- kernel-4.15.0-1006.6 (ubuntu-bionic-gcp)
- 4.15.0-1044.70
- 2021-12-14 08:02:41
- 2021-12-14 15:38:42
- K20211214_02
- CVE-2018-10021
- Description:
denial of service (memory exhaustion)
- CVE: https://access.redhat.com/security/cve/cve-2018-10021
- Patch: 4.15.0/CVE-2018-10021.patch
- From: >4.15.0
- CVE-2018-1092
- Description:
NULL pointer dereference in ext4fs driver
- CVE: https://access.redhat.com/security/cve/cve-2018-1092
- Patch: 4.15.0/CVE-2018-1092.patch
- From: >4.15.0
- CVE-2018-8087
- Description:
memory leak in the drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() function
- CVE: https://access.redhat.com/security/cve/cve-2018-8087
- Patch: 4.15.0/CVE-2018-8087.patch
- From: >4.15.0
- Description:
- CVE:
- Patch: 4.15.0/CVE-2018-3639-bpf-Prevent-memory-disambiguation-attack.patch
- From:
- CVE-2018-10940
- Description:
incorrect bounds check
- CVE: https://access.redhat.com/security/cve/cve-2018-10940
- Patch: 4.15.0/CVE-2018-10940.patch
- From: >4.15.0
- CVE-2018-1094
- Description:
denial of service via a crafted ext4 image
- CVE: https://access.redhat.com/security/cve/cve-2018-1094
- Patch: 4.15.0/CVE-2018-1094.patch
- From: >4.15.0
- CVE-2018-1094
- Description:
denial of service (NULL pointer dereference and system crash) via a crafted ext4 image
- CVE: https://access.redhat.com/security/cve/cve-2018-1094
- Patch: 4.15.0/CVE-2018-1094-1.patch
- From: >4.15.0
- CVE-2018-1095
- Description:
denial of service
- CVE: https://access.redhat.com/security/cve/cve-2018-1095
- Patch: 4.15.0/CVE-2018-1095.patch
- From: >4.15.0
- CVE-2018-11508
- Description:
obtain sensitive information from kernel memory via adjtimex
- CVE: https://access.redhat.com/security/cve/cve-2018-11508
- Patch: 4.15.0/CVE-2018-11508.patch
- From: >4.15.0
- CVE-2018-1108
- Description:
random: fix crng_ready() test
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1108.html
- Patch: 4.15.0/CVE-2018-1108-1.patch
- From: 4.15.0-33.36
- CVE-2018-1108
- Description:
random: use a different mixing algorithm for add_device_randomness()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1108.html
- Patch: 4.15.0/CVE-2018-1108-2.patch
- From: 4.15.0-33.36
- CVE-2017-7755
- Description:
floppy: Do not copy a kernel pointer to user
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-7755
- Patch: 4.15.0/CVE-2018-7755-UBUNTU-SAUCE-floppy-Do-not-copy-a-kernel-pointer-to-user-memory-in-FDGETPRM-ioctl.patch
- From: kernel-4.15.0-24.26
- CVE-2018-20961
- Description:
USB: gadget: f_midi: fixing a possible double-free in f_midi
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-20961
- Patch: 4.15.0/CVE-2018-20961-USB-gadget-f_midi-fixing-a-possible-double-free-in-f_midi.patch
- From: kernel-4.15.0-24.26
- CVE-2019-14763
- Description:
usb: dwc3: gadget: never call ->complete() from ->ep_queue()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-14763
- Patch: 4.15.0/CVE-2019-14763-usb-dwc3-gadget-never-call-complete-from-ep_queue.patch
- From: kernel-4.15.0-60.67
- CVE-2018-5390
- Description:
denial of service
- CVE: https://access.redhat.com/security/cve/cve-2018-5390
- Patch: 4.15.0/CVE-2018-5390.patch
- From: >4.15.0
- CVE-2018-11506
- Description:
denial of service (stack-based buffer overflow)
- CVE: https://access.redhat.com/security/cve/cve-2018-11506
- Patch: 4.15.0/CVE-2018-11506.patch
- From: >4.15.0
- CVE-2018-13094
- Description:
OOPS may occur for a corrupted xfs image
- CVE: https://access.redhat.com/security/cve/cve-2018-13094
- Patch: 4.15.0/CVE-2018-13094.patch
- From: >4.15.0
- CVE-2018-13405
- Description:
privileges escalating
- CVE: https://access.redhat.com/security/cve/cve-2018-13405
- Patch: 4.15.0/CVE-2018-13405.patch
- From: >4.15.0
- CVE-2018-10881
- Description:
ext4: clear i_data in ext4_inode_info when removing inline data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10881.html
- Patch: 4.15.0/cve-2018-10881-ext4-clear-idata-when-removing-inline-data.patch
- From: >4.15.0
- CVE-2018-13406
- Description:
video: uvesafb: Fix integer overflow in allocation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13406.html
- Patch: 4.15.0/cve-2018-13406-uvesafb-fix-integer-overflow.patch
- From: >4.15.0
- CVE-2018-1000200
- Description:
mm, oom: fix concurrent munlock and oom reaper unmap, v3
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000200.html
- Patch: 4.15.0/CVE-2018-1000200.patch
- From: 4.15.0-33.36
- CVE-2018-1000200
- Description:
mm, oom: fix concurrent munlock and oom reaper unmap, v3
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000200.html
- Patch: 4.15.0/CVE-2018-1000200-kpatch.patch
- From: 4.15.0-33.36
- CVE-2018-1000204
- Description:
scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000204.html
- Patch: 4.15.0/CVE-2018-1000204.patch
- From: 4.15.0-33.36
- CVE-2018-10323
- Description:
xfs: set format back to extents if xfs_bmap_extents_to_btree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10323.html
- Patch: 4.15.0/CVE-2018-10323.patch
- From: 4.15.0-33.36
- CVE-2018-10840
- Description:
ext4: correctly handle a zero-length xattr with a non-zero
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10840.html
- Patch: 4.15.0/CVE-2018-10840.patch
- From: 4.15.0-33.36
- CVE-2018-1093
- Description:
ext4: add validity checks for bitmap block numbers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1093.html
- Patch: 4.15.0/CVE-2018-1093.patch
- From: 4.15.0-33.36
- CVE-2018-1108
- Description:
random: set up the NUMA crng instances after the CRNG is fully initialized
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1108.html
- Patch: 4.15.0/CVE-2018-1108-3-pre-4.15.0-24.26.patch
- From: 4.15.0-33.36
- CVE-2018-1108
- Description:
random: fix possible sleeping allocation from irq context
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1108.html
- Patch: 4.15.0/CVE-2018-1108-4.patch
- From: 4.15.0-33.36
- CVE-2018-1120
- Description:
proc: do not access cmdline nor environ from file-backed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1120.html
- Patch: 4.15.0/CVE-2018-1120.patch
- From: 4.15.0-33.36
- CVE-2018-11412
- Description:
ext4: do not allow external inodes for inline data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-11412.html
- Patch: 4.15.0/CVE-2018-11412-1.patch
- From: 4.15.0-33.36
- CVE-2018-11412
- Description:
ext4: bubble errors from ext4_find_inline_data_nolock() up to
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-11412.html
- Patch: 4.15.0/CVE-2018-11412-2.patch
- From: 4.15.0-33.36
- CVE-2018-12232
- Description:
socket: close race condition between sock_close()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2018-12232.html
- Patch: 4.15.0/CVE-2018-12232.patch
- From: 4.15.0-33.36
- CVE-2018-12233
- Description:
jfs: Fix inconsistency between memory allocation and ea_buf->max_size
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2018-12233.html
- Patch: 4.15.0/CVE-2018-12233.patch
- From: 4.15.0-33.36
- CVE-2018-12904
- Description:
kvm: nVMX: Enforce cpl=0 for VMX instructions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2018-12904.html
- Patch: 4.15.0/CVE-2018-12904.patch
- From: 4.15.0-33.36
- CVE-2018-5814
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-1.patch
- From: 4.15.0-33.36
- CVE-2018-5814
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-2.patch
- From: 4.15.0-33.36
- CVE-2018-5814
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-3.patch
- From: 4.15.0-33.36
- CVE-2018-5814
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-kpatch.patch
- From: 4.15.0-33.36
- CVE-2018-9415
- Description:
ARM: amba: Fix race condition with driver_override
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-9415
- Patch: 4.15.0/CVE-2018-9415-ARM-amba-Fix-race-condition-with-driver_override-32.35.patch
- From: kernel-4.15.0-33.36
- CVE-2018-9385
- Description:
ARM: amba: Don't read past the end of sysfs "driver_override" buffer
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-9385
- Patch: 4.15.0/CVE-2018-9385-ARM-amba-Dont-read-past-the-end-of-sysfs-driver_override-buffer.patch
- From: kernel-4.15.0-33.36
- CVE-2018-13695
- Description:
acpi: acpica: fix acpi operand cache leak in nseval.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2018-13695.html
- Patch: 4.15.0/CVE-2017-13695.patch
- From: 4.15.0-34.37
- CVE-2018-13695
- Description:
vhost: fix info leak due to uninitialized memory
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1118.html
- Patch: 4.15.0/CVE-2018-1118.patch
- From: 4.15.0-34.37
- CVE-2018-9518
- Description:
NFC: llcp: Limit size of SDP URI
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-9518
- Patch: 4.4.0/CVE-2018-9518.patch
- From: kernel-4.4.134
- Description:
- CVE:
- Patch: 4.15.0/CVE-2018-9518-kpatch.patch
- From:
- CVE-2018-15594
- Description:
x86/paravirt: Fix spectre-v2 mitigations for paravirt guests
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-155947.html
- Patch: 4.15.0/cve-2018-15594-paravirt-fix-spectre2-mitigation-for-pv-guests.patch
- From: >4.15.0
- Description:
- CVE:
- Patch: 4.15.0/CVE-2018-10853-linear-read-and-write.patch
- From:
- CVE-2018-10853
- Description:
kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10853
- Patch: 4.15.0/CVE-2018-10853-kvm-x86-use-correct-privilege-level-for-sgdt-sidt-fxsave-fxrstor-access-30.32.patch
- From: kernel-4.15.0-35.38
- CVE-2018-6554
- Description:
The irda_bind() function allocates memory for self->ias_obj without checking to see if the socket is already bound
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6554.html
- Patch: 4.15.0/CVE-2018-6554.patch
- From: kernel-4.15.0-36.39
- CVE-2018-6555
- Description:
irda: Only insert new objects into the global database via setsockopt
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-6555
- Patch: 4.14.0/irda_only_insert_new_objects_into_the_global_database_via_setsockopt.patch
- From: v4.14.70
- CVE-2018-15572
- Description:
x86/speculation: Protect against userspace-userspace spectreRSB
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-15572
- Patch: 4.15.0/x86_speculation_protect_against_userspace_userspace_spectrersb.patch
- From: kernel-4.15.0-35.38
- Description:
- CVE:
- Patch: 4.15.0/x86_speculation_protect_against_userspace_userspace_spectrersb-20.21-kpatch.patch
- From:
- CVE-2018-10322
- Description:
xfs: enhance dinode verifier
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- Patch: ubuntu-bionic-gcp/4.15.0-1020.20/CVE-2018-10322-1-xfs-move-inode-fork-verifiers-to-xfs_dinode_verify-kpatch.patch
- From: kernel-5.0.0-1020.20~18.04.1
- CVE-2018-10322
- Description:
xfs: enhance dinode verifier
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- Patch: ubuntu-bionic-gcp/4.15.0-1020.20/CVE-2018-10322-2-xfs-enhance-dinode-verifier-kpatch.patch
- From: kernel-5.0.0-1020.20~18.04.1
- CVE-2018-13095
- Description:
xfs: More robust inode extent count validation
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-13095
- Patch: ubuntu-bionic-gcp/4.15.0-1020.20/CVE-2018-13095-xfs-More-robust-inode-extent-count-validation-kpatch.patch
- From: kernel-5.0.0-1020.20~18.04.1
- CVE-2018-14633
- Description:
scsi: target: iscsi: Use hex2bin instead of a re-implementation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14633.html
- Patch: 4.15.0/cve-2018-14633-iscsi-target-use-hex2bin.patch
- From: >4.15.0
- CVE-2018-14633
- Description:
scsi: target: iscsi: Use bin2hex instead of a re-implementation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14633.html
- Patch: 4.15.0/cve-2018-14633-iscsi-target-use-bin2hex.patch
- From: >4.15.0
- CVE-2018-17182
- Description:
mm: rollback 6b4ebc3a9078
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-17182
- Patch: 4.14.0/cve-2018-17182-revert-mm-optimize-overflow-system-wide-flushing.patch
- From: v4.14.68
- CVE-2017-13168
- Description:
scsi: sg: mitigate read/write abuse
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-13168.html
- Patch: 4.15.0/cve-2017-13168-sg-mitigate-read-write-abuse.patch
- From: >4.15.0
- CVE-2018-15471
- Description:
xen-netback: fix input validation in xenvif_set_hash_mapping()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-15471.html
- Patch: 4.15.0/cve-2018-15471-xen-netback-fix-input-validation.patch
- From: >4.15.0
- CVE-2018-16658
- Description:
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16658.html
- Patch: 4.15.0/cve-2018-16658-cdrom-fix-info-leak-oob-read.patch
- From: >4.15.0
- CVE-2018-9363
- Description:
Bluetooth: hidp: buffer overflow in hidp_process_report
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-9363.html
- Patch: 4.15.0/cve-2018-9363-bluetooth-hidp-buffer-overflow.patch
- From: >4.15.0
- CVE-2018-14734
- Description:
infiniband: fix a possible use-after-free bug
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14734.html
- Patch: 4.15.0/cve-2018-14734-infiniband-fix-possible-use-after-free.patch
- From: >4.15.0
- CVE-2018-10902
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10902.html
- Patch: 4.15.0/cve-2018-10902-alsa-rawmidi-change-resized-buffers-atomically.patch
- From: >4.15.0
- CVE-2018-16276
- Description:
USB: yurex: fix out-of-bounds uaccess in read handler
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16276.html
- Patch: 4.15.0/cve-2018-16276-usb-yurex-fix-out-of-bond-access.patch
- From: >4.15.0
- CVE-2018-18955
- Description:
userns: also map extents in the reverse map to kernel IDs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18955.html
- Patch: 4.15.0/CVE-2018-18955.patch
- From: kernel-4.15.0-42.45
- CVE-2018-16658
- Description:
overlayfs: ensure mounter privileges when reading directories
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6559.html
- Patch: 4.15.0/CVE-2018-6559.patch
- From: kernel-4.15.0-42.45
- CVE-2018-12896
- Description:
posix-timers: Sanitize overrun handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12896.html
- Patch: 4.15.0/CVE-2018-12896-posix-timers-Sanitize-overrun-handling.patch
- From: 4.15.0-43.46
- CVE-2018-12896
- Description:
posix-timers: Sanitize overrun handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12896.html
- Patch: 4.15.0/CVE-2018-12896-posix-timers-Sanitize-overrun-handling-kpatch.patch
- From: 4.15.0-43.46
- CVE-2018-18445
- Description:
bpf: 32-bit RSH verification must truncate input before the ALU op
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18445.html
- Patch: 4.15.0/CVE-2018-18445-bpf-32-bit-RSH-verification-must-truncate-input-be.patch
- From: 4.15.0-43.46
- CVE-2018-18690
- Description:
xfs: don't fail when converting shortform attr to long form
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18690.html
- Patch: 4.15.0/CVE-2018-18690-xfs-don-t-fail-when-converting-shortform-attr-to-l.patch
- From: 4.15.0-43.46
- CVE-2018-18710
- Description:
cdrom: fix improper type cast, which can leat to information leak.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18710.html
- Patch: 4.15.0/CVE-2018-18710-cdrom-fix-improper-type-cast-which-can-leat-to-inf.patch
- From: 4.15.0-43.46
- CVE-2018-10876
- Description:
ext4: only look at the bg_flags field if it is valid
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10876.html
- Patch: 4.15.0/cve-2018-10876-ext4-only-look-at-bg_flag-field-pre-24.26.patch
- From: 4.15.0-44.47
- CVE-2018-10877
- Description:
ext4: verify the depth of extent tree in ext4_find_extent()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10877.html
- Patch: 4.15.0/cve-2018-10877-ext4-verify-depth-of-extent-tree.patch
- From: 4.15.0-44.47
- CVE-2018-10878
- Description:
xt4: always check block group bounds in ext4_init_block_bitmap()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10878.html
- Patch: 4.15.0/cve-2018-10878-ext4-always-check-block-group-bounds.patch
- From: 4.15.0-44.47
- CVE-2018-10878
- Description:
ext4: make sure bitmaps and the inode table don't overlap with bg descriptors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10878.html
- Patch: 4.15.0/cve-2018-10878-ext4-make-sure-bitmaps-do-not-overlap.patch
- From: 4.15.0-44.47
- CVE-2018-10879
- Description:
xt4: add corruption check in ext4_xattr_set_entry()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10879.html
- Patch: 4.15.0/cve-2018-10879-ext4-add-corruption-check.patch
- From: 4.15.0-44.47
- CVE-2018-10879
- Description:
ext4: always verify the magic number in xattr blocks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10879.html
- Patch: 4.15.0/cve-2018-10879-ext4-always-verify-magic-in-xattr-pre-24.26.patch
