- linux-5.10.197-1 (debian11)
- 5.10.218-1
- 2024-06-26 13:30:37
- 2024-06-28 07:29:48
- K20240626_02
- CVE-2024-0193, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: skip set commit for deleted/destroyed sets
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0193
- Patch: debian11/CVE-2024-0193-netfilter-nf_tables-skip-set-commit-for-deleted-destroyed-sets.patch
- From: 5.10.205-1
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-1086
- Patch: debian11/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE_DROP-verdict-parameters.patch
- From: 5.10.209-2
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0646
- Patch: debian11/5.10.209-2/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.10.209-1
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6040
- Patch: debian11/5.10.209-2/CVE-2023-6040-patch-netfilter-nf-tables-reject-tables-of-unsupported-family.patch
- From: 5.10.209-1
- CVE-2023-39198, CVSSv2 Score: 7.5
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-39198
- Patch: debian11/5.10.209-2/CVE-2023-39198-patch-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.10.209-1
- CVE-2023-46838, CVSSv2 Score: 7.5
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-46838
- Patch: debian11/5.10.209-2/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags.patch
- From: 5.10.209-1
- CVE-2023-6915, CVSSv2 Score: 7.5
- Description:
[PATCH] ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6915
- Patch: debian11/5.10.209-2/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.10.209-1
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6606
- Patch: debian11/5.10.209-2/CVE-2023-6606-patch-smb-client-fix-oob-in-smbcalcsize.patch
- From: 5.10.209-1
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-51779
- Patch: debian11/5.10.209-2/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.10.209-1
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52340
- Patch: debian11/5.10.209-2/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.10.209-1
- CVE-2023-52604, CVSSv2 Score: 7.8
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52604
- Patch: debian11/5.10.216-1/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbAdjTree.patch
- From: 5.10.216-1
- CVE-2023-52601, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52601
- Patch: debian11/5.10.216-1/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree-205.patch
- From: 5.10.216-1
- CVE-2024-26593, CVSSv2 Score: 7.1
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26593
- Patch: debian11/5.10.216-1/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions-205.patch
- From: 5.10.216-1
- CVE-2023-52603, CVSSv2 Score: 7.1
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52603
- Patch: debian11/5.10.216-1/CVE-2023-52603-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.10.216-1
- CVE-2023-52599, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52599
- Patch: debian11/5.10.216-1/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.10.216-1
- CVE-2023-6270 CVE-2024-26898, CVSSv2 Score: 4.4
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26898
- Patch: debian11/5.10.216-1/CVE-2023-6270-CVE-2024-26898-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 5.10.216-1
- CVE-2023-52597, CVSSv2 Score:
- Description:
CVE patch is for s390 arch only
- CVE:
- Patch: skipped/CVE-2023-52597.patch
- From:
- CVE-2023-52606, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2023-52606.patch
- From:
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in smb2_parse_contexts()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52434
- Patch: debian11/5.10.216-1/CVE-2023-52434-smb-client-fix-potential-oobs-in-smb2-parse-contexts.patch
- From: 5.10.216-1
- CVE-2023-52600, CVSSv2 Score: 7.8
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52600
- Patch: debian11/5.10.216-1/CVE-2023-52600-jfs-fix-uaf-in-jfs-evict-inode.patch
- From: 5.10.216-1
- CVE-2024-0565, CVSSv2 Score: 8.8
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0565
- Patch: debian11/5.10.216-1/CVE-2024-0565-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 5.10.216-1
- CVE-2024-0607, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0607
- Patch: debian11/5.10.216-1/CVE-2024-0607-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.10.216-1
- CVE-2024-0841, CVSSv2 Score: 7.8
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0841
- Patch: debian11/5.10.216-1/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.10.216-1
- CVE-2024-26622, CVSSv2 Score: 7.8
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26622
- Patch: debian11/5.10.216-1/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.10.216-1
- CVE-2024-26625, CVSSv2 Score: 7.8
- Description:
llc: call sock_orphan() at release time
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26625
- Patch: debian11/5.10.216-1/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.10.216-1
- CVE-2024-26688, CVSSv2 Score:
- Description:
CVE patch is the same as CVE-2024-0841
- CVE:
- Patch: skipped/CVE-2024-26688.patch
- From:
- CVE-2024-26900, CVSSv2 Score: 5.5
- Description:
md: fix kmemleak of rdev->serial
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26900
- Patch: debian11/5.10.218-1/CVE-2024-26900-md-fix-kmemleak-of-rdev-serial.patch
- From: 5.10.218-1
- CVE-2024-27398, CVSSv2 Score: 5.5
- Description:
Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27398
- Patch: debian11/5.10.218-1/CVE-2024-27398-Bluetooth-Fix-use-after-free-bugs-caused-by-sco_sock_timeout.patch
- From: 5.10.218-1
- CVE-2022-48655, CVSSv2 Score: 7.8
- Description:
