- kernel-3.10.0-123.1.2.el7 (centos7)
- 3.10.0-1160.42.2.el7
- 2021-09-24 17:29:19
- 2021-09-24 21:57:44
- K20210925_01
- CVE-2014-0206, CVSSv2 Score: 4
- Description:
fs: aio: fix plug memory disclosure and fix reqs_active accounting backport
- CVE: https://access.redhat.com/security/cve/CVE-2014-0206
- Patch: 3.10.0/fs-aio-fix-kernel-memory-disclosure-in-io_getevents-int.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-0206, CVSSv2 Score: 4
- Description:
fs: aio: plug memory disclosure and fix reqs_active accounting
- CVE: https://access.redhat.com/security/cve/CVE-2014-0206
- Patch: 3.10.0/fs-aio-plug-memory-disclosure-and-fix-reqs_active-accounting.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-2851, CVSSv2 Score: 6.2
- Description:
net: ipv4: current group_info should be put after using
- CVE: https://access.redhat.com/security/cve/CVE-2014-2851
- Patch: 3.10.0/net-ipv4-current-group_info-should-be-put-after-using.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-3144 CVE-2014-3145, CVSSv2 Score: 5.4
- Description:
net: filter: prevent nla extensions to peek beyond the end of the message
- CVE: https://access.redhat.com/security/cve/CVE-2014-3144 https://access.redhat.com/security/cve/CVE-2014-3145
- Patch: 3.10.0/net-filter-prevent-nla-extensions-to-peek-beyond-the-end-of-the-message.patch
- From: kernel-3.10.0-123.el7
- CVE-2014-1737 CVE-2014-1738, CVSSv2 Score: 6.6
- Description:
block: floppy: ignore kernel-only members in FDRAWCMD ioctl input
- CVE: https://access.redhat.com/security/cve/CVE-2014-1737 https://access.redhat.com/security/cve/CVE-2014-1738
- Patch: 3.10.0/block-floppy-ignore-kernel-only-members-in-FDRAWCMD-ioctl-input.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-1737 CVE-2014-1738, CVSSv2 Score: 6.6
- Description:
block: floppy: don't write kernel-only members to FDRAWCMD ioctl output
- CVE: https://access.redhat.com/security/cve/CVE-2014-1737 https://access.redhat.com/security/cve/CVE-2014-1738
- Patch: 3.10.0/block-floppy-dont-write-kernel-only-members-to-FDRAWCMD-ioctl-output.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-2568, CVSSv2 Score: 2.9
- Description:
net: core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors
- CVE: https://access.redhat.com/security/cve/CVE-2014-2568
- Patch: 3.10.0/net-core-nfqueue-openvswitch-Orphan-frags-in-skb_zerocopy-and-handle-errors.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-3153, CVSSv2 Score: 7.2
- Description:
kernel: futex: prevent requeue pi on same futex
- CVE: https://access.redhat.com/security/cve/CVE-2014-3153
- Patch: 3.10.0/kernel-futex-prevent-requeue-pi-on-same-futex.patch-futex-F.patch
- From: kernel-3.10.0-123.1.2.el7
- CVE-2014-4699, CVSSv2 Score: 6.9
- Description:
kernel: ptrace,x86: force IRET path after a ptrace_stop()
- CVE: https://security-tracker.debian.org/tracker/CVE-2014-4699
- Patch: 3.10.0/4376-x86-ptrace-force-IRET-path-after-a-ptrace_stop.patch
- From: kernel-3.10.0-123.4.4.el7
- CVE-2014-4943, CVSSv2 Score: 7.2
- Description:
net: l2tp: don't fall back on UDP [get|set]sockopt()
- CVE: https://access.redhat.com/security/cve/CVE-2014-4943
- Patch: 3.10.0/net-l2tp-dont-fall-back-on-UDP-get-set-sockopt.patch
- From:
- CVE-2014-5045, CVSSv2 Score:
- Description:
fs: Fix umount ref count leak.
- CVE: https://access.redhat.com/security/cve/CVE-2014-5045
- Patch: 3.10.0/fs-umount-on-symlink-leaks-mnt-count.patch
- From: vzkernel-2.6.32-042stab092.3
- CVE-2014-2672, CVSSv2 Score: 5.4
- Description:
ath9k: protect tid->sched check
- CVE: https://access.redhat.com/security/cve/CVE-2014-2672
- Patch: 3.10.0/ath9k-protect-tid-sched-check.patch
- From: kernel-3.10.0-123.6.3.el6
- CVE-2014-2706, CVSSv2 Score: 5.4
- Description:
mac80211: fix AP powersave TX vs. wakeup race
- CVE: https://access.redhat.com/security/cve/CVE-2014-2706
- Patch: 3.10.0/mac80211-fix-ap-powersave-tx-vs-wakeup-race.patch
- From: kernel-3.10.0-123.6.3.el6
- CVE-2014-4667, CVSSv2 Score: 5
- Description:
sctp: Fix sk_ack_backlog wrap-around problem
- CVE: https://access.redhat.com/security/cve/CVE-2014-4667
- Patch: 3.10.0/sctp-fix-sk_ack_backlog-wrap-around-problem.patch
- From: kernel-3.10.0-123.6.3.el6
- CVE-2014-3917, CVSSv2 Score: 4.7
- Description:
auditsc: audit_krule mask accesses need bounds checking
- CVE: https://access.redhat.com/security/cve/CVE-2014-3917
- Patch: 3.10.0/4412-kernel-auditsc-audit_krule-mask-accesses-need-bounds.patch
- From: kernel-3.10.0-123.8.1.el7
- CVE-2014-5077, CVSSv2 Score:
- Description:
SCTP: Fix auth_capable inheritence on INIT collision
- CVE: https://access.redhat.com/security/cve/CVE-2014-5077
- Patch: 3.10.0/net-v2-net-sctp-inherit-auth_capable-on-INIT-collisions.patch
- From: >kernel-3.10.0-123.4.4.el6
- CVE-2014-3611, CVSSv2 Score: 5.5
- Description:
KVM: x86: Improve thread safety in pit
- CVE: https://access.redhat.com/security/cve/CVE-2014-3611
- Patch: 3.10.0/kvm-x86-Improve-thread-safety-in-pit.patch
- From: kernel-3.10.0-123.9.2.el7
- CVE-2014-4653, CVSSv2 Score: 3.8
- Description:
ALSA: control: Don't access controls outside of protected regions
- CVE: https://access.redhat.com/security/cve/CVE-2014-4653
- Patch: 3.10.0/alsa-control-don-t-access-controls-outside-of-protected.patch
- From: kernel-3.10.0-123.9.2.el7
- CVE-2014-3645 CVE-2014-3646, CVSSv2 Score: 4.7
- Description:
kvm/vmx: handle invept and invvpid vm exits gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2014-3646
- Patch: 3.10.0/kvm-vmx-handle-invept-and-invvpid-vm-exit-gracefully.patch
- From: kernel-3.10.0-123.9.2.el7
- CVE-2014-3645 CVE-2014-3646, CVSSv2 Score: 4.7
- Description:
kvm/vmx: handle invept and invvpid vm exits gracefully
- CVE: https://access.redhat.com/security/cve/CVE-2014-3646
- Patch: 3.10.0/kvm-vmx-handle-invept-and-invvpid-vm-exit-gracefully-kpatch-1.patch
- From: kernel-3.10.0-123.9.2.el7
- CVE-2014-4027, CVSSv2 Score: 2.3
- Description:
target/rd: Refactor rd_build_device_space + rd_release_device_space
- CVE: https://access.redhat.com/security/cve/CVE-2014-4027
- Patch: 3.10.0/4479-target-rd-Refactor-rd_build_device_space-rd_release_.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-1739, CVSSv2 Score: 1.7
- Description:
media-device: fix infoleak in ioctl media_enum_entities()
- CVE: https://access.redhat.com/security/cve/CVE-2014-1739
- Patch: 3.10.0/4480-media-media-device-fix-an-information-leakage.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2013-2929, CVSSv2 Score: 1.9
- Description:
exec/ptrace: fix get_dumpable() incorrect tests
- CVE: https://access.redhat.com/security/cve/CVE-2013-2929
- Patch: 3.10.0/4481-kernel-ptrace-get_dumpable-incorrect-tests.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-5045, CVSSv2 Score: 6.2
- Description:
vfs: fix ref count leak in path_mountpoint()
- CVE: https://access.redhat.com/security/cve/CVE-2014-5045
- Patch: 3.10.0/4482-fs-vfs-fix-ref-count-leak-in-path_mountpoint.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3181, CVSSv2 Score: 6.2
- Description:
HID: magicmouse: sanity check report size in raw_event() callback
- CVE: https://access.redhat.com/security/cve/CVE-2014-3181
- Patch: 3.10.0/4484-hid-fix-OOB-write-in-magicmouse-driver.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3182, CVSSv2 Score: 6.2
- Description:
HID: logitech: perform bounds checking on device_id early enough
- CVE: https://access.redhat.com/security/cve/CVE-2014-3182
- Patch: 3.10.0/4485-hid-logitech-dj-fix-OOB-array-access.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3184, CVSSv2 Score: 1.2
- Description:
HID: off by one error in various _report_fixup routines
- CVE: https://access.redhat.com/security/cve/CVE-2014-3184
- Patch: 3.10.0/4486-hid-fix-off-by-one-error-in-various-_report_fixup-ro.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3185, CVSSv2 Score: 6.2
- Description:
USB: whiteheat: Added bounds checking for bulk command response
- CVE: https://access.redhat.com/security/cve/CVE-2014-3185
- Patch: 3.10.0/4487-usb-serial-whiteheat-fix-memory-corruption-flaw.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3186, CVSSv2 Score: 6.2
- Description:
HID: picolcd: sanity check report size in raw_event() callback
- CVE: https://access.redhat.com/security/cve/CVE-2014-3186
- Patch: 3.10.0/4488-hid-picolcd-fix-memory-corruption-via-OOB-write.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-6410, CVSSv2 Score: 4.9
- Description:
udf: Avoid infinite loop when processing indirect ICBs
- CVE: https://access.redhat.com/security/cve/CVE-2014-6410
- Patch: 3.10.0/4489-fs-udf-Avoid-infinite-loop-when-processing-indirect-.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3631, CVSSv2 Score: 4.9
- Description:
assoc_array: Fix termination condition in assoc array garbage collection
- CVE: https://access.redhat.com/security/cve/CVE-2014-3631
- Patch: 3.10.0/4498-lib-assoc_array-Fix-termination-condition-in-assoc-a.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3673, CVSSv2 Score: 7.1
- Description:
net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks
- CVE: https://access.redhat.com/security/cve/CVE-2014-3673
- Patch: 3.10.0/4502-net-sctp-fix-skb_over_panic-when-receiving-malformed.patch
- From: kernel-3.10.0-123.13.1.el7
- CVE-2014-3687, CVSSv2 Score: 7.1
- Description:
net: sctp: fix panic on duplicate ASCONF chunks
- CVE: https://access.redhat.com/security/cve/CVE-2014-3687
- Patch: 3.10.0/4503-net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-3688, CVSSv2 Score: 7.1
- Description:
net: sctp: fix remote memory pressure from excessive queueing
- CVE: https://access.redhat.com/security/cve/CVE-2014-3688
- Patch: 3.10.0/4504-net-sctp-fix-remote-memory-pressure-from-excessive-q.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-4654 CVE-2014-4655, CVSSv2 Score: 3.8
- Description:
ALSA: control: Fix replacing user controls
- CVE: https://access.redhat.com/security/cve/CVE-2014-4655
- Patch: 3.10.0/4505-alsa-control-Fix-replacing-user-controls.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-4652, CVSSv2 Score: 1.5
- Description:
ALSA: control: Fix replacing user controls
- CVE: https://access.redhat.com/security/cve/CVE-2014-4652
- Patch: 3.10.0/4506-alsa-control-Protect-user-controls-against-concurren.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-4652, CVSSv2 Score: 1.5
- Description:
ALSA: control: Fix replacing user controls
- CVE: https://access.redhat.com/security/cve/CVE-2014-4652
- Patch: 3.10.0/4506-alsa-control-Protect-user-controls-against-concurren.kpatch-1.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-4656, CVSSv2 Score: 5.0
- Description:
ALSA: control: Handle numid overflow
- CVE: https://access.redhat.com/security/cve/CVE-2014-4656
- Patch: 3.10.0/4507-alsa-control-Handle-numid-overflow.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-4656, CVSSv2 Score: 5.0
- Description:
ALSA: control: Make sure that id->index does not overflow
- CVE: https://access.redhat.com/security/cve/CVE-2014-4656
- Patch: 3.10.0/4508-alsa-control-Make-sure-that-id-index-does-not-overfl.patch
- From: kernel-3.10.0-123.9.3.el7
- CVE-2014-9322, CVSSv2 Score: 7.2
- Description:
x86_64, traps: Stop using IST for #SS
- CVE: https://access.redhat.com/security/cve/CVE-2014-9322
- Patch: 3.10.0/4516-x86-traps-stop-using-IST-for-SS.patch
- From: kernel-3.10.0-123.13.2.el7
- CVE-2014-9322, CVSSv2 Score: 7.2
- Description:
x86_64, traps: Stop using IST for #SS
- CVE: https://access.redhat.com/security/cve/CVE-2014-9322
- Patch: 3.10.0/4516-x86-traps-stop-using-IST-for-SS.kpatch-1.patch
- From: kernel-3.10.0-123.13.2.el7
- CVE-2014-7841, CVSSv2 Score: 7.1
- Description:
net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks
- CVE: https://access.redhat.com/security/cve/CVE-2014-7841
- Patch: 3.10.0/net-sctp-fix-NULL-pointer-dereference-in-af-from_addr_param-on-malformed-packet.patch
- From: kernel-3.10.0-123.20.1el7
- CVE-2014-4171, CVSSv2 Score: 4.0
- Description:
shmem: fix faulting into a hole while it's punched
- CVE: https://access.redhat.com/security/cve/CVE-2014-4171
- Patch: 3.10.0/shmem-fix-faulting-into-a-hole-while-its-punched.patch
- From: kernel-3.10.0-123.20.1.el7
- CVE-2014-4171, CVSSv2 Score: 4.0
- Description:
shmem: fix faulting into a hole, not taking i_mutex
- CVE: https://access.redhat.com/security/cve/CVE-2014-4171
- Patch: 3.10.0/shmem-fix-faulting-into-a-hole,-not-taking-i_mutex.patch
- From: kernel-3.10.0-123.20.1.el7
- CVE-2014-4171, CVSSv2 Score: 4.0
- Description:
shmem: fix splicing from a hole while it's punched
- CVE: https://access.redhat.com/security/cve/CVE-2014-4171
- Patch: 3.10.0/shmem-fix-splicing-from-a-hole-while-its-punched.patch
- From: kernel-3.10.0-123.20.1.el7
- CVE-2014-7145, CVSSv2 Score: 4.6
- Description:
cifs: Possible null ptr deref in SMB2_tcon
- CVE: https://access.redhat.com/security/cve/CVE-2014-7145
- Patch: 3.10.0/cifs-possible-null-ptr-deref-in-smb2_tcon.patch
- From: kernel-3.10.0-123.20.1.el7
- CVE-2014-7822, CVSSv2 Score: 4.6
- Description:
kernel: splice: lack of generic write checks
- CVE: https://access.redhat.com/security/cve/CVE-2014-7822
- Patch: 3.10.0/kernel-splice-lack-of-generic-write-checks.patch
- From: kernel-3.10.0-123.20.1.el7
- CVE-2014-5471, CVE-2014-5472, CVSSv2 Score: 6.2
- Description:
isofs: Fix unbounded recursion when processing relocated directories
- CVE: https://access.redhat.com/security/cve/CVE-2014-5472
- Patch: 3.10.0/isofs-fix-unbounded-recursion-when-processing-relocated.patch
- From: kernel-3.10.0-123.20.1.el7
- CVE-2015-0274, CVSSv2 Score: 6.9
- Description:
xfs: remote attribute overwrite causes transaction overrun
- CVE: https://access.redhat.com/security/cve/CVE-2015-0274
- Patch: 3.10.0/xfs-remote-attribute-overwrite-causes-transaction-overrun.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-3690, CVSSv2 Score: 4.7
- Description:
x86,kvm,vmx: Preserve CR4 across VM entry
- CVE: https://access.redhat.com/security/cve/CVE-2014-3690
- Patch: 3.10.0/x86-kvm-vmx-Preserve-CR4-across-VM-entry.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-3690, CVSSv2 Score: 4.7
- Description:
x86,kvm,vmx: Preserve CR4 across VM entry
- CVE: https://access.redhat.com/security/cve/CVE-2014-3690
- Patch: 3.10.0/x86-kvm-vmx-Preserve-CR4-across-VM-entry.kpatch-1.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-3940, CVSSv2 Score: 4.7
- Description:
mm: add !pte_present() check on existing hugetlb_entry callbacks
- CVE: https://access.redhat.com/security/cve/CVE-2014-3940
- Patch: 3.10.0/mm-add-pte_present-check-on-existing-hugetlb_entry-c.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-7825 CVE-2014-7826, CVSSv2 Score: 4
- Description:
tracing/syscalls: Ignore numbers outside NR_syscalls' range
- CVE: https://access.redhat.com/security/cve/CVE-2014-7826
- Patch: 3.10.0/tracing-syscalls-Ignore-numbers-outside-NR_syscalls-.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-8086, CVSSv2 Score: 4.7
- Description:
ext4: prevent bugon on race between write/fcntl
- CVE: https://access.redhat.com/security/cve/CVE-2014-8086
- Patch: 3.10.0/ext4-prevent-bugon-on-race-between-write-fcntl.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-8160, CVSSv2 Score: 5.8
- Description:
netfilter: conntrack: disable generic tracking for known protocols
- CVE: https://access.redhat.com/security/cve/CVE-2014-8160
- Patch: 3.10.0/netfilter-conntrack-disable-generic-tracking-for-kno.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-8173, CVSSv2 Score: 4.9
- Description:
mm: Fix NULL pointer dereference in madvise(MADV_WILLNEED) support
- CVE: https://access.redhat.com/security/cve/CVE-2014-8173
- Patch: 3.10.0/mm-Fix-NULL-pointer-dereference-in-madvise-MADV_WILL.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-8709, CVSSv2 Score: 1.8
- Description:
mac80211: fix fragmentation code, particularly for encryption
- CVE: https://access.redhat.com/security/cve/CVE-2014-8709
- Patch: 3.10.0/mac80211-fix-fragmentation-code-particularly-for-enc.patch
- From: kernel-3.10.0-229.el7
- CVE-2014-8884, CVSSv2 Score:
- Description:
[media] ttusb-dec: buffer overflow in ioctl
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8884
- Patch: 3.10.0/ttusb-dec-buffer-overflow-in-ioctl.patch
- From: kernel-3.10.0-229.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: improve socket create/bind latency in some cases
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-improve-socket-create-bind-latency-in-some-cases.patch
- From: 3.10.0-229.el7
- CVE-2018-1087, CVSSv2 Score: 8
- Description:
kvm/vmx: Fix DR6 update on #DB exception
- CVE: https://access.redhat.com/security/cve/CVE-2015-5283
- Patch: 3.10.0/virt-kvm-vmx-Fix-DR6-update-on-DB-exception.patch
- From: 3.10.0-229.el7
- CVE-2018-1087, CVSSv2 Score: 8
- Description:
kvm/vmx: Advance rip to after an ICEBP instruction
- CVE: https://access.redhat.com/security/cve/CVE-2015-5283
- Patch: 3.10.0/virt-kvm-vmx-Advance-rip-to-after-an-ICEBP-instruction.patch
- From: 3.10.0-229.el7
- CVE-2015-1421, CVSSv2 Score: 7.1
- Description:
net: sctp: fix slab corruption from use after free on INIT collisions
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-1421
- Patch: 3.10.0/net-sctp-fix-slab-corruption-from-use-after-free-on-INIT-collisions.patch
- From: kernel-3.10.0-229.1.2.el7
- CVE-2014-8159, CVSSv2 Score: 6.2
- Description:
kernel: infiniband: uverbs: unprotected physical memory access
- CVE: https://access.redhat.com/security/cve/CVE-2014-8159
- Patch: 3.10.0/kernel-infiniband-uverbs-unprotected-physical-memory-access.patch
- From: >kernel-3.10.0-229.el7
- CVE-2015-3331, CVSSv2 Score: 7.1
- Description:
crypto: aesni - fix memory usage in GCM decryption
- CVE: https://access.redhat.com/security/cve/CVE-2015-3331
- Patch: 3.10.0/0001-crypto-aesni-fix-memory-usage-in-GCM-decryption.patch
- From: kernel-3.10.0-229.4.2.el7
- CVE-2015-1805, CVSSv2 Score: 6.9
- Description:
pipe: fix pipe corruption and iovec overrun on partial copy
- CVE: https://access.redhat.com/security/cve/CVE-2015-1805
- Patch: 3.10.0/fs-pipe-fix-pipe-corruption-and-iovec-overrun-on-partial-copy.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2014-9529, CVSSv2 Score: 4.9
- Description:
kernel: use-after-free during key garbage collection
- CVE: https://access.redhat.com/security/cve/CVE-2014-9529
- Patch: 3.10.0/security-keys-memory-corruption-or-panic-during-key-garbage-collection.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2015-2830, CVSSv2 Score: 1.9
- Description:
kernel: Remove a bogus 'ret_from_fork' optimization
- CVE: https://access.redhat.com/security/cve/CVE-2015-2830
- Patch: 3.10.0/x86-kernel-Remove-a-bogus-ret_from_fork-optimization.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2015-2830, CVSSv2 Score: 1.9
- Description:
kernel: Remove a bogus 'ret_from_fork' optimization
- CVE: https://access.redhat.com/security/cve/CVE-2015-2830
- Patch: 3.10.0/x86-kernel-Remove-a-bogus-ret_from_fork-optimization.kpatch-1.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2014-9420, CVSSv2 Score: 4.7
- Description:
isofs: infinite loop in CE record entries
- CVE: https://access.redhat.com/security/cve/CVE-2014-9420
- Patch: 3.10.0/fs-isofs-infinite-loop-in-CE-record-entries.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2014-9584, CVSSv2 Score: 1.9
- Description:
isofs: Fix unchecked printing of ER records
- CVE: https://access.redhat.com/security/cve/CVE-2014-9584
- Patch: 3.10.0/fs-isofs-Fix-unchecked-printing-of-ER-records.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2015-1593, CVSSv2 Score: 1.9
- Description:
kernel: Linux stack ASLR implementation
- CVE: https://access.redhat.com/security/cve/CVE-2015-1593
- Patch: 3.10.0/x86-mm-Linux-stack-ASLR-implementation.patch
- From: kernel-3.10.0-229.7.2.el7
- CVE-2015-2666, CVSSv2 Score: 6.0
- Description:
kernel: execution in the early microcode loader
- CVE: https://access.redhat.com/security/cve/CVE-2015-2666
- Patch: 3.10.0/x86-kernel-execution-in-the-early-microcode-loader.patch
- From: kernel-3.10.0-229.11.1.el7
- CVE-2015-3636, CVSSv2 Score: 6.0
- Description:
ipv4: Missing sk_nulls_node_init() in ping_unhash()
- CVE: https://access.redhat.com/security/cve/CVE-2015-3636
- Patch: 3.10.0/net-ipv4-Missing-sk_nulls_node_init-in-ping_unhash.patch
- From: kernel-3.10.0-229.11.1.el7
- CVE-2015-2922, CVSSv2 Score: 3.3
- Description:
ipv6: Don't reduce hop limit for an interface
- CVE: https://access.redhat.com/security/cve/CVE-2015-2922
- Patch: 3.10.0/net-ipv6-Don-t-reduce-hop-limit-for-an-interface.patch
- From: kernel-3.10.0-229.11.1.el7
- CVE-2015-3212, CVSSv2 Score: 5.6
- Description:
sctp: fix ASCONF list handling
- CVE: https://access.redhat.com/security/cve/CVE-2015-3212
- Patch: 3.10.0/net-sctp-fix-ASCONF-list-handling.patch
- From: kernel-3.10.0-229.14.1.el7
- CVE-2015-5364, CVE-2015-5366, CVSSv2 Score: 7.1
- Description:
udp: fix behavior of wrong checksums
- CVE: https://access.redhat.com/security/cve/CVE-2015-5366
- Patch: 3.10.0/net-udp-fix-behavior-of-wrong-checksums.patch
- From: kernel-3.10.0-229.14.1.el7
- CVE-2015-1333, CVSSv2 Score: 4.9
- Description:
keys: Ensure we free the assoc array edit if edit is valid
- CVE: https://access.redhat.com/security/cve/CVE-2015-1333
- Patch: 3.10.0/security-keys-Ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch
- From: kernel-3.10.0-229.14.1.el7
- CVE-2015-4700, CVSSv2 Score: 7.2
- Description:
bpf_jit: fix compilation of large bpf programs
- CVE: https://access.redhat.com/security/cve/CVE-2015-4700
- Patch: 3.10.0/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch
- From: kernel-3.10.0-229.14.1.el7
- CVE-2014-8559, CVSSv2 Score: 4
- Description:
dcache: fold try_to_ascend() into the sole remaining caller
- CVE: https://access.redhat.com/security/cve/CVE-2014-8559
- Patch: 3.10.0/0001-fs-dcache-fold-try_to_ascend-into-the-sole-remaining-caller.patch
- From: kernel-3.10.0-229.20.1.el7
- CVE-2014-8559, CVSSv2 Score: 4
- Description:
dcache: move d_rcu from overlapping d_child to overlapping d_alias
- CVE: https://access.redhat.com/security/cve/CVE-2014-8559
- Patch: 3.10.0/0002-fs-dcache-move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias.patch
- From: kernel-3.10.0-229.20.1.el7
- CVE-2014-8559, CVSSv2 Score: 4
- Description:
dcache: move d_rcu from overlapping d_child to overlapping d_alias (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2014-8559
- Patch: 3.10.0/0003-fs-dcache-move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias-kpatch-1.patch
- From: kernel-3.10.0-229.20.1.el7
- CVE-2014-8559, CVSSv2 Score: 4
- Description:
dcache: deal with deadlock in d_walk()
- CVE: https://access.redhat.com/security/cve/CVE-2014-8559
- Patch: 3.10.0/0004-fs-dcache-deal-with-deadlock-in-d_walk.patch
- From: kernel-3.10.0-229.20.1.el7
- CVE-2014-8559, CVSSv2 Score: 4
- Description:
dcache: d_walk() might skip too much
- CVE: https://access.redhat.com/security/cve/CVE-2014-8559
- Patch: 3.10.0/0005-fs-dcache-d_walk-might-skip-too-much.patch
- From: kernel-3.10.0-229.20.1.el7
- CVE-2015-5156, CVSSv2 Score: 6.8
- Description:
virtio-net: drop NETIF_F_FRAGLIST
- CVE: https://access.redhat.com/security/cve/CVE-2015-5156
- Patch: 3.10.0/0006-netdrv-virtio-net-drop-NETIF_F_FRAGLIST.patch
- From: kernel-3.10.0-229.20.1.el7
- CVE-2015-2925, CVSSv2 Score: 6
- Description:
dcache: Handle escaped paths in prepend_path
- CVE: https://access.redhat.com/security/cve/CVE-2015-2925
- Patch: 3.10.0/dcache-Handle-escaped-paths-in-prepend_path.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-2925, CVSSv2 Score: 6
- Description:
vfs: Test for and handle paths that are unreachable from their mnt_root
- CVE: https://access.redhat.com/security/cve/CVE-2015-2925
- Patch: 3.10.0/vfs-Test-for-and-handle-paths-that-are-unreachable-f.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-7613, CVSSv2 Score: 6.2
- Description:
Initialize msg/shm IPC objects before doing ipc_addid()
- CVE: https://access.redhat.com/security/cve/CVE-2015-7613
- Patch: 3.10.0/Initialize-msg-shm-IPC-objects-before-doing-ipc_addi.patch
- From: kernel-3.10.0-327.el7
- CVE-2014-7842, CVSSv2 Score: 4
- Description:
KVM: x86: Don't report guest userspace emulation error to userspace
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7842
- Patch: 3.10.0/x86-kvm-Dont-report-guest-userspace-emulation-error-to-userspace.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-3339, CVSSv2 Score: 6.2
- Description:
kernel: Provide READ_ONCE and ASSIGN_ONCE
- CVE: https://access.redhat.com/security/cve/CVE-2015-3339
- Patch: 3.10.0/kernel-Provide-READ_ONCE-and-ASSIGN_ONCE.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-3339, CVSSv2 Score: 6.2
- Description:
kernel: Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val)
- CVE: https://access.redhat.com/security/cve/CVE-2015-3339
- Patch: 3.10.0/kernel-Change-ASSIGN_ONCE-val-x-to-WRITE_ONCE-x-val.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-3339, CVSSv2 Score: 6.2
- Description:
kernel: make READ_ONCE() valid on const arguments
- CVE: https://access.redhat.com/security/cve/CVE-2015-3339
- Patch: 3.10.0/kernel-make-READ_ONCE-valid-on-const-arguments.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-3339, CVSSv2 Score: 6.2
- Description:
fs: take i_mutex during prepare_binprm for set[ug]id executables
- CVE: https://access.redhat.com/security/cve/CVE-2015-3339
- Patch: 3.10.0/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-5283, CVSSv2 Score: 4.7
- Description:
sctp: fix race on protocol/netns initialization
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-5283
- Patch: 3.10.0/461142-sctp-fix-race-on-protocol-netns-initialization.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-5283, CVSSv2 Score: 4.7
- Description:
sctp: fix race on protocol/netns initialization (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-5283
- Patch: 3.10.0/461142-sctp-fix-race-on-protocol-netns-initialization-kpatch-1.patch
- From: kernel-3.10.0-327.el7
- CVE-2014-9419, CVSSv2 Score: 1.2
- Description:
x86_64, switch_to(): Load TLS descriptors before switching DS and ES
- CVE: https://access.redhat.com/security/cve/CVE-2014-9419
- Patch: 3.10.0/419197-x86_64-switch_to-Load-TLS-descriptors-before-switc.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-0239, CVSSv2 Score: 1.9
- Description:
KVM: x86: SYSENTER emulation is broken
- CVE: https://access.redhat.com/security/cve/CVE-2015-0239
- Patch: 3.10.0/419186-KVM-x86-SYSENTER-emulation-is-broken.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-5157, CVSSv2 Score: 5.7
- Description:
Disable modification of LDT by userspace processes.