- From: 4.15.0-44.47
- CVE-2018-10882
- Description:
ext4: add more inode number paranoia checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10882.html
- Patch: 4.15.0/cve-2018-10882-ext4-add-more-paranoja-checks.patch
- From: 4.15.0-44.47
- CVE-2018-10880
- Description:
ext4: never move the system.data xattr out of the inode body
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10880.html
- Patch: 4.15.0/CVE-2018-10880-ext4-never-move-the-system.data-xattr-out-of-the-i.patch
- From: 4.15.0-44.47
- CVE-2018-10883
- Description:
ext4: avoid running out of journal credits when appending to an inline file
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10883.html
- Patch: 4.15.0/CVE-2018-10883-ext4-avoid-running-out-of-journal-credits-when-app.patch
- From: 4.15.0-44.47
- CVE-2018-10883
- Description:
jbd2: don't mark block as modified if the handle is out of credits
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10883.html
- Patch: 4.15.0/CVE-2018-10883-jbd2-don-t-mark-block-as-modified-if-the-handle-is.patch
- From: 4.15.0-44.47
- CVE-2018-16882
- Description:
KVM: Fix UAF in nested posted interrupt processing
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16882.html
- Patch: 4.15.0/CVE-2018-16882-KVM-Fix-UAF-in-nested-posted-interrupt-processing.patch
- From: 4.15.0-44.47
- CVE-2018-17972
- Description:
proc: restrict kernel stack dumps to root
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-17972.html
- Patch: 4.15.0/CVE-2018-17972-proc-restrict-kernel-stack-dumps-to-root.patch
- From: 4.15.0-44.47
- CVE-2018-18281
- Description:
mremap: properly flush TLB before releasing the page
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18281.html
- Patch: 4.15.0/CVE-2018-18281-mremap-properly-flush-TLB-before-releasing-the-pag.patch
- From: 4.15.0-44.47
- CVE-2018-19407
- Description:
KVM: X86: Fix scan ioapic use-before-initialization
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19407.html
- Patch: 4.15.0/CVE-2018-19407-KVM-X86-Fix-scan-ioapic-use-before-initialization.patch
- From: 4.15.0-43.46
- CVE-2018-9516
- Description:
HID: debug: check length before copy_to_user()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-9516.html
- Patch: 4.15.0/CVE-2018-9516-HID-debug-check-length-before-copy_to_user.patch
- From: 4.15.0-45.48
- CVE-2018-14625
- Description:
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14625.html
- Patch: 4.15.0/CVE-2018-14625-vhost-vsock-fix-use-after-free-in-network-stack-ca.patch
- From: 4.15.0-44.47
- CVE-2018-14625
- Description:
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14625.html
- Patch: 4.15.0/CVE-2018-14625-vhost-vsock-fix-use-after-free-in-network-stack-ca-kpatch.patch
- From: 4.15.0-44.47
- CVE-2018-19854
- Description:
crypto: user - fix leaking uninitialized memory to userspace
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19854.html
- Patch: 4.15.0/cve-2018-19854-crypto-fix-leaking-uninitialized-memory-to-user-space.patch
- From: >= kernel-4.15.0-43.46
- CVE-2018-20836
- Description:
scsi: libsas: fix a race condition when smp task timeout
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20836.html
- Patch: 4.15.0/CVE-2018-20836-scsi-libsas-fix-a-race-condition-when-smp-task-timeout.patch
- From: 4.15.0-44.47
- CVE-2018-16871
- Description:
nfsd: COPY and CLONE operations require the saved filehandle to be set
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16871.html
- Patch: 4.15.0/CVE-2018-16871-nfsd-COPY-and-CLONE-operations-require-the-saved-filehandle-to-be-set.patch
- From: 4.15.0-46.49
- CVE-2018-18397
- Description:
userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-use-ENOENT-when-atomic-copy-fails.patch
- From: v4.14.92
- CVE-2018-18397
- Description:
userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-allocate-anon-memory-for-MAP_PRIVATE.patch
- From: v4.14.92
- CVE-2018-18397
- Description:
userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-shmem-hugetlbfs-allow-VM_MAYWRITE-vmas-only.patch
- From: v4.14.92
- CVE-2018-18397
- Description:
userfaultfd: shmem: add i_size checks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-recheck-i_size-after-taking-pt-lock.patch
- From: v4.14.92
- CVE-2018-18397
- Description:
userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-shmem-UFDIO_COPY-set-the-page-dirty.patch
- From: v4.14.92
- CVE-2019-8912
- Description:
crypto set sk to NULL when af_alg_release
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-8912
- Patch: 4.15.0/cve-2019-8912-net-crypto-set-sk-to-NULL.patch
- From: > kernel-4.14.94-162
- CVE-2018-19824
- Description:
ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-19824
- Patch: 4.4.0/CVE-2018-19824.patch
- From: kernel-4.4.167
- CVE-2018-3459
- Description:
Bluetooth: Verify that l2cap_get_conf_opt provides large
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
- Patch: 4.18.0/CVE-2019-3459-771136-Bluetooth-Verify-that-l2cap_get_conf_opt-provides-.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2018-3460
- Description:
Bluetooth: Check L2CAP option sizes returned from
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html
- Patch: 4.18.0/CVE-2019-3460-Bluetooth-Check-L2CAP-option-sizes-returned-from-l.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2019-6974
- Description:
kvm: fix kvm_ioctl_create_device() reference counting
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-6974.html
- Patch: 4.18.0/CVE-2019-6974-kvm-fix-kvm_ioctl_create_device-reference-counting.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2019-7221
- Description:
KVM: nVMX: unconditionally cancel preemption timer in free_nested
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7221.html
- Patch: 4.18.0/CVE-2019-7221-KVM-nVMX-unconditionally-cancel-preemption-timer-i.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2019-7222
- Description:
KVM: x86: work around leak of uninitialized stack contents
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7222.html
- Patch: 4.15.0/CVE-2019-7222-KVM-x86-work-around-leak-of-uninitialized-stack-co-34.37.patch
- From: 4.15.0-47.50
- CVE-2019-8980
- Description:
exec: Fix mem leak in kernel_read_file
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-8980.html
- Patch: 4.18.0/CVE-2019-8980-exec-Fix-mem-leak-in-kernel_read_file.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2019-9213
- Description:
mm: enforce min addr even if capable() in expand_downwards()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9213.html
- Patch: 4.18.0/CVE-2019-9213-mm-enforce-min-addr-even-if-capable-in-expand_down.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2018-14678
- Description:
x86/entry/64: Remove %ebx handling from error_entry/exit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14678.html
- Patch: 4.15.0/CVE-2018-14678-x86-entry-64-Remove-ebx-handling-from-error_entry--kpatch.patch
- From: 4.15.0-47.50
- Description:
- CVE:
- Patch: 4.15.0/CVE-2018-5753-bpf-properly-enforce-index-mask-to-prevent-out-of-.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-move-prev_-insn_idx-into-verifier-env.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-move-tmp-variable-into-ax-register-in-interpre.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-enable-access-to-ax-register-also-from-verifie.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-restrict-map-value-pointer-arithmetic-for-unpr.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-restrict-stack-pointer-arithmetic-for-unprivil.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-restrict-unknown-scalars-of-mixed-signed-bound.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-fix-check_map_access-smin_value-test-when-poin.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-prevent-out-of-bounds-speculation-on-pointer-a.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-7308-bpf-fix-sanitation-of-alu-op-with-pointer-scalar-t.patch
- From:
- CVE-2019-7308
- Description:
bpf: prevent out of bounds speculation on pointer arithmetic
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7308.html
- Patch: 4.15.0/CVE-2019-7308-bpf-check-block-kpatch.patch
- From: 4.15.0-47.50
- n/a
- Description:
srcu: Lock srcu_data structure in srcu_gp_start() (ubuntu bug LP: #1802021)
- CVE: http://bugs.launchpad.net/bugs/1802021
- Patch: 4.15.0/bug-srcu-lock-srcu_data_structure-in-srcu_gp_start.patch
- From: 4.15.0-47.50
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
- Description:
mds clear cpu buffers
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.15.0/CVE-2018-12126-CVE-2018-12127-CVE-2018-12130-CVE-2019-11091-4.patch
- From: 4.15.0-50.54
- Description:
- CVE:
- Patch: 4.15.0/CVE-2018-12126-CVE-2018-12127-CVE-2018-12130-CVE-2019-11091-entry_32_64_1.patch
- From:
- CVE-2018-16884
- Description:
sunrpc: use SVC_NET() in svcauth_gss_* functions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16884.html
- Patch: 4.15.0/CVE-2018-16884-sunrpc-use-SVC_NET-in-svcauth_gss_functions.patch
- From: 4.15.0-49.52
- CVE-2018-16884
- Description:
sunrpc: use-after-free in svc_process_common()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16884.html
- Patch: 4.15.0/CVE-2018-16884-sunrpc-use-after-free-in-svc_process_common.patch
- From: 4.15.0-49.52
- CVE-2018-16884
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2019-3882
- Description:
vfio/type1: Limit DMA mappings per container
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2019-3882.html
- Patch: 4.15.0/CVE-2019-3882-vfio-type1-Limit-DMA-mappings-per-container.patch
- From: 4.15.0-49.52
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-3882-vfio-type1-Limit-DMA-mappings-per-container-kpatch.patch
- From:
- CVE-2019-3874
- Description:
sctp: implement memory accounting on rx path
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3874.html
- Patch: 4.15.0/CVE-2019-3874-sctp-implement-memory-accounting-on-rx-path.patch
- From: 4.15.0-49.52
- CVE-2019-3874
- Description:
sctp: implement memory accounting on tx path
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3874.html
- Patch: 4.15.0/CVE-2019-3874-sctp-implement-memory-accounting-on-tx-path.patch
- From: 4.15.0-49.52
- CVE-2019-9500
- Description:
brcmfmac: assure SSID length from firmware is limited
- CVE: https://access.redhat.com/security/cve/cve-2019-9500
- Patch: 4.15.0/CVE-2019-9500-brcmfmac-assure-SSID-length-from-firmware-is-limited.patch
- From: 4.15.0-49.52
- CVE-2019-9503
- Description:
brcmfmac: add subtype check for event handling in data path
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.15.0/CVE-2019-9503-brcmfmac-add-subtype-check-for-event-handling-in-data-path.patch
- From: 4.15.0-49.52
- CVE-2019-11477
- Description:
UBUNTU: SAUCE: tcp: limit payload size of sacked skbs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11477
- Patch: 4.15.0/CVE-2019-11477-tcp-limit-payload-size-of-sacked-skbs.patch
- From: 4.15.0-52.56
- CVE-2019-11478
- Description:
UBUNTU: SAUCE: tcp: tcp_fragment() should apply sane memory limits
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11478
- Patch: 4.15.0/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
- From: 4.15.0-52.56
- CVE-2019-11479
- Description:
tcp: add tcp_min_snd_mss sysctl
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.15.0/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl-kpatch.patch
- From:
- CVE-2019-11479
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.15.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing-kpatch.patch
- From:
- CVE-2019-11884
- Description:
Bluetooth: hidp: fix buffer overflow
- CVE: https://access.redhat.com/security/cve/cve-2019-11884
- Patch: 4.14.0/cve-2019-11884-hidp-fix-buffer-overflow.patch
- From: v4.14.106
- CVE-2019-11833
- Description:
ext4: zero out the unused memory region in the extent tree block
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11833
- Patch: 4.15.0/CVE-2019-11833-ext4-zero-out-the-unused-memory-region-in-the-extent-tree-block.patch
- From: 4.15.0-55.60
- CVE-2019-11815
- Description:
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
- Patch: 4.15.0/cve-2019-11815-net-rds-force-to-destroy-connection.patch
- From:
- CVE-2019-11085
- Description:
drm/i915/gvt: Fix mmap range check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11085
- Patch: 4.15.0/CVE-2019-11085-drm-i915-gvt-Fix-mmap-range-check.patch
- From: 4.15.0-55.60
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-11085-1.patch
- From:
- CVE-2018-13053
- Description:
alarmtimer: Prevent overflow for relative nanosleep
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13053.html
- Patch: 4.15.0/CVE-2018-13053.patch
- From: 4.15.0-58.64
- CVE-2018-13093
- Description:
validate cached inodes are free when allocated in xfs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13093.html
- Patch: 4.15.0/CVE-2018-13093.patch
- From: 4.15.0-58.64
- CVE-2018-13096
- Description:
fix to do sanity check with {sit,nat}_ver_bitmap_bytesize
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13096.html
- Patch: 4.15.0/CVE-2018-13096.patch
- From: 4.15.0-58.64
- CVE-2018-13097
- Description:
f2fs: fix to do sanity check with user_block_count
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13097.html
- Patch: 4.15.0/CVE-2018-13097.patch
- From: 4.15.0-58.64
- CVE-2018-13098
- Description:
f2fs: introduce sanity_check_inode() (dependency for CVE-2018-13098)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13098.html
- Patch: 4.15.0/CVE-2018-13098-dependency.patch
- From: 4.15.0-44.47
- CVE-2018-13098
- Description:
do sanity check with extra_attr feature in f2fs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13098.html
- Patch: 4.15.0/CVE-2018-13098.patch
- From: 4.15.0-58.64
- CVE-2018-13099
- Description:
f2fs: fix to do sanity check with reserved blkaddr of inline inode
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13099.html
- Patch: 4.15.0/CVE-2018-13099.patch
- From: 4.15.0-58.64
- CVE-2018-13100
- Description:
f2fs: fix to do sanity check with secs_per_zone
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13100.html
- Patch: 4.15.0/CVE-2018-13100.patch
- From: 4.15.0-58.64
- CVE-2018-14609
- Description:
btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14609.html
- Patch: 4.15.0/CVE-2018-14609.patch
- From: 4.15.0-58.64
- CVE-2018-14610
- Description:
btrfs: Check that each block group has corresponding chunk at mount time
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14610.html
- Patch: 4.15.0/CVE-2018-14610.patch
- From: 4.15.0-58.64
- CVE-2018-14611
- Description:
btrfs: validate type when reading a chunk
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14611.html
- Patch: 4.15.0/CVE-2018-14611.patch
- From: 4.15.0-58.64
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14612.html
- Patch: 4.15.0/CVE-2018-14612.patch
- From: 4.15.0-58.64
- CVE-2018-14613
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14613.html
- Patch: 4.15.0/CVE-2018-14613.patch
- From: 4.15.0-58.64
- CVE-2018-14614
- Description:
f2fs: fix to do sanity check with cp_pack_start_sum
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14614.html
- Patch: 4.15.0/CVE-2018-14614.patch
- From: 4.15.0-58.64
- CVE-2018-14615
- Description:
do sanity check with i_extra_isize in f2fs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14615.html
- Patch: 4.15.0/CVE-2018-14615.patch
- From: 4.15.0-58.64
- CVE-2018-14616
- Description:
f2fs: check_nid_range() refactoring (dependency for CVE-2018-14616)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14616.html
- Patch: 4.15.0/CVE-2018-14616-dependency.patch
- From: 4.15.0-44.47
- CVE-2018-14616
- Description:
f2fs: fix to do sanity check with block address in main area v2
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14616.html
- Patch: 4.15.0/CVE-2018-14616.patch
- From: 4.15.0-58.64
- CVE-2018-14617
- Description:
hfsplus: fix NULL dereference in hfsplus_lookup()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14617.html
- Patch: 4.15.0/CVE-2018-14617.patch
- From: 4.15.0-58.64
- CVE-2018-16862
- Description:
mm: cleancache: fix corruption on missed inode invalidation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16862.html
- Patch: 4.15.0/CVE-2018-16862.patch
- From: 4.15.0-58.64
- CVE-2018-20169
- Description:
USB: check usb_get_extra_descriptor for proper size
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20169.html
- Patch: 4.15.0/CVE-2018-20169.patch
- From: 4.15.0-58.64
- CVE-2018-20511
- Description:
net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20511.html
- Patch: 4.15.0/CVE-2018-20511.patch
- From: 4.15.0-58.64
- CVE-2018-20856
- Description:
fixed possible use-after-free in block/blk-core.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20856.html
- Patch: 4.15.0/CVE-2018-20856.patch
- From: 4.15.0-58.64
- CVE-2018-5383
- Description:
validate public key in crypto/ecc.c (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5383.html
- Patch: 4.15.0/CVE-2018-5383.patch
- From: 4.15.0-58.64
- CVE-2019-10126
- Description:
fix heap overflow in mwifiex_uap_parse_tail_ies()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-10126.html
- Patch: 4.15.0/CVE-2019-10126.patch
- From: 4.15.0-58.64
- Description:
- CVE:
- Patch: 4.15.0/kpatch-pti-add-KernelCare-mapping-into-shadow-PGD-1.patch
- From:
- CVE-2019-1125
- Description:
Spectre v1 swapgs mitigations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1125.html
- Patch: 4.15.0/CVE-2019-1125-2.patch
- From: 4.15.0-58.64
- CVE-2019-12818
- Description:
fix NULL pointer dereference in net/nfc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12818.html
- Patch: 4.15.0/CVE-2019-12818.patch
- From: 4.15.0-58.64
- CVE-2019-12819
- Description:
fix use-after-free in drivers/net/phy/mdio_bus.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12819.html
- Patch: 4.15.0/CVE-2019-12819.patch
- From: 4.15.0-58.64
- CVE-2019-12984
- Description:
fixed possible NULL pointer dereference in net/nfc/netlink.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12984.html
- Patch: 4.15.0/CVE-2019-12984.patch
- From: 4.15.0-58.64
- CVE-2019-13233
- Description:
fix use-after-free access to LDT entry
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13233.html
- Patch: 4.15.0/CVE-2019-13233.patch
- From: 4.15.0-58.64
- CVE-2019-13272
- Description:
fix ->ptracer_cred handling for PTRACE_TRACEME
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13272.html
- Patch: 4.15.0/CVE-2019-13272.patch
- From: 4.15.0-58.64
- CVE-2019-2024
- Description:
media: em28xx: Fix use-after-free when disconnecting
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-2024.html
- Patch: 4.15.0/CVE-2019-2024.patch
- From: 4.15.0-58.64
- CVE-2019-2101
- Description:
fixed possible OOB-read with improper input validation in drivers/media/usb/uvc/uvc_driver.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-2101.html
- Patch: 4.15.0/CVE-2019-2101.patch
- From: 4.15.0-58.64
- CVE-2019-3846
- Description:
fixed possible memory corruption in mwifiex kernel module
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3846.html
- Patch: 4.15.0/CVE-2019-3846.patch
- From: 4.15.0-58.64
- CVE-2020-36385
- Description:
RDMA/ucma: check fd type in ucma_migrate_id()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-733293-RDMA-ucma-check-fd-type-in-ucma_migrate_id.patch
- From: 4.15.0-56.62
- CVE-2019-9506
- Description:
Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-9506
- Patch: 4.15.0/CVE-2019-9506-Bluetooth-Align-minimum-encryption-key-size-for-LE-and-BR-EDR-connections.patch
- From: kernel-4.15.0-60.67
- CVE-2019-9506
- Description:
Bluetooth: Fix regression with minimum encryption key size alignment
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-9506
- Patch: 4.15.0/CVE-2019-9506-Bluetooth-Fix-regression-with-minimum-encryption-key-size-alignment.patch
- From: kernel-4.15.0-60.67
- CVE-2019-9506
- Description:
Bluetooth: Fix faulty expression for minimum encryption key size check
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-9506
- Patch: 4.15.0/CVE-2019-9506-Bluetooth-Fix-faulty-expression-for-minimum-encryption-key-size-check.patch
- From: kernel-4.15.0-60.67
- CVE-2019-3900
- Description:
introduce vhost_exceeds_weight() (adaptation for CVE-2019-3900 dependency)
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 4.15.0/cve-2019-3900-vhost.patch
- From: 4.15.0-60.67
- CVE-2019-3900
- Description:
fix possible infinite loop in drivers/vhost/net.c (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 4.14.0/cve-2019-3900-net.patch
- From: 4.14.133-*.amzn{1,2}
- CVE-2019-3900
- Description:
add weight support to drivers/vhost/vsock.c (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 4.14.0/cve-2019-3900-vsock.patch
- From: 4.14.133-*.amzn{1,2}
- CVE-2019-3900
- Description:
add weight support to drivers/vhost/scsi.c (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 4.14.0/cve-2019-3900-scsi.patch
- From: 4.14.133-*.amzn{1,2}
- CVE-2019-3819
- Description:
HID: debug: fix the ring buffer implementation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3819
- Patch: 4.4.0/CVE-2019-3819.patch
- From: kernel-4.4.175
- CVE-2019-3701
- Description:
can: gw: ensure DLC boundaries after CAN frame modification
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3701
- Patch: 4.14.0/cve-2019-3701-can-allows-for-crash-by-users.patch
- From: v4.14.92
- CVE-2019-15221
- Description:
ALSA: line6: Fix write on zero-sized buffer
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15221
- Patch: 4.15.0/CVE-2019-15221-ALSA-line6-Fix-write-on-zero-sized-buffer.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15220
- Description:
p54usb: Fix race between disconnect and firmware loading
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15220
- Patch: 4.15.0/CVE-2019-15220-p54usb-Fix-race-between-disconnect-and-firmware-loading.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15218
- Description:
media: usb: siano: Fix general protection fault in smsusb
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15218
- Patch: 4.15.0/CVE-2019-15218-media-usb-siano-Fix-general-protection-fault-in-smsusb.patch
- From: kernel-4.15.0-60.67
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-15216-USB-yurex-Fix-protection-fault-after-device-removal.patch
- From:
- CVE-2019-15215
- Description:
media: cpia2_usb: first wake up, then free in disconnect
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15215
- Patch: 4.15.0/CVE-2019-15215-media-cpia2_usb-first-wake-up-then-free-in-disconnect.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15214
- Description:
ALSA: core: Fix card races between register and disconnect
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15214
- Patch: 4.15.0/CVE-2019-15214-ALSA-core-Fix-card-races-between-register-and-disconnect.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15214
- Description:
ALSA: info: Fix racy addition/deletion of nodes
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15214
- Patch: 4.15.0/CVE-2019-15214-ALSA-info-Fix-racy-addition-deletion-of-nodes.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15212
- Description:
USB: rio500: refuse more than one device at a time
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15212
- Patch: 4.15.0/CVE-2019-15212-USB-rio500-refuse-more-than-one-device-at-a-time.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15211
- Description:
media: radio-raremono: change devm_k*alloc to k*alloc
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15211
- Patch: 4.15.0/CVE-2019-15211-media-radio-raremono-change-devm_kalloc-to-kalloc.patch
- From: kernel-4.15.0-60.67
- CVE-2019-14763
- Description:
USB: gadget: f_hid: fix deadlock in f_hidg_write()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-14763
- Patch: 4.15.0/CVE-2019-14763-USB-gadget-f_hid-fix-deadlock-in-f_hidg_write.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15090
- Description:
scsi: qedi: remove memset/memcpy to nfunc and use func instead
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15090
- Patch: 4.15.0/CVE-2019-15090-scsi-qedi-remove-memset-memcpy-to-nfunc-and-use-func-instead.patch
- From: kernel-4.15.0-60.67
- CVE-2019-14284
- Description:
floppy: fix div-by-zero in setup_format_params
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-14284
- Patch: 4.15.0/CVE-2019-14284-floppy-fix-div-by-zero-in-setup_format_params.patch
- From: kernel-4.15.0-60.67
- CVE-2019-14283
- Description:
floppy: fix out-of-bounds read in copy_buffer
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-14283
- Patch: 4.15.0/CVE-2019-14283-floppy-fix-out-of-bounds-read-in-copy_buffer.patch
- From: kernel-4.15.0-60.67
- CVE-2019-13631
- Description:
Input: gtco - bounds check collection indent level
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-13631
- Patch: 4.15.0/CVE-2019-13631-Input-gtco-bounds-check-collection-indent-level.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11810
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 4.4.0/CVE-2019-11810-scsi-megaraid_sas-return-error-when-create-DMA-pool-failed.patch
- From: 4.4.0-149.175
- CVE-2019-11599
- Description:
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11599
- Patch: 4.15.0/CVE-2019-11599-coredump-fix-race-condition-between-mmget_not_zero-get_task_mm-and-core-dumping-55.60.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11487
- Description:
fs: prevent page refcount overflow in pipe_buf_get
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-fs-prevent-page-refcount-overflow-in-pipe_buf_get-48.51.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11487
- Description:
mm: add 'try_get_page()' helper function
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-mm-add-try_get_page-helper-function.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11487
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-mm-prevent-get_user_pages-from-overflowing-page-refcount.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11487
- Description:
mm: make page ref count overflow check tighter and more explicit
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-mm-make-page-ref-count-overflow-check-tighter-and-more-explicit.patch
- From: kernel-4.15.0-60.67
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-11487-kpatch.patch
- From:
- CVE-2019-10207
- Description:
Bluetooth: hci_uart: check for missing tty operations
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-10207
- Patch: 4.15.0/CVE-2019-10207-Bluetooth-hci_uart-check-for-missing-tty-operations.patch
- From: kernel-4.15.0-60.67
- CVE-2018-20784
- Description:
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20784
- Patch: 4.15.0/CVE-2018-20784-sched-fair-Fix-infinite-loop-in-update_blocked_averages-by-reverting-a9e7f6544b9c.patch
- From: kernel-4.15.0-60.67
- CVE-2018-19985
- Description:
USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CVE: https://access.redhat.com/security/cve/cve-2018-19985
- Patch: 4.15.0/CVE-2018-19985-USB-hso-Fix-OOB-memory-access-in-hso_probe-hso_get_config_data.patch
- From: kernel-4.15.0-60.67
- CVE-2019-10638 CVE-2019-10639
- Description:
inet: switch IP ID generator to siphash
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-10638
- Patch: 4.15.0/CVE-2019-10638-inet-switch-IP-ID-generator-to-siphash.patch
- From: kernel-4.15.0-60.67
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-10638-inet-switch-IP-ID-generator-to-siphash-kpatch.patch
- From:
- CVE-2019-15916
- Description:
net-sysfs: Fix mem leak in netdev_register_kobject
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15916
- Patch: 4.15.0/CVE-2019-15916-net-sysfs-Fix-mem-leak-in-netdev_register_kobject.patch
- From: linux-4.15.0-59.66
- CVE-2019-15924
- Description:
fm10k: Fix a potential NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15924
- Patch: 4.15.0/CVE-2019-15924-fm10k-Fix-a-potential-NULL-pointer-dereference.patch
- From: 4.15.0-59.66
- CVE-2019-15921
- Description:
genetlink: Fix a memory leak on error path
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15921
- Patch: 4.15.0/CVE-2019-15921-genetlink-Fix-a-memory-leak-on-error-path.patch
- From: linux-4.15.0-59.66
- CVE-2019-15666
- Description:
xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15666.html
- Patch: 4.15.0/CVE-2019-15666-xfrm-policy-Fix-out-of-bound-array-accesses-in-__xfrm_policy_unlink.patch
- From: 4.15.0-59.66
- CVE-2019-15807
- Description:
scsi: libsas: delete sas port if expander discover failed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15807.html
- Patch: 4.15.0/CVE-2019-15807-scsi-libsas-delete-sas-port-if-expander-discover-failed.patch
- From: 4.15.0-15807
- CVE-2019-16413
- Description:
9p: use inode->i_lock to protect i_size_write() under 32-bit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16413
- Patch: 4.9.0/cve-2019-16413-9p-use-inode-i-lock-to-protect.patch
- From: >kernel-4.9.127-32.el7
- CVE-2019-5489
- Description:
Change mincore() to count "mapped" pages rather than "cached" pages
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-5489
- Patch: 4.9.0/CVE-2019-5489-Change-mincore-to-count-mapped-pages-rather-than-cached-pages.patch
- From: 4.9.168-1+deb9u3
- CVE-2019-17351
- Description:
update ballooning to not consume all dom0's VA
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17351
- Patch: 4.9.0/cve-2019-17351-avoid-dom0-running-out-of-mem.patch
- From: >kernel-4.9.127-32.el7
- CVE-2019-16994
- Description:
net: sit: fix memory leak in sit_init_net()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16994
- Patch: 4.9.0/cve-2019-16994-net-sit-fix-memory-leak.patch
- From: >kernel-4.9.127-32.el7
- CVE-2019-16995
- Description:
net: hsr: fix memory leak in hsr_dev_finalize()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16995
- Patch: 4.9.0/cve-2019-16995-net-hsr-fix-memory-leak.patch
- From: >kernel-4.9.127-32.el7
- CVE-2018-20976
- Description:
xfs: clear sb->s_fs_info on mount failure
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20976.html
- Patch: 4.15.0/CVE-2018-20976-xfs-clear-sb-s_fs_info-on-mount-failure.patch
- From: 4.15.0-65.74
- CVE-2019-11486
- Description:
tty: mark Siemens R3964 line discipline as BROKEN
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-11486
- Patch: 4.9.0/CVE-2019-11486-tty-mark-Siemens-R3964-line-discipline-as-BROKEN.patch
- From: linux-4.9.168-1+deb9u3
- CVE-2020-0067
- Description:
f2fs: sanity check of xattr entry size
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0067.html
- Patch: 4.15.0/735000-f2fs-sanity-check-of-xattr-entry-size.patch
- From: 4.15.0-59.66
- CVE-2020-0067
- Description:
f2fs: fix to avoid accessing xattr across the boundary
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0067.html
- Patch: 4.15.0/737811-f2fs-fix-to-avoid-accessing-xattr-across-the-bound.patch
- From: 4.15.0-59.66
- CVE-2019-14835
- Description:
kvm: fix vhost_net log overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14835.html
- Patch: 4.15.0/kvm-vhost_net-log-overflow.patch
- From: 4.15.0-58.64+
- CVE-2019-15538
- Description:
xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15538.html
- Patch: 4.15.0/CVE-2019-15538-xfs-fix-missing-ILOCK-unlock-when-xfs_setattr_nonsize-fails-due-to-EDQUOT.patch
- From: 4.15.0-65.74
- CVE-2019-15918
- Description:
cifs: Fix lease buffer length error
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15918
- Patch: 4.15.0/CVE-2019-15918-cifs-Fix-lease-buffer-length-error.patch
- From: linux-4.15.0-66.75
- CVE-2018-21008
- Description:
rsi: add fix for crash during assertions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2019-21008.html
- Patch: 4.15.0/CVE-2018-21008-rsi-add-fix-for-crash-during-assertions.patch
- From: 4.15.0-66.75
- CVE-2019-14814
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14814
- Patch: 4.15.0/CVE-2019-14814-mwifiex-Fix-three-heap-overflow-at-parsing-element.patch
- From: 4.15.0-66.75
- CVE-2019-14815
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14815
- Patch: 4.15.0/CVE-2019-14815-mwifiex-Fix-three-heap-overflow-at-parsing-element.patch
- From: 4.15.0-66.75
- CVE-2019-14816
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14816
- Patch: 4.15.0/CVE-2019-14816-mwifiex-Fix-three-heap-overflow-at-parsing-element.patch
- From: 4.15.0-66.75
- CVE-2019-14821
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14821
- Patch: 4.15.0/CVE-2019-14821-KVM-coalesced_mmio-add-bounds-checking.patch
- From: 4.15.0-66.75
- CVE-2019-15117
- Description:
ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15117
- Patch: 4.15.0/CVE-2019-15117-ALSA-usb-audio-Fix-an-OOB-bug-in-parse_audio_mixer.patch
- From: 4.15.0-66.75
- CVE-2019-15118
- Description:
ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15118
- Patch: 4.15.0/CVE-2019-15118-ALSA-usb-audio-Fix-a-stack-buffer-overflow-bug-in-.patch
- From: 4.15.0-66.75
- CVE-2019-15505
- Description:
media: technisat-usb2: break out of loop at end of buffer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15505
- Patch: 4.15.0/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of-b.patch
- From: 4.15.0-66.75
- CVE-2016-10723
- Description:
mm, oom: remove sleep from under oom_lock
- CVE: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10723.html
- Patch: 4.15.0/CVE-2016-10723-mm-oom-remove-sleep-from-under-oom_lock.patch
- From: 5.0.0-1020.20~18.04.1
- CVE-2018-20669
- Description:
make 'user_access_begin()' do 'access_ok()'
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20669.html
- Patch: 4.15.0/CVE-2018-20669-make-user_access_begin-do-access_ok.patch
- From: 5.0.0-1020.20~18.04.1
- CVE-2018-12207
- Description:
x86: kvm: Do not release the page inside mmu_set_spte() (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-01-x86-kvm-do-not-release-page-inside-mmu_set_spte.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207
- Description:
CVE-2018-12207 prerequirement - code cleanup and simplification
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-02-cleanup.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207
- Description:
x86: kvm: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-03-x86-kvm-change-kvm_mmu_page_get_gfn-BUG_ON-to-WARN_ON.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207
- Description:
x86: kvm: vmx,svm: always run with EFER.NXE=1 when shadow paging is active (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-04-kvm-vmx-svm-always-run-with-EFER.NXE-1-when-shadow-paging-is-active.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207
- Description:
kvm: Convert kvm_lock to a mutex (CVE-2018-12207 prerequirement)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.15.0/CVE-2018-12207-05-kvm-Convert-kvm_lock-to-a-mutex.patch
- From: 4.19.67-2+deb10u2
- CVE-2018-12207
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-06-mitigation.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-15098
- Description:
ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15098.html
- Patch: 4.15.0/CVE-2019-15098-ath6kl-fix-a-NULL-ptr-deref-bug-in-ath6kl_usb_alloc_urb_from_pipe.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17052
- Description:
ax25: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17052.html
- Patch: 4.15.0/CVE-2019-17052-ax25-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17053
- Description:
ieee802154: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17053.html
- Patch: 4.15.0/CVE-2019-17053-ieee802154-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17054
- Description:
appletalk: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17054.html
- Patch: 4.15.0/CVE-2019-17054-appletalk-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17055
- Description:
mISDN: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17055.html
- Patch: 4.15.0/CVE-2019-17055-mISDN-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17056
- Description:
nfc: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17056.html
- Patch: 4.15.0/CVE-2019-17056-nfc-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17666
- Description:
rtlwifi: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17666.html
- Patch: 4.15.0/CVE-2019-17666-UBUNTU-SAUCE-rtlwifi-Fix-potential-overflow-on-P2P-code.patch
- From: kernel-4.15.0-67.76
- CVE-2019-0155
- Description:
drm/i915/gtt: Add read only pages to gen8_pte_encode
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-gtt-Add-read-only-pages-to-gen8_pte_encode.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915/gtt: Read-only pages for insert_entries on bdw+
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-gtt-Read-only-pages-for-insert_entries-on-bdw.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915/gtt: Disable read-only support under GVT
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-gtt-Disable-read-only-support-under-GVT.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Prevent writing into a read-only object via a GGTT mmap
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Prevent-writing-into-a-read-only-object-via-a-GGTT-mmap.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Prevent-writing-into-a-read-only-object-via-a-GGTT-mmap-kpatch.patch
- From:
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Check reg_table_count before derefencing.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-cmdparser-Check-reg_table_count-before-derefencing.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Do not check past the cmd length
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-cmdparser-Do-not-check-past-the-cmd-length.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Silence smatch for cmdparser
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Silence-smatch-for-cmdparser.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Move engine->needs_cmd_parser to engine->flags
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Move-engine-needs_cmd_parser-to-engine-flags.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Rename gen7 cmdparser tables
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Rename-gen7-cmdparser-tables.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Disable Secure Batches for gen6+
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Disable-Secure-Batches-for-gen6.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Remove Master tables from cmdparser
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Remove-Master-tables-from-cmdparser.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Add support for mandatory cmdparsing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Add-support-for-mandatory-cmdparsing.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Support-ro-ppgtt-mapped-cmdparser-shadow-buffers.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Allow parsing of unsized batches
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Allow-parsing-of-unsized-batches.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
drm/i915: Add gen9 BCS cmdparsing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Add-gen9-BCS-cmdparsing.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Add-gen9-BCS-cmdparsing-kpatch.patch
- From:
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Use explicit goto for error paths
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Use-explicit-goto-for-error-paths.patch
- From: 4.15.0-70.79
- CVE-2019-0155
- Description:
Add support for backward jumps
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Add-support-for-backward-jumps.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Add-support-for-backward-jumps-kpatch.patch
- From:
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Ignore Length operands during command matching
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Ignore-Length-operands-during-command-matching.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Ignore-Length-operands-during-command-matching-kpatch.patch
- From:
- CVE-2019-0154
- Description:
drm/i915: Lower RM timeout to avoid DSI hard hangs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0154
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch
- From: 4.15.0-70.79
- CVE-2019-0154
- Description:
drm/i915/gen8+: Add RC6 CTX corruption WA
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0154
- Patch: 4.15.0/i915/CVE-2019-0154-UBUNTU-SAUCE-drm-i915-gen8-Add-RC6-CTX-corruption-WA-23.25.patch
- From: 4.15.0-69.78
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0154-UBUNTU-SAUCE-drm-i915-gen8-Add-RC6-CTX-corruption-WA-kpatch.patch
- From:
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Fix jump whitelist clearing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0154-UBUNTU-SAUCE-drm-i915-cmdparser-Fix-jump-whitelist-clearing.patch
- From: 4.15.0-69.78
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs-kpatch.patch
- From:
- CVE-2019-11135
- Description:
x86/speculation/taa: Add mitigation for TSX Async Abort
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-11135
- Patch: 4.9.0/CVE-2019-11135-TSX-Async-Abort.patch
- From: 4.9.189-3+deb9u2
- CVE-2019-16746
- Description:
nl80211: fixed buffer overflow when handling beacon settings (CVE-2019-16746 helper functions)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.18.0/CVE-2019-16746-for_each_element-helpers.patch
- From: 5.0.0-37.40~18.04.1
- CVE-2019-16746
- Description:
nl80211: fixed buffer overflow when handling beacon settings
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.18.0/CVE-2019-16746.patch
- From: 5.0.0-37.40~18.04.1
- CVE-2019-17075
- Description:
fixed possible DoS in drivers/infiniband/hw/cxgb4/mem.c via directly calling dma_map_single() from a stack variable
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17075.html
- Patch: 4.15.0/CVE-2019-17075.patch
- From: kernel-4.15.0-72.81
- CVE-2019-17133
- Description:
fixed buffer overflow in cfg80211_mgd_wext_giwessid() in net/wireless/wext-sme.c which does not reject a long SSID IE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17133.html
- Patch: 4.15.0/CVE-2019-17133.patch
- From: kernel-4.15.0-72.81
- CVE-2019-19060
- Description:
fixed possible DoS via memory leak in the adis_update_scan_mode() in drivers/iio/imu/adis_buffer.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19060.html
- Patch: 4.15.0/CVE-2019-19060.patch
- From: kernel-4.15.0-72.81
- CVE-2019-19065
- Description:
fixed possible DoS via memory leak in the sdma_init() in drivers/infiniband/hw/hfi1/sdma.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19065.html
- Patch: 4.15.0/CVE-2019-19065.patch
- From: kernel-4.15.0-72.81
- CVE-2019-19075
- Description:
fixed possible DoS via memory leak in the ca8210_probe() in drivers/net/ieee802154/ca8210.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19075.html
- Patch: 4.15.0/CVE-2019-19075.patch
- From: kernel-4.15.0-72.81
- CVE-2019-14895
- Description:
mwifiex: fix possible heap overflow in mwifiex_process_country_ie()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14895
- Patch: 5.0.0/cve-2019-14895-heap-overflow-in-mwifiex-driver.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-14897
- Description:
Heap Overflow in add_ie_rates() function of Marvell Wifi Driver in Linux kernel
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14897
- Patch: 5.0.0/cve-2019-14896-14897-various-issues-in-marvell-libertas-driver.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-14901
- Description:
fix a heap overflow in Marvell WiFi driver
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14901
- Patch: 5.0.0/cve-2019-14901-fix-heap-overflow-in-mmwifiex_process_tdls_action_frame.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-16231
- Description:
Start checking alloc_workqueue() return value in fjes driver.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16231
- Patch: 5.0.0/cve-2019-16231-fjes-does-not-check-alloc_workqueue-return.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-16233
- Description:
scsi: qla2xxx: fix a potential NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16233
- Patch: 4.15.0/cve-2019-16233-scsi-qla2xxx-fix-a-potential-NULL-pointer-derefere.patch
- From: linux-4.15.0-74.84
- CVE-2019-19045
- Description:
net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19045
- Patch: 5.0.0/cve-2019-19045-mlx5-prevent-memory-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19052
- Description:
can: gs_usb: gs_can_open(): prevent memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19052
- Patch: 5.0.0/cve-2019-19052-can-gs_can_open-revent-memory-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19083
- Description:
drm/amd/display: memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19083
- Patch: 4.15.0/cve-2019-19083-drm-amd-display-memory-leak.patch
- From: linux-4.15.0-74.84
- CVE-2019-19524
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19524
- Patch: 5.0.0/cve-2019-19524-ff-memless-kill-timer-in-destroy.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19529
- Description:
can: mcba_usb: fix use-after-free on disconnect
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19529
- Patch: 5.0.0/cve-2019-19529-mcba_usb-fix-use-after-free-on-disconnect.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19534
- Description:
can: peak_usb: fix slab info leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19534
- Patch: 5.0.0/cve-2019-19534-peak_usb-fix-slab-info-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19807
- Description:
[sound] ALSA: timer: Fix incorrectly assigned timer instance
- CVE: https://access.redhat.com/security/cve/cve-2019-19807
- Patch: 4.15.0/CVE-2019-19807-ALSA-timer-Simplify-error-path-in-snd_timer_open.patch
- From: 4.15.0-73.82
- CVE-2019-19807
- Description:
[sound] ALSA: timer: Fix incorrectly assigned timer instance
- CVE: https://access.redhat.com/security/cve/cve-2019-19807
- Patch: 4.15.0/CVE-2019-19807-ALSA-timer-Fix-incorrectly-assigned-timer-instance.patch
- From: 4.15.0-73.82
- CVE-2019-18282
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-18282
- Patch: 4.19.0/CVE-2019-18282.patch
- From: 4.19.98-1
- CVE-2019-18282
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-18282
- Patch: 4.19.0/CVE-2019-18282-kpatch.patch
- From: 4.19.98-1
- CVE-2020-7053
- Description:
UBUNTU: SAUCE: drm/i915: Fix use-after-free when destroying GEM context
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-7053
- Patch: ubuntu-bionic/4.15.0-76.86/CVE-2020-7053-UBUNTU-SAUCE-drm-i915-Fix-use-after-free-when-destro.patch
- From: 4.15.0-76.86
- CVE-2019-14615
- Description:
drm/i915/gen9: Clear residual context state on context switch
- CVE: https://access.redhat.com/security/cve/cve-2019-14615
- Patch: ubuntu-bionic/4.15.0-76.86/CVE-2019-14615-drm-i915-gen9-Clear-residual-context-state-on-context-switch-43.46.patch
- From: kernel-4.15.0-76.86
- Description:
- CVE:
- Patch: ubuntu-bionic/4.15.0-76.86/CVE-2019-14615-kpatch.patch
- From:
- CVE-2020-0427
- Description:
pinctrl: devicetree: Avoid taking direct reference to device name string.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0427
- Patch: 4.15.0/CVE-2020-0427-pinctrl-devicetree-Avoid-taking-direct-reference-to-device-name-string.patch
- From: kernel-4.15.0-88.88
- CVE-2019-19332
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19332
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19332-KVM-x86-fix-out-of-bounds-write-in-KVM_GET_EMULATED_.patch
- From: 4.15.0-88.88
- CVE-2019-19227
- Description:
appletalk: Fix potential NULL pointer dereference in unregister_snap_client
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19227
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19227-appletalk-Fix-potential-NULL-pointer-dereference-in-58.64.patch
- From: 4.15.0-88.88
- CVE-2019-19227
- Description:
appletalk: Set error code if register_snap_client failed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19227
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19227-appletalk-Set-error-code-if-register_snap_client-fai.patch
- From: 4.15.0-88.88
- CVE-2019-19767
- Description:
ext4: fix use-after-free race with debug_want_extra_isize
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19767
- Patch: ubuntu-bionic/4.15.0-88.88/ext4-fix-use-after-free-race-with-debug_want_extra_isize.patch
- From: 4.15.0-88.88
- CVE-2019-5108
- Description:
cfg80211/mac80211: make ieee80211_send_layer2_update a public function
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5108
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-5108-cfg80211-mac80211-make-ieee80211_send_layer2_update-65.74.patch
- From: 4.15.0-88.88
- CVE-2019-19767
- Description:
ext4: add more paranoia checking in ext4_expand_extra_isize handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19767
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19767-ext4-add-more-paranoia-checking-in-ext4_expand_extra.patch
- From: 4.15.0-88.88
- CVE-2019-19078
- Description:
ath10k: fix memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19078
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19078-ath10k-fix-memory-leak.patch
- From: 4.15.0-88.88
- CVE-2019-19082
- Description:
drm/amd/display: prevent memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19082
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19082-drm-amd-display-prevent-memory-leak.patch
- From: 4.15.0-88.88
- CVE-2019-19063
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19063
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19063-rtlwifi-prevent-memory-leak-in-rtl_usb_probe.patch
- From: 4.15.0-88.88
- CVE-2019-19071
- Description:
rsi: release skb if rsi_prepare_beacon fails
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19071
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19071-rsi-release-skb-if-rsi_prepare_beacon-fails.patch
- From: 4.15.0-88.88
- CVE-2019-19057
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19057
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19057-mwifiex-pcie-Fix-memory-leak-in-mwifiex_pcie_init_ev.patch
- From: 4.15.0-88.88
- CVE-2019-18809
- Description:
media: usb: fix memory leak in af9005_identify_state
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18809
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-18809-media-usb-fix-memory-leak-in-af9005_identify_state.patch
- From: 4.15.0-88.88
- CVE-2019-18885
- Description:
btrfs: refactor btrfs_find_device() take fs_devices as argument
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-18885-btrfs-refactor-btrfs_find_device-take-fs_devices-as-.patch
- From: 4.15.0-88.88
- CVE-2019-18885
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-18885-btrfs-merge-btrfs_find_device-and-find_device.patch
- From: 4.15.0-88.88
- CVE-2019-18786
- Description:
media: rcar_drif: fix a memory disclosure
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18786
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-18786-media-rcar_drif-fix-a-memory-disclosure.patch
- From: 4.15.0-88.88
- CVE-2019-18683
- Description:
media: vivid: Fix wrong locking that causes race conditions on streaming stop
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18683
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-18683-media-vivid-Fix-wrong-locking-that-causes-race-condi.patch
- From: 4.15.0-88.88
- CVE-2019-15099
- Description:
ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15099
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-15099-ath10k-Fix-a-NULL-ptr-deref-bug-in-ath10k_usb_alloc_.patch
- From: 4.15.0-88.88
- CVE-2019-5108
- Description:
mac80211: fix station inactive_time shortly after boot
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5108
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-5108-mac80211-fix-station-inactive_time-shortly-after-boo.patch
- From: 4.15.0-88.88
- CVE-2019-5108
- Description:
mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5108
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-5108-mac80211-Do-not-send-Layer-2-Update-frame-before-aut.patch
- From: 4.15.0-88.88
- CVE-2019-20096
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-20096
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-20096-dccp-Fix-memleak-in-__feat_register_sp.patch
- From: 4.15.0-88.88
- CVE-2019-19965
- Description:
scsi: libsas: stop discovering if oob mode is disconnected
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19965
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19965-scsi-libsas-stop-discovering-if-oob-mode-is-disconne.patch
- From: 4.15.0-88.88
- CVE-2019-19062
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://access.redhat.com/security/cve/CVE-2019-19062
- Patch: 4.14.0/CVE-2019-19062.patch
- From: 4.14.165-131.185.amzn2 4.14.165-102.185.amzn1
- CVE-2019-16232
- Description:
libertas: fix a potential NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16232
- Patch: 5.3.0/CVE-2019-16232-libertas-fix-a-potential-NULL-pointer-dereference.patch
- From: 5.3.0-40.32~18.04.1
- CVE-2019-16229
- Description:
drm/amdkfd: fix a potential NULL pointer dereference (v2)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16229
- Patch: 5.3.0/CVE-2019-16229-drm-amdkfd-fix-a-potential-NULL-pointer-dereference.patch
- From: 5.3.0-40.32~18.04.1
- CVE-2019-15291
- Description:
media: b2c2-flexcop-usb: add sanity checking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15291
- Patch: 5.3.0/CVE-2019-15291-media-b2c2-flexcop-usb-add-sanity-checking.patch
- From: 5.3.0-40.32~18.04.1
- Description:
net: icmp: fix data-race in cmp_global_allow()
- CVE:
- Patch: 4.15.0/CVE-2020-25705-net-icmp-fix-data-race-in-cmp_global_allow.patch
- From: kernel-5.3.0-28.30~18.04.1
- CVE-2020-0431
- Description:
HID: hid-input: clear unmapped usages.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0431
- Patch: 4.15.0/CVE-2020-0431-HID-hid-input-clear-unmapped-usages.patch
- From: kernel-4.15.0-91.88
- CVE-2019-19068
- Description:
rtl8xxxu: prevent leaking urb
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19068
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19068-rtl8xxxu-prevent-leaking-urb.patch
- From: 4.15.0-91.92
- CVE-2019-19066
- Description:
scsi: bfa: release allocated memory in case of error
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19066
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19066-scsi-bfa-release-allocated-memory-in-case-of-error.patch
- From: 4.15.0-91.92
- CVE-2019-19058
- Description:
iwlwifi: dbg_ini: fix memory leak in alloc_sgtable
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19058
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19058-iwlwifi-dbg_ini-fix-memory-leak-in-alloc_sgtable.patch
- From: 4.15.0-91.92
- CVE-2019-19056
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19056
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19056-mwifiex-pcie-Fix-memory-leak-in-mwifiex_pcie_alloc_c.patch
- From: 4.15.0-91.92
- CVE-2019-19051
- Description:
wimax: i2400: fix memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19051
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19051-wimax-i2400-fix-memory-leak.patch
- From: 4.15.0-91.92
- CVE-2019-15217
- Description:
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15217
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-15217-media-usb-zr364xx-Fix-KASAN-null-ptr-deref-Read-in-z.patch
- From: 4.15.0-91.92
- CVE-2019-19046
- Description:
ipmi: Fix memory leak in __ipmi_bmc_register
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19046
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19046-ipmi-Fix-memory-leak-in-__ipmi_bmc_register.patch
- From: 4.15.0-91.92
- CVE-2020-2732
- Description:
kvm: nVMX: fixed L2 guest possible tricking the L0 hypervisor to access sensitive L1 resources
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2020-2732
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-2732-vmx-dont-emulate-in-guest-mode.patch
- From: 4.15.0-91.92
- CVE-2020-8832
- Description:
drm/i915: Restore sane defaults for KMS on GEM error load (CVE-2020-8832 dependency)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Restore-sane-defaults-for-KMS-on-GEM-error-load.patch
- From: 4.15.0-66.75
- CVE-2020-8832
- Description:
drm/i915: Use same test for eviction and submitting kernel context
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Use-same-test-for-eviction-and-submitting-kernel-context.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Define an engine class enum for the uABI
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Define-an-engine-class-enum-for-the-uABI.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Define an engine class enum for the uABI (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Define-an-engine-class-enum-for-the-uABI-kpatch.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Force the switch to the i915->kernel_context
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Force-the-switch-to-the-i915-kernel_context.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Move GT powersaving init to i915_gem_init()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Move-GT-powersaving-init-to-i915_gem_init.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Move intel_init_clock_gating() to i915_gem_init()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Move-intel_init_clock_gating-to-i915_gem_init.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Inline intel_modeset_gem_init()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Inline-intel_modeset_gem_init.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Mark the context state as dirty/written
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Mark-the-context-state-as-dirty_written.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Record the default hw state after reset upon load
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Record-the-default-hw-state-after-reset-upon-load.patch
- From: 4.15.0-89.89
- CVE-2020-8832
- Description:
drm/i915: Record the default hw state after reset upon load (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8832.html
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2020-8832-drm_i915-Record-the-default-hw-state-after-reset-upon-load-kpatch-leq-4.15.0-74.84.patch
- From: 4.15.0-89.89
- CVE-2020-0432
- Description:
staging: most: net: fix buffer overflow.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0432
- Patch: 4.15.0/CVE-2020-0432-staging-most-net-fix-buffer-overflow.patch
- From: kernel-4.15.0-96.97
- CVE-2020-0404
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0404
- Patch: 4.15.0/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-malformed-USB-descriptors.patch
- From: kernel-4.15.0-96.97
- CVE-2020-29370
- Description:
mm: slub: add missing TID bump in kmem_cache_alloc_bulk()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29370
- Patch: 4.15.0/CVE-2020-29370-mm-slub-add-missing-TID-bump-in-kmem_cache_alloc_bulk.patch
- From: kernel-4.15.0-99.100
- CVE-2020-27068
- Description:
cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27068
- Patch: 4.15.0/CVE-2020-27068-cfg80211-add-missing-policy-for-NL80211_ATTR_STATUS_CODE.patch
- From: kernel-4.15.0-99.100
- CVE-2020-27068
- Description:
cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27068
- Patch: 4.15.0/CVE-2020-27068-cfg80211-add-missing-policy-for-NL80211_ATTR_STATUS_CODE-kpatch.patch
- From: kernel-4.15.0-99.100
- CVE-2020-0444
- Description:
audit: fix error handling in audit_data_to_entry().
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0444
- Patch: 4.15.0/CVE-2020-0444-audit-fix-error-handling-in-audit_data_to_entry.patch
- From: kernel-4.15.0-99.100
- CVE-2019-16234
- Description:
iwlwifi: pcie: fix rb_allocator workqueue allocation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16234
- Patch: 4.15.0/CVE-2019-16234-iwlwifi-pcie-fix-rb_allocator-workqueue-allocation.patch
- From: 4.15.0-97.98
- CVE-2019-19768
- Description:
tracing/blktrace: Fix to allow setting same value
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: 4.15.0/CVE-2019-19768-tracing-blktrace-Fix-to-allow-setting-same-value.patch
- From: 4.15.0-97.98
- CVE-2019-19768
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: 4.15.0/CVE-2019-19768-blktrace-Protect-q-blk_trace-with-RCU.patch
- From: 4.15.0-97.98
- CVE-2019-19768
- Description:
blktrace: fix dereference after null check
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: 4.15.0/CVE-2019-19768-blktrace-fix-dereference-after-null-check.patch
- From: 4.15.0-97.98
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-10942
- Patch: 4.15.0/CVE-2020-10942-vhost-Check-docket-sk_family-instead-of-call-getname.patch
- From: 4.15.0-97.98
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11608
- Patch: 4.15.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: 4.15.0-97.98
- Description:
media: stv06xx: add missing descriptor sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11609
- Patch: 4.15.0/CVE-2020-11609-media-stv06xx-add-missing-descriptor-sanity-checks.patch
- From: 4.15.0-97.98
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11668
- Patch: 4.15.0/CVE-2020-11668-media-xirlink_cit-add-missing-descriptor-sanity-checks.patch
- From: 4.15.0-97.98
- Description:
vt: selection, handle pending signals in paste_selection
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8648
- Patch: 4.15.0/CVE-2020-8648-vt-selection-handle-pending-signals-in-paste_selection.patch
- From: 4.15.0-97.98
- Description:
vt: selection, close sel_buffer race
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8648
- Patch: 4.15.0/CVE-2020-8648-vt-selection-close-sel_buffer-race.patch
- From: 4.15.0-97.98
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9383
- Patch: 4.15.0/CVE-2020-9383-floppy-check-FDC-index-for-errors-before-assigning-it.patch
- From: 4.15.0-97.98
- CVE-2020-0433
- Description:
blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0433
- Patch: 4.15.0/CVE-2020-0433-blk-mq-sync-the-update-nr_hw_queues-with-blk_mq_queue_tag_busy_iter.patch
- From: kernel-4.15.0-101.102
- CVE-2020-0433
- Description:
blk-mq: Allow blocking queue tag iter callbacks.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0433
- Patch: 4.15.0/CVE-2020-0433-blk-mq-Allow-blocking-queue-tag-iter-callbacks.patch
- From: kernel-4.15.0-101.102
- CVE-2020-11565
- Description:
stack-based out-of-bounds write
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11565
- Patch: 4.9.0/CVE-2020-11565.patch
- From: 4.9.189-3+deb9u2
- CVE-2020-11494
- Description:
CAN: zero scl_bump properly
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11494.html
- Patch: ubuntu-bionic/4.15.0-101.102/cve-2020-11494-can-leaks-uninitialized-data.patch
- From: 4.15.0-101.102
- CVE-2020-12657
- Description:
block, bfq: fix use-after-free in bfq_idle_slice_timer_body
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12657.html
- Patch: ubuntu-bionic/4.15.0-101.102/cve-2020-12657-bfq-fix-use-after-free.patch
- From: 4.15.0-101.102
- CVE-2020-12114
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12114.html
- Patch: 4.15.0/744270-fs-namespace.c-fix-mountpoint-reference-counter-ra.patch
- From: 4.15.0-102.103
- CVE-2020-12464
- Description:
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12464.html
- Patch: 4.15.0/744274-USB-core-Fix-free-while-in-use-bug-in-the-USB-S-Gl.patch
- From: 4.15.0-102.103
- CVE-2020-12114
- Description:
propagate_one(): mnt_set_mountpoint() needs mount_lock
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12114.html
- Patch: 4.15.0/744338-propagate_one-mnt_set_mountpoint-needs-mount_lock.patch
- From: 4.15.0-102.103
- CVE-2020-1749
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-1749.html
- Patch: 4.15.0/744345-net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-i.patch
- From: 4.15.0-102.103
- CVE-2020-1749
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup (kpatch adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-1749.html
- Patch: 4.15.0/744345-net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-i-kpatch-1.patch
- From: 4.15.0-102.103
- CVE-2020-0067
- Description:
f2fs: fix to avoid memory leakage in f2fs_listxattr
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0067.html
- Patch: 4.15.0/744346-f2fs-fix-to-avoid-memory-leakage-in-f2fs_listxattr.patch
- From: 4.15.0-102.103
- CVE-2020-10751
- Description:
selinux: properly handle multiple messages in selinux_netlink_send()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-10751.html
- Patch: 4.15.0/744390-selinux-properly-handle-multiple-messages-in-selin.patch
- From: 4.15.0-102.103
- CVE-2020-0543
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2019-19039 CVE-2019-19377
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.15.0/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: 4.15.0-109.110
- CVE-2019-19462
- Description:
include/linux/relay.h: fix percpu annotation in struct rchan
- CVE: https://access.redhat.com/security/cve/CVE-2019-19462
- Patch: 4.14.0/CVE-2019-19462.patch
- From: 4.14.35-1902.302.2
- CVE-2019-19039 CVE-2019-19377
- Description:
btrfs: sink flush_fn to extent_write_cache_pages
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.15.0/CVE-2019-19377-CVE-2019-19039-btrfs-sink-flush_fn-to-extent_write_cache_pages.patch
- From: 4.15.0-109.110
- CVE-2019-19039 CVE-2019-19377
- Description:
btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.15.0/CVE-2019-19377-CVE-2019-19039-btrfs-extent_io-Move-the-BUG_ON-in-flush_write_bio-one-level-up.patch
- From: 4.15.0-109.110
- CVE-2019-19039 CVE-2019-19377
- Description:
btrfs: Don't submit any btree write bio if the fs has errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.15.0/CVE-2019-19377-CVE-2019-19039-btrfs-Dont-submit-any-btree-write-bio-if-the-fs-has-errors.patch
- From: 4.15.0-109.110
- CVE-2019-19036
- Description:
btrfs: fix reading stale metadata blocks after degraded raid1 mounts
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19036
- Patch: 4.15.0/CVE-2019-19036-btrfs-fix-reading-stale-metadata-blocks-after-degraded-raid1-mounts.patch
- From: 4.15.0-109.110
- CVE-2019-19036
- Description:
btrfs: Always try all copies when reading extent buffers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19036
- Patch: 4.15.0/CVE-2019-19036-btrfs-Always-try-all-copies-when-reading-extent-buffers.patch
- From: 4.15.0-109.110
- CVE-2019-19036
- Description:
btrfs: Correctly free extent buffer in case btree_read_extent_buffer_pages fails
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19036
- Patch: 4.15.0/CVE-2019-19036-btrfs-Correctly-free-extent-buffer-in-case-btree_read_extent_buffer_pages-fails.patch
- From: 4.15.0-109.110
- CVE-2019-19036
- Description:
btrfs: Validate child tree block's level and first key
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19036
- Patch: 4.15.0/CVE-2019-19036-btrfs-Validate-child-tree-blocks-level-and-first-key.patch
- From: 4.15.0-109.110
- CVE-2019-19036
- Description:
btrfs: Detect unbalanced tree with empty leaf before crashing btree operations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19036
- Patch: 4.15.0/CVE-2019-19036-btrfs-Detect-unbalanced-tree-with-empty-leaf-before-crashing-btree-operations.patch
- From: 4.15.0-109.110
- CVE-2019-16089
- Description:
UBUNTU: SAUCE: nbd_genl_status: null check for nla_nest_start
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16089
- Patch: 4.15.0/CVE-2019-16089-UBUNTU-SAUCE-nbd_genl_status-null-check-for-nla_nest_start.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-12770
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://access.redhat.com/security/cve/CVE-2020-12770
- Patch: 4.14.0/CVE-2020-12770.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-10711
- Description:
netlabel: fixed possible NULL pointer dereference issue while importing some category bitmap into SELinux
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 4.14.0/CVE-2020-10711.patch
- From: 4.14.177-139.254.amzn2
- CVE-2020-13143
- Description:
USB: gadget: fix illegal array access in binding with UDC
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-13143
- Patch: 4.9.0/cve-2020-13143-usb-gadget-fix-illegal-array-access.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-10757
- Description:
mm: Fix mremap not considering huge pmd devmap
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10757
- Patch: 4.19.0/CVE-2020-10757-mm-Fix-mremap-not-considering-huge-pmd-devmap.patch
- From: 4.19.118-2+deb10u1
- CVE-2020-15780
- Description:
UBUNTU: SAUCE: acpi: disallow loading configfs acpi tables when locked down
- CVE: https://access.redhat.com/security/cve/CVE-2020-15780
- Patch: 4.15.0/CVE-2020-15780-UBUNTU-SAUCE-acpi-disallow-loading-configfs-acpi-tables-when-locked-down.patch
- From: kernel-4.15.0-112.113
- CVE-2020-11935
- Description:
aufs: bugfix, IMA i_readcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11935.html
- Patch: 4.15.0/CVE-2020-11935-aufs-bugfix-IMA-i_readcount.patch
- From: 4.15.0-112.113
- CVE-2020-11935
- Description:
aufs: do not call i_readcount_inc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11935.html
- Patch: 4.15.0/CVE-2020-11935-aufs-do-not-call-i_readcount_inc.patch
- From: 4.15.0-112.113
- CVE-2020-15393
- Description:
usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15393
- Patch: ubuntu-bionic-hwe-5.3/5.3.0-65.59/CVE-2020-15393-usb-usbtest-fix-missing-kfree-dev-buf-in-usbtest_dis.patch
- From: 5.3.0-65.59
- CVE-2020-12771
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://access.redhat.com/security/cve/CVE-2020-12771
- Patch: 4.14.0/cve-2020-12771-bcache-fix-potential-deadlock.patch
- From: 4.14.186-110.268.amzn1
- CVE-2020-12655
- Description:
xfs: add agf freeblocks verify in xfs_agf_verify
- CVE: https://access.redhat.com/security/cve/CVE-2020-12655
- Patch: 4.15.0/cve-2020-12655-xfs-add-agf-freeblocks-verify.patch
- From: 4.14.35-1902.304.6
- CVE-2020-12656
- Description:
sunrpc: svcauth_gss_register_pseudoflavor must reject duplicate registrations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12656
- Patch: 4.15.0/CVE-2020-12656-sunrpc-svcauth_gss_register_pseudoflavor-must-reject-duplicate-registrations.patch
- From: kernel-4.15.0-112.113
- CVE-2020-12656
- Description:
sunrpc: clean up properly in gss_mech_unregister
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12656
- Patch: 4.15.0/CVE-2020-12656-sunrpc-clean-up-properly-in-gss_mech_unregister.patch
- From: kernel-4.15.0-112.113
- CVE-2020-12656
- Description:
sunrpc: clean up properly in gss_mech_unregister (adaptation )
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12656
- Patch: 5.4.0/CVE-2020-12656-kpatch.patch
- From: kernel-5.4.0-42.46
- CVE-2019-20810
- Description:
media: go7007: fix a miss of snd_card_free
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-20810
- Patch: ubuntu-bionic-hwe-5.3/5.3.0-64.58~18.04.1/CVE-2019-20810-media-go7007-fix-a-miss-of-snd_card_free-4.18.patch
- From: kernel-5.3.0-64.58~18.04.1
- CVE-2020-13974
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-13974
- Patch: 4.9.0/cve-2020-13974-vt-keyboard-avoid-signed-integer-overlow.patch
- From: linux-4.9.228-1
- CVE-2020-10781
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-10781
- Patch: 5.4.0/CVE-2020-10781-kpatch.patch
- From: kernel-5.4.0-42.46
- CVE-2020-14356
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.15.0/CVE-2020-14356-cgroup-fix-cgroup_sk_alloc-for-sk_clone_lock-96.97.patch
- From: kernel-4.15.0-112.113
- CVE-2020-14356
- Description:
cgroup: Fix sock_cgroup_data on big-endian.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.15.0/CVE-2020-14356-cgroup-Fix-sock_cgroup_data-on-big-endian.patch
- From: kernel-4.15.0-112.113
- CVE-2020-14356
- Description:
cgroup: add missing skcd->no_refcnt check in cgroup_sk_clone()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.15.0/CVE-2020-14356-cgroup-add-missing-skcd-no_refcnt-check-in-cgroup_sk_clone.patch
- From: kernel-4.15.0-112.113
- CVE-2020-24394
- Description:
nfsd: apply umask on fs without ACL support
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-24394
- Patch: 5.4.0/CVE-2020-24394-nfsd-apply-umask-on-fs-without-ACL-support.patch
- From: kernel-5.4.0-42.46
- Description:
net/packet: fix overflow in tpacket_rcv
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14386.html
- Patch: 4.15.0/CVE-2020-14386.patch
- From: 4.15.0-117.118
- CVE-2019-9445
- Description:
f2fs: check memory boundary by insane namelen
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9445
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-9445-f2fs-check-memory-boundary-by-insane-namelen.patch
- From: 4.15.0-118.119
- CVE-2019-9445
- Description:
f2fs: check if file namelen exceeds max value
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9445
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-9445-f2fs-check-if-file-namelen-exceeds-max-value.patch
- From: 4.15.0-118.119
- CVE-2020-12888
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.15.0/CVE-2020-12888-42.45.patch
- From: kernel-4.15.0-118.119
- CVE-2020-12888
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.15.0/CVE-2020-12888-kpatch.patch
- From: kernel-4.15.0-118.119
- CVE-2020-16166
- Description:
random32: update the net random state on interrupt and activity
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-16166
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2020-16166-random32-update-the-net-random-state-on-interrupt-an.patch
- From: 4.15.0-118.119
- CVE-2019-18808
- Description:
crypto: ccp - Release all allocated memory if sha type is invalid
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18808
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-18808-crypto-ccp-Release-all-allocated-memory-if-sha-type-.patch
- From: 4.15.0-118.119
- CVE-2019-19054
- Description:
media: rc: prevent memory leak in cx23888_ir_probe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19054
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-19054-media-rc-prevent-memory-leak-in-cx23888_ir_probe.patch
- From: 4.15.0-118.119
- CVE-2019-19061
- Description:
iio: imu: adis16400: fix memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2019-19061
- Patch: 4.15.0/CVE-2019-19061-iio-imu-adis16400-fix-memory-leak.patch
- From: kernel-4.15.0-118.119
- CVE-2019-19067
- Description:
drm/amdgpu: fix multiple memory leaks in acp_hw_init
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19067
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-19067-drm-amdgpu-fix-multiple-memory-leaks-in-acp_hw_init.patch
- From: 4.15.0-118.119
- CVE-2019-19073
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19073
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-19073-ath9k_htc-release-allocated-buffer-if-timed-out.patch
- From: 4.15.0-118.119
- CVE-2019-19074
- Description:
ath9k: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19074
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-19074-ath9k-release-allocated-buffer-if-timed-out.patch
- From: 4.15.0-118.119
- CVE-2020-14314
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2020-25212
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25212
- Patch: 4.19.0/cve-2020-25212-nfs-fix-getaddr-kernel-panic.patch
- From: linux-4.19.146-1
- CVE-2020-26088
- Description:
net/nfc/rawsock.c: add CAP_NET_RAW check.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-26088
- Patch: 4.15.0/cve-2020-26088-nfc-add-CAP_NET_RAW-check.patch
- From: 4.15.0-119.120
- CVE-2019-19448
- Description:
btrfs only search for left_info if there is no right_info
- CVE: https://access.redhat.com/security/cve/CVE-2019-19448
- Patch: 4.19.0/CVE-2019-19448.patch
- From: linux-4.19.146-1
- CVE-2020-16120
- Description:
ovl: pass correct flags for opening real directory
- CVE: https://ubuntu.com/security/CVE-2020-16120
- Patch: 4.15.0/CVE-2020-16120-ovl-pass-correct-flags-for-opening-real-directory.patch
- From:
- CVE-2020-16120
- Description:
ovl: switch to mounter creds in readdir
- CVE: https://ubuntu.com/security/CVE-2020-16120
- Patch: 4.15.0/cve-2020-16120-part-one.patch
- From:
- CVE-2020-16120
- Description:
ovl: verify permissions in ovl_path_open()
- CVE: https://ubuntu.com/security/CVE-2020-16120
- Patch: 4.15.0/cve-2020-16120-part-two.patch
- From:
- CVE-2020-12351
- Description:
Bluetooth: L2CAP: Fix calling sk_filter on non-socket based
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12351.html
- Patch: ubuntu-bionic/4.15.0-122.124/CVE-2020-12351-Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socke.patch
- From: kernel-5.4.0-122.124
- CVE-2020-12351
- Description:
Bluetooth: L2CAP: Fix calling sk_filter on non-socket based
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12351.html
- Patch: ubuntu-bionic/4.15.0-122.124/CVE-2020-12351-kpatch.patch
- From: kernel-5.4.0-122.124
- CVE-2020-12352
- Description:
Bluetooth: A2MP: Fix not initializing all members
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12352.html
- Patch: ubuntu-bionic/4.15.0-122.124/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: kernel-5.4.0-122.124
- CVE-2020-8694
- Description:
powercap: make attributes only readable by root
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8694
- Patch: 5.4.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-5.4.0-53.59
- CVE-2020-8694
- Description:
powercap: make attributes only readable by root (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8694
- Patch: 4.15.0/CVE-2020-8694-kpatch.patch
- From: kernel-4.15.0-123.126
- CVE-2020-25211
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-14351
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 5.4.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: kernel-5.4.0-56.62
- CVE-2020-25284
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.19.0/cve-2020-25284-rbd-require-global-CAP_SYS_ADMIN.patch
- From: linux-4.19.146-1
- CVE-2020-25285
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.19.0/cve-2020-25285-hugetlb-fix-a-race-between-sysctl-handlers.patch
- From: linux-4.19.146-1
- CVE-2020-14390
- Description:
fbcon: remove soft scrollback code
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.14.0/CVE-2020-14390-fbcon-remove-soft-scrollback-code.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-14390
- Description:
fbcon: remove now unusued 'softback_lines' cursor() argument
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.15.0/CVE-2020-14390-fbcon-remove-now-unusued-softback_lines-cursor-argument.patch
- From: kernel-4.15.0-125.128
- CVE-2020-14390
- Description:
fbcon: remove soft scrollback code (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.19.0/CVE-2020-14390-kpatch.patch
- From: linux-4.19.146-1
- CVE-2020-25641
- Description:
block: allow for_each_bvec to support zero len bvec
- CVE: https://access.redhat.com/security/cve/CVE-2020-25641
- Patch: 4.14.0/CVE-2020-25641-block-allow-for_each_bvec-to-support-zero-len-bvec.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-25643
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25643
- Patch: 4.19.0/CVE-2020-25643-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: 4.19.152-1
- CVE-2020-25645
- Description:
geneve: add transport ports in route lookup for geneve
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25645
- Patch: 4.14.0/CVE-2020-25645-geneve-add-transport-ports-in-route-lookup-for-genev.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-28915
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: ttps://ubuntu.com/security/CVE-2020-28915
- Patch: 5.4.0/CVE-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-5.4.0-56.62
- CVE-2020-28915
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: ttps://ubuntu.com/security/CVE-2020-28915
- Patch: 5.4.0/CVE-2020-28915-kpatch.patch
- From: kernel-5.4.0-56.62
- CVE-2020-0431
- Description:
HID: hid-input: fix stylus battery reporting.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0431
- Patch: 4.15.0/CVE-2020-0431-HID-hid-input-fix-stylus-battery-reporting.patch
- From: kernel-4.15.0-91.88
- CVE-2020-27675
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27675
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-25656-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handler.patch
- From: 4.15.0-129.132
- CVE-2020-25656
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25656
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-25656-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.15.0-129.132
- CVE-2020-25656
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25656
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-25656-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.15.0-129.132
- CVE-2020-27675
- Description:
xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27675
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-27675-xen-fix-GCC-warning-and-remove-duplicate-EVTCHN_ROW-EVTCHN_COL-usage.patch
- From: 4.15.0-129.132
- CVE-2020-27675
- Description:
xen/events: avoid removing an event channel while handling it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27675
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-27675-xen-events-avoid-removing-an-event-channel-while-han-118.119.patch
- From: 4.15.0-129.132
- CVE-2020-0423
- Description:
binder: fix UAF when releasing todo list
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0423
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-0423-binder-fix-UAF-when-releasing-todo-list.patch
- From: 4.15.0-129.132
- CVE-2020-28974
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28974
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.15.0-129.132
- CVE-2019-19770
- Description:
Blktrace: bail out early if block debugfs is not configured
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19770
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2019-19770-Blktrace-bail-out-early-if-block-debugfs-is-not-configured.patch
- From: kernel-4.15.0-129.132
- CVE-2019-19770
- Description:
blktrace: fix debugfs use after free
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19770
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2019-19770-blktrace-fix-debugfs-use-after-free.patch
- From: kernel-4.15.0-129.132
- CVE-2019-19770
- Description:
blktrace: ensure our debugfs dir exists
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19770
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2019-19770-blktrace-ensure-our-debugfs-dir-exists.patch
- From: kernel-4.15.0-129.132
- CVE-2020-25668
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25668
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: kernel-4.15.0-129.132
- CVE-2020-10135
- Description:
media: usbtv: Fix refcounting mixup
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10135
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-10135-media-usbtv-Fix-refcounting-mixup.patch
- From: kernel-4.15.0-129.132
- CVE-2020-10135
- Description:
Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10135
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-10135-Bluetooth-Consolidate-encryption-handling-in-hci_encrypt_cfm.patch
- From: kernel-4.15.0-129.132
- CVE-2020-10135
- Description:
Bluetooth: Fix update of connection state in `hci_encrypt_cfm`
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10135
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-10135-Bluetooth-Fix-update-of-connection-state-in-hci_encrypt_cfm.patch
- From: kernel-4.15.0-129.132
- CVE-2020-10135
- Description:
Bluetooth: Disconnect if E0 is used for Level 4
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10135
- Patch: ubuntu-bionic/4.15.0-129.132/CVE-2020-10135-Bluetooth-Disconnect-if-E0-is-used-for-Level-4.patch
- From: kernel-4.15.0-129.132
- CVE-2020-36385
- Description:
RDMA/ucma: Fix locking for ctx->events_reported
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-746935-RDMA-ucma-Fix-locking-for-ctx-events_reported-99.patch
- From: 4.15.0-129.132
- CVE-2020-25705
- Description:
icmp: randomize the global rate limiter
- CVE: https://access.redhat.com/security/cve/CVE-2020-25705
- Patch: 4.18.0/icmp-randomize-the-global-rate-limiter.patch
- From: 4.18.0-240.15.1.el8_3
- CVE-2020-28374
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: 4.15.0/CVE-2020-28374-UBUNTU-SAUCE-target-fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.15.0-132.136
- CVE-2020-28374
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup (adaptation )
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: 4.15.0/CVE-2020-28374-kpatch.patch
- From: 4.15.0-132.136
- CVE-2020-25704
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25704
- Patch: ubuntu-bionic/4.15.0-135.139/0003-CVE-2020-25704-perf-core-Fix-a-memory-leak-in-perf_event_parse_addr.patch
- From: 4.15.0-135.139
- CVE-2020-29374
- Description:
mm/userfaultfd: do not access vma->vm_mm after calling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29374
- Patch: ubuntu-bionic/4.15.0-136.140/0001-CVE-2020-29374-mm-userfaultfd-do-not-access-vma-vm_mm-after-calling.patch
- From: 4.15.0-136.140
- CVE-2020-29661
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29661
- Patch: ubuntu-bionic/4.15.0-136.140/0002-CVE-2020-29661-CVE-2020-29660-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 4.15.0-136.140
- CVE-2020-29660
- Description:
tty: Fix ->session locking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29660
- Patch: ubuntu-bionic/4.15.0-136.140/0003-CVE-2020-29661-CVE-2020-29660-tty-Fix-session-locking.patch
- From: 4.15.0-136.140
- CVE-2020-29374
- Description:
gup: document and work around "COW can break either way" issue
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29374
- Patch: ubuntu-bionic/4.15.0-136.140/0004-CVE-2020-29374-gup-document-and-work-around-COW-can-break-either-wa-pve.patch
- From: 4.15.0-136.140
- CVE-2020-28941
- Description:
speakup: Do not let the line discipline be used several times
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28941
- Patch: ubuntu-bionic/4.15.0-136.140/CVE-2020-28941-speakup-do-not-let-the-line-discipline-be-used-several-times.patch
- From: 4.15.0-136.140
- CVE-2020-27830
- Description:
speakup: Reject setting the speakup line discipline outside of
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27830
- Patch: ubuntu-bionic/4.15.0-136.140/CVE-2020-27830-speakup-reject-setting-the-speakup-line-discipline-outside-of.patch
- From: 4.15.0-136.140
- CVE-2020-27815
- Description:
jfs: Fix array index bounds check in dbAdjTree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27815
- Patch: ubuntu-bionic/4.15.0-136.140/CVE-2020-27815-jfs-Fix-array-index-bounds-check-in-dbAdjTree.patch
- From: kernel-4.15.0-136.140
- CVE-2020-29569
- Description:
xen-blkback: set ring->xenblkd to NULL after kthread_stop()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29569
- Patch: ubuntu-bionic/4.15.0-136.140/CVE-2020-29569-xen-blkback-set-ring-xenblkd-to-NULL-after-kthread_stop.patch
- From: 5.4.0-66.74
- CVE-2020-25669
- Description:
Input: sunkbd - avoid use-after-free in teardown paths
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25669
- Patch: 4.19.0/CVE-2020-25669-Input-sunkbd-avoid-use-after-free-in-teardown-paths.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-29568
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.15.0/CVE-2020-29568-xsa349-kpatch.patch
- From: kernel-4.15.0-136.140
- CVE-2020-29568
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.15.0/CVE-2020-29568-xsa349-handle-xenwatch-thread-kpatch.patch
- From: kernel-4.15.0-136.140
- CVE-2020-36158
- Description:
mwifiex: Fix possible buffer overflows in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-36158
- Patch: ubuntu-bionic/4.15.0-137.141/0001-CVE-2020-36158-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 4.15.0-137.141
- CVE-2021-3178
- Description:
nfsd4: readdirplus shouldn't return parent of export
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3178
- Patch: ubuntu-bionic/4.15.0-137.141/0002-CVE-2021-3178-nfsd4-readdirplus-shouldn-t-return-parent-of-export.patch
- From: 4.15.0-137.141
- CVE-2021-3347
- Description:
futex: Ensure the correct return value from futex_lock_pi()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 4.18.0/futex/CVE-2021-3347-futex-Ensure-the-correct-return-value-from-futex_lock_pi.patch
- From: >kernel-5.4.0-65.73
- CVE-2021-3347
- Description:
futex: Simplify fixup_pi_state_owner()
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 4.18.0/futex/CVE-2021-3347-futex-Simplify-fixup_pi_state_owner.patch
- From: >kernel-5.4.0-65.73
- CVE-2021-3347
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 4.15.0/futex/CVE-2021-3347-futex-Handle-faults-correctly-for-PI-futexes-76.86.patch
- From: >kernel-5.4.0-65.73
- CVE-2021-27365
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.0.0/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs-output.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27363 CVE-2021-27364
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27363
- Patch: 5.4.0/CVE-2021-27363-CVE-2021-27364-scsi-iscsi-Restrict-sessions-and-handles-to-admin-capabilities.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27365
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.4.0/CVE-2021-27365-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27365
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 4.15.0/CVE-2021-27365-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: >kernel-4.15.0-136.140
- CVE-2020-27170
- Description:
bpf: Prohibit alu ops for pointer types not defining ptr_limit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27170
- Patch: 5.4.0/CVE-2020-27170-bpf-Prohibit-alu-ops-for-pointer-types-not-defining-ptr_limit.patch
- From: >kernel-5.4.0-67.75
- CVE-2020-27171
- Description:
bpf: Fix off-by-one for area size in creating mask to left
- CVE: https://www.vicarius.io/research-center/vulnerability/cve-2021-27171-id271858
- Patch: 5.0.0/CVE-2020-27171-bpf-Fix-off-by-one-for-area-size-in-creating-mask-to-left.patch
- From: >kernel-5.4.0-67.75
- CVE-2021-3348
- Description:
nbd: freeze the queue while we're adding connections
- CVE: https://access.redhat.com/security/cve/CVE-2021-3348
- Patch: 4.14.0/CVE-2021-3348-nbd-freeze-the-queue-while-we-re-adding-connections-188.patch
- From: 4.14.219-119.340.amzn1
- CVE-2021-29154
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29154
- Patch: 5.4.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: >kernel-5.4.0-70.78
- CVE-2021-3493
- Description:
xattr: break delegations in {set,remove}xattr
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 5.4.0/CVE-2021-3493-xattr-break-delegations-in-set-remove-xattr.patch
- From: kernel-5.4.0-71.79
- CVE-2021-3493
- Description:
vfs: move cap_convert_nscap() call into vfs_setxattr()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 5.4.0/CVE-2021-3493-vfs-move-cap_convert_nscap-call-into-vfs_setxattr.patch
- From: kernel-5.4.0-71.79
- CVE-2021-26931
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-26931
- Patch: ubuntu-bionic/4.15.0-143.147/0001-CVE-2021-26931-xen-blkback-don-t-handle-error-by-BUG.patch
- From: kernel-4.15.0-143.147
- CVE-2021-26931
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-26931
- Patch: ubuntu-bionic/4.15.0-143.147/CVE-2021-29631-xen-netback-dont-handle-error-by-BUG.patch
- From: 4.15.0-143.147
- CVE-2021-26931
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26931
- Patch: ubuntu-bionic/4.15.0-143.147/CVE-2021-26931-xen-scsiback-dont-handle-error-by-BUG.patch
- From: 4.15.0-143.147
- CVE-2021-28688
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28688
- Patch: ubuntu-bionic/4.15.0-143.147/CVE-2021-28688-xen-blkback-Avoid-unmapping-unmapped-grant-pages.patch
- From: 4.15.0-143.147
- CVE-2021-26930
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: ubuntu-bionic/4.15.0-143.147/0002-CVE-2021-26930-xen-blkback-fix-error-handling-in-xen_blkbk_map.patch
- From: kernel-4.15.0-143.147
- Description:
- CVE:
- Patch: ubuntu-bionic/4.15.0-143.147/0003-CVE-2021-30002-media-v4l-ioctl-Fix-memory-leak-in-video_usercopy.patch
- From:
- CVE-2021-29265
- Description:
usbip: fix stub_dev usbip_sockfd_store() races leading to gpf
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29265
- Patch: ubuntu-bionic/4.15.0-143.147/0004-CVE-2021-29265-usbip-fix-stub_dev-usbip_sockfd_store-races-leading-.patch
- From: 4.15.0-143.147
- CVE-2021-29264
- Description:
gianfar: fix jumbo packets+napi+rx overrun crash
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29264
- Patch: ubuntu-bionic/4.15.0-143.147/CVE-2021-29264-gianfar-prevent-integer-wrapping-in-the-rx-handler.patch
- From: 4.15.0-143.147
- CVE-2021-29264
- Description:
gianfar: fix jumbo packets+napi+rx overrun crash
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29264
- Patch: ubuntu-bionic/4.15.0-143.147/0005-CVE-2021-29264-gianfar-fix-jumbo-packets-napi-rx-overrun-crash.patch
- From: 4.15.0-143.147
- CVE-2021-28688
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28688
- Patch: ubuntu-bionic/4.15.0-143.147/0007-CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from-xen_bl.patch
- From: 4.15.0-143.147
- CVE-2021-29650
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29650
- Patch: ubuntu-bionic/4.15.0-143.147/0008-CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.15.0-143.147
- CVE-2021-20292
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-20292
- Patch: ubuntu-bionic/4.15.0-143.147/CVE-2021-20292-drm-ttm-nouveau-dont-call-tt-destroy-callback-on-alloc-failure.patch
- From: 4.15.0-143.147
- CVE-2021-28038
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-28038
- Patch: ubuntu-bionic/4.15.0-143.147/CVE-2021-28038-xsa367-linux.patch
- From: 4.15.0-143.147
- CVE-2021-33033
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33033
- Patch: ubuntu-bionic/4.15.0-144.148/0001-CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-.patch
- From: 4.15.0-144.148
- CVE-2021-28660
- Description:
staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28660
- Patch: ubuntu-bionic/4.15.0-144.148/0002-CVE-2021-28660-staging-rtl8188eu-prevent-ssid-overflow-in-rtw_wx_se.patch
- From: 4.15.0-144.148
- CVE-2021-29647
- Description:
net: qrtr: fix error return code of qrtr_sendmsg()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29647
- Patch: ubuntu-bionic/4.15.0-144.148/0003-CVE-2021-29647-net-qrtr-fix-error-return-code-of-qrtr_sendmsg.patch
- From: 4.15.0-144.148
- CVE-2021-28964
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28964
- Patch: ubuntu-bionic/4.15.0-144.148/0004-CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rew.patch
- From: 4.15.0-144.148
- CVE-2021-29647
- Description:
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29647
- Patch: ubuntu-bionic/4.15.0-144.148/CVE-2021-29647-net-qrtr-Fix-an-out-of-bounds-read-qrtr_endpoint_post.patch
- From: 4.15.0-144.148
- CVE-2021-29647
- Description:
net/qrtr: fix __netdev_alloc_skb call
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29647
- Patch: ubuntu-bionic/4.15.0-144.148/0005-CVE-2021-29647-net-qrtr-fix-__netdev_alloc_skb-call.patch
- From: 5.4.0-74.83
- CVE-2021-28972
- Description:
PCI: rpadlpar: Fix potential drc_name corruption in store functions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28972
- Patch: ubuntu-bionic/4.15.0-144.148/0006-CVE-2021-28972-PCI-rpadlpar-Fix-potential-drc_name-corruption-in-st.patch
- From: 4.15.0-144.148
- CVE-2021-28971
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28971
- Patch: ubuntu-bionic/4.15.0-144.148/0007-CVE-2021-28971-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-statu.patch
- From: 4.15.0-144.148
- CVE-2021-31916
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-31916
- Patch: ubuntu-bionic/4.15.0-144.148/0008-CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 4.15.0-144.148
- CVE-2021-29647
- Description:
net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29647
- Patch: ubuntu-bionic/4.15.0-144.148/0009-CVE-2021-29647-net-qrtr-fix-a-kernel-infoleak-in-qrtr_recvmsg.patch
- From: 4.15.0-144.148
- CVE-2021-3483
- Description:
firewire: nosy: Fix a use-after-free bug in nosy_ioctl()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3483
- Patch: ubuntu-bionic/4.15.0-144.148/0010-CVE-2021-3483-firewire-nosy-Fix-a-use-after-free-bug-in-nosy_ioctl.patch
- From: 4.15.0-144.148
- CVE-2021-33033
- Description:
net: mac802154: Fix general protection fault
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33033
- Patch: ubuntu-bionic/4.15.0-144.148/0011-CVE-2021-33033-net-mac802154-Fix-general-protection-fault.patch
- From: 4.15.0-144.148
- CVE-2021-3428
- Description:
ext4: fix extent_status fragmentation for plain files
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3428
- Patch: ubuntu-bionic/4.15.0-144.148/CVE-2021-3428-ext4-fix-extent_status-fragmentation-for-plain-files.patch
- From: 4.15.0-144.148
- CVE-2021-3428
- Description:
ext4: avoid arithemetic overflow that can trigger a BUG
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3428
- Patch: ubuntu-bionic/4.15.0-144.148/CVE-2021-3428-ext4-avoid-arithemetic-overflow-that-can-trigger-a-BUG.patch
- From: 4.15.0-144.148
- CVE-2021-3428
- Description:
ext4: catch integer overflow in ext4_cache_extents
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3428
- Patch: 4.19.0/CVE-2021-3428-ext4-catch-integer-overflow-in-ext4_cache_extents.patch
- From: v4.19.182
- CVE-2020-25670
- Description:
nfc: fix memory leak in llcp_sock_bind() (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: 4.14.0/CVE-2020-25670-nfc-fix-memory-leak-in-llcp_sock_bind.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25670
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25670-nfc-fix-refcount-leak-in-llcp_sock_bind.patch
- From: 5.4.0-74.83
- CVE-2020-25671
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25671
- Patch: 4.14.0/CVE-2020-25671-nfc-fix-refcount-leak-in-llcp_sock_connect.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25672
- Description:
nfc: fix memory leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25672
- Patch: 4.14.0/CVE-2020-25672-nfc-fix-memory-leak-in-llcp_sock_connect.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25673
- Description:
nfc: Avoid endless loops caused by repeated llcp_sock_connect()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-25673
- Patch: 4.14.0/CVE-2020-25673-nfc-Avoid-endless-loops-caused-by-repeated-llcp_sock_connect.patch
- From: >kernel-4.14.231-173.360.amzn1
- CVE-2021-22555
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.15.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-o.patch
- From: kernel-4.15.0-144.148
- CVE-2021-3609
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From:
- CVE-2021-23133
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-23133
- Patch: 4.14.0/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-3600
- Description:
UBUNTU: SAUCE: bpf: Do not use ax register in interpreter on div/mod
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3600
- Patch: 4.15.0/CVE-2021-3600-UBUNTU-SAUCE-bpf-Do-not-use-ax-register-in-interpreter-on-div-mod.patch
- From: kernel-4.15.0-147.151
- CVE-2021-3600
- Description:
bpf: fix subprog verifier bypass by div/mod by 0 exception
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3600
- Patch: 4.15.0/CVE-2021-3600-bpf-fix-subprog-verifier-bypass-by-div-mod-by-0-exception.patch
- From: kernel-4.15.0-147.151
- CVE-2021-3600
- Description:
UBUNTU: SAUCE: bpf: Fix 32-bit register truncation on div/mod instruction
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3600
- Patch: 4.15.0/CVE-2021-3600-UBUNTU-SAUCE-bpf-Fix-32-bit-register-truncation-on-div-mod-instruction.patch
- From: kernel-4.15.0-147.151
- CVE-2021-33909
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://ubuntu.com/security/CVE-2021-33909
- Patch: 4.15.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: >kernel-4.15.0-147.151
- CVE-2021-33034
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 4.15.0/CVE-2021-33034-Bluetooth-verify-AMP-hci_chan-before-amp_destroy.patch
- From:
- CVE-2021-33034
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-0129 CVE-2020-26558
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-0129
- Patch: 4.15.0/CVE-2020-26558-CVE-2021-0129-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From:
- CVE-2021-23134
- Description:
net/nfc: fix use-after-free llcp_sock_bind/connect
- CVE: https://ubuntu.com/security/CVE-2021-23134
- Patch: 4.15.0/CVE-2021-23134-net-nfc-fix-use-after-free-llcp_sock_bind-connect.patch
- From:
- CVE-2020-26147
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 4.15.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From:
- CVE-2020-26139
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.15.0/CVE-2020-26139-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From:
- CVE-2021-32399
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- CVE: https://ubuntu.com/security/CVE-2021-32399
- Patch: 4.15.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the-HCI-controller.patch
- From:
- CVE-2021-31829
- Description:
bpf: Fix masking negation logic upon negative dst register
- CVE: https://ubuntu.com/security/CVE-2021-31829
- Patch: 4.15.0/CVE-2021-31829-bpf-Fix-masking-negation-logic-upon-negative-dst-register.patch
- From:
- CVE-2021-33200
- Description:
bpf: improve verifier branch analysis
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-improve-verifier-branch-analysis.patch
- From:
- CVE-2021-33200
- Description:
bpf: do not restore dst_reg when cur_state is freed
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-do-not-restore-dst_reg-when-cur_state-is-freed.patch
- From:
- CVE-2021-33200
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Simplify-alu_limit-masking-for-pointer-arithmetic.patch
- From:
- CVE-2021-33200
- Description:
bpf: Add sanity check for upper ptr_limit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Add-sanity-check-for-upper-ptr_limit.patch
- From:
- CVE-2021-33200
- Description:
bpf: extend is_branch_taken to registers
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-extend-is_branch_taken-to-registers.patch
- From:
- CVE-2021-33200
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From:
- CVE-2021-33200
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-all-types.patch
- From:
- CVE-2021-33200
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-error-path.patch
- From:
- CVE-2021-33200
- Description:
bpf: Improve verifier error messages for users
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Improve-verifier-error-messages-for-users.patch
- From:
- CVE-2021-33200
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Refactor-and-streamline-bounds-check-into-helper.patch
- From:
- CVE-2021-33200
- Description:
bpf: Move sanitize_val_alu out of op switch
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From:
- CVE-2021-33200
- Description:
bpf: Tighten speculative pointer arithmetic mask
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From:
- CVE-2021-33200
- Description:
bpf: Fix leakage of uninitialized bpf stack under speculation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Fix-leakage-of-uninitialized-bpf-stack-under-speculation.patch
- From:
- CVE-2021-33200
- Description:
bpf: Wrap aux data inside bpf_sanitize_info container
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 4.15.0/CVE-2021-33200-bpf-Wrap-aux-data-inside-bpf_sanitize_info-container.patch
- From:
- CVE-2020-24587 CVE-2020-24586
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.15.0/CVE-2020-24587-mac80211-restrict-delayed-tailroom-needed-decrement.patch
- From:
- CVE-2020-24587 CVE-2020-24586
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.15.0/CVE-2020-24587-CVE-2020-24586-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From:
- CVE-2020-24587 CVE-2020-24586
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment-cache-attacks.patch
- From: 5.8.0-59.66
- CVE-2021-3573
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3573
- Patch: ubuntu-bionic/4.15.0-154.161/0001-CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 4.15.0-154.161
- CVE-2021-3587
- Description:
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3587
- Patch: ubuntu-bionic/4.15.0-154.161/0002-CVE-2021-3587-nfc-fix-NULL-ptr-dereference-in-llcp_sock_getname-af.patch
- From: 4.15.0-154.161
- CVE-2021-3564
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3564
- Patch: ubuntu-focal/5.4.0-81.91/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 5.4.0-81.91
- CVE-2021-34693
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-34693
- Patch: ubuntu-bionic/4.15.0-156.163/0001-CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.15.0-156.163
- CVE-2021-3612
- Description:
Input: joydev - prevent use of not validated data in JSIOCSBTNMAP
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3612
- Patch: ubuntu-bionic/4.15.0-156.163/0003-CVE-2021-3612-Input-joydev-prevent-use-of-not-validated-data-in-JS.patch
- From: 4.15.0-156.163
- CVE-2021-38160
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38160
- Patch: ubuntu-bionic/4.15.0-156.163/0004-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.15.0-156.163
- CVE-2021-3656
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3656
- Patch: ubuntu-bionic/4.15.0-156.163/0006-CVE-2021-3653-CVE-2021-3656-UBUNTU-SAUCE-KVM-nSVM-always-intercept-VMLOAD-VMSAVE.patch
- From: 4.15.0-156.163
- CVE-2021-3653
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-bionic/4.15.0-156.163/0008-CVE-2021-3653-CVE-2021-3656-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i-70.79.patch
- From: 4.15.0-156.163
- CVE-2021-3653
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-bionic/4.15.0-156.163/CVE-2021-3653-kpatch-66.75.patch
- From: 4.15.0-156.163
- CVE-2021-3743
- Description:
net: qrtr: fix OOB Read in qrtr_endpoint_post
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3743
- Patch: 4.15.0/CVE-2021-3743-749700-net-qrtr-fix-OOB-Read-in-qrtr_endpoint_post.patch
- From: 4.15.0-155.162
- CVE-2021-37576
- Description:
- CVE:
- Patch: skipped/CVE-2021-37576.patch
- From:
- CVE-2021-38204
- Description:
usb: max-3421: Prevent corruption of freed memory
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-bionic/4.15.0-159.167/0002-CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory.patch
- From: 4.15.0-159.167
- CVE-2021-38204
- Description:
usb: max-3421: Prevent corruption of freed memory (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-bionic/4.15.0-159.167/CVE-2021-38204-kpatch.patch
- From: 4.15.0-159.167
- CVE-2021-3679
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3679
- Patch: ubuntu-bionic/4.15.0-159.167/0003-CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch
- From: 4.15.0-159.167
- CVE-2021-3732
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3732
- Patch: ubuntu-bionic/4.15.0-159.167/0007-CVE-2021-3732-ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch
- From: 4.15.0-159.167
- CVE-2021-38205
- Description:
net: xilinx_emaclite: Do not print real IOMEM pointer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38205
- Patch: ubuntu-bionic/4.15.0-159.167/0008-CVE-2021-38205-net-xilinx_emaclite-Do-not-print-real-IOMEM-pointer.patch
- From: 4.15.0-159.167
- CVE-2021-38198
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: 4.14.0/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-shadow-page.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2021-38198
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: 4.14.0/CVE-2021-38198-kpatch.patch
- From: 4.14.243-185.433
- CVE-2020-3702
- Description:
ath: Use safer key clearing with key cache entries
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Use-safer-key-clearing-with-key-cache-entries.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702
- Description:
ath9k: Clear key cache explicitly on disabling hardware
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath9k-Clear-key-cache-explicitly-on-disabling-hardware.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702
- Description:
ath: Export ath_hw_keysetmac
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Export-ath_hw_keysetmac.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702
- Description:
ath: Modify ath_key_delete() to not need full key entry
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702
- Description:
ath9k: Postpone key cache entry deletion for TXQ frames reference it
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath9k-Postpone-key-cache-entry-deletion-for-TXQ-frames-reference-it.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702
- Description:
ath9k: Postpone key cache entry deletion for TXQ frames reference it (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath9k-Postpone-key-cache-entry-deletion-for-TXQ-frames-reference-it-kpatch.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702
- Description:
ath: Export ath_hw_keysetmac (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Export-ath_hw_keysetmac-kpatch.patch
- From: kernel-5.4.0-89.100
- CVE-2021-40490
- Description:
ext4: fix race writing to an inline_data file while its xattrs are changing
- CVE: https://access.redhat.com/security/cve/CVE-2021-40490
- Patch: 4.14.0/CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-its-xattrs-are-changing.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2021-42008
- Description:
net: 6pack: fix slab-out-of-bounds in decode_data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42008
- Patch: ubuntu-focal/5.4.0-89.100/0003-CVE-2021-42008-net-6pack-fix-slab-out-of-bounds-in-decode_data.patch
- From: 5.4.0-89.100
- CVE-2021-3753
- Description:
vt_kdsetmode: extend console locking
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3753
- Patch: 4.15.0/CVE-2021-3753-750398-vt_kdsetmode-extend-console-locking.patch
- From: 4.15.0-162.170
- CVE-2021-3743
- Description:
net: qrtr: fix another OOB Read in qrtr_endpoint_post
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3743
- Patch: 4.15.0/CVE-2021-3743-750402-net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_pos.patch
- From: 4.15.0-162.170
- CVE-2021-42252
- Description:
soc: aspeed: lpc-ctrl: Fix boundary check for mmap
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42252
- Patch: 4.15.0/CVE-2021-42252-750507-soc-aspeed-lpc-ctrl-Fix-boundary-check-for-mmap.patch
- From: 4.15.0-162.170
- CVE-2021-3759
- Description:
memcg: enable accounting of ipc resources
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3759
- Patch: 4.15.0/CVE-2021-3759-750633-memcg-enable-accounting-of-ipc-resources.patch
- From: 4.15.0-162.170
- CVE-2019-19449
- Description:
f2fs: fix wrong total_sections check and fsmeta check
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19449
- Patch: 4.15.0/CVE-2019-19449-750637-f2fs-fix-wrong-total_sections-check-and-fsmeta-che.patch
- From: 4.15.0-162.170
- CVE-2019-19449
- Description:
f2fs: fix to do sanity check on segment/section count
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19449
- Patch: 4.15.0/CVE-2019-19449-750638-f2fs-fix-to-do-sanity-check-on-segment-section-cou-70.patch
- From: 4.15.0-162.170
- CVE-2021-38199
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38199
- Patch: 4.15.0/CVE-2021-38199-750639-NFSv4-Initialise-connection-to-the-server-in-nfs4_.patch
- From: 4.15.0-162.170
- CVE-2021-3655
- Description:
sctp: validate chunk size in __rcv_asconf_lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3655
- Patch: 4.15.0/CVE-2021-3655-750644-sctp-validate-chunk-size-in-__rcv_asconf_lookup.patch
- From: 4.15.0-162.170
- CVE-2021-3655
- Description:
sctp: add param size validation for SCTP_PARAM_SET_PRIMARY
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3655
- Patch: 4.15.0/CVE-2021-3655-750645-sctp-add-param-size-validation-for-SCTP_PARAM_SET_.patch
- From: 4.15.0-162.170
- CVE-2020-36322
- Description:
fuse: fix bad inode
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36322
- Patch: 4.15.0/CVE-2020-36322-750669-fuse-fix-bad-inode.patch
- From: 4.15.0-162.170
- CVE-2021-28950
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28950
- Patch: 4.15.0/CVE-2021-28950-750670-fuse-fix-live-lock-in-fuse_iget.patch
- From: 4.15.0-162.170
- CVE-2020-36385
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-750671-RDMA-cma-Add-missing-locking-to-rdma_accept-99.patch
- From: 4.15.0-162.170
- CVE-2020-36385
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-750672-RDMA-ucma-Fix-the-locking-of-ctx-file.patch
- From: 4.15.0-162.170
- CVE-2020-36385
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-750673-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-wi.patch
- From: 4.15.0-162.170
- CVE-2021-37159
- Description:
net: hso: fix muxed tty registration
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-bionic/4.15.0-163.171/0001-CVE-2021-37159-net-hso-fix-muxed-tty-registration.patch
- From: 4.15.0-163.171
- CVE-2021-37159
- Description:
hso: fix bailout in error case of probe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-bionic/4.15.0-163.171/0002-CVE-2021-37159-hso-fix-bailout-in-error-case-of-probe.patch
- From: 4.15.0-163.171
- CVE-2021-37159
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-bionic/4.15.0-163.171/0003-CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_de.patch
- From: 4.15.0-163.171
- CVE-2021-37159
- Description:
usb: hso: remove the bailout parameter
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-bionic/4.15.0-163.171/0004-CVE-2021-37159-usb-hso-remove-the-bailout-parameter.patch
- From: 4.15.0-163.171
- CVE-2021-3744
- Description:
crypto: ccp/gcm - use const time tag comparison.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-bionic/4.15.0-163.171/CVE-2021-3744-CVE-2021-3764-crypto-ccp-gcm-use-const-time-tag-comparison.patch
- From: 4.15.0-163.171
- CVE-2021-3744
- Description:
crypto: ccp - Validate buffer lengths for copy operations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-bionic/4.15.0-163.171/CVE-2021-3744-CVE-2021-3764-crypto-ccp-Validate-buffer-lengths-for-copy-operations.patch
- From: 4.15.0-163.171
- CVE-2021-3744
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-bionic/4.15.0-163.171/0005-CVE-2021-3744-CVE-2021-3764-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd-62.69.patch
- From: 4.15.0-163.171
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 4.15.0/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/kpatch-add-paravirt-asm-definitions.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2021-0512-HID-make-arrays-usage-and-value-to-be-the-same.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2021-21781-ARM-ensure-the-signal-page-contains-defined-contents.patch
- From:
- CVE-2018-3646 CVE-2018-3620
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.15.0/CVE-2018-3646-CVE-2018-3620-smt_disable.patch
- From: >= 4.14.63
- CVE-2018-3646 CVE-2018-3620
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.15.0/CVE-2018-3646-l1tf-cpu-setup.patch
- From: >= 4.14.63
- CVE-2018-3646 CVE-2018-3620
- Description:
vmx l1d flush
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.15.0/CVE-2018-3646-vmx-l1d-flush-20.22.patch
- From: >= 4.14.63
- CVE-2018-5391
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5391
- Patch: 4.4.0/574984-Revert-net-increase-fragment-memory-usage-limits.patch
- From: kernel-4.4.0-133.159
- CVE-2018-5391
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5391
- Patch: 4.4.0/574984-Revert-net-increase-fragment-memory-usage-limits-kpatch-1.patch
- From: kernel-4.4.0-133.159