firmware: arm_scmi: Harden accesses to the reset domains
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-48655
- Patch: debian11/5.10.218-1/CVE-2022-48655-firmware-arm_scmi-Harden-accesses-to-the-reset-domains.patch
- From: 5.10.218-1
- CVE-2024-35947, CVSSv2 Score: 5.5
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-35947
- Patch: debian11/5.10.218-1/CVE-2024-35947-dyndbg-fix-old-BUG_ON-in-control-parser.patch
- From: 5.10.218-1
- CVE-2024-27401, CVSSv2 Score: 5.5
- Description:
firewire: nosy: ensure user_length is taken into account when fetching packet contents
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27401
- Patch: debian11/5.10.218-1/CVE-2024-27401-firewire-nosy-ensure-user_length-is-taken-into-account-when-fetching-packet-contents.patch
- From: 5.10.218-1
- CVE-2024-27399, CVSSv2 Score: 5.5
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27399
- Patch: debian11/5.10.218-1/CVE-2024-27399-Bluetooth-l2cap-fix-null-ptr-deref-in-l2cap_chan_timeout.patch
- From: 5.10.218-1
- CVE-2024-35848, CVSSv2 Score: 5.5
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-35848
- Patch: debian11/5.10.218-1/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-condition.patch
- From: 5.10.218-1
- CVE-2023-52585, CVSSv2 Score: 4.4
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52585
- Patch: debian11/5.10.218-1/CVE-2023-52585-drm-amdgpu-Fix-possible-NULL-dereference-in-amdgpu_ras_query_error_status_helper.patch
- From: 5.10.218-1
- N/A, CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 5.10.0/proc-restrict-pagemap-access.patch
- From:
- CVE-2021-44879, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on inode type during garbage collection
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-44879
- Patch: debian11/CVE-2021-44879-f2fs-fix-to-do-sanity-check-on-inode-type-during-garbage-collection.patch
- From: 5.10.205-2
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-5178
- Patch: debian11/CVE-2023-5178-nvmet-tcp-Fix-a-possible-UAF-in-queue-intialization-setup.patch
- From: 5.10.205-2
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6121
- Patch: debian11/CVE-2023-6121-nvmet-nul-terminate-the-NQNs-passed-in-the-connect-comand.patch
- From: 5.10.205-2
- CVE-2023-6531, CVSSv2 Score: 4.3
- Description:
io_uring/af_unix: disable sending io_uring over sockets
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6531
- Patch: debian11/CVE-2023-6531-io_uring-af_unix-disable-sending-io_uring-over-sockets.patch
- From: 5.10.205-2
- CVE-2023-6817, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: skip inactive elements during set walk
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6817
- Patch: debian11/CVE-2023-6817-netfilter-nft_set_pipapo-skip-inactive-elements-during-set-walk.patch
- From: 5.10.205-2
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6931
- Patch: debian11/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.10.205-2
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6931
- Patch: debian11/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.10.205-2
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6932
- Patch: debian11/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.10.205-2
- CVE-2023-5197, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow rule removal from chain binding
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-5197
- Patch: debian11/CVE-2023-5197-netfilter-nf_tables-disallow-rule-removal-from-chain-binding.patch
- From: 5.10.205-2
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-5717
- Patch: debian11/CVE-2023-5717-perf-Disallow-mis-matched-inherited-group-reads.patch
- From: 5.10.205-2
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-5717
- Patch: debian11/CVE-2023-5717-perf-Disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 5.10.205-2
- CVE-2023-25775, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-25775.patch
- From:
- CVE-2023-34324, CVSSv2 Score: 4.9
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-34324
- Patch: debian11/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU.patch
- From: 5.10.205-2
- CVE-2023-34324, CVSSv2 Score: 4.9
- Description:
xen/events: replace evtchn_rwlock with RCU (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-34324
- Patch: debian11/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.10.205-2
- CVE-2023-35827, CVSSv2 Score: 7.0
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-35827
- Patch: debian11/CVE-2023-35827-ravb-Fix-use-after-free-issue-in-ravb_tx_timeout_work.patch
- From: 5.10.205-2
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-45863
- Patch: debian11/CVE-2023-45863-kobject-Fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 5.10.205-2
- CVE-2023-46813, CVSSv2 Score:
- Description:
Affected code not present.
- CVE:
- Patch: skipped/CVE-2023-46813.patch
- From:
- CVE-2023-46862, CVSSv2 Score:
- Description:
till debian11 kernel 'linux-5.10.197-1', afftected code isn't present.
- CVE:
- Patch: skipped/CVE-2023-46862.patch
- From:
- CVE-2023-51780, CVSSv2 Score: 7.8
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-51780
- Patch: debian11/CVE-2023-51780-atm-Fix-Use-After-Free-in-do_vcc_ioctl.patch
- From: 5.10.205-2
- CVE-2023-51781, CVSSv2 Score: 7.8
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-51781
- Patch: debian11/CVE-2023-51781-appletalk-Fix-Use-After-Free-in-atalk_ioctl.patch
- From: 5.10.205-2
- CVE-2023-51782, CVSSv2 Score: Not assigned yet
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-51782
- Patch: debian11/CVE-2023-51782-net-rose-Fix-Use-After-Free-in-rose_ioctl.patch
- From: 5.10.205-2