- CVE: https://access.redhat.com/security/cve/cve-2015-5157
- Patch: 3.10.0/kcare-mitigate-cve-2015-5157.patch
- From: kernel-3.10.0-327.el7
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
crypto: define OPTIMIZER_HIDE_VAR for future use in memzero_explicit
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/md-crypto-define-OPTIMIZER_HIDE_VAR-for-future-use-in-memzero_explicit.patch
- From: 3.10.0-327.el7
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
random: add and use memzero_explicit() for clearing data
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/md-random-add-and-use-memzero_explicit-for-clearing-data.patch
- From: 3.10.0-327.el7
- Description:
fix kernel crash in smp_execute_task caused by libsas disco_mutex (dependency for cve-2017-18232)
- CVE:
- Patch: 3.10.0/scsi-libsas-Fix-Kernel-Crash-in-smp_execute_task.patch
- From: 3.10.0-327.el7
- CVE-2014-3610, CVSSv2 Score: 5.5
- Description:
[x86] kvm: Check non-canonical addresses upon WRMSR
- CVE: https://access.redhat.com/security/cve/cve-2014-3610
- Patch: 3.10.0/0174-x86-kvm-Check-non-canonical-addresses-upon-WRMSR.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2014-3610, CVSSv2 Score: 5.5
- Description:
[x86] kvm: Prevent guest from writing non-canonical shared MSR addresses
- CVE: https://access.redhat.com/security/cve/cve-2014-3610
- Patch: 3.10.0/0175-x86-kvm-Prevent-guest-from-writing-non-canonical-sha-123.patch
- From: 3.10.0-1062.18.1.el7
- Description:
- CVE:
- Patch: 3.10.0/0121-ALSA-seq-correctly-report-maximum-number-of-ports.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0136-ALSA-seq-fill-client-ID-in-return-value-of-pool-oper.patch
- From:
- CVE-2015-5307, CVSSv2 Score: 5.2
- Description:
virt: guest to host DoS by triggering an infinite loop in microcode
- CVE: https://access.redhat.com/security/cve/CVE-2015-5307
- Patch: 3.10.0/x86-virt-guest-to-host-DoS-by-triggering-an-infinite-loop-in-microcode.patch
- From: kernel-3.10.0-327.3.1.el7
- CVE-2015-8104, CVSSv2 Score: 5.2
- Description:
kvm: svm: unconditionally intercept #DB
- CVE: https://access.redhat.com/security/cve/CVE-2015-8104
- Patch: 3.10.0/x86-kvm-svm-unconditionally-intercept-DB-123.patch
- From: kernel-3.10.0-327.3.1.el7
- CVE-2015-5307 CVE-2015-8104, CVSSv2 Score: 5.2
- Description:
CVE-2015-5307 and CVE-2015-8104 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2015-8104
- Patch: 3.10.0/cve-2015-5307-cve-2015-8104-kpatch-1.patch
- From: kernel-3.10.0-327.3.1.el7
- CVE-2016-0728, CVSSv2 Score: 7.2
- Description:
KEYS: Fix keyring ref leak in join_session_keyring()
- CVE: https://access.redhat.com/security/cve/CVE-2016-0728
- Patch: 3.10.0/KEYS-Fix-keyring-ref-leak-in-join_session_keyring.patch
- From: >kernel-3.10.0-327.4.4.el7
- CVE-2015-7872, CVSSv2 Score: 7.2
- Description:
KEYS: Fix race between key destruction and finding a keyring by name
- CVE: https://access.redhat.com/security/cve/CVE-2015-7872
- Patch: 3.10.0/KEYS-Fix-race-between-key-destruction-and-finding-a-.patch
- From: >kernel-3.10.0-229.14.1.el7
- CVE-2015-7872, CVSSv2 Score: 7.2
- Description:
KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring
- CVE: https://access.redhat.com/security/cve/CVE-2015-7872
- Patch: 3.10.0/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch
- From: >kernel-3.10.0-229.14.1.el7
- CVE-2015-7872, CVSSv2 Score: 7.2
- Description:
KEYS: Don't permit request_key() to construct a new keyring
- CVE: https://access.redhat.com/security/cve/CVE-2015-7872
- Patch: 3.10.0/KEYS-Don-t-permit-request_key-to-construct-a-new-key.patch
- From: >kernel-3.10.0-229.14.1.el7
- Description:
veth: don't modify ip_summed; doing so treats packets with bad checksums as good
- CVE:
- Patch: 3.10.0/11008-net-veth-don-t-modify-ip_summed-doing-so-treats-packets-with-bad-checksums-as-good.patch
- From: kernel-3.10.0-327.13.1.el7
- CVE-2016-0758, CVSSv2 Score: 7.2
- Description:
KEYS: Fix ASN.1 indefinite length object parsing
- CVE: https://access.redhat.com/security/cve/cve-2016-0758
- Patch: 3.10.0/keys-fix-asn1-indefinite-length-object-parsing.patch
- From: kernel-3.10.0-327.18.2.el7
- CVE-2016-4565, CVSSv2 Score: 6.9
- Description:
IB/security: Restrict use of the write() interface
- CVE: https://access.redhat.com/security/cve/cve-2016-4565
- Patch: 3.10.0/ib-security-restrict-use-of-the-write-interface.patch
- From: kernel-3.10.0-327.22.2.el7
- CVE-2015-8767, CVSSv2 Score: 7.1
- Description:
sctp: Prevent soft lockup when sctp_accept() is called during a timeout event
- CVE: https://access.redhat.com/security/cve/cve-2015-8767
- Patch: 3.10.0/sctp-Prevent-soft-lockup-when-sctp_accept-is-calle.patch
- From: kernel-3.10.0-327.22.2.el7
- CVE-2016-4470, CVSSv2 Score: 6.9
- Description:
KEYS: potential uninitialized variable
- CVE: https://access.redhat.com/security/cve/CVE-2016-4470
- Patch: 3.10.0/keys-potential-uninitialized-variable.patch
- From: kernel-3.10.0-327.28.2.el7
- CVE-2016-10229, CVSSv2 Score: 8.1
- Description:
udp: properly support MSG_PEEK with truncated buffers
- CVE: https://access.redhat.com/security/cve/CVE-2016-10229
- Patch: 3.10.0/udp-properly-support-msg_peek-with-truncated-buffers.patch
- From: 3.10.0-514.el7
- CVE-2016-5696, CVSSv2 Score: 5.8
- Description:
tcp: make challenge acks less predictable
- CVE: https://access.redhat.com/security/cve/cve-2016-5696
- Patch: 3.10.0/tcp-make-challenge-acks-less-predictable-123.patch
- From: >kernel-3.10.0-327.28.2.el7
- CVE-2016-5696, CVSSv2 Score: 5.8
- Description:
tcp: make challenge acks less predictable
- CVE: https://access.redhat.com/security/cve/cve-2016-5696
- Patch: 3.10.0/tcp-make-challenge-acks-less-predictable-229.kpatch-1.patch
- From: >kernel-3.10.0-327.28.2.el7
- CVE-2016-4997 CVE-2016-4998, CVSSv2 Score: n/a
- Description:
netfilter: x_tables: validate e->target_offset early
- CVE: http://www.openwall.com/lists/oss-security/2016/06/24/5
- Patch: 3.10.0/0020-netfilter-x_tables-validate-e-target_offset-early.patch
- From: >kernel-3.10.0-327.22.2.el7
- CVE-2016-4997 CVE-2016-4998, CVSSv2 Score: n/a
- Description:
netfilter: x_tables: make sure e->next_offset covers remaining blob size
- CVE: http://www.openwall.com/lists/oss-security/2016/06/24/5
- Patch: 3.10.0/0021-netfilter-x_tables-make-sure-e-next_offset-covers-re.patch
- From: >kernel-3.10.0-327.22.2.el7
- CVE-2016-3134, CVSSv2 Score: 6.2
- Description:
netfilter: x_tables: fix unconditional helper
- CVE: https://access.redhat.com/security/cve/cve-2016-3134
- Patch: 3.10.0/0022-netfilter-x_tables-fix-unconditional-helper.patch
- From: >kernel-3.10.0-327.22.2.el7
- CVE-2016-4997 CVE-2016-4998, CVSSv2 Score: n/a
- Description:
netfilter: x_tables: check for bogus target offset
- CVE: http://www.openwall.com/lists/oss-security/2016/06/24/5
- Patch: 3.10.0/0023-netfilter-x_tables-check-for-bogus-target-offset-123.patch
- From: >kernel-3.10.0-327.22.2.el7
- CVE-2016-5195, CVSSv2 Score: 6.9
- Description:
mm: remove gup_flags FOLL_WRITE games from __get_user_pages()
- CVE: https://access.redhat.com/security/cve/cve-2016-5195
- Patch: 3.10.0/0001-mm-remove-gup_flags-FOLL_WRITE-games-from-__get_user.patch
- From: >kernel-3.10.0-327.36.2.el7
- CVE-2016-4581, CVSSv2 Score: 4.7
- Description:
fs/pnode.c: treat zero mnt_group_id-s as unequal
- CVE: https://access.redhat.com/security/cve/cve-2016-4581
- Patch: 3.10.0/fs-pnodec-treat-zero-mnt_group_id-s-as-unequal.patch
- From: >kernel-3.10.0-327.18.2.el7
- CVE-2016-4581, CVSSv2 Score: 4.7
- Description:
propogate_mnt: Handle the first propogated copy being a slave
- CVE: https://access.redhat.com/security/cve/cve-2016-4581
- Patch: 3.10.0/propogate_mnt-handle-the-first-propogated-copy-being-a-slave.patch
- From: >kernel-3.10.0-327.18.2.el7
- CVE-2016-5829, CVSSv2 Score: 6.9
- Description:
HID: hiddev: validate num_values for HIDIOCGUSAGES,HIDIOCSUSAGES commands
- CVE: https://access.redhat.com/security/cve/CVE-2016-5829
- Patch: 3.10.0/HID-hiddev-validate-num_values-for-HID.patch
- From: >kernel-3.10.0-327.36.2.el7
- CVE-2015-8374, CVSSv2 Score: 3.5
- Description:
Btrfs: fix truncation of compressed and inlined extents
- CVE: https://access.redhat.com/security/cve/CVE-2015-8374
- Patch: 3.10.0/Btrfs-fix-truncation-of-compressed-and-inlined-exten-123.patch
- From: kernel-3.10.0-514.el7
- CVE-2015-8543, CVSSv2 Score: 4.6
- Description:
Btrfs: fix truncation of compressed and inlined extents
- CVE: https://access.redhat.com/security/cve/CVE-2015-8543
- Patch: 3.10.0/net-add-validation-for-the-socket-syscall-protocol-a-229.patch
- From: kernel-3.10.0-514.el7
- CVE-2015-8812, CVSSv2 Score: 6.9
- Description:
iw_cxgb3: Fix incorrectly returning error on success
- CVE: https://access.redhat.com/security/cve/CVE-2015-8812
- Patch: 3.10.0/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch
- From: kernel-3.10.0-514.el7
- CVE-2015-8956, CVSSv2 Score: 5.4
- Description:
Bluetooth: Fix potential NULL dereference in RFCOMM bind callback
- CVE: https://access.redhat.com/security/cve/CVE-2015-8956
- Patch: 3.10.0/Bluetooth-Fix-potential-NULL-dereference-in-RFCOMM-b-229.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-2053, CVSSv2 Score: 4.6
- Description:
ASN.1: Fix non-match detection failure on data overrun
- CVE: https://access.redhat.com/security/cve/CVE-2016-2053
- Patch: 3.10.0/ASN.1-Fix-non-match-detection-failure-on-data-overru.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-2069, CVSSv2 Score: 3.7
- Description:
x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- CVE: https://access.redhat.com/security/cve/CVE-2016-2069
- Patch: 3.10.0/x86-mm-Add-barriers-and-document-switch_mm-vs-flush-229.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-2384, CVSSv2 Score: 6.2
- Description:
ALSA: usb-audio: avoid freeing umidi object twice
- CVE: https://access.redhat.com/security/cve/CVE-2016-2384
- Patch: 3.10.0/ALSA-usb-audio-avoid-freeing-umidi-object-twice.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-3156, CVSSv2 Score: 1.7
- Description:
ipv4: Don't do expensive useless work during inetdev destroy.
- CVE: https://access.redhat.com/security/cve/CVE-2016-3156
- Patch: 3.10.0/ipv4-Don-t-do-expensive-useless-work-during-inetdev-.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-2117, CVSSv2 Score: 2.6
- Description:
atl2: Disable unimplemented scatter/gather feature
- CVE: https://access.redhat.com/security/cve/CVE-2016-2117
- Patch: 3.10.0/atl2-Disable-unimplemented-scatter-gather-feature.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-2117, CVSSv2 Score: 2.6
- Description:
atl2: Disable unimplemented scatter/gather feature (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2016-2117
- Patch: 3.10.0/atl2-Disable-unimplemented-scatter-gather-feature-kpatch-1.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-4569, CVSSv2 Score: 2.1
- Description:
ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- CVE: https://access.redhat.com/security/cve/CVE-2016-4569
- Patch: 3.10.0/ALSA-timer-Fix-leak-in-SNDRV_TIMER_IOCTL_PARAMS.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-4578, CVSSv2 Score: 2.1
- Description:
ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- CVE: https://access.redhat.com/security/cve/CVE-2016-4578
- Patch: 3.10.0/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_cca.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-4578, CVSSv2 Score: 2.1
- Description:
ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- CVE: https://access.redhat.com/security/cve/CVE-2016-4578
- Patch: 3.10.0/ALSA-timer-Fix-leak-in-events-via-snd_timer_user_tin.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-6327, CVSSv2 Score: 4.7
- Description:
IB/srpt: Simplify srpt_handle_tsk_mgmt()
- CVE: https://access.redhat.com/security/cve/CVE-2016-6327
- Patch: 3.10.0/IB-srpt-Simplify-srpt_handle_tsk_mgmt.patch
- From: kernel-3.10.0-514.el7
- CVE-2016-6480, CVSSv2 Score: 4.7
- Description:
aacraid: Check size values after double-fetch from user
- CVE: https://access.redhat.com/security/cve/CVE-2016-6480
- Patch: 3.10.0/aacraid-Check-size-values-after-double-fetch-from-us.patch
- From: kernel-3.10.0-514.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: missing dev_put() in packet_do_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-missing-dev_put-in-packet_do_bind.patch
- From: 3.10.0-514.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: race condition in packet_bind
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-race-condition-in-packet_bind.patch
- From: 3.10.0-514.el7
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 3.10.0/CVE-2018-10902-ALSA-rawmidi-shange-resize-buffers-atomically-2-pre-514.patch
- From: >=kernel-3.10.0-123.1.2.el7
- Description:
- CVE:
- Patch: 3.10.0/0146-ALSA-seq-Fix-snd_seq_call_port_info_ioctl-in-compat-.patch
- From:
- CVE-2016-7117, CVSSv2 Score: 7.6
- Description:
net: Fix use after free in the recvmmsg exit path
- CVE: https://access.redhat.com/security/cve/cve-2016-7117
- Patch: 3.10.0/net-fix-use-after-free-in-the-recvmmsg-exit-path.patch
- From: kernel-3.10.0-514.6.1.el7
- CVE-2016-6828, CVSSv2 Score: 3.6
- Description:
tcp: fix use after free in tcp_xmit_retransmit_queue()
- CVE: https://access.redhat.com/security/cve/cve-2016-6828
- Patch: 3.10.0/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch
- From: kernel-3.10.0-514.6.1.el7
- CVE-2016-9555, CVSSv2 Score: 7.1
- Description:
sctp: validate chunk len before actually using it
- CVE: https://access.redhat.com/security/cve/cve-2016-9555
- Patch: 3.10.0/sctp-validate-chunk-len-before-actually-using-it.patch
- From: kernel-3.10.0-514.6.1.el7
- CVE-2017-6074, CVSSv2 Score: 7.8
- Description:
dccp: fix freeing skb too early for IPV6_RECVPKTINFO
- CVE: https://access.redhat.com/security/cve/CVE-2017-6074
- Patch: 3.10.0/dccp-fix-freeing-skb-too-early-for-ipv6_recvpktinfo.patch
- From: kernel-3.10.0-514.6.2.el7
- CVE-2016-9083 CVE-2016-9084, CVSSv2 Score: 7.2
- Description:
vfio/pci: Fix integer overflows, bitmask check
- CVE: https://access.redhat.com/security/cve/cve-2016-9084
- Patch: 3.10.0/vfio-pci-Fix-integer-overflows-bitmask-check.patch
- From: kernel-3.10.0-514.10.2.el7
- CVE-2016-8655, CVSSv2 Score: 6.6
- Description:
packet: fix race condition in packet_set_ring
- CVE: http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-8655.html
- Patch: 3.10.0/packet-fix-race-condition-in-packet_set_ring.patch
- From: 3.10.0-514.10.2.el7
- CVE-2017-2636, CVSSv2 Score: 7.8
- Description:
tty: n_hdlc: get rid of racy n_hdlc.tbuf
- CVE: https://access.redhat.com/security/cve/CVE-2017-2636
- Patch: 3.10.0/fix-CVE-2017-2636.patch
- From: 3.10.0-514.16.1.el7
- CVE-2016-8650, CVSSv2 Score: 8.8
- Description:
mpi: Fix NULL ptr dereference in mpi_powm
- CVE: https://access.redhat.com/security/cve/cve-2016-8650
- Patch: 3.10.0/mpi-Fix-NULL-ptr-dereference-in-mpi_powm-ver-3.patch
- From: kernel-3.10.0-514.16.1.el7
- CVE-2016-9793, CVSSv2 Score: 6.7
- Description:
net: avoid signed overflows for SO_{SND|RCV}BUFFORCE
- CVE: https://access.redhat.com/security/cve/CVE-2016-9793
- Patch: 3.10.0/net-avoid-signed-overflows-for-SO_-SND-RCV-BUFFORCE.patch
- From: kernel-3.10.0-514.16.1.el7
- CVE-2017-2618, CVSSv2 Score: 5.5
- Description:
selinux: fix off-by-one in setprocattr
- CVE: https://access.redhat.com/security/cve/CVE-2017-2618
- Patch: 3.10.0/selinux-fix-off-by-one-in-setprocattr.patch
- From: kernel-3.10.0-514.16.1.el7
- CVE-2017-2647, CVSSv2 Score: 7.8
- Description:
kernel: Null pointer dereference in search_keyring
- CVE: https://access.redhat.com/security/cve/CVE-2017-2647
- Patch: 3.10.0/kernel-Null-pointer-dereference-in-search_keyring.patch
- From: >3.10.0-514.10.2.el7
- CVE-2016-7910, CVSSv2 Score: 7
- Description:
block: fix use-after-free in seq file
- CVE: https://access.redhat.com/security/cve/CVE-2016-7910
- Patch: 3.10.0/block-fix-use-after-free-in-seq-file.patch
- From: kernel-3.10.0-514.21.1.el7
- CVE-2016-8646, CVSSv2 Score: 5.5
- Description:
crypto: algif_hash - Only export and import on sockets with data
- CVE: https://access.redhat.com/security/cve/CVE-2016-8646
- Patch: 3.10.0/crypto-algif_hash-Only-export-and-import-on-sockets-with-data.patch
- From: kernel-3.10.0-514.21.1.el7
- CVE-2016-10208, CVSSv2 Score: 6.2
- Description:
ext4: validate s_first_meta_bg at mount time
- CVE: https://access.redhat.com/security/cve/CVE-2016-10208
- Patch: 3.10.0/fs-ext4-validate-s_first_meta_bg-at-mount-time.patch
- From: kernel-3.10.0-514.21.1.el7
- CVE-2017-7308, CVSSv2 Score: 7
- Description:
net/packet: fix overflow in check for priv area size, tp_frame_nr, tp_reserve
- CVE: https://access.redhat.com/security/cve/CVE-2017-7308
- Patch: 3.10.0/net-packet-fix-overflow-in-check_123.patch
- From: kernel-3.10.0-514.21.1.el7
- CVE-2017-5986, CVSSv2 Score: 5.5
- Description:
sctp: avoid BUG_ON on sctp_wait_for_sndbuf
- CVE: https://access.redhat.com/security/cve/CVE-2017-5986
- Patch: 3.10.0/net-sctp-avoid-BUG_ON-on-sctp_wait_for_sndbuf_123.patch
- From: kernel-3.10.0-514.21.1.el7
- CVE-2017-1000364, CVSSv2 Score: 7.4
- Description:
mm: enlarge stack guard gap
- CVE: https://access.redhat.com/security/cve/cve-2017-1000364
- Patch: 3.10.0/CVE-2017-1000364-upstream-no-gup.patch
- From: 3.10.0-514.21.2.el7
- CVE-2017-7895, CVSSv2 Score: 6.5
- Description:
nfsd: stricter decoding of write-like NFSv2/v3 ops
- CVE: https://access.redhat.com/security/cve/cve-2017-7895
- Patch: 3.10.0/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch
- From: 3.10.0-514.26.1.el7
- CVE-2017-2583, CVSSv2 Score: 6.4
- Description:
KVM: x86: fix emulation of "MOV SS, null selector"
- CVE: https://access.redhat.com/security/cve/CVE-2017-2583
- Patch: 3.10.0/KVM-x86-fix-emulation-of-MOV-SS-null-selector_before_229.patch
- From: kernel-3.10.0-514.26.1.el7
- CVE-2017-7645, CVSSv2 Score: 7.5
- Description:
nfsd: check for oversized NFSv2/v3 arguments
- CVE: https://access.redhat.com/security/cve/CVE-2017-7645
- Patch: 3.10.0/nfsd-check-for-oversized-NFSv2-v3-arguments.patch
- From: kernel-3.10.0-514.26.1.el7
- CVE-2017-6214, CVSSv2 Score: 6.5
- Description:
tcp: avoid infinite loop in tcp_splice_read()
- CVE: https://access.redhat.com/security/cve/CVE-2017-6214
- Patch: 3.10.0/tcp-avoid-infinite-loop-in-tcp_splice_read_before_327.patch
- From: kernel-3.10.0-514.26.1.el7
- CVE-2017-1000253, CVSSv2 Score: 7.8
- Description:
fs/binfmt_elf.c: fix bug in loading of PIE binaries
- CVE: https://access.redhat.com/security/cve/cve-2017-1000253
- Patch: 3.10.0/fs-binfmt_elfc-fix-bug-in-loading-of-pie-binaries.patch
- From: 3.10.0-693.el7
- CVE-2016-10200, CVSSv2 Score: 7.0
- Description:
l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()
- CVE: https://access.redhat.com/security/cve/cve-2016-10200
- Patch: 3.10.0/-patch-l2tp-fix-racy-sock_zapped-flag-check-in-l2tp_ip{,6}_bind.patch
- From: 3.10.0-693.el7
- CVE-2016-7042, CVSSv2 Score: 4.9
- Description:
KEYS: Fix short sprintf buffer in /proc/keys show function
- CVE: https://access.redhat.com/security/cve/cve-2016-7042
- Patch: 3.10.0/CVE-2016-7042.patch
- From: 3.10.0-693.el7
- CVE-2016-10088 CVE-2016-9576, CVSSv2 Score: 7
- Description:
[scsi] sg_write()/bsg_write() is not fit to be called under KERNEL_DS
- CVE: https://access.redhat.com/security/cve/CVE-2016-10088
- Patch: 3.10.0/scsi-sg_write-bsg_write-is-not-fit-to-be-called-under-KERNEL_DS-lt-229.patch
- From: 3.10.0-693.el7
- CVE-2017-2671, CVSSv2 Score: 7.8
- Description:
[net] ping: implement proper locking
- CVE: https://access.redhat.com/security/cve/CVE-2017-2671
- Patch: 3.10.0/net-ping-implement-proper-locking.patch
- From: 3.10.0-693.el7
- CVE-2017-5970, CVSSv2 Score: 7.5
- Description:
[net] ipv4: keep skb->dst around in presence of IP options
- CVE: https://access.redhat.com/security/cve/CVE-2017-5970
- Patch: 3.10.0/net-ipv4-keep-skb-dst-around-in-presence-of-IP-options.patch
- From: 3.10.0-693.el7
- CVE-2017-7616, CVSSv2 Score: 5.5
- Description:
[mm] mempolicy.c: fix error handling in set_mempolicy and mbind
- CVE: https://access.redhat.com/security/cve/CVE-2017-7616
- Patch: 3.10.0/mm-mempolicy-c-fix-error-handling-in-set_mempolicy-and-mbind.patch
- From: 3.10.0-693.el7
- CVE-2017-7889, CVSSv2 Score: 7.8
- Description:
[x86] mm: Tighten x86 /dev/mem with zeroing reads
- CVE: https://access.redhat.com/security/cve/CVE-2017-7889
- Patch: 3.10.0/x86-mm-Tighten-x86-dev-mem-with-zeroing-reads.patch
- From: 3.10.0-693.el7
- CVE-2017-8890, CVSSv2 Score: 5.5
- Description:
[net] tcp: do not inherit fastopen_req from parent
- CVE: CVE-2017-8890
- Patch: 3.10.0/net-tcp-do-not-inherit-fastopen_req-from-parent.patch
- From: 3.10.0-693.el7
- CVE-2017-9076 CVE-2017-9077, CVSSv2 Score: 5.5
- Description:
[net] ipv6/dccp: do not inherit ipv6_mc_list from parent
- CVE: https://access.redhat.com/security/cve/cve-2017-9076
- Patch: 3.10.0/net-ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch
- From: 3.10.0-693.el7
- CVE-2017-8890, CVSSv2 Score: 5.5
- Description:
[net] tcp: do not inherit fastopen_req from parent
- CVE: CVE-2017-8890
- Patch: 3.10.0/net-dccp-tcp-do-not-inherit-mc_list-from-parent.patch
- From: 3.10.0-693.el7
- CVE-2017-9075, CVSSv2 Score: 5.5
- Description:
[net] sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
- CVE: https://access.redhat.com/security/cve/cve-2017-9075
- Patch: 3.10.0/net-sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent-lt-514.patch
- From: 3.10.0-693.el7
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
[net] ipv6: Prevent overrun when parsing v6 header options
- CVE: https://access.redhat.com/security/cve/CVE-2017-9074
- Patch: 3.10.0/net-ipv6-Prevent-overrun-when-parsing-v6-header-options-lt-229.patch
- From: 3.10.0-693.el7
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
[net] ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt()
- CVE: https://access.redhat.com/security/cve/CVE-2017-9074
- Patch: 3.10.0/net-ipv6-xfrm-Handle-errors-reported-by-xfrm6_find_1stfragopt.patch
- From: 3.10.0-693.el7
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
[net] ipv6: Check ip6_find_1stfragopt() return value properly
- CVE: https://access.redhat.com/security/cve/CVE-2017-9074
- Patch: 3.10.0/net-ipv6-Check-ip6_find_1stfragopt-return-value-properly-lt-229.patch
- From: 3.10.0-693.el7
- CVE-2017-9074, CVSSv2 Score: 5.5
- Description:
[net] ipv6: Fix leak in ipv6_gso_segment()
- CVE: https://access.redhat.com/security/cve/CVE-2017-9074
- Patch: 3.10.0/net-ipv6-Fix-leak-in-ipv6_gso_segment-lt-229.patch
- From: 3.10.0-693.el7
- CVE-2014-7970, CVSSv2 Score: 1
- Description:
[fs] mnt: Prevent pivot_root from creating a loop in the mount tree
- CVE: https://access.redhat.com/security/cve/CVE-2014-7970
- Patch: 3.10.0/fs-mnt-Prevent-pivot_root-from-creating-a-loop-in-the-mount-tree.patch
- From: 3.10.0-693.el7
- CVE-2014-7975, CVSSv2 Score: 2.9
- Description:
[fs] Add a missing permission check to do_umount
- CVE: https://access.redhat.com/security/cve/CVE-2014-7975
- Patch: 3.10.0/fs-Add-a-missing-permission-check-to-do_umount.patch
- From: 3.10.0-693.el7
- CVE-2016-9604, CVSSv2 Score: 1.2
- Description:
[security] keys: Disallow keyrings beginning with '.' to be joined as session keyrings
- CVE: https://access.redhat.com/security/cve/CVE-2016-9604
- Patch: 3.10.0/security-keys-Disallow-keyrings-beginning-with-to-be-joined-as-session-keyrings.patch
- From: 3.10.0-693.el7
- CVE-2016-9685, CVSSv2 Score: 2.1
- Description:
[fs] xfs: fix two memory leaks in xfs_attr_list.c error paths
- CVE: https://access.redhat.com/security/cve/CVE-2016-9685
- Patch: 3.10.0/fs-xfs-fix-two-memory-leaks-in-xfs_attr_list-c-error-paths.patch
- From: 3.10.0-693.el7
- CVE-2016-9588, CVSSv2 Score: 3.3
- Description:
[x86] kvm: nvmx: Allow L1 to intercept software exceptions (#BP and #OF)
- CVE: https://access.redhat.com/security/cve/cve-2016-9588
- Patch: 3.10.0/x86-kvm-nvmx-Allow-L1-to-intercept-software-exceptions-BP-and-OF-lt-229.patch
- From: 3.10.0-693.el7
- CVE-2015-6937, CVSSv2 Score: 7.1
- Description:
RDS: verify the underlying transport exists before creating a connection
- CVE: https://access.redhat.com/security/cve/CVE-2015-6937
- Patch: 3.10.0/RDS-verify-the-underlying-transport-exists-before-cr.patch
- From: >kernel-3.10.0-229.14.1.el7
- CVE-2015-7990, CVSSv2 Score: 6.3
- Description:
RDS: fix race condition when sending a message on unbound socket
- CVE: https://access.redhat.com/security/cve/CVE-2015-7990
- Patch: 3.10.0/RDS-fix-race-condition-when-sending-a-message-on.patch
- From: >kernel-3.10.0-229.14.1.el7
- CVE-2018-1094, CVSSv2 Score: 4.6
- Description:
ext4: validate that metadata blocks do not overlap superblock
- CVE: https://access.redhat.com/security/cve/cve-2018-1094
- Patch: 3.10.0/CVE-2018-1094-fs-ext4-don-t-allow-r-w-mounts-if-metadata-blocks-overlap-the-superblock-additional.patch
- From: 3.10.0-957.el7
- Description:
- CVE:
- Patch: 3.10.0/0160-ALSA-seq-add-documentation-for-snd_seq_kernel_client.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0161-ALSA-seq-add-an-alternative-way-to-handle-ioctl-requ.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0161-ALSA-seq-add-an-alternative-way-to-handle-ioctl-requ-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0162-ALSA-seq-change-ioctl-command-operation-to-get-data-.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0163-ALSA-seq-obsolete-change-of-address-limit-123.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0164-ALSA-seq-initialize-whole-fields-of-automatic-variab.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0165-ALSA-seq-fix-to-copy-from-to-user-space.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0166-ALSA-seq-fix-passing-wrong-pointer-in-function-call-.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0169-ALSA-seq-Don-t-handle-loop-timeout-at-snd_seq_pool_d-123.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0170-ALSA-seq-Fix-race-at-creating-a-queue.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/0175-ALSA-seq-Don-t-break-snd_use_lock_sync-loop-by-timeo-123.patch
- From:
- CVE-2017-1000251, CVSSv2 Score: 7.5
- Description:
Bluetooth: Properly check L2CAP config option output buffer length
- CVE: https://access.redhat.com/errata/RHSA-2017:2679
- Patch: 3.10.0/bluetooth-properly-check-l2cap-config-option-output-buffer-length.patch
- From: 3.10.0-693.2.2.el7
- CVE-2017-7184, CVSSv2 Score: 7.8
- Description:
xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
- CVE: https://access.redhat.com/security/cve/CVE-2017-7184
- Patch: 3.10.0/xfrm_user-validate-XFRM_MSG_NEWAE-XFRMA_REPLAY_ESN_V.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-7184, CVSSv2 Score: 7.8
- Description:
xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder
- CVE: https://access.redhat.com/security/cve/CVE-2017-7184
- Patch: 3.10.0/xfrm_user-validate-XFRM_MSG_NEWAE-incoming-ESN-size-.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-1000112, CVSSv2 Score: 7
- Description:
udp: consistently apply ufo or fragmentation
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000112
- Patch: 3.10.0/CVE-2017-1000112-before-327.patch
- From: 3.10.0-693.5.2.el7
- CVE-2017-1000111, CVSSv2 Score: 7
- Description:
net-packet: fix race in packet_set_ring on PACKET_RESERVE
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000111
- Patch: 3.10.0/CVE-2017-1000111.patch
- From: 3.10.0-693.5.2.el7
- CVE-2017-11176, CVSSv2 Score: 7.8
- Description:
ipc: mqueue: fix a use-after-free in sys_mq_notify()
- CVE: https://access.redhat.com/security/cve/CVE-2017-11176
- Patch: 3.10.0/ipc-mqueue-fix-a-use-after-free-in-sys_mq_notify.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2016-8399, CVSSv2 Score: 6.8
- Description:
net: ping: check minimum size on ICMP header length
- CVE: https://access.redhat.com/security/cve/CVE-2016-8399
- Patch: 3.10.0/net-ping-check-minimum-size-on-ICMP-header-length.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-7542, CVSSv2 Score: 5.5
- Description:
net: ipv6: avoid overflow of offset in ip6_find_1stfragopt
- CVE: https://access.redhat.com/security/cve/CVE-2017-7542
- Patch: 3.10.0/net-ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-7542, CVSSv2 Score: 5.5
- Description:
net: ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
- CVE: https://access.redhat.com/security/cve/CVE-2017-7542
- Patch: 3.10.0/net-ipv6-accept-64k-1-packet-length-in-ip6_find_1stfragopt.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-14106, CVSSv2 Score: 5.5
- Description:
net: tcp: fix 0 divide in __tcp_select_window()
- CVE: https://access.redhat.com/security/cve/CVE-2017-14106
- Patch: 3.10.0/net-tcp-fix-0-divide-in-__tcp_select_window.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-14106, CVSSv2 Score: 5.5
- Description:
net: tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0
- CVE: https://access.redhat.com/security/cve/CVE-2017-14106
- Patch: 3.10.0/net-tcp-initialize-rcv_mss-to-TCP_MIN_MSS-instead-of-0.patch
- From: kernel-3.10.0-693.5.2.el7
- CVE-2017-1000380, CVSSv2 Score: 4.7
- Description:
ALSA: timer: Fix race among timer ioctls
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000380
- Patch: 3.10.0/ALSA-timer-Fix-race-among-timer-ioctls.patch
- From: 3.10.0-514.el7
- CVE-2017-1000380, CVSSv2 Score: 4.7
- Description:
ALSA: timer: Fix race at concurrent reads
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000380
- Patch: 3.10.0/ALSA-timer-Fix-race-at-concurrent-reads.patch
- From: 3.10.0-514.26.2.el7
- CVE-2017-1000380, CVSSv2 Score: 4.7
- Description:
ALSA: timer: Fix negative queue usage by racy accesses
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000380
- Patch: 3.10.0/ALSA-timer-Fix-negative-queue-usage-by-racy-accesses.patch
- From: 3.10.0-693.el7
- CVE-2017-1000380, CVSSv2 Score: 4.7
- Description:
ALSA: timer: fix NULL pointer dereference in read()/ioctl() race
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000380
- Patch: 3.10.0/ALSA-timer-fix-NULL-pointer-dereference-in-read-ioct.patch
- From: 3.10.0-693.el7
- CVE-2017-1000380, CVSSv2 Score: 4.7
- Description:
ALSA: timer: Fix race between read and ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000380
- Patch: 3.10.0/ALSA-timer-Fix-race-between-read-and-ioctl.patch
- From: 3.10.0-693.11.1.el7
- CVE-2017-1000380, CVSSv2 Score: 4.7
- Description:
ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
- CVE: https://access.redhat.com/security/cve/CVE-2017-1000380
- Patch: 3.10.0/ALSA-timer-Fix-missing-queue-indices-reset-at-SNDRV_.patch
- From: 3.10.0-693.11.1.el7
- CVE-2017-5753, CVSSv2 Score: 8.2
- Description:
meltdown: introduce gmb
- CVE: https://access.redhat.com/security/cve/CVE-2017-5753
- Patch: 3.10.0/CVE-2017-5753-123.patch
- From: 3.10.0-693.11.6.el7
- CVE-2017-5754, CVSSv2 Score: 7.9
- Description:
add kernel page table isolation feature(aka KAISER)
- CVE: https://access.redhat.com/security/cve/cve-2017-5754
- Patch: 3.10.0/kcpti-123.patch
- From: 3.10.0-693.11.6.el7
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: fix cpu hotplug crash
- CVE: N/A
- Patch: 3.10.0/kcpti-fix-cpu-hotplug-crash.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: ignore Xen PV guests
- CVE: N/A
- Patch: 3.10.0/kcpti-fix-Xen-PV-guests-crashes.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: map performance monitoring buffers
- CVE: N/A
- Patch: 3.10.0/kcpti-map-performance-monitoring-buffers-123.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: align trampoline stack to 16
- CVE: N/A
- Patch: 3.10.0/kcpti-align-trampoline-stack-to-16.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: free all shadow page table layers
- CVE: N/A
- Patch: 3.10.0/kcpti-free-all-shadow-page-table-layers.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: check present flag when removing global pte flag
- CVE: N/A
- Patch: 3.10.0/kcpti-respect-present-flag-during-kcpti_remove_page_.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: ignore AMD processors
- CVE: N/A
- Patch: 3.10.0/kcpti-ignore-AMD-processors.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kcpti: apply patch to Xen PV domains
- CVE: N/A
- Patch: 3.10.0/kcpti-apply-patch-to-Xen-PV-domains.patch
- From: N/A
- Description:
- CVE:
- Patch: 3.10.0/kcpti-rework-patching-of-paranoid_exit.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/kcpti-fix-use-after-free-in-kcpti_exit_pre.patch
- From:
- CVE-2017-5715, CVSSv2 Score: 5.6
- Description:
spec_ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 3.10.0/misc-bitops-Introduce-BIT_ULL.patch
- From: 3.10.0-229.el7
- CVE-2017-5715, CVSSv2 Score: 5.6
- Description:
[x86] msr: add 64bit _on_cpu access functions
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 3.10.0/x86-msr-add-64bit-_on_cpu-access-functions.patch
- From: 3.10.0-229.el7
- CVE-2017-5715, CVSSv2 Score: 5.6
- Description:
[x86] Add another set of MSR accessor functions
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 3.10.0/x86-Add-another-set-of-MSR-accessor-functions.patch
- From: 3.10.0-327.el7
- CVE-2017-5715, CVSSv2 Score: 5.6
- Description:
spec_ctrl
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 3.10.0/spec_ctrl-123.patch
- From: 3.10.0-693.11.6.el7
- CVE-2017-5715, CVSSv2 Score: 5.6
- Description:
spec_ctrl: print warning on {ibrs,ibpb}_enabled files creation failure
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 3.10.0/spec_ctrl-print-warning-on-ibrs-ibpb-_enabled-files-.patch
- From: 3.10.0-693.11.6.el7
- CVE-2017-5715, CVSSv2 Score: 5.6
- Description:
spec_ctrl: rescan cpuid when patch is loaded
- CVE: https://access.redhat.com/security/cve/CVE-2017-5715
- Patch: 3.10.0/spec_ctrl-rescan-cpuid-when-patch-is-loaded.patch
- From: 3.10.0-693.11.6.el7
- Description:
- CVE:
- Patch: 3.10.0/spec_ctrl-sysctl-ibrs.patch
- From:
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
keys: Fix an error code in request_master_key()
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/security-keys-Fix-an-error-code-in-request_master_key.patch
- From: 3.10.0-693.17.1.el7
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
keys: Use memzero_explicit() for secret data
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/security-keys-Use-memzero_explicit-for-secret-data.patch
- From: 3.10.0-693.17.1.el7
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
keys: Differentiate uses of rcu_dereference_key() and user_key_payload()
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/security-keys-Differentiate-uses-of-rcu_dereference_key-and-user_key_payload-327.patch
- From: 3.10.0-693.17.1.el7
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
keys: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/security-keys-fix-keyctl_set_reqkey_keyring-to-not-leak-thread-keyrings.patch
- From: 3.10.0-693.17.1.el7
- CVE-2015-8539 CVE-2017-7472, CVSSv2 Score: 7.2
- Description:
keys: Fix handling of stored error in a negatively instantiated user key
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.10.0/KEYS-Fix-handling-of-stored-error-in-a-negatively-in.patch
- From: 3.10.0-693.17.1.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: fix races in fanout_add()
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-fix-races-in-fanout_add.patch
- From: 3.10.0-693.17.1.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: Do not call fanout_release from atomic contexts
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-Do-not-call-fanout_release-from-atomic-contexts.patch
- From: 3.10.0-693.17.1.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: hold bind lock when rebinding to fanout hook
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-hold-bind-lock-when-rebinding-to-fanout-hook.patch
- From: 3.10.0-693.17.1.el7
- CVE-2017-15649, CVSSv2 Score: 7.8
- Description:
packet: in packet_do_bind, test fanout with bind_lock held
- CVE: https://access.redhat.com/security/cve/CVE-2017-15649
- Patch: 3.10.0/net-packet-in-packet_do_bind-test-fanout-with-bind_lock-held.patch
- From: 3.10.0-693.17.1.el7
- CVE-2017-12193, CVSSv2 Score: 4.7
- Description:
assoc_array: Fix a buggy node-splitting case
- CVE: https://access.redhat.com/security/cve/CVE-2017-12193
- Patch: 3.10.0/lib-assoc_array-Fix-a-buggy-node-splitting-case.patch
- From: 3.10.0-693.17.1.el7
- CVE-2017-12192, CVSSv2 Score: 5.5
- Description:
keys: prevent KEYCTL_READ on negative key
- CVE: https://access.redhat.com/security/cve/CVE-2017-12192
- Patch: 3.10.0/security-keys-prevent-KEYCTL_READ-on-negative-key.patch
- From: 3.10.0-693.17.1.el7
- CVE-2016-3672, CVSSv2 Score: 4.6
- Description:
x86/mm/32: Enable full randomization on i386 and X86_32
- CVE: https://access.redhat.com/security/cve/cve-2016-3672
- Patch: 3.10.0/CVE-2016-3672.patch
- From: 3.10.0-862.el7
- CVE-2016-7913, CVSSv2 Score: 9.3
- Description:
[media] xc2028: avoid use after free
- CVE: https://access.redhat.com/security/cve/cve-2016-7913
- Patch: 3.10.0/CVE-2016-7913.patch
- From: 3.10.0-862.el7
- CVE-2016-8633, CVSSv2 Score: 5.9
- Description:
firewire: net: guard against rx buffer overflows
- CVE: https://access.redhat.com/security/cve/cve-2016-8633
- Patch: 3.10.0/CVE-2016-8633.patch
- From: 3.10.0-862.el7
- CVE-2017-7294, CVSSv2 Score: 6.1
- Description:
avoid overflow in vmw_surface_define_ioctl()
- CVE: https://access.redhat.com/security/cve/cve-2017-7294
- Patch: 3.10.0/CVE-2017-7294.patch
- From: 3.10.0-862.el7
- CVE-2017-12190, CVSSv2 Score: 6.2
- Description:
bio: avoid page leaks
- CVE: https://access.redhat.com/security/cve/cve-2017-12190
- Patch: 3.10.0/CVE-2017-12190.patch
- From: 3.10.0-862.el7
- CVE-2017-15127, CVSSv2 Score: 4.7
- Description:
ugetlbfs: remove superfluous page unlock in VM_SHARED case
- CVE: https://access.redhat.com/security/cve/cve-2017-15127
- Patch: 3.10.0/CVE-2017-15127.patch
- From: 3.10.0-862.el7
- CVE-2017-17448, CVSSv2 Score: 4.4
- Description:
etfilter: nfnetlink_cthelper: Add missing permission checks
- CVE: https://access.redhat.com/security/cve/cve-2017-17448
- Patch: 3.10.0/CVE-2017-17448.patch
- From: 3.10.0-862.el7
- CVE-2017-17449, CVSSv2 Score: 3.3
- Description:
etlink: Add netns check on taps
- CVE: https://access.redhat.com/security/cve/cve-2017-17449
- Patch: 3.10.0/CVE-2017-17449.patch
- From: 3.10.0-862.el7
- CVE-2017-17558, CVSSv2 Score: 6.4
- Description:
SB: core: prevent malicious bNumInterfaces overflow
- CVE: https://access.redhat.com/security/cve/cve-2017-17558
- Patch: 3.10.0/CVE-2017-17558.patch
- From: 3.10.0-862.el7
- CVE-2017-18017, CVSSv2 Score: 6.5
- Description:
netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
- CVE: https://access.redhat.com/security/cve/cve-2017-18017
- Patch: 3.10.0/CVE-2017-18017.patch
- From: 3.10.0-862.el7
- CVE-2017-18203, CVSSv2 Score: 4.7
- Description:
dm: fix race between dm_get_from_kobject() and __dm_destroy()
- CVE: https://access.redhat.com/security/cve/cve-2017-18203
- Patch: 3.10.0/CVE-2017-18203.patch
- From: 3.10.0-862.el7
- CVE-2017-1000410, CVSSv2 Score: 6.5
- Description:
Bluetooth: Prevent stack info leak from the EFS element.
- CVE: https://access.redhat.com/security/cve/cve-2017-1000410
- Patch: 3.10.0/CVE-2017-1000410.patch
- From: 3.10.0-862.el7
- CVE-2018-5750, CVSSv2 Score: 3.3
- Description:
ACPI: sbshc: remove raw pointer from printk() message.
- CVE: https://access.redhat.com/security/cve/cve-2018-5750
- Patch: 3.10.0/CVE-2018-5750.patch
- From: 3.10.0-862.el7
- CVE-2018-6927, CVSSv2 Score: 3.3
- Description:
futex: Prevent overflow by strengthen input validation
- CVE: https://access.redhat.com/security/cve/cve-2018-6927
- Patch: 3.10.0/CVE-2018-6927.patch
- From: 3.10.0-862.el7
- CVE-2017-1000407, CVSSv2 Score: 4.6
- Description:
Prevent flooding into debug port 0x80
- CVE: https://access.redhat.com/security/cve/cve-2017-1000407
- Patch: 3.10.0/CVE-2017-1000407-v2.patch
- From: 3.10.0-862.el7
- CVE-2017-1000407, CVSSv2 Score: 4.6
- Description:
Prevent flooding into debug port 0x80
- CVE: https://access.redhat.com/security/cve/cve-2017-1000407
- Patch: 3.10.0/CVE-2017-1000407-kpatch-1.patch
- From: 3.10.0-862.el7
- CVE-2017-14140, CVSSv2 Score: 3.3
- Description:
Sanitize 'move_pages()' permission checks
- CVE: https://access.redhat.com/security/cve/CVE-2017-14140
- Patch: 3.10.0/CVE-2017-14140-0001-Sanitize-move_pages-permission-checks-514.patch
- From: >3.10.0-693.5.2.el7
- CVE-2017-8824, CVSSv2 Score: 7.8
- Description:
dccp: fix use-after-free (CVE-2017-8824)
- CVE: https://access.redhat.com/security/cve/cve-2017-8824
- Patch: 3.10.0/dccp-fix-use-after-free.patch
- From: kernel-3.10.0-714.10.2.lve1.4.77.el7
- CVE-2017-14489, CVSSv2 Score: 5.5
- Description:
scsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly
- CVE: https://access.redhat.com/security/cve/cve-2017-14489
- Patch: 3.10.0/CVE-2017-14489.patch
- From: >kernel-3.10.0-693.21.1.el7
- CVE-2017-13166, CVSSv2 Score: 7.8
- Description:
provide with option to switch compat32 v4l ioctls on and off.
- CVE: https://access.redhat.com/security/cve/CVE-2017-13166
- Patch: 3.10.0/cve-2017-13166-disable-v4l-compat32-ioctls.patch
- From: kernel-3.10.0-862.el7
- CVE-2018-1000004, CVSSv2 Score: 4.7
- Description:
alsa: seq: Make ioctls race-free
- CVE: https://access.redhat.com/security/cve/cve-2018-1000004
- Patch: 3.10.0/CVE-2018-1000004-c7.patch
- From: 3.10.0-862.el7
- Description:
- CVE:
- Patch: 3.10.0/CVE-2018-10322-additional-1.patch
- From:
- CVE-2018-1087, CVSSv2 Score: 8
- Description:
kvm/x86: fix icebp instruction handling
- CVE: https://access.redhat.com/security/cve/CVE-2015-5283
- Patch: 3.10.0/kvm-x86-fix-icebp-instruction-handling-229.patch
- From: >3.10.0-862.el7
- CVE-2018-1000199, CVSSv2 Score: n/a
- Description:
perf/hwbp: Simplify the perf-hwbp code, fix documentation
- CVE: https://access.redhat.com/security/cve/CVE-2018-1000199
- Patch: 3.10.0/perf-hwbp-Simplify-the-perf-hwbp-code-fix-documentat.patch
- From: >3.10.0-862.el7
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack
- CVE: https://access.redhat.com/security/cve/CVE-2018-8897
- Patch: 3.10.0/x86-entry-64-Don-t-use-IST-entry-for-BP-stack.patch
- From: 3.10.0-862.2.3.el7
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2018-8897
- Patch: 3.10.0/x86-entry-64-Don-t-use-IST-entry-for-BP-stack-123.13.1-kpatch-1.patch
- From: 3.10.0-862.2.3.el7
- CVE-2018-1068, CVSSv2 Score: 8.1
- Description:
netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
- CVE: https://access.redhat.com/security/cve/cve-2018-1068
- Patch: 3.10.0/ebtables-CONFIG_COMPAT-dont-trust-userland-offsets.patch
- From: 3.10.0-862.2.3.el7
- CVE-2017-16939, CVSSv2 Score: 6.2
- Description:
ipsec: Fix aborted xfrm policy dump crash
- CVE: https://access.redhat.com/security/cve/cve-2017-16939
- Patch: 3.10.0/ipsec-fix-aborted-xfrm-policy-dump-crash.patch
- From: kernel-3.10.0-862.2.3.el7
- CVE-2017-16939, CVSSv2 Score: 6.2
- Description:
ipsec: Fix aborted xfrm policy dump crash (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2017-16939
- Patch: 3.10.0/ipsec-fix-aborted-xfrm-policy-dump-crash-kpatch-1.patch
- From: kernel-3.10.0-862.2.3.el7
- Description:
- CVE:
- Patch: rhel-common/x86-cpu-intel-Introduce-macros-for-Intel-family-numb.patch
- From:
- Description:
- CVE:
- Patch: rhel-common/x86-cpu-intel-Add-Knights-Mill-to-Intel-family.patch
- From:
- CVE-2018-3639, CVSSv2 Score: 5.5
- Description:
Speculative Store Bypass mitigation
- CVE: https://access.redhat.com/security/cve/CVE-2018-3639
- Patch: 3.10.0/ssb_mitigation.patch
- From: 3.10.0-862.3.2.el7
- CVE-2017-11600, CVSSv2 Score: 5.5
- Description:
xfrm: policy: check policy direction value
- CVE: https://access.redhat.com/security/cve/cve-2017-11600
- Patch: 3.10.0/CVE-2017-11600-pre-327.patch
- From: kenerl-3.10.0-862.6.3.el7
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: avoid collapses in tcp_prune_queue() if possible
- CVE: https://access.redhat.com/security/cve/cve-2018-5390
- Patch: 3.10.0/CLKRN-322-tcp-avoid-collapses-in-tcp_prune_queue-if-pre-514.patch
- From: >3.10.0-862.9.1.el7
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- CVE: https://access.redhat.com/security/cve/cve-2018-5390
- Patch: 3.10.0/CLKRN-322-tcp-detect-malicious-patterns-in-tcp_colla.patch
- From: >3.10.0-862.9.1.el7
- CVE-2017-13215, CVSSv2 Score: 5.3
- Description:
crypto: algif_skcipher - Load TX SG list after waiting
- CVE: https://access.redhat.com/security/cve/cve-2017-13215
- Patch: 3.10.0/CVE-2017-13215.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-5391, CVSSv2 Score: 7.5
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: https://access.redhat.com/security/cve/cve-2018-5391
- Patch: 3.10.0/Revert-net-increase-fragment-memory-usage-limits.patch
- From: 3.10.0-957.el7
- CVE-2018-10675, CVSSv2 Score: 5.5
- Description:
fix for use-after-free bug via crafted system calls in mm/mempolicy.c:do_get_mempolicy()
- CVE: https://access.redhat.com/security/cve/cve-2018-10675
- Patch: 3.10.0/CVE-2018-10675.patch
- From: kernel-2.6.32-358.93.1.el6, kernel-3.10.0-514.58.1.el7, kernel-3.10.0-862.11.6.el7
- CVE-2018-7566, CVSSv2 Score: 6.1
- Description:
ALSA: seq: Fix racy pool initializations
- CVE: https://access.redhat.com/security/cve/cve-2018-7566
- Patch: 3.10.0/sound-alsa-seq-Fix-racy-pool-initializations.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3690, CVSSv2 Score: 4
- Description:
introduce barrier_nospec() and array_index_nospec() (adaptation, 862.2.3.el7)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-3690
- Patch: 3.10.0/cve-2018-3690-dependency-862.2.3.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3693, CVSSv2 Score: 5.9
- Description:
fix regression when using the last syscall on x86 (adaptation, 123.el7-kernels)
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 3.10.0/cve-2018-3693-123.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3693, CVSSv2 Score: 5.9
- Description:
fix regression for ipv6 in latest kernels after spectre commit (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-3693
- Patch: 3.10.0/net-ipv6-fix-nospec-related-regression-in-ipv6_addr_prefix.patch
- From: kernel-3.10.0-862.11.6.el7
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 3.10.0/CVE-2018-3646-CVE-2018-3620-smt_disable-123.20.1.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 3.10.0/CVE-2018-3646-l1tf-cpu-setup-693.17.1.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-3646, CVSSv2 Score: 5.6
- Description:
Add ability to flush l1d cache on vmexit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 3.10.0/CVE-2018-3646-vmx-l1d-flush-123.20.1.patch
- From: 3.10.0-862.11.6.el7
- CVE-2018-14634, CVSSv2 Score: 7.8
- Description:
Limit arg stack to at most 75% of _STK_LIM
- CVE: https://access.redhat.com/security/cve/cve-2018-14634
- Patch: 3.10.0/limit-stack-arg-to-75-percent-of_STK_LIM.patch
- From: >kernel-3.10.0-862.11.6.el7
- CVE-2016-4913, CVSSv2 Score: 7.2
- Description:
get_rock_ridge_filename(): handle malformed NM entries
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-4913
- Patch: 3.10.0/CVE-2016-4913-get_rock_ridge_filename-handle-malformed-NM-entrie.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-0861, CVSSv2 Score: 7
- Description:
ALSA: pcm: prevent UAF in snd_pcm_info
- CVE: https://access.redhat.com/security/cve/cve-2017-0861
- Patch: 3.10.0/CVE-2017-0861-alsa-pcm-prevent-UAF-in-snd_pcm_info.patch
- From: 3.10.0-957.el7
- CVE-2017-10661, CVSSv2 Score: 7.6
- Description:
timerfd: Protect the might cancel mechanism proper
- CVE: https://access.redhat.com/security/cve/cve-2017-10661
- Patch: 3.10.0/CVE-2017-10661.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-10661, CVSSv2 Score: 7.6
- Description:
timerfd: Protect the might cancel mechanism proper (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2017-10661
- Patch: 3.10.0/CVE-2017-10661-kpatch-1.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-17805, CVSSv2 Score: 5.5
- Description:
crypto: salsa20 - fix blkcipher_walk API usage
- CVE: https://access.redhat.com/security/cve/cve-2017-17805
- Patch: 3.10.0/CVE-2017-17805.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2018-1092, CVSSv2 Score: 4.6
- Description:
ext4: fail ext4_iget for root directory if unallocated
- CVE: https://access.redhat.com/security/cve/cve-2018-1092
- Patch: 3.10.0/CVE-2018-1092-ext4-fail-ext4_iget-for-root-directory-if-unallocated.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-18344, CVSSv2 Score: 6.7
- Description:
posix-timer: Properly check sigevent->sigev_notify
- CVE: https://access.redhat.com/security/cve/cve-2017-18344
- Patch: 3.10.0/CVE-2017-18344.patch
- From: >3.10.0-862.9.1.el7
- CVE-2017-18232, CVSSv2 Score: 5.5
- Description:
fix possible deadlock with mutex within SCSI libsas (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18232
- Patch: 3.10.0/cve-2017-18232-scsi-libsas-direct-call-probe-and-destruct.patch
- From: 4.15.*
- CVE-2018-5344, CVSSv2 Score: 5.5
- Description:
loop: fix concurrent lo_open/lo_release
- CVE: https://access.redhat.com/security/cve/cve-2018-5344
- Patch: 3.10.0/CVE-2018-5344-loop-fix-concurrent-lo_open-lo_release-pre-327.patch
- From: >kernel-3.10.0-327.36.3.el7
- CVE-2018-5803, CVSSv2 Score: 5.5
- Description:
sctp: verify size of a new chunk in _sctp_make_chunk()
- CVE: https://access.redhat.com/security/cve/cve-2018-5803
- Patch: 3.10.0/CVE-2018-5803-sctp-verify-size-of-a-new-chunk-327.36.3.patch
- From: >kernel-3.10.0-514.2.2.el7
- CVE-2018-7757, CVSSv2 Score: 5.5
- Description:
scsi: libsas: fix memory leak
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7757
- Patch: 3.10.0/CVE-2018-7757-scsi-libsas-fix-memory-leak-in-sas_smp_get_phy_events.patch
- From: >kernel-3.10.0-123.1.2.el7
- CVE-2018-8781, CVSSv2 Score: 7
- Description:
drm: udl: Properly check framebuffer mmap offsets
- CVE: https://access.redhat.com/security/cve/cve-2018-8781
- Patch: 3.10.0/CVE-2018-8781-drm-udl-Properly-check-framebuffer-mmap-offsets.patch
- From: >= kernel-3.10.0-123.1.2.el7
- CVE-2018-10879, CVSSv2 Score: 4.2
- Description:
ext4: always verify the magic number in xattr blocks
- CVE: https://access.redhat.com/security/cve/cve-2018-10879
- Patch: 3.10.0/CVE-2018-10879-ext4-always-verify-the-magic-number-in-xattr-blocks-pre229.patch
- From: 3.10.0-957.el7
- CVE-2018-10879, CVSSv2 Score: 4.2
- Description:
ext4: always verify the magic number in xattr blocks
- CVE: https://access.redhat.com/security/cve/cve-2018-10879
- Patch: 3.10.0/CVE-2018-10879-ext4-add-corruption-check.patch
- From: kernel-3.10.0-957.el7
- CVE-2018-10881, CVSSv2 Score: 4.2
- Description:
ext4: clear i_data in ext4_inode_info when removing inline data
- CVE: https://access.redhat.com/security/cve/cve-2018-10881
- Patch: 3.10.0/CVE-2018-10881-ext4-clear-i_data-in-ext4_inode_info-when-removing-inline-data.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://access.redhat.com/security/cve/cve-2018-10902
- Patch: 3.10.0/CVE-2018-10902-ALSA-rawmidi-shange-resize-buffers-atomically.patch
- From: >=kernel-3.10.0-123.1.2.el7
- CVE-2017-18208, CVSSv2 Score: 5.5
- Description:
mm/madvise.c: fix madvise() infinite loop under special circumstances
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-18208
- Patch: 3.10.0/CVE-2017-18208-fix-madvise-infinite-loop-under-speci.patch
- From: kernel-3.10.0-862.14.4.el7
- CVE-2018-1094, CVSSv2 Score: 4.6
- Description:
ext4: don't allow r/w mounts if metadata blocks overlap the superblock
- CVE: https://access.redhat.com/security/cve/cve-2018-1094
- Patch: 3.10.0/CVE-2018-1094-fs-ext4-don-t-allow-r-w-mounts-if-metadata-blocks-overlap-the-superblock.patch
- From: 3.10.0-957.el7
- CVE-2018-10322, CVSSv2 Score: 4.6
- Description:
xfs: move inode fork verifiers to xfs_dinode_verify
- CVE: https://access.redhat.com/security/cve/cve-2018-10322
- Patch: 3.10.0/CVE-2018-10322-fs-xfs-move-inode-fork-verifiers-to-xfs_dinode_verify-2.patch
- From: 3.10.0-957.el7
- CVE-2018-10322, CVSSv2 Score: 4.6
- Description:
xfs: enhance dinode verifier
- CVE: https://access.redhat.com/security/cve/cve-2018-10322
- Patch: 3.10.0/CVE-2018-10322-fs-xfs-enhance-dinode-verifier-1.patch
- From: 3.10.0-957.el7
- CVE-2018-10940, CVSSv2 Score: 4.4
- Description:
cdrom-information-leak-in-cdrom_ioctl_media_changed.patch
- CVE: https://access.redhat.com/security/cve/cve-2018-10940
- Patch: 3.10.0/CVE-2018-10940-cdrom-information-leak-in-cdrom_ioctl_media_changed-1.patch
- From: 3.10.0-957.el7
- CVE-2018-1120, CVSSv2 Score: 2.6
- Description:
proc: do not access cmdline nor environ from file-backed areas
- CVE: https://access.redhat.com/security/cve/cve-2018-1120
- Patch: 3.10.0/CVE-2018-1120-proc-do-not-access-cmdline-nor-environ-from-file-backed-areas-4.patch
- From: 3.10.0-957.el7
- CVE-2015-8830, CVSSv2 Score: 4.9
- Description:
AIO: properly check iovec sizes
- CVE: https://access.redhat.com/security/cve/CVE-2015-8830
- Patch: 3.10.0/CVE-2015-8830.patch
- From: 3.10.0-957.el7
- CVE-2018-10878, CVSSv2 Score: 4.8
- Description:
ext4: always check block group bounds in ext4_init_block_bitmap()
- CVE: https://access.redhat.com/security/cve/cve-2018-10878
- Patch: 3.10.0/CVE-2018-10878-ext4-always-check-block-group-bounds-in-ext4_init_block_bitmap_123.patch
- From: 3.10.0-957.el7
- CVE-2018-10878, CVSSv2 Score: 4.8
- Description:
ext4: make sure bitmaps and the inode table don't overlap with bg descriptors
- CVE: https://access.redhat.com/security/cve/cve-2018-10878
- Patch: 3.10.0/CVE-2018-10878-ext4-make-sure-bitmaps-and-the-inode-table-don-t-overlap-with-bg-descriptors.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
include/linux/mmdebug.h: add VM_WARN which maps to WARN()
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-linux-include-linux-mmdebug-h-add-VM_WARN-which-maps-to-WARN_123.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
include/linux/mmdebug.h: add VM_WARN_ONCE()
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-linux-include-linux-mmdebug-h-add-VM_WARN_ONCE_123.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-fs-hugetlbfs-check-for-pgoff-value-overflow-229.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-fs-hugetlbfs-check-for-pgoff-value-overflow-v3.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-fs-hugetlbfs-check-for-pgoff-value-overflow-v3-fix-fix.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
include/linux/mmdebug.h: fix VM_WARN[_*]() with CONFIG_DEBUG_VM=n
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-linux-include-linux-mmdebug-h-fix-VM_WARN-_-with-CONFIG_DEBUG_VM-n_123.patch
- From: 3.10.0-957.el7
- CVE-2018-7740, CVSSv2 Score: 4.4
- Description:
mm/hugetlb.c: clean up VM_WARN usage
- CVE: https://access.redhat.com/security/cve/cve-2018-7740
- Patch: 3.10.0/CVE-2018-7740-mm-hugetlb-c-clean-up-VM_WARN-usage_229.patch
- From: 3.10.0-957.el7
- CVE-2018-14633, CVSSv2 Score: 7
- Description:
scsi: target: iscsi: Use hex2bin instead of a re-implementation
- CVE: https://access.redhat.com/security/cve/cve-2018-14633
- Patch: 3.10.0/cve-2018-14633-iscsi-target-use-hex2bin-instead-of-123.patch
- From: kernel-3.10.0-957.1.3.el7
- CVE-2018-18690, CVSSv2 Score: 5.5
- Description:
[fs] xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE
- CVE: https://access.redhat.com/security/cve/CVE-2018-18690
- Patch: 3.10.0/fs-xfs-don-t-fail-when-converting-shortform-attr-to-long-form-during-ATTR_REPLACE-229.20.1.patch
- From: 3.10.0-957.el7
- CVE-2018-10882, CVSSv2 Score: 4.8
- Description:
[fs] ext4: add more inode number paranoia checks
- CVE: https://access.redhat.com/security/cve/CVE-2018-10882
- Patch: 3.10.0/fs-ext4-add-more-inode-number-paranoia-checks.patch
- From: 3.10.0-957.el7
- CVE-2018-18559, CVSSv2 Score: 7
- Description:
net/packet: fix a race in packet_bind() and packet_notifier()
- CVE: https://access.redhat.com/security/cve/cve-2018-18559
- Patch: 3.10.0/CVE-2018-18559.patch
- From: 3.10.0-953.5.1.el7
- CVE-2018-9568, CVSSv2 Score: 7
- Description:
net: Set sk_prot_creator when cloning sockets to the right proto
- CVE: https://access.redhat.com/security/cve/cve-2018-9568
- Patch: 3.10.0/CVE-2018-9568.patch
- From: 3.10.0-957.10.1.el7
- CVE-2018-17972, CVSSv2 Score: 5.5
- Description:
proc: restrict kernel stack dumps to root
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17972
- Patch: 3.10.0/CVE-2018-17972-pre-862.patch
- From: 3.13.0-165.215
- CVE-2019-6974, CVSSv2 Score: 7.3
- Description:
use-after-free vulnerability in the way the Linux kernel's KVM hypervisor implements its device control API
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6974
- Patch: 3.10.0/cve-2019-6974-123.patch
- From:
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
[net] tcp: pass previous skb to tcp_shifted_skb()
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 3.10.0/net-tcp-pass-previous-skb-to-tcp_shifted_skb.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11477, CVSSv2 Score: 7.5
- Description:
[net] tcp: limit payload size of sacked skbs
- CVE: https://access.redhat.com/security/cve/cve-2019-11477
- Patch: 3.10.0/net-tcp-limit-payload-size-of-sacked-skbs.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11478, CVSSv2 Score: 5.3
- Description:
[net] tcp: tcp_fragment() should apply sane memory limits
- CVE: https://access.redhat.com/security/cve/cve-2019-11478
- Patch: 3.10.0/net-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11479, CVSSv2 Score: 5.3
- Description:
[net] tcp: add tcp_min_snd_mss sysctl
- CVE: https://access.redhat.com/security/cve/cve-2019-11479
- Patch: 3.10.0/net-tcp-add-tcp_min_snd_mss-sysctl.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11479, CVSSv2 Score: 5.3
- Description:
[net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://access.redhat.com/security/cve/cve-2019-11479
- Patch: 3.10.0/net-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From: 3.10.0-957.21.3.el7
- CVE-2019-11811, CVSSv2 Score: 7.8
- Description:
ipmi_si: fix use-after-free of resource->name
- CVE: https://access.redhat.com/security/cve/cve-2019-11811
- Patch: 3.10.0/cve-2019-11811-ipmi-si-fix-use-after-free-of-resource-name-514.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
sunrpc: use-after-free in svc_process_common()
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-229.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch-229.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10772-sunrpc-use-SVC_NET-in-svcauth_gss_-functions.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-12130 CVE-2018-12126 CVE-2018-12127 and CVE-2019-11091, CVSSv2 Score: 6.2
- Description:
MDS CPU Side-channel Attacks mitigation
- CVE: https://access.redhat.com/security/cve/cve-2019-11091
- Patch: 3.10.0/mds.patch
- From: 3.10.0-957.12.2.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost-net: Always access vq->private_data under vq mutex
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0001-vhost-net-Always-access-vq-private_data-under-vq-mut.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost-net: set packet weight of tx polling to 2 * vq size
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0001-vhost-net-set-packet-weight-of-tx-polling-to-2-vq-si-229.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: use packet weight for rx handler, too
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0002-vhost_net-use-packet-weight-for-rx-handler-too-229.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: introduce vhost_exceeds_weight()
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0003-vhost_net-introduce-vhost_exceeds_weight-229.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: fix possible infinite loop
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0004-vhost_net-fix-possible-infinite-loop-229.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2019-5489, CVSSv2 Score: 7.1
- Description:
mm/mincore.c: make mincore() more conservative
- CVE: https://access.redhat.com/security/cve/cve-2019-5489
- Patch: 3.10.0/0006-mincore.c-make-mincore-more-conservative-pre-693.patch
- From: 3.10.0-1062.el6
- CVE-2018-9517, CVSSv2 Score: 4.7
- Description:
l2tp: pass tunnel pointer to ->session_create()
- CVE: https://access.redhat.com/security/cve/cve-2018-9517
- Patch: 3.10.0/0007-l2tp-pass-tunnel-pointer-to-session_create-693.21.1.patch
- From: 3.10.0-1062.el7
- CVE-2018-10853, CVSSv2 Score: 7.0
- Description:
KVM: x86: introduce linear_{read,write}_system
- CVE: https://access.redhat.com/security/cve/cve-2018-10853
- Patch: 3.10.0/0008-kvm-x86-introduce-linear_-read-write-_system-123.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2018-10853, CVSSv2 Score: 7.0
- Description:
KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system
- CVE: https://access.redhat.com/security/cve/cve-2018-10853
- Patch: 3.10.0/0009-kvm-x86-pass-kvm_vcpu-to-kvm_read_guest_virt-and-kvm-123.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2018-10853, CVSSv2 Score: 7.0
- Description:
kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access
- CVE: https://access.redhat.com/security/cve/cve-2018-10853
- Patch: 3.10.0/0010-kvm-x86-use-correct-privilege-level-for-sgdt-sidt-fx-229.20.1.patch
- From: 3.10.0-1062.el7
- Description:
- CVE:
- Patch: 3.10.0/0011-kernelcare-CVE-2018-10853-adaptation-123.20.1.patch
- From:
- CVE-2018-14734, CVSSv2 Score: 5.3
- Description:
vhost/vsock: fix use-after-free in network stack callers
- CVE: https://access.redhat.com/security/cve/cve-2018-14734
- Patch: 3.10.0/CVE-2018-14734.patch
- From: 3.10.0-1062.el7
- CVE-2018-15594, CVSSv2 Score: 5.6
- Description:
3.10.0/CVE-2018-15594.patch
- CVE: https://access.redhat.com/security/cve/cve-2018-15594
- Patch: 3.10.0/CVE-2018-15594.patch
- From: 3.10.0-1062.el7
- CVE-2019-3459, CVSSv2 Score: 5.3
- Description:
Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-3459
- Patch: 3.10.0/CVE-2019-3459.patch
- From: 3.10.0-1062.el7
- CVE-2019-3460, CVSSv2 Score: 5.3
- Description:
Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt
- CVE: https://access.redhat.com/security/cve/cve-2019-3460
- Patch: 3.10.0/CVE-2019-3460-327.36.3.patch
- From: 3.10.0-1062.el7
- CVE-2019-11810, CVSSv2 Score: 6.2
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 3.10.0/CVE-2019-11810-327.28.3.patch
- From: 3.10.0-1062.el7
- CVE-2019-11833, CVSSv2 Score: 5.5
- Description:
ext4: zero out the unused memory region in the extent tree block
- CVE: https://access.redhat.com/security/cve/cve-2019-11833
- Patch: 3.10.0/CVE-2019-11833.patch
- From: 3.10.0-1062.el7
- CVE-2018-7755, CVSSv2 Score: 5.9
- Description:
floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
- CVE: https://access.redhat.com/security/cve/cve-2018-7755
- Patch: 3.10.0/CVE-2018-7755.patch
- From: 3.10.0-1062.el7
- CVE-2018-9516, CVSSv2 Score: 3.1
- Description:
HID: debug: check length before copy_to_user()
- CVE: https://access.redhat.com/security/cve/CVE-2018-9516
- Patch: 3.10.0/CVE-2018-9516.patch
- From: 3.10.0-1062.el7
- CVE-2018-13053, CVSSv2 Score: 3.3
- Description:
alarmtimer: Prevent overflow for relative nanosleep
- CVE: https://access.redhat.com/security/cve/CVE-2018-13053
- Patch: 3.10.0/CVE-2018-13053.patch
- From: 3.10.0-1062.el7
- CVE-2018-13093, CVSSv2 Score: 5.5
- Description:
validate cached inodes are free when allocated in xfs
- CVE: https://access.redhat.com/security/cve/cve-2018-13093
- Patch: 3.10.0/CVE-2018-13093-lt-327.patch
- From: 3.10.0-1062.el7
- CVE-2018-13094, CVSSv2 Score: 5.0
- Description:
xfs: fixed incorrect xfs_da_shrink_inode call with NULL buffer
- CVE: https://access.redhat.com/security/cve/cve-2018-13094
- Patch: 3.10.0/CVE-2018-13094-lt-327.patch
- From: 3.10.0-1062.el7
- CVE-2018-13095, CVSSv2 Score: 5.0
- Description:
xfs: fixed possible ifp->if_broot dereference based on the XFS_DINODE_FMT_BTREE format
- CVE: https://access.redhat.com/security/cve/cve-2018-13095
- Patch: 3.10.0/CVE-2018-13095-1-lt-327.patch
- From: 3.10.0-1062.el7
- CVE-2018-13095, CVSSv2 Score: 5.0
- Description:
xfs: fix a null pointer dereference in xfs_bmap_extents_to_btree
- CVE: https://access.redhat.com/security/cve/cve-2018-13095
- Patch: 3.10.0/CVE-2018-13095-2-lt-327.patch
- From: 3.10.0-1062.el7
- CVE-2018-13095, CVSSv2 Score: 5.0
- Description:
xfs: fix error handling in xfs_bmap_extents_to_btree
- CVE: https://access.redhat.com/security/cve/cve-2018-13095
- Patch: 3.10.0/CVE-2018-13095-3-lt-327.patch
- From: 3.10.0-1062.el7
- CVE-2018-16658, CVSSv2 Score: 4.0
- Description:
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status
- CVE: https://access.redhat.com/security/cve/CVE-2018-16658
- Patch: 3.10.0/CVE-2018-16658.patch
- From: 3.10.0-1062.el7
- CVE-2018-16885, CVSSv2 Score: 4.7
- Description:
iovec: make sure the caller actually wants anything in memcpy_fromiovecend
- CVE: https://access.redhat.com/security/cve/CVE-2018-16885
- Patch: 3.10.0/CVE-2018-16885.patch
- From: 3.10.0-1062.el7
- CVE-2019-7222, CVSSv2 Score: 2.8
- Description:
KVM: x86: work around leak of uninitialized stack contents
- CVE: https://access.redhat.com/security/cve/CVE-2019-7222
- Patch: 3.10.0/CVE-2019-7222.patch
- From: 3.10.0-1062.el7
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
Mitigation of SWAPGS Spectre gadget
- CVE: https://access.redhat.com/security/cve/cve-2019-1125
- Patch: 3.10.0/swapgs-327.4.5.patch
- From: 3.10.0-1062.1.1.el7
- CVE-2019-14835, CVSSv2 Score: 7.2
- Description:
host: make sure log_num < in_num
- CVE: https://access.redhat.com/security/cve/CVE-2019-14835
- Patch: 3.10.0/CVE-2019-14835-vhost-make-sure-log_num-in_num-lt-327.patch
- From: >3.10.0-1062.1.1.el7
- CVE-2019-3846, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix possible buffer overflows at parsing bss descriptor
- CVE: https://access.redhat.com/security/cve/cve-2019-3846
- Patch: 3.10.0/8947-wireless-mwifiex-Fix-possible-buffer-overflows-at-pa-327.36.3.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2019-3846, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix possible buffer overflows at parsing bss descriptor
- CVE: https://access.redhat.com/security/cve/cve-2019-3846
- Patch: 3.10.0/8948-wireless-mwifiex-Abort-at-too-short-BSS-descriptor-e-327.36.3.patch
- From: kernel-3.10.0-1062.4.1.el7
- CVE-2018-10880, CVSSv2 Score: 5.5
- Description:
ext4: never move the system.data xattr out of the inode body
- CVE: https://access.redhat.com/security/cve/CVE-2018-10880
- Patch: 3.10.0/ext4-never-move-the-system.data-xattr-out-of-the-ino.patch
- From: >3.10.0-957.1.3.el7
- CVE-2019-14821, CVSSv2 Score: 7.0
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://access.redhat.com/security/cve/cve-2019-14821
- Patch: 3.10.0/9010-virt-KVM-coalesced_mmio-add-bounds-checking.patch
- From: kernel-3.10.0-1062.1.1.el7
- CVE-2019-15239, CVSSv2 Score: 7.4
- Description:
tcp: purge write queue in tcp_connect_init()
- CVE: https://access.redhat.com/security/cve/cve-2019-15239
- Patch: 3.10.0/CVE-2019-15239-pre-327.patch
- From: kernel-3.10.0-1062.7.1.el7
- CVE-2019-14816, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14816
- Patch: 3.10.0/cve-2019-14816-mwifiex-fix-three-heap-overflow-327.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-14895, CVSSv2 Score: 8.0
- Description:
Heap Overflow in mwifiex_process_country_ie() function of Marvell Wifi Driver
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14895
- Patch: 3.10.0/cve-2019-14895-mwifiex-fix-possible-heap-overflow-123.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-17133, CVSSv2 Score: 8.8
- Description:
cfg80211: wext: avoid copying malformed SSIDs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17133
- Patch: 3.10.0/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2019-17666, CVSSv2 Score: 6.3
- Description:
[wireless] rtlwifi: Fix potential overflow on P2P code
- CVE: https://access.redhat.com/security/cve/cve-2019-17666
- Patch: 3.10.0/CVE-2019-17666-0001-rtlwifi-Fix-potential-overflow-on-P2P-code-123.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-19338, CVSSv2 Score: 5.5
- Description:
[x86] kvm: x86: do not modify masked bits of shared MSRs
- CVE: https://access.redhat.com/security/cve/cve-2019-19338
- Patch: 3.10.0/CVE-2019-19338-0003-KVM-x86-do-not-modify-masked-bits-of-shared-MSRs.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
[mm] mm/hugetlb.c: __get_user_pages ignores certain follow_hugetlb_page errors
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 3.10.0/CVE-2019-11487-0003-mm-hugetlb.c-__get_user_pages-ignores-certain-follow.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
[mm] mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://access.redhat.com/security/cve/cve-2019-11487
- Patch: 3.10.0/CVE-2019-11487-0004-mm-prevent-get_user_pages-from-overflowing-page-refc-123.patch
- From: 3.10.0-1062.18.1.el7
- CVE-2018-19985 CVE-2018-20169, CVSSv2 Score: 6.4
- Description:
[usb] check usb_get_extra_descriptor for proper size
- CVE: https://access.redhat.com/security/cve/cve-2018-20169
- Patch: 3.10.0/0105-usb-check-usb_get_extra_descriptor-for-proper-size-327.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-19985 CVE-2018-20169, CVSSv2 Score: 6.4
- Description:
[usb] hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CVE: https://access.redhat.com/security/cve/cve-2018-20169
- Patch: 3.10.0/0106-usb-hso-Fix-OOB-memory-access-in-hso_probe-hso_get_c.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-11884, CVSSv2 Score: 6.8
- Description:
[net] bluetooth: hidp: fix buffer overflow
- CVE: https://access.redhat.com/security/cve/cve-2019-11884
- Patch: 3.10.0/0135-net-bluetooth-hidp-fix-buffer-overflow.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-10207, CVSSv2 Score: 4.7
- Description:
[bluetooth] Bluetooth: hci_uart: check for missing tty operations
- CVE: https://access.redhat.com/security/cve/cve-2019-10207
- Patch: 3.10.0/1106-bluetooth-Bluetooth-hci_uart-check-for-missing-tty-o-327.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-14283, CVSSv2 Score: 5.6
- Description:
[block] floppy: fix out-of-bounds read in copy_buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-14283
- Patch: 3.10.0/1107-block-floppy-fix-out-of-bounds-read-in-copy_buffer.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15214, CVSSv2 Score: 6.4
- Description:
[sound] ALSA: info: Fix racy addition/deletion of nodes
- CVE: https://access.redhat.com/security/cve/cve-2019-15214
- Patch: 3.10.0/1478-sound-ALSA-info-Fix-racy-addition-deletion-of-nodes-229.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15214, CVSSv2 Score: 6.4
- Description:
[sound] ALSA: core: Fix card races between register and disconnect
- CVE: https://access.redhat.com/security/cve/cve-2019-15214
- Patch: 3.10.0/1479-sound-ALSA-core-Fix-card-races-between-register-and-.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15221, CVSSv2 Score: 4.6
- Description:
[sound] ALSA: line6: Fix write on zero-sized buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-15221
- Patch: 3.10.0/1590-sound-ALSA-line6-Fix-write-on-zero-sized-buffer-229.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15221, CVSSv2 Score: 4.6
- Description:
[sound] ALSA: line6: Fix memory leak at line6_init_pcm() error path
- CVE: https://access.redhat.com/security/cve/cve-2019-15221
- Patch: 3.10.0/1607-sound-ALSA-line6-Fix-memory-leak-at-line6_init_pcm-e-229.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-7191, CVSSv2 Score: 6.2
- Description:
[net] tun: call dev_get_valid_name() before register_netdevice()
- CVE: https://access.redhat.com/security/cve/cve-2018-7191
- Patch: 3.10.0/1694-net-tun-call-dev_get_valid_name-before-register_netd-229.patch
- From: kernel-3.10.0-1127.el7
- CVE-2018-7191, CVSSv2 Score: 6.2
- Description:
[net] tun: allow positive return values on dev_get_valid_name() call
- CVE: https://access.redhat.com/security/cve/cve-2018-7191
- Patch: 3.10.0/1695-net-tun-allow-positive-return-values-on-dev_get_vali.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
[security] KEYS: Strip trailing spaces
- CVE: https://access.redhat.com/security/cve/cve-2017-17807
- Patch: 3.10.0/1721-security-KEYS-Strip-trailing-spaces.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
[security] KEYS: remove unnecessary get/put of explicit dest_keyring
- CVE: https://access.redhat.com/security/cve/cve-2017-17807
- Patch: 3.10.0/1722-security-KEYS-remove-unnecessary-get-put-of-explicit.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
[security] KEYS: add missing permission check for request_key() destination
- CVE: https://access.redhat.com/security/cve/cve-2017-17807
- Patch: 3.10.0/1723-security-KEYS-add-missing-permission-check-for-reque.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-11190, CVSSv2 Score: 4.7
- Description:
binfmt_elf: switch to new creds when switching to new mm
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11190
- Patch: 3.10.0/CVE-2019-11190.patch
- From: >4.8
- CVE-2019-3901, CVSSv2 Score: 5.6
- Description:
[kernel] perf/core: Fix perf_event_open() vs. execve() race
- CVE: https://access.redhat.com/security/cve/cve-2019-3901
- Patch: 3.10.0/2070-kernel-perf-core-Fix-perf_event_open-vs.-execve-race-123.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-15916, CVSSv2 Score: 5.5
- Description:
[net] sysfs: Fix mem leak in netdev_register_kobject
- CVE: https://access.redhat.com/security/cve/cve-2019-15916
- Patch: 3.10.0/2160-net-sysfs-Fix-mem-leak-in-netdev_register_kobject.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
cfg80211: add and use strongly typed element iteration macros
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/CVE-2019-16746-0001-cfg80211-add-and-use-strongly-typed-element-iteratio.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
ieee80211: fix for_each_element_extid()
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/CVE-2019-16746-0002-ieee80211-fix-for_each_element_extid.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
cfg80211: Use const more consistently in for_each_element macros
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/CVE-2019-16746-0003-cfg80211-Use-const-more-consistently-in-for_each_ele.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
[net] mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://access.redhat.com/security/cve/cve-2019-5108
- Patch: 3.10.0/2275-net-mac80211-Do-not-send-Layer-2-Update-frame-before-327.patch
- From: kernel-3.10.0-1127.el7
- CVE-2019-16746, CVSSv2 Score: 8.4
- Description:
[net] nl80211: validate beacon head
- CVE: https://access.redhat.com/security/cve/cve-2019-16746
- Patch: 3.10.0/2282-net-nl80211-validate-beacon-head-123.patch
- From: kernel-3.10.0-1127.el7
- CVE-2015-9289, CVSSv2 Score: 3.3
- Description:
[media] cx24116: fix a buffer overflow when checking userspace params
- CVE: https://access.redhat.com/security/cve/cve-2015-9289
- Patch: 3.10.0/2347-media-cx24116-fix-a-buffer-overflow-when-checking-us.patch
- From: kernel-3.10.0-1127.el7
- CVE-2017-18595, CVSSv2 Score: 7.8
- Description:
tracing: Fix possible double free on failure of allocating trace buffer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18595
- Patch: 3.10.0/CVE-2017-18595.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix dereference after null check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19768
- Patch: 3.10.0/CVE-2019-19768-123.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 3.10.0/cve-2020-12888-123.patch
- From: kernel-3.10.0-1127.13.1.el7
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 3.10.0/cve-2020-12888-kpatch-1-229.patch
- From: kernel-3.10.0-1127.13.1.el7
- CVE-2019-19527, CVSSv2 Score: 4.6
- Description:
HID: hiddev: avoid opening a disconnected device
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19527
- Patch: 3.16.0/cve-2019-19527-usb-hid-avoid-opening-disconnected-device.patch
- From: 3.16.81-1
- CVE-2020-12653, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12653
- Patch: 3.10.0/CVE-2020-12653-mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 3.10.0-1127.18.2
- CVE-2020-12654, CVSSv2 Score: 7.1
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12654
- Patch: 3.10.0/CVE-2020-12654-mwifiex-fix-possible-buffer-overflows-in-mwifiex_ret.patch
- From: 3.10.0-1127.18.2
- CVE-2020-14305, CVSSv2 Score: 8.1
- Description:
kernel: memory corruption in Voice over IP nf_conntrack_h323 module
- CVE: https://access.redhat.com/security/cve/cve-2020-14305
- Patch: 3.10.0/CVE-2020-14305.patch
- From: >kernel-3.10.0-1127.13.1.el7
- CVE-2020-9383, CVSSv2 Score: 7.1
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://access.redhat.com/security/cve/cve-2020-9383
- Patch: 3.10.0/CVE-2020-9383-0314-block-floppy-check-floppy-check-FDC-index-for-errors-before-assig.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-8647 CVE-2020-8649, CVSSv2 Score: 6.1
- Description:
vgacon: Fix a UAF in vgacon_invert_region
- CVE: https://access.redhat.com/security/cve/cve-2020-8647
- Patch: 3.10.0/CVE-2020-8647-CVE-2020-8649-0363-video-vgacon-Fix-a-UAF-in-vgacon_invert_region.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
ipv6: constify ip6_dst_lookup_{flow|tail}() sock arguments
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-0250-net-ipv6-constify-ip6_dst_lookup_-flow-tail-sock-arg-229.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-0251-net-ipv6-add-argument-to-ip6_dst_lookup_flow-229.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-0252-net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-ip6-327.36.3.patch
- From: kernel-3.10.0-1160.el7
- cve-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6_stub: ip6_dst_lookup_flow (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-1749
- Patch: 3.10.0/CVE-2020-1749-kpatch-229.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10942, CVSSv2 Score: 5.3
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://access.redhat.com/security/cve/cve-2020-10942
- Patch: 3.10.0/CVE-2020-10942-0728-vhost-vhost-Check-docket-sk_family-instead-of-call-g.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-11565, CVSSv2 Score: 6.0
- Description:
mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
- CVE: https://access.redhat.com/security/cve/cve-2020-11565
- Patch: 3.10.0/CVE-2020-11565-0564-mm-mm-mempolicy-require-at-least-one-nedeid-for-MPOL.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20636, CVSSv2 Score: 6.7
- Description:
Input: add safety guards to input_set_keycode
- CVE: https://access.redhat.com/security/cve/cve-2019-20636
- Patch: 3.10.0/CVE-2019-20636-0469-input-Input-add-safety-guards-to-input_set_keycode.patch
- From: kernel-3.10.0-1160.el7
- N/A, CVSSv2 Score: N/A
- Description:
chardev: add helper function to register char devs with a struct device (CVE-2020-10690 dependency)
- CVE: N/A
- Patch: 3.16.0/CVE-2020-10690-chardev-add-helper-function-to-register-char-devs-with-a-struct-device.patch
- From: 3.16.84-1
- CVE-2020-10690, CVSSv2 Score: 6.5
- Description:
ptp: fix the race between the release of ptp_clock and cdev
- CVE: https://access.redhat.com/security/cve/CVE-2020-10690
- Patch: 3.10.0/CVE-2020-10690-ptp-fix-the-race-between-the-release-of-ptp_clock-and-cdev.patch
- From: 3.10.0-1160.el7
- CVE-2020-10690, CVSSv2 Score: 6.5
- Description:
ptp: fix the race between the release of ptp_clock and cdev (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-10690
- Patch: 3.10.0/CVE-2020-10690-ptp-fix-the-race-between-the-release-of-ptp_clock-and-cdev-kpatch-lt-327.patch
- From: 3.10.0-1160.el7
- CVE-2020-10732, CVSSv2 Score: 3.3
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info
- CVE: https://access.redhat.com/security/cve/cve-2020-10732
- Patch: 3.10.0/CVE-2020-10732-0756-fs-fs-binfmt_elf.c-allocate-initialized-memory-in-fi.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits
- CVE: https://access.redhat.com/security/cve/cve-2020-12826
- Patch: 3.10.0/CVE-2020-12826-0707-fs-signal-Extend-exec_id-to-64bits-123.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2020-12826
- Patch: 3.10.0/CVE-2020-12826-123.20.1-kpatch.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://access.redhat.com/security/cve/cve-2020-12770
- Patch: 3.10.0/CVE-2020-12770-0757-scsi-scsi-sg-add-sg_remove_request-in-sg_write.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10742, CVSSv2 Score: 6.0
- Description:
nfs: Correct an nfs page array calculation error
- CVE: https://access.redhat.com/security/cve/cve-2020-10742
- Patch: 3.10.0/CVE-2020-10742-0462-fs-nfs-Correct-an-nfs-page-array-calculation-error.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: properly handle multiple messages in selinux_netlink_send
- CVE: https://access.redhat.com/security/cve/cve-2020-10751
- Patch: 3.10.0/CVE-2020-10751-0749-security-selinux-properly-handle-multiple-messages-i-123.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-17055, CVSSv2 Score: 4.0
- Description:
mISDN: enforce CAP_NET_RAW for raw sockets
- CVE: https://access.redhat.com/security/cve/cve-2019-17055
- Patch: 3.10.0/CVE-2019-17055-0329-isdn-mISDN-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-17053, CVSSv2 Score: 4.0
- Description:
ieee802154: enforce CAP_NET_RAW for raw sockets
- CVE: https://access.redhat.com/security/cve/cve-2019-17053
- Patch: 3.10.0/CVE-2019-17053-0248-net-ieee802154-enforce-CAP_NET_RAW-for-raw-sockets-327.36.3.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-16994, CVSSv2 Score: 4.7
- Description:
net: sit: fix memory leak in sit_init_net()
- CVE: https://access.redhat.com/security/cve/cve-2019-16994
- Patch: 3.10.0/CVE-2019-16994-0574-net-sit-fix-memory-leak-in-sit_init_net-327.36.3.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-16233, CVSSv2 Score: 4.1
- Description:
scsi: qla2xxx: fix a potential NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/cve-2019-16233
- Patch: 3.10.0/CVE-2019-16233-0442-scsi-scsi-qla2xxx-fix-a-potential-NULL-pointer-deref-514.26.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-15807, CVSSv2 Score: 4.7
- Description:
scsi: libsas: delete sas port if expander discover failed
- CVE: https://access.redhat.com/security/cve/cve-2019-15807
- Patch: 3.10.0/CVE-2019-15807-0468-scsi-scsi-libsas-delete-sas-port-if-expander-discove.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-15217, CVSSv2 Score: 4.6
- Description:
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
- CVE: https://access.redhat.com/security/cve/cve-2019-15217
- Patch: 3.10.0/CVE-2019-15217-0621-media-media-usb-zr364xx-Fix-KASAN-null-ptr-deref-Rea.patch
- From: kernel-3.10.0-1160.el7
- CVE-2018-20836, CVSSv2 Score: 7.0
- Description:
scsi: libsas: fix a race condition when smp task timeout
- CVE: https://access.redhat.com/security/cve/cve-2018-20836
- Patch: 3.10.0/CVE-2018-20836-0184-scsi-scsi-lbsas-fix-a-race-condition-when-smp-task-.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20054, CVSSv2 Score: 5.1
- Description:
fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links
- CVE: https://access.redhat.com/security/cve/cve-2019-20054
- Patch: 3.10.0/CVE-2019-20054-0071-fs-fs-proc-proc_sysctl.c-fix-NULL-pointer-dereferenc.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-20054, CVSSv2 Score: 5.1
- Description:
fs/proc/proc_sysctl.c: Fix a NULL pointer dereference
- CVE: https://access.redhat.com/security/cve/cve-2019-20054
- Patch: 3.10.0/CVE-2019-20054-0072-fs-fs-proc-proc_sysctl.c-Fix-a-NULL-pointer-derefere.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19534, CVSSv2 Score: 4.6
- Description:
can: peak_usb: fix slab info leak
- CVE: https://access.redhat.com/security/cve/CVE-2019-19534
- Patch: 3.10.0/CVE-2019-19534-0183-netdrv-can-peak_usb-fix-slab-info-leak-327.36.3.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19447, CVSSv2 Score: 7.8
- Description:
ext4: work around deleting a file with i_nlink == 0 safely
- CVE: https://access.redhat.com/security/cve/CVE-2019-19447
- Patch: 3.10.0/CVE-2019-19447-0197-fs-ext4-work-around-deleting-a-file-with-i_nlink-O-s.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
- CVE: https://access.redhat.com/security/cve/CVE-2019-19332
- Patch: 3.10.0/CVE-2019-19332-0203-x86-kvm-OOB-memory-write-via-kvm_dev_ioctl_get_cpuid-123.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-9454 CVE-2017-18551, CVSSv2 Score: 6.5
- Description:
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
- CVE: https://access.redhat.com/security/cve/CVE-2019-9454
- Patch: 3.10.0/CVE-2017-18551-CVE-2019-9454-0413-i2c-i2c-core-smbus-prevent-stack-corruption-on-read-.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19524, CVSSv2 Score: 4.6
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://access.redhat.com/security/cve/CVE-2019-19524
- Patch: 3.10.0/CVE-2019-19524-0443-input-Input-ff-memless-kill-timer-in-destroy.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19063, CVSSv2 Score: 4.7
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://access.redhat.com/security/cve/CVE-2019-19063
- Patch: 3.10.0/CVE-2019-19063-0488-wireless-rtlwifi-prevent-memory-leak-in-rtl_usb_prob-327.36.3.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19062, CVSSv2 Score: 4.7
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://access.redhat.com/security/cve/CVE-2019-19062
- Patch: 3.10.0/CVE-2019-19062-0601-crypto-crypto-user-fix-memory-leak-in-crypto_report.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 3.10.0/CVE-2019-9458-0604-media-media-v4l-event-Prevent-freeing-event-subscrip.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 3.10.0/CVE-2019-9458-kpatch.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: validate the debug_want_extra_isize mount option at parse time
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0608-fs-ext4-validate-the-debug_want_extra_isize-mount-op.123.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: forbid i_extra_isize not divisible by 4
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0609-fs-ext4-forbid-i_extra_isize-not-divisible-by-4.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: add more paranoia checking in ext4_expand_extra_isize handling
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0610-fs-ext4-add-more-paranoia-checking-in-ext4_expand_ex.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: fix support for inode sizes > 1024 bytes
- CVE: https://access.redhat.com/security/cve/CVE-2019-19767
- Patch: 3.10.0/CVE-2019-19767-0611-ext4-fix-support-for-inode-sizes-1024-bytes.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19523, CVSSv2 Score: 7.8
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://access.redhat.com/security/cve/CVE-2019-19523
- Patch: 3.10.0/CVE-2019-19523-0622-usb-USB-adutux-fix-use-after-free-on-disconnect-229.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19530, CVSSv2 Score: 5.7
- Description:
usb: cdc-acm: make sure a refcount is taken early enough
- CVE: https://access.redhat.com/security/cve/CVE-2019-19530
- Patch: 3.10.0/CVE-2019-19530-0623-usb-usb-cdc-acm-make-sure-a-refcount-is-taken-early-229.20.1.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19537, CVSSv2 Score: 4.2
- Description:
USB: core: Fix races in character device registration and deregistraion
- CVE: https://access.redhat.com/security/cve/CVE-2019-19537
- Patch: 3.10.0/CVE-2019-19537-0624-usb-USB-core-Fix-races-in-character-device-registrat-327.36.3.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-12351, CVSSv2 Score: 7.5
- Description:
[net] sock: backport __sock_queue_rcv_skb()
- CVE: https://access.redhat.com/security/cve/cve-2020-12351
- Patch: 3.10.0/8051-net-sock-backport-__sock_queue_rcv_skb.patch
- From: 3.10.0-693.el7
- CVE-2020-12351, CVSSv2 Score: 7.5
- Description:
[net] bluetooth: split sk_filter in l2cap_sock_recv_cb
- CVE: https://access.redhat.com/security/cve/cve-2020-12351
- Patch: 3.10.0/11204-net-bluetooth-split-sk_filter-in-l2cap_sock_recv_cb.patch
- From: 3.10.0-693.el7
- CVE-2020-12351, CVSSv2 Score: 7.5
- Description:
Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel
- CVE: https://access.redhat.com/security/cve/cve-2020-12351
- Patch: 3.10.0/CVE-2020-12351-Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch
- From: 3.10.0-1160.2.2.el7
- CVE-2020-12352, CVSSv2 Score: 5.3
- Description:
Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-12352
- Patch: 3.10.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members-327.patch
- From: 3.10.0-1160.2.2.el7
- CVE-2019-20811, CVSSv2 Score: 3.3
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 3.10.0/cve-2019-20811-call-dev_hold-if-kobject_init_and_add-success.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2019-20811, CVSSv2 Score: 3.3
- Description:
net-sysfs: Call dev_hold always in netdev_queue_add_kobject
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 3.10.0/cve-2019-20811-call-dev_hold-always-in-netdev_queue_add_kobject.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2019-20811, CVSSv2 Score: 3.3
- Description:
net-sysfs: Call dev_hold always in rx_queue_add_kobject
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 3.10.0/cve-2019-20811-call-dev_hold-always-in-rx_queue_add_kobject.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2020-14331, CVSSv2 Score: 6.6
- Description:
Fix for missing check in vgacon scrollback handling
- CVE: https://access.redhat.com/security/cve/CVE-2020-14331
- Patch: 3.10.0/cve-2020-14331-vgacon-overflow-fix.patch
- From: kernel-3.10.0-1160.6.1
- CVE-2020-10769, CVSSv2 Score: 5.5
- Description:
crypto: authenc: Export key parsing helper function (CVE-2020-10769 dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2020-10769
- Patch: 3.10.0/CVE-2020-10769-crypto-authenc-Export-key-parsing-helper-function.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-10769, CVSSv2 Score: 5.5
- Description:
crypto: authenc - fix parsing key with misaligned rta_len
- CVE: https://access.redhat.com/security/cve/CVE-2020-10769
- Patch: 3.10.0/CVE-2020-10769.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://access.redhat.com/security/cve/CVE-2020-14314
- Patch: 3.10.0/CVE-2020-14314.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://access.redhat.com/security/cve/CVE-2020-25212
- Patch: 3.10.0/CVE-2020-25212.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-25643, CVSSv2 Score: 6.6
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25643
- Patch: 3.10.0/CVE-2020-25643.patch
- From: 3.10.0-1160.11.1.el7
- CVE-2020-15436, CVSSv2 Score: 6.7
- Description:
block: Fix use-after-free in blkdev_get()
- CVE: https://access.redhat.com/security/cve/CVE-2020-15436
- Patch: 3.10.0/CVE-2020-15436-block-fix-use-after-free-in-blkdev_get.patch
- From: 3.10.0-1160.15.2.el7
- CVE-2019-19532, CVSSv2 Score: 6.8
- Description:
HID: Fix assumption that devices have inputs
- CVE: https://access.redhat.com/security/cve/cve-2019-19532
- Patch: 3.10.0/CVE-2019-19532-HID-Fix-assumption-that-devices-have-inputs.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: Delete an error message
- CVE: https://access.redhat.com/security/cve/cve-2020-0427
- Patch: 3.10.0/CVE-2020-0427-0001-pinctrl-Delete-an-error-message.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: devicetree: Avoid taking direct reference to device name string
- CVE: https://access.redhat.com/security/cve/cve-2020-0427
- Patch: 3.10.0/CVE-2020-0427-0002-pinctrl-devicetree-Avoid-taking-direct-reference-to-.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/cve-2020-14351
- Patch: 3.10.0/CVE-2020-14351-0001-perf-core-Fix-race-in-the-perf_mmap_close-function-327.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25211, CVSSv2 Score: 6.7
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/cve-2020-25211
- Patch: 3.10.0/CVE-2020-25211-0001-netfilter-ctnetlink-add-a-range-check-for-l3-l4-prot.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0001-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handl.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty: keyboard, do not speculate on func_table index
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0002-tty-keyboard-do-not-speculate-on-func_table-index.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0003-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0004-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, rename i to kb_func in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0005-vt-keyboard-rename-i-to-kb_func-in-vt_do_kdgkb_ioctl.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, reorder user buffer handling in vt_do_kdgkb_ioctl
- CVE: https://access.redhat.com/security/cve/cve-2020-25656
- Patch: 3.10.0/CVE-2020-25656-0006-vt-keyboard-reorder-user-buffer-handling-in-vt_do_kd.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2020-29661, CVSSv2 Score: 7.8
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/cve-2020-29661
- Patch: 3.10.0/CVE-2020-29661-0001-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2021-20265, CVSSv2 Score: 5.1
- Description:
af_unix: fix struct pid memory leak
- CVE: https://access.redhat.com/security/cve/cve-2021-20265
- Patch: 3.10.0/CVE-2021-20265-0001-af_unix-fix-struct-pid-memory-leak-229.patch
- From: kernel-3.10.0-1160.21.1.el7
- CVE-2021-20265, CVSSv2 Score: 5.1
- Description:
af_unix: fix struct pid memory leak (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2021-20265
- Patch: 3.10.0/CVE-2021-20265-kpatch-1-lt-327.patch
- From: kernel-3.10.0-1160.21.1.el7
- n/a, CVSSv2 Score: n/a
- Description:
net: Fix permission check in netlink_connect() (CVE-2021-27363_27364 dependency)
- CVE: n/a
- Patch: 3.10.0/CVE-2021-27363_27364-net-netlink-Fix-permission-check-in-netlink_connect.patch
- From: 3.10.0-123.6.3.el7
- n/a, CVSSv2 Score: n/a
- Description:
netlink: Rename netlink_capable netlink_allowed (CVE-2021-27363_27364 dependency)
- CVE: n/a
- Patch: 3.10.0/CVE-2021-27363_27364-net-netlink-Rename-netlink_capable-netlink_allowed.patch
- From: 3.10.0-123.6.3.el7
- n/a, CVSSv2 Score: n/a
- Description:
net: Add variants of capable for use on netlink messages (CVE-2021-27363_27364 dependency)
- CVE: n/a
- Patch: 3.10.0/CVE-2021-27363_27364-net-Add-variants-of-capable-for-use-on-netlink-mes.patch
- From: 3.10.0-123.6.3.el7
- CVE-2021-27363 CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://access.redhat.com/security/cve/cve-2021-27364
- Patch: 3.10.0/CVE-2021-27363_27364-iscsi-Restrict-sessions-and-handles-to-admin-capabilities.patch
- From: >3.10.0-1160.15.2.el7
- n/a, CVSSv2 Score: n/a
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output (CVE-2021-27365 dependency)
- CVE: n/a
- Patch: 3.10.0/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs-output-lt-862.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 3.10.0/CVE-2021-27365-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE-lt-327.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 3.10.0/CVE-2021-27365-iscsi-Verify-lengths-on-passthrough-PDUs-leq-862.3.3.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Replace pointless printk in fixup_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 3.10.0/CVE-2021-3347-0001-futex-Replace-pointless-printk-in-fixup_owner.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 3.10.0/CVE-2021-3347-0002-futex-Provide-and-use-pi_state_update_owner.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 3.10.0/CVE-2021-3347-0003-futex-Handle-faults-correctly-for-PI-futexes.patch
- From: >3.10.0-1160.15.2.el7
- CVE-2020-27170, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-27170.patch
- From:
- CVE-2020-27171, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-27171.patch
- From:
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://access.redhat.com/security/cve/CVE-2020-8648
- Patch: 3.10.0/CVE-2020-8648-vt-selection-close-sel_buffer-race-lt-693.patch
- From: 3.10.0-1160.31.1.el7
- CVE-2020-12362, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12362.patch
- From:
- CVE-2020-12363, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12363.patch
- From:
- CVE-2020-12364, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12364.patch
- From:
- CVE-2020-11668, CVSSv2 Score: 7.1
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://access.redhat.com/security/cve/CVE-2020-11668
- Patch: 3.10.0/CVE-2020-11668-media-xirlink-cit-add-missing-descriptor-sanity-checks.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33033, CVSSv2 Score: 7.8
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://access.redhat.com/security/cve/CVE-2021-33033
- Patch: 3.10.0/CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-doi-refcounts.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 3.10.0/CVE-2021-33034-bluetooth-verify-amp-hci-chan-before-amp-destroy-lt-514.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 3.10.0/CVE-2021-33034-kpatch.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/numa: Move task_numa_free() to __put_task_struct()
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-numa-Move-task_numa_free-to-__put_task_struct-lt-514.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/numa: Fix task_numa_free() lockdep splat
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-numa-Fix-task_numa_free-lockdep-splat.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/numa: Simplify task_numa_compare()
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-numa-Simplify-task_numa_compare.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/fair: Don't free p->numa_faults with concurrent readers
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-fair-don-t-free-p-numa-faults-with-concurrent-readers-lt-229.4.2.patch
- From: 3.10.0-1160.36.2.el7
- Description:
- CVE:
- Patch: 3.10.0/CVE-2019-20934-support-capsule8-lt-229.4.2.patch
- From:
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/fair: Use RCU accessors consistently for ->numa_group
- CVE: https://access.redhat.com/security/cve/CVE-2019-20934
- Patch: 3.10.0/CVE-2019-20934-sched-fair-Use-RCU-accessors-consistently-for-numa_group.patch
- From: 3.10.0-1160.36.2.el7
- CVE-2020-27777, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-27777.patch
- From:
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 3.10.0/CVE-2021-22555-lt-327.patch
- From: 3.10.0-1160.41.1.el7
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 3.10.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: 3.10.0-1160.41.1.el7
- n/a, CVSSv2 Score: n/a
- Description:
seqcount: Provide raw_read_seqcount() (CVE-2021-29650 dependency)
- CVE: n/a
- Patch: 3.10.0/seqcount-Provide-raw_read_seqcount.patch
- From: 3.10.0-229.el7
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: make xt_replace_table wait until old
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-make-xt_replace_table-wait-until-old.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 3.10.0/CVE-2021-29650-netfilter-x-tables-use-correct-memory-barriers.patch
- From: 3.10.0-1160.41.1.el7
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the
- CVE: https://access.redhat.com/security/cve/CVE-2021-32399
- Patch: 3.10.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the-lt-514.patch
- From: 3.10.0-1160.41.1.el7
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 3.10.0/proc-restrict-pagemap-access.patch
- From:
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 3.10.0/x86-kvm-vmx_vcpu_run-wrapper-lt-229.patch
- From:
- Description:
- CVE:
- Patch: 3.10.0/paravirt-asm-definition-693.17.1.patch
- From:
- CVE-2018-7566, CVSSv2 Score: 6.1
- Description:
ALSA: seq: Fix racy pool initializations (kpatch adaptation due CVE-2018-1000004)
- CVE: https://access.redhat.com/security/cve/cve-2018-7566
- Patch: 3.10.0/sound-alsa-seq-Fix-racy-pool-initializations-kpatch-1.patch
- From: kernel-3.10.0-693.11.6.0.1