2 Score: 7.8
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42224
- Patch: debian11/5.10.223-1/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.10.223-1
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41090
- Patch: debian11/5.10.223-1/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.10.223-1
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41091
- Patch: debian11/5.10.223-1/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.10.223-1
- N/A, CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 5.10.0/proc-restrict-pagemap-access.patch
- From: