- linux-4.9.189-3+deb9u1 (debian9)
- 4.9.303-1
- 2022-05-05 15:34:25
- 2022-05-06 05:00:56
- K20220505_06
- CVE-2019-5489, CVSSv2 Score: 5.5
- Description:
Change mincore() to count "mapped" pages rather than "cached" pages
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-5489
- Patch: 4.9.0/CVE-2019-5489-Change-mincore-to-count-mapped-pages-rather-than-cached-pages.patch
- From: 4.9.168-1+deb9u3
- CVE-2018-14610, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with secs_per_zone
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-14610
- Patch: 4.9.0/CVE-2018-14610.patch
- From: 4.9.144-3.1~deb8u1
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: Do not release the page inside mmu_set_spte() (CVE-2018-12207 prerequirement)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.9.0/cve-2018-12207-01-x86-kvm-Do-not-release-the-page-inside-mmu_set_spte.patch
- From: 4.9.189-3+deb9u2
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
CVE-2018-12207 prerequirement - code cleanup and simplification
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.9.0/cve-2018-12207-02-cleanup.patch
- From: 4.9.189-3+deb9u2
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (CVE-2018-12207 prerequirement)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.9.0/cve-2018-12207-03-x86-kvm-change-kvm_mmu_page_get_gfn-BUG_ON-to-WARN_ON.patch
- From: 4.9.189-3+deb9u2
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: vmx,svm: always run with EFER.NXE=1 when shadow paging is active (CVE-2018-12207 prerequirement)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.9.0/cve-2018-12207-04-kvm-vmx-svm-always-run-with-EFER.NXE-1-when-shadow-paging-is-active.patch
- From: 4.9.189-3+deb9u2
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: Convert kvm_lock to a mutex (CVE-2018-12207 prerequirement)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.9.0/cve-2018-12207-05-kvm-Convert-kvm_lock-to-a-mutex.patch
- From: 4.9.189-3+deb9u2
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.9.0/cve-2018-12207-06-mitigation.patch
- From: 4.9.189-3+deb9u2
- CVE-2019-0155, CVSSv2 Score: 7.8
- Description:
drm/i915: Add support for mandatory cmdparsing
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0155
- Patch: 4.9.0/i915/0001-drm-i915-kick-out-cmd_parser-specific-structs-from-i.patch
- From: linux-4.9.189-3+deb9u2~deb8u1
- Description:
- CVE:
- Patch: 4.9.0/i915/0002-drm-i915-cleanup-use-of-INSTR_CLIENT_MASK.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0003-drm-i915-return-EACCES-for-check_cmd-failures.patch
- From:
- CVE-2019-0154, CVSSv2 Score: 5.5
- Description:
drm/i915/gen8+: Add RC6 CTX corruption WA
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0154
- Patch: 4.9.0/i915/0004-drm-i915-don-t-whitelist-oacontrol-in-cmd-parse-kpatch.patch
- From: linux-4.9.189-3+deb9u2~deb8u1
- Description:
- CVE:
- Patch: 4.9.0/i915/0005-drm-i915-Use-the-precomputed-value-for-whether--kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0006-drm-i915-cmdparser-Limit-clflush-to-active-cacheline.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0007-drm-i915-gtt-Add-read-only-pages-to-gen8_pte_encode.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0008-drm-i915-gtt-Read-only-pages-for-insert_entries-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0009-drm-i915-gtt-Disable-read-only-support-under-GV-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0010-drm-i915-Prevent-writing-into-a-read-only-objec-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0011-drm-i915-cmdparser-Check-reg_table_count-before-dere.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0012-drm-i915-cmdparser-Do-not-check-past-the-cmd-length.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0013-drm-i915-Silence-smatch-for-cmdparser.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0014-drm-i915-Move-engine-needs_cmd_parser-to-engine-kpatch.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Rename gen7 cmdparser tables
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8987-drm-drm-i915-Rename-gen7-cmdparser-tables.patch
- From: 3.10.0-1062.4.2.el7
- Description:
- CVE:
- Patch: 4.9.0/i915/0002-drm-i915-Disable-Secure-Batches-for-gen6.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915: Remove Master tables from cmdparser
- CVE: https://access.redhat.com/security/cve/CVE-2019-0154
- Patch: 3.10.0/i915/8989-drm-drm-i915-Remove-Master-tables-from-cmdparser-693.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-0155, CVSSv2 Score: 7.8
- Description:
drm/i915: Add support for mandatory cmdparsing
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0155
- Patch: 4.9.0/i915/0004-drm-i915-Add-support-for-mandatory-cmdparsing-kpatch.patch
- From: linux-4.9.189-3+deb9u2~deb8u1
- Description:
- CVE:
- Patch: 4.9.0/i915/0005-drm-i915-Support-ro-ppgtt-mapped-cmdparser-shadow-bu-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0006-drm-i915-Allow-parsing-of-unsized-batches.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0007-drm-i915-Add-gen9-BCS-cmdparsing-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0008-drm-i915-cmdparser-Use-explicit-goto-for-error-paths.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0009-drm-i915-cmdparser-Add-support-for-backward-jump-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0010-drm-i915-cmdparser-Ignore-Length-operands-during-com-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch
- From:
- CVE-2019-0154, CVSSv2 Score: 5.5
- Description:
drm/i915/gen8+: Add RC6 CTX corruption WA
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0154
- Patch: 4.9.0/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA-kpatch.patch
- From: linux-4.9.189-3+deb9u2~deb8u1
- CVE-2019-0155, CVSSv2 Score: 8.8
- Description:
[drm] drm/i915/cmdparser: Fix jump whitelist clearing
- CVE: https://access.redhat.com/security/cve/CVE-2019-0155
- Patch: 3.10.0/i915/9000-drm-drm-i915-cmdparser-Fix-jump-whitelist-clearing-1062.4.1.patch
- From: 3.10.0-1062.4.3.el7
- Description:
- CVE:
- Patch: 4.9.0/i915/drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hang-kpatch.patch
- From:
- CVE-2019-15917, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15917
- Patch: 4.9.0/CVE-2019-15917.patch
- From: 4.9.210-1
- CVE-2019-14814, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14814
- Patch: 4.9.0/CVE-2019-14814.patch
- From: 4.9.210-1
- CVE-2019-14815, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14815
- Patch: 4.9.0/CVE-2019-14815.patch
- From: 4.9.210-1
- CVE-2019-14816, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14816
- Patch: 4.9.0/CVE-2019-14816.patch
- From: 4.9.210-1
- CVE-2018-20976, CVSSv2 Score: 7.8
- Description:
xfs: clear sb->s_fs_info on mount failure
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20976.html
- Patch: 4.15.0/CVE-2018-20976-xfs-clear-sb-s_fs_info-on-mount-failure.patch
- From: 4.15.0-65.74
- CVE-2018-21008, CVSSv2 Score: 4.9
- Description:
rsi: add fix for crash during assertions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2019-21008.html
- Patch: 4.4.0/CVE-2018-21008-rsi-add-fix-for-crash-during-assertions.patch
- From: 4.4.0-166.195
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: add more paranoia checking in ext4_expand_extra_isize handling
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19767
- Patch: 4.9.0/CVE-2019-19767.patch
- From: 4.9.210-1
- CVE-2019-19537, CVSSv2 Score: 4.2
- Description:
USB: core: Fix races in character device registration and deregistraion
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 4.9.0/CVE-2019-19537.patch
- From: 4.9.210-1
- CVE-2019-19536, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19536
- Patch: 3.16.0/cve-2019-19536-peak_usb-fix-info-leaks.patch
- From: 3.16.81-1
- CVE-2019-19535, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 4.9.0/CVE-2019-19535.patch
- From: 4.9.210-1
- CVE-2019-19534, CVSSv2 Score: 2.4
- Description:
can: peak_usb: fix slab info leak
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19534
- Patch: 4.9.0/CVE-2019-19534.patch
- From: 4.9.210-1
- CVE-2019-19533, CVSSv2 Score: 2.4
- Description:
media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19533
- Patch: 3.16.0/cve-2019-19533-media-ttusb_dec-fix-info-leak.patch
- From: 3.16.81-1
- CVE-2019-19532, CVSSv2 Score: 6.8
- Description:
HID: Fix assumption that devices have inputs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19532
- Patch: 5.0.0/CVE-2019-19532-HID-Fix-assumption-that-devices-have-inputs.patch
- From: 5.0.0-1028.30~18.04.1
- CVE-2019-19531, CVSSv2 Score: 6.8
- Description:
usb: yurex: Fix use-after-free in yurex_delete
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19531
- Patch: 3.16.0/cve-2019-19531-yurex-fix-use-after-free-in-yurex_delete.patch
- From: 3.16.81-1
- CVE-2019-19530, CVSSv2 Score: 4.6
- Description:
usb: cdc-acm: make sure a refcount is taken early enough
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19530
- Patch: 4.9.0/CVE-2019-19530.patch
- From: 4.9.210-1
- CVE-2019-19527, CVSSv2 Score: 4.6
- Description:
HID: hiddev: avoid opening a disconnected device
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19527
- Patch: 3.16.0/cve-2019-19527-usb-hid-avoid-opening-disconnected-device.patch
- From: 3.16.81-1
- CVE-2019-19525, CVSSv2 Score: 4.6
- Description:
ieee802154: atusb: fix use-after-free at disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19524
- Patch: 4.9.0/CVE-2019-19525.patch
- From: 4.9.210-1
- CVE-2019-19524, CVSSv2 Score: 4.6
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19524
- Patch: 5.0.0/cve-2019-19524-ff-memless-kill-timer-in-destroy.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19523, CVSSv2 Score: 4.6
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19523
- Patch: 3.16.0/cve-2019-19523-adutux-fix-use-after-free-on-disconnect.patch
- From: 3.16.81-1
- CVE-2019-19447, CVSSv2 Score: 7.8
- Description:
ext4: work around deleting a file with i_nlink == 0 safely
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19447
- Patch: 4.9.0/CVE-2019-19447.patch
- From: 4.9.210-1
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19332
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19332-KVM-x86-fix-out-of-bounds-write-in-KVM_GET_EMULATED_.patch
- From: 4.4.0-173.203
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
Revert "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)"
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19332
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19332-Revert-KVM-x86-fix-out-of-bounds-write-in-KVM_GET_EM.patch
- From: 4.4.0-173.203
- CVE-2019-19227, CVSSv2 Score: 5.5
- Description:
appletalk: Fix potential NULL pointer dereference in unregister_snap_client
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19227
- Patch: 4.9.0/CVE-2019-19227-2-kpatch.patch
- From: 4.9.210-1
- CVE-2019-19068, CVSSv2 Score: 7.5
- Description:
rtl8xxxu: prevent leaking urb
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19068
- Patch: 4.9.0/CVE-2019-19068.patch
- From: 4.9.210-1
- CVE-2019-19066, CVSSv2 Score: 7.5
- Description:
scsi: bfa: release allocated memory in case of error
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19066
- Patch: 3.16.0/cve-2019-19066-scsi-bfa-release-allocated-memory-on-errors.patch
- From: 3.16.81-1
- CVE-2019-19063, CVSSv2 Score: 7.5
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19063
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19063-rtlwifi-prevent-memory-leak-in-rtl_usb_probe.patch
- From: kernel-4.4.0-173.203
- CVE-2019-19062, CVSSv2 Score: 7.5
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19062
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19062-crypto-user-fix-memory-leak-in-crypto_report.patch
- From: kernel-4.4.0-173.203
- CVE-2019-19057, CVSSv2 Score: 3.3
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19057
- Patch: 4.9.0/CVE-2019-19057.patch
- From: 4.9.210-1
- CVE-2019-19056, CVSSv2 Score: 7.5
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19056
- Patch: 4.9.0/CVE-2019-19056.patch
- From: 4.9.210-1
- CVE-2019-19052, CVSSv2 Score: 7.5
- Description:
can: gs_usb: gs_can_open(): prevent memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19052
- Patch: 5.0.0/cve-2019-19052-can-gs_can_open-revent-memory-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19051, CVSSv2 Score: 7.5
- Description:
wimax: i2400: Fix memory leak in i2400m_op_rfkill_sw_toggle
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19051
- Patch: 5.0.0/cve-2019-19051-fix-memory-leak-in-i2400_op_rfkill_sw_toggle.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19049, CVSSv2 Score: 7.5
- Description:
of: unittest: fix memory leak in attach_node_and_children
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19049
- Patch: 4.9.0/CVE-2019-19049.patch
- From: 4.9.210-1
- CVE-2019-19037, CVSSv2 Score: 5.5
- Description:
ext4: fix ext4_empty_dir() for directories with holes
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19037
- Patch: 4.9.0/CVE-2019-19037.patch
- From: 4.9.210-1
- CVE-2019-18806, CVSSv2 Score: 5.5
- Description:
net: qlogic: Fix memory leak in ql_alloc_large_buffers
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-18806
- Patch: 4.9.0/CVE-2019-18806.patch
- From: 4.9.210-1
- CVE-2019-18683, CVSSv2 Score: 7.0
- Description:
media: vivid: Fix wrong locking that causes race conditions on streaming stop
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-18683
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-18683-media-vivid-Fix-wrong-locking-that-causes-race-conditions-on-streaming-stop.patch
- From: kernel-4.4.0-173.203
- CVE-2019-17666, CVSSv2 Score: 8.8
- Description:
rtlwifi: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17666.html
- Patch: 4.15.0/CVE-2019-17666-UBUNTU-SAUCE-rtlwifi-Fix-potential-overflow-on-P2P-code.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17133, CVSSv2 Score: 9.8
- Description:
fixed buffer overflow in cfg80211_mgd_wext_giwessid() in net/wireless/wext-sme.c which does not reject a long SSID IE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17133.html
- Patch: 4.15.0/CVE-2019-17133.patch
- From: kernel-4.15.0-72.81
- CVE-2019-17075, CVSSv2 Score: 7.5
- Description:
RDMA/cxgb4: Do not dma memory off of the stack
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-17075
- Patch: 4.9.0/CVE-2019-17075.patch
- From: 4.9.210-1
- CVE-2019-17056, CVSSv2 Score: 3.3
- Description:
nfc: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17056.html
- Patch: 4.15.0/CVE-2019-17056-nfc-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17055, CVSSv2 Score: 3.3
- Description:
enforce CAP_NET_RAW for AF_ISDN sockets
- CVE: https://linux.oracle.com/cve/CVE-2019-17055.html
- Patch: 4.1.12/cve-2019-17055-misdn-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: 4.1.12-124.33.4
- CVE-2019-17054, CVSSv2 Score: 3.3
- Description:
appletalk: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17054.html
- Patch: 4.15.0/CVE-2019-17054-appletalk-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17053, CVSSv2 Score: 3.3
- Description:
ieee802154: enforce CAP_NET_RAW for raw sockets
- CVE: https://linux.oracle.com/cve/CVE-2019-17053.html
- Patch: 4.1.12/cve-2019-17053-ieee802154-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: 4.1.12-124.33.4
- CVE-2019-16746, CVSSv2 Score: 9.8
- Description:
nl80211: fixed buffer overflow when handling beacon settings
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.9.0/CVE-2019-16746.patch
- From: 4.4.0-168.197
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of buffer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15505
- Patch: 4.15.0/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of-b.patch
- From: 4.15.0-66.75
- CVE-2019-15291, CVSSv2 Score: 4.6
- Description:
media: b2c2-flexcop-usb: add sanity checking
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15291
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-15291-media-b2c2-flexcop-usb-add-sanity-checking.patch
- From: kernel-4.4.0-173.203
- CVE-2019-15217, CVSSv2 Score: 4.6
- Description:
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15217
- Patch: 4.4.0/CVE-2019-15217-media-usb-zr364xx-Fix-KASAN-null-ptr-deref-Read-in-zr364xx_vidioc_querycap.patch
- From:
- CVE-2019-15098, CVSSv2 Score: 4.6
- Description:
ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15098.html
- Patch: 4.15.0/CVE-2019-15098-ath6kl-fix-a-NULL-ptr-deref-bug-in-ath6kl_usb_alloc_urb_from_pipe.patch
- From: kernel-4.15.0-67.76
- CVE-2019-14901, CVSSv2 Score: 9.8
- Description:
fix a heap overflow in mmwifiex_process_tdls_action_frame()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14901
- Patch: 4.9.0/CVE-2019-14901.patch
- From: 4.9.210-1
- CVE-2019-14897, CVSSv2 Score: 9.8
- Description:
Heap Overflow in add_ie_rates() function of Marvell Wifi Driver in Linux kernel
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14897
- Patch: 5.0.0/cve-2019-14896-14897-various-issues-in-marvell-libertas-driver.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-14895, CVSSv2 Score: 9.8
- Description:
mwifiex: fix possible heap overflow in mwifiex_process_country_ie()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14895
- Patch: 5.0.0/cve-2019-14895-heap-overflow-in-mwifiex-driver.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-10220, CVSSv2 Score: 8.8
- Description:
Make filldir[64]() verify the directory entry filename is valid
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-10220
- Patch: 4.9.0/CVE-2019-10220.patch
- From: 4.9.210-1
- CVE-2018-13094, CVSSv2 Score: 5.5
- Description:
OOPS may occur for a corrupted xfs image
- CVE: https://access.redhat.com/security/cve/cve-2018-13094
- Patch: 4.15.0/CVE-2018-13094.patch
- From: >4.15.0
- CVE-2018-13093, CVSSv2 Score: 4.3
- Description:
xfs: validate cached inodes are free when allocated
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13093
- Patch: 4.14.0/xfs_validate_cached_inodes_are_free_when_allocated.patch
- From: v4.14.62
- CVE-2019-20096, CVSSv2 Score: 5.5
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20096
- Patch: 4.9.0/CVE-2019-20096.patch
- From: 4.9.210-1
- CVE-2019-19965, CVSSv2 Score: 4.7
- Description:
scsi: libsas: stop discovering if oob mode is disconnected
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19965
- Patch: 3.16.0/cve-2019-19965-scsi-libsas-stop-discovering-if-oob-mode-is-disconnected.patch
- From: 3.16.81-1
- CVE-2019-19947, CVSSv2 Score: 4.6
- Description:
Uninitialized Kernel memory can leak to USB devices.
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19947
- Patch: 4.9.0/CVE-2019-19947.patch
- From: 4.9.210-1
- CVE-2019-14615, CVSSv2 Score: 5.5
- Description:
drm/i915/gen9: Clear residual context state on context switch
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14615
- Patch: 4.9.0/CVE-2019-14615.patch
- From: 4.9.210-1
- Description:
- CVE:
- Patch: 4.9.0/CVE-2019-14615-kpatch.patch
- From:
- CVE-2019-18809, CVSSv2 Score: 8.5
- Description:
media: usb: fix memory leak in af9005_identify_state
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-18809
- Patch: 4.9.0/CVE-2019-18809.patch
- From: 4.9.210-1
- CVE-2019-17052, CVSSv2 Score: 3.3
- Description:
ax25: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17052.html
- Patch: 4.15.0/CVE-2019-17052-ax25-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-18282, CVSSv2 Score: 5.3
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-18282
- Patch: 4.9.0/CVE-2019-18282.patch
- From: 4.9.210-1
- CVE-2019-18282, CVSSv2 Score: 5.3
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-18282
- Patch: 4.9.0/CVE-2019-18282-kpatch.patch
- From: 4.9.210-1
- CVE-2019-2215, CVSSv2 Score: 7.8
- Description:
ANDROID: binder: remove waitqueue when thread exits.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-2215.html
- Patch: 4.4.0/CVE-2019-2215-ANDROID-binder-remove-waitqueue-when-thread-exits.patch
- From: 4.4.0-168.197
- CVE-2020-11565, CVSSv2 Score: 7.8
- Description:
stack-based out-of-bounds write
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11565
- Patch: 4.9.0/CVE-2020-11565.patch
- From: 4.9.189-3+deb9u2
- CVE-2020-8428, CVSSv2 Score: 7.1
- Description:
do_last(): fetch directory ->i_mode and ->i_uid before it's too late
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-8428
- Patch: 4.9.0/CVE-2020-8428-1.patch
- From: 4.9.212-36
- CVE-2020-8428, CVSSv2 Score: 7.1
- Description:
do_last(): fetch directory ->i_mode and ->i_uid before it's too late
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-8428
- Patch: 4.9.0/CVE-2020-8428-2.patch
- From: 4.9.212-36
- CVE-2020-10942, CVSSv2 Score: 5.3
- Description:
kernel stack corruption via crafted system calls
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10942
- Patch: 4.9.0/CVE-2020-10942.patch
- From: 4.9.210-1
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: nVMX: Don't emulate instructions in guest mode
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-2732
- Patch: 4.9.0/CVE-2020-2732-0001-KVM-nVMX-Don-t-emulate-instructions-in-guest-mode.patch
- From: 4.9.215-36.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: nVMX: Refactor IO bitmap checks into helper function
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-2732
- Patch: 4.9.0/CVE-2020-2732-0002-KVM-nVMX-Refactor-IO-bitmap-checks-into-helper-funct.patch
- From: 4.9.215-36.el7
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
KVM: nVMX: Check IO instruction VM-exit conditions
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-2732
- Patch: 4.9.0/CVE-2020-2732-0003-KVM-nVMX-Check-IO-instruction-VM-exit-conditions.patch
- From: 4.9.215-36.el7
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: Fix potential deadlock between delete & sysfs ops (CVE-2019-19768 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19768
- Patch: 4.9.0/CVE-2019-19768-blktrace-fix-potential-deadlock-between-delete-sysfs.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: Fix potential deadlock between delete & sysfs ops (CVE-2019-19768 dependency, adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19768
- Patch: 4.9.0/CVE-2019-19768-blktrace-fix-potential-deadlock-between-delete-sysfs-kpatch.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix unlocked access to init/start-stop/teardown (CVE-2019-19768 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19768
- Patch: 4.9.0/CVE-2019-19768-blktrace-fix-unlocked-access-to-init-start-stop-tear.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix trace mutex deadlock (CVE-2019-19768 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19768
- Patch: 4.9.0/CVE-2019-19768-blktrace-fix-trace-mutex-deadlock.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19768
- Patch: 4.9.0/CVE-2019-19768-blktrace-protect-q-blk_trace-with-rcu.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix dereference after null check
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19768
- Patch: 4.9.0/CVE-2019-19768-blktrace-fix-dereference-after-null-check.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-11494, CVSSv2 Score: 4.4
- Description:
slcan: Don't transmit uninitialized stack data in padding
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11494
- Patch: 4.1.12/CVE-2020-11494.patch
- From: 4.1.12-124.38.2
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: don't perform block validity checks on the journal inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-ext4-don-t-perform-block-validity-checks-on-the-jour.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: avoid declaring fs inconsistent due to invalid file handles
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-ext4-avoid-declaring-fs-inconsistent-due-to-invalid-.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: protect journal inode's blocks using block_validity
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-ext4-protect-journal-inode-s-blocks-using-block_vali.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: fix block validity checks for journal inodes using indirect blocks
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-ext4-fix-block-validity-checks-for-journal-inodes-us.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: avoid declaring fs inconsistent due to invalid file handles
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-ext4-fix-special-inode-number-checks-in-__ext4_iget.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: don't perform block validity checks on the journal inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-kpatch.patch
- From: 4.9.210-1+deb9u1
- Description:
- CVE:
- Patch: 4.9.0/cve-2019-19319-kpatch-fix-rbtree.patch
- From:
- Description:
- CVE:
- Patch: 4.9.0/cve-2019-19319-kpatch-fix-races.patch
- From:
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: don't perform block validity checks on the journal inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-kpatch-rbtree-copy.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: properly handle multiple messages in selinux_netlink_send()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10751
- Patch: 4.9.0/cve-2020-10751-selinux-properly-handle-multiple-messages-in-selinux.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-20806, CVSSv2 Score: 4.4
- Description:
media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20806
- Patch: 4.9.0/cve-2019-20806-tw5864-fix-possible-NULL-pointer-dereference.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-20811, CVSSv2 Score: 5.5
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20811
- Patch: 4.9.0/cve-2019-20811-call-dev_hold-if-kobject_init_and_add-success.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
cfg80211/mac80211: make ieee80211_send_layer2_update a public function
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 4.9.0/cfg80211-mac80211-make-ieee80211_send_layer2_update-a-public-function-alt-4.9.patch
- From: 4.9.212-36.el7
- CVE-2020-10757, CVSSv2 Score: N/A
- Description:
mm: Fix mremap not considering huge pmd devmap
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10757
- Patch: 4.9.0/cve-2020-10757-fix-mremap-not-considering-huge-pmd-devmap.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-12114, CVSSv2 Score: 4.7
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12114
- Patch: 4.9.0/cve-2020-12114-fs-namespace-fix-mountpoint-ref-counter-race.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12770
- Patch: 4.9.0/cve-2020-12770-scsi-sg-add-sg_remove_request-in-sg_write.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-13143, CVSSv2 Score: 6.5
- Description:
USB: gadget: fix illegal array access in binding with UDC
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-13143
- Patch: 4.9.0/cve-2020-13143-usb-gadget-fix-illegal-array-access.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-12464, CVSSv2 Score: 6.7
- Description:
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12464
- Patch: 4.9.0/cve-2020-12464-usb-fix-free-while-in-use-bug.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-8648
- Patch: 4.9.0/cve-2020-8648-vt-selection-close-sel_buffer-race.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-9383, CVSSv2 Score: 7.1
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-2732
- Patch: 4.9.0/CVE-2020-9383-0001-floppy-check-FDC-index-for-errors-before-assigning-i.patch
- From: 4.9.215-36.el7
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 4.9.0/CVE-2019-5108-mac80211-Do-not-send-Layer-2-Update-frame-before-authorization--alt-4.9.patch
- From: 4.9.212-36.el7
- CVE-2020-10732, CVSSv2 Score: N/A
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10732
- Patch: 4.9.0/cve-2020-10732-binfmt_elf-allocate-initialized-memory.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-12652, CVSSv2 Score: 4.1
- Description:
scsi: mptfusion: Fix double fetch bug in ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12652
- Patch: 4.9.0/cve-2020-12652-scsi-mpfusion-fix-double-fetch-bug.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: fixed possible NULL pointer dereference issue while importing some category bitmap into SELinux
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 4.14.0/CVE-2020-10711.patch
- From: 4.14.177-139.254.amzn2
- CVE-2019-19462, CVSSv2 Score: 5.5
- Description:
include/linux/relay.h: fix percpu annotation in struct rchan
- CVE: https://access.redhat.com/security/cve/CVE-2019-19462
- Patch: 4.14.0/CVE-2019-19462.patch
- From: 4.14.35-1902.302.2
- CVE-2020-11608, CVSSv2 Score: 4.3
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11608
- Patch: 4.19.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: 4.19.118-2
- CVE-2020-11609, CVSSv2 Score: 4.3
- Description:
media: stv06xx: add missing descriptor sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11609
- Patch: 4.19.0/CVE-2020-11609-media-stv06xx-add-missing-descriptor-sanity-checks.patch
- From: 4.19.118-2
- CVE-2020-11668, CVSSv2 Score: 7.1
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11668
- Patch: 4.19.0/CVE-2020-11668-media-xirlink_cit-add-missing-descriptor-sanity-chec.patch
- From: 4.19.118-2
- CVE-2020-12653, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12653
- Patch: 4.19.0/CVE-2020-12653-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 4.19.118-2
- CVE-2020-12654, CVSSv2 Score: 9.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12654
- Patch: 4.19.0/CVE-2020-12654-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_ret.patch
- From: 4.19.118-2
- CVE-2020-8647 CVE-2020-8649, CVSSv2 Score: 6.1
- Description:
vgacon: Fix a UAF in vgacon_invert_region
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-8649
- Patch: 4.19.0/CVE-2020-8647-CVE-2020-8649-vgacon-Fix-a-UAF-in-vgacon_invert_region.patch
- From: 4.19.118-2
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2020-10766, CVSSv2 Score: 5.5
- Description:
x86/speculation: Prevent rogue cross-process SSBD shutdown
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10766
- Patch: 4.9.0/652292-x86-speculation-Prevent-rogue-cross-process-SSBD-s.patch
- From: 4.9.228
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Change misspelled STIPB to STIBP
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10767
- Patch: 4.9.0/652306-x86-speculation-Change-misspelled-STIPB-to-STIBP.patch
- From: 4.9.228
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10767
- Patch: 4.9.0/652308-x86-speculation-Avoid-force-disabling-IBPB-based-o.patch
- From: 4.9.228
- CVE-2020-10768, CVSSv2 Score: 5.5
- Description:
x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10768
- Patch: 4.9.0/652309-x86-speculation-PR_SPEC_FORCE_DISABLE-enforcement-.patch
- From: 4.9.228
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS. (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10767
- Patch: 4.9.0/652308-x86-speculation-Avoid-force-disabling-IBPB-based-o-kpatch-1.patch
- From: 4.9.228
- Description:
- CVE:
- Patch: spectre_v2.patch
- From:
- CVE-2020-14305, CVSSv2 Score: 8.1
- Description:
kernel: memory corruption in Voice over IP nf_conntrack_h323 module
- CVE: https://access.redhat.com/security/cve/cve-2020-14305
- Patch: 3.10.0/CVE-2020-14305.patch
- From: >kernel-3.10.0-1127.13.1.el7
- CVE-2018-9517, CVSSv2 Score: 6.7
- Description:
l2tp: pass tunnel pointer to ->session_create()
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-9517
- Patch: 4.9.0/cve-2018-9517-l2tp-pass-tunnel-pointer.patch
- From: linux-4.9.228-1
- CVE-2020-0009, CVSSv2 Score: 5.5
- Description:
staging: android: ashmem: Disallow ashmem memory from being remapped
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-0009
- Patch: 4.19.0/CVE-2020-0009-staging-android-ashmem-Disallow-ashmem-memory-from-b.patch
- From: 4.19.118-2
- CVE-2020-10690, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-10690.patch
- From:
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12826
- Patch: 4.4.0/581442-signal-Extend-exec_id-to-64bits.patch
- From: 4.4.0-180.210
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12826
- Patch: 4.4.0/581442-signal-Extend-exec_id-to-64bits-kpatch-1.patch
- From: 4.4.0-180.210
- CVE-2020-12826, CVSSv2 Score: 5.3
- Description:
signal: Extend exec_id to 64bits (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12826
- Patch: 4.4.0/581442-signal-Extend-exec_id-to-64bits-kpatch-2.patch
- From: 4.4.0-180.210
- CVE-2020-12769, CVSSv2 Score: 5.5
- Description:
spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12769
- Patch: 4.9.0/cve-2020-12769-spi-spi-dw-Add-lock-protect-dw_spi-rx-tx-to-prevent-.patch
- From: linux-4.9.228-1
- CVE-2019-20810, CVSSv2 Score: 5.5
- Description:
media: go7007: fix a miss of snd_card_free
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20810
- Patch: 4.9.0/cve-2019-20810-media-go7007-fix-a-miss-of-snd_card_free.patch
- From: linux-4.9.228-1
- CVE-2020-13974, CVSSv2 Score: 7.8
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-13974
- Patch: 4.9.0/cve-2020-13974-vt-keyboard-avoid-signed-integer-overlow.patch
- From: linux-4.9.228-1
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.9.0/CVE-2020-29568-xsa349-kpatch.patch
- From: linux-4.9.258-1
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.9.0/CVE-2020-29568-xsa349-restart-xenwatch-thread-kpatch.patch
- From: linux-4.9.258-1
- CVE-2019-19073, CVSSv2 Score: 4.0
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19073
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-19073-ath9k_htc-release-allocated-buffer-if-timed-out.patch
- From: 4.15.0-118.119
- CVE-2019-19074, CVSSv2 Score: 7.5
- Description:
ath9k: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19074
- Patch: ubuntu-bionic/4.15.0-118.119/CVE-2019-19074-ath9k-release-allocated-buffer-if-timed-out.patch
- From: 4.15.0-118.119
- CVE-2019-19448, CVSSv2 Score: 7.8
- Description:
btrfs only search for left_info if there is no right_info
- CVE: https://access.redhat.com/security/cve/CVE-2019-19448
- Patch: 4.19.0/CVE-2019-19448.patch
- From: linux-4.19.146-1
- CVE-2019-9445, CVSSv2 Score: 4.4
- Description:
f2fs: check if file namelen exceeds max value
- CVE: https://access.redhat.com/security/cve/CVE-2019-9445
- Patch: 4.14.0/cve-2019-9445-f2fs-check-if-name-length-too-big.patch
- From: 4.14.35-1902.302.2
- CVE-2020-12351 CVE-2020-25661, CVSSv2 Score: 7.5
- Description:
[net] Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel
- CVE: https://access.redhat.com/security/cve/cve-2020-25661
- Patch: 4.18.0/CVE-2020-12351-Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-12352 CVE-2020-25662, CVSSv2 Score: 5.3
- Description:
[net] Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-25662
- Patch: 4.18.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-12655, CVSSv2 Score: 5.5
- Description:
xfs: add agf freeblocks verify in xfs_agf_verify
- CVE: https://access.redhat.com/security/cve/CVE-2020-12655
- Patch: 4.14.0/cve-2020-12655-xfs-add-agf-freeblocks-verify.patch
- From: 4.14.35-1902.304.6
- CVE-2020-12771, CVSSv2 Score: 5.1
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://access.redhat.com/security/cve/CVE-2020-12771
- Patch: 4.14.0/cve-2020-12771-bcache-fix-potential-deadlock.patch
- From: 4.14.186-110.268.amzn1
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.9.0/cve-2020-12888-4.9.210-1.patch
- From: 4.9.240-1
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.14.0/cve-2020-12888-kpatch-1.patch
- From: 4.14.35-1902.305.0
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2020-14356 CVE-2020-25220, CVSSv2 Score: 7.8
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.9.0/CVE-2020-14356.patch
- From: 4.9.240-1
- Description:
net/packet: fix overflow in tpacket_rcv
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14386.html
- Patch: 4.15.0/CVE-2020-14386.patch
- From: 4.15.0-117.118
- CVE-2020-14390, CVSSv2 Score: 5.7
- Description:
fbcon: remove soft scrollback code
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.9.0/CVE-2020-14390.patch
- From: 4.9.240-1
- CVE-2020-14390, CVSSv2 Score: 5.7
- Description:
fbcon: remove soft scrollback code
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.9.0/CVE-2020-14390-fbcon-remove-now-unusued-softback_lines-cursor-argum.patch
- From: 4.9.240-1
- CVE-2020-14390, CVSSv2 Score: 5.7
- Description:
fbcon: remove soft scrollback code (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.9.0/CVE-2020-14390-kpatch.patch
- From: 4.9.240-1
- CVE-2020-15393, CVSSv2 Score: 5.5
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-15393
- Patch: 4.19.0/CVE-2020-15393.patch
- From: 4.19.131-1
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: update the net random state on interrupt and activity
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-16166
- Patch: 4.9.0/CVE-2020-16166.patch
- From: 4.9.240-1
- CVE-2020-24490, CVSSv2 Score: 7.1
- Description:
Bluetooth: fix kernel oops in store_pending_adv_report
- CVE: https://access.redhat.com/security/cve/CVE-2020-24490
- Patch: 4.9.0/CVE-2020-24490.patch
- From: 4.9.240-1
- CVE-2020-25211, CVSSv2 Score: 7.0
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25212
- Patch: 4.4.0/CVE-2020-25212-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: 4.4.0-190.220
- CVE-2020-25284, CVSSv2 Score: 5.5
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.14.0/cve-2020-25284-rbd-require-global-CAP_SYS_ADMIN.patch
- From: 4.14.35-2025.401.4.el7uek
- CVE-2020-25285, CVSSv2 Score: 7.0
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.19.0/cve-2020-25285-hugetlb-fix-a-race-between-sysctl-handlers.patch
- From: linux-4.19.146-1
- CVE-2020-25643, CVSSv2 Score: 7.2
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25643
- Patch: 4.9.0/CVE-2020-25643.patch
- From: 4.9.240-1
- CVE-2020-26088, CVSSv2 Score: 4.4
- Description:
net/nfc/rawsock.c: add CAP_NET_RAW check
- CVE: https://access.redhat.com/security/cve/CVE-2020-26088
- Patch: 4.19.0/CVE-2020-26088-net-nfc-rawsock.c-add-CAP_NET_RAW-check.patch
- From: linux-4.19.146-1
- CVE-2021-27363 CVE-2021-27364 CVE-2021-27365, CVSSv2 Score: 7.8
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-27363
- Patch: debian9/4.9.258-1/CVE-2021-27365-CVE-2021-27364-CVE-2021-27363-sysfs-add-sysfs_emit-and-sysfs_emit_at-to-format-sys.patch
- From: 4.9.258-1
- CVE-2021-27363, CVSSv2 Score: 3.6
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-27363
- Patch: debian9/4.9.258-1/CVE-2021-27363-27364-scsi-iscsi-restrict-sessions-and-handles-to-admin-capabilities.patch
- From: 4.9.258-1
- CVE-2021-27363 CVE-2021-27364 CVE-2021-27365, CVSSv2 Score: 7.8
- Description:
scsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-27363
- Patch: debian9/4.9.258-1/CVE-2021-27365-CVE-2021-27364-CVE-2021-27363-scsi-iscsi-ensure-sysfs-attributes-are-limited-to-pa.patch
- From: 4.9.258-1
- CVE-2021-27363 CVE-2021-27364 CVE-2021-27365, CVSSv2 Score: 7.8
- Description:
scsi: Verify lengths on passthrough PDUs
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-27363
- Patch: debian9/4.9.258-1/CVE-2021-27365-CVE-2021-27364-CVE-2021-27363-scsi-iscsi-verify-lengths-on-passthrough-PDUs.patch
- From: 4.9.258-1
- CVE-2021-26930 CVE-2021-26931, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26931
- Patch: debian9/4.9.258-1/CVE-2021-26930-CVE-2021-26931-xsa365-linux-189.patch
- From: linux-4.9.258-1
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-28038
- Patch: debian9/4.9.258-1/CVE-2021-28038-xsa367-linux.patch
- From: linux-4.9.258-1
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26931
- Patch: debian9/4.9.258-1/CVE-2021-26931-xsa362-linux-2.patch
- From: linux-4.9.258-1
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26931
- Patch: debian9/4.9.258-1/CVE-2021-26931-xsa362-linux-3.patch
- From: linux-4.9.258-1
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26932
- Patch: debian9/4.9.258-1/CVE-2021-26932-xsa361-linux-1.patch
- From: linux-4.9.258-1
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26932
- Patch: debian9/4.9.258-1/CVE-2021-26932-xsa361-linux-2.patch
- From: linux-4.9.258-1
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-26932
- Patch: debian9/4.9.258-1/CVE-2021-26932-xsa361-linux-3-4.patch
- From: linux-4.9.258-1
- CVE-2021-3178, CVSSv2 Score: 6.5
- Description:
nfsd4: readdirplus shouldn't return parent of export
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3178
- Patch: debian9/4.9.258-1/0010-CVE-2021-3178-nfsd4-readdirplus-shouldn-t-return-parent-of-export.patch
- From: linux-4.9.258-1
- CVE-2020-36158, CVSSv2 Score: 6.5
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
- CVE: https://access.redhat.com/security/cve/CVE-2020-36158
- Patch: debian9/4.9.258-1/0004-CVE-2020-36158-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: linux-4.9.258-1
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
target: simplify XCOPY wwn->se_dev lookup helper
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28374
- Patch: debian9/4.9.258-1/0006-CVE-2020-28374-target-simplify-XCOPY-wwn-se_dev-lookup-helper.patch
- From: linux-4.9.258-1
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
target: use XCOPY segment descriptor CSCD IDs
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28374
- Patch: debian9/4.9.258-1/0007-CVE-2020-28374-target-use-XCOPY-segment-descriptor-CSCD-IDs.patch
- From: linux-4.9.258-1
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
xcopy: loop over devices using idr helper
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28374
- Patch: debian9/4.9.258-1/0008-CVE-2020-28374-xcopy-loop-over-devices-using-idr-helper.patch
- From: linux-4.9.258-1
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
scsi: target: Fix XCOPY NAA identifier lookup
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28374
- Patch: debian9/4.9.258-1/0009-CVE-2020-28374-scsi-target-Fix-XCOPY-NAA-identifier-lookup.patch
- From: linux-4.9.258-1
- CVE-2020-28374, CVSSv2 Score: 6.5
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup (adaptation )
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: debian9/4.9.258-1/CVE-2020-28374-kpatch.patch
- From: 4.4.0-200.232
- CVE-2020-29569, CVSSv2 Score: 8.8
- Description:
xen-blkback: set ring->xenblkd to NULL after kthread_stop()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-29569
- Patch: debian9/4.9.258-1/CVE-2020-29568-xsa350.patch
- From: linux-4.9.258-1
- CVE-2020-27825, CVSSv2 Score: 5.7
- Description:
[PATCH] tracing: Fix race in trace_open and buffer resize call
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-27825
- Patch: debian9/4.9.258-1/CVE-2020-27825-patch-tracing-fix-race-in-trace-open-and-buffer-resize-call.patch
- From: 4.9.258-1
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: debian9/4.9.258-1/0002-CVE-2020-29660-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: linux-4.9.258-1
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: debian9/4.9.258-1/0003-CVE-2020-29660-tty-Fix-session-locking.patch
- From: linux-4.9.258-1
- CVE-2020-27815, CVSSv2 Score: 7.4
- Description:
jfs: Fix array index bounds check in dbAdjTree
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-27815
- Patch: debian10/4.19.171-2/CVE-2020-27815-jfs-Fix-array-index-bounds-check-in-dbAdjTree.patch
- From: 4.19.171-2
- CVE-2019-19318, CVSSv2 Score: 4.4
- Description:
Btrfs: fix selftests failure due to uninitialized i_mode in test inodes
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19318
- Patch: debian9/4.9.258-1/CVE-2019-19318-Btrfs-fix-selftests-failure-due-to-uninitialized-i_mode-in-test-inodes.patch
- From: linux-4.9.258-1
- CVE-2019-19813, CVSSv2 Score: 7.8
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19816
- Patch: ubuntu-xenial/4.4.0-201.233/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: kernel-4.4.0-20kernel-4.4.0-201.233
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 4.4.0/CVE-2021-3347-futex-Handle-faults-correctly-for-PI-futexes-kpatch.patch
- From: >kernel-4.4.0-201.233
- CVE-2021-29154, CVSSv2 Score: 7.8
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-29154
- Patch: 4.9.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >4.9.258-1
- Description:
net: icmp: fix data-race in cmp_global_allow()
- CVE:
- Patch: 4.9.0/net-icmp-fix-data-race-in-cmp_global_allow.patch
- From: 4.19.92
- CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_bind() (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: 4.14.0/CVE-2020-25670-nfc-fix-memory-leak-in-llcp_sock_bind.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: 4.14.0/CVE-2020-25670-nfc-fix-refcount-leak-in-llcp_sock_bind.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25671, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25671
- Patch: 4.14.0/CVE-2020-25671-nfc-fix-refcount-leak-in-llcp_sock_connect.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25672, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25672
- Patch: 4.14.0/CVE-2020-25672-nfc-fix-memory-leak-in-llcp_sock_connect.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-29374, CVSSv2 Score: 7.0
- Description:
gup: document and work around "COW can break either way" issue
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-29374
- Patch: 4.9.0/CVE-2020-29374-gup-document-and-work-around-COW-can-break-either-way-issue.patch
- From: 4.9.272-1
- CVE-2021-28660, CVSSv2 Score: 7.8
- Description:
staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-28660
- Patch: 4.19.0/801719-staging-rtl8188eu-prevent-ssid-overflow-in-rtw_wx_.patch
- From: v4.19.181
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: verify attributes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36322
- Patch: 4.9.0/CVE-2020-36322-fuse-verify-attributes.patch
- From: 4.9.272-1
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36322
- Patch: debian9/4.9.272-1/CVE-2020-36322-fuse-fix-bad-inode.patch
- From: 4.9.272-1
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28950
- Patch: debian9/4.9.272-1/CVE-2021-28950-fuse-fix-live-lock-in-fuse_iget.patch
- From: 4.9.272-1
- CVE-2021-20292, CVSSv2 Score: 6.7
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20292
- Patch: debian9/4.9.272-1/CVE-2021-20292-drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch
- From: 4.9.272-1
- CVE-2021-28971, CVSSv2 Score: 4.7
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://access.redhat.com/security/cve/CVE-2021-28971
- Patch: 5.4.17/CVE-2021-28971-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-status.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-28964, CVSSv2 Score: 4.1
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old root
- CVE: https://access.redhat.com/security/cve/CVE-2021-28964
- Patch: 4.1.12/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29265, CVSSv2 Score: 4.7
- Description:
usbip: fix stub_dev to check for stream socket
- CVE: https://access.redhat.com/security/cve/CVE-2021-29265
- Patch: 4.14.0/CVE-2021-29265-usbip-fix-stub_dev-to-check-for-stream-socket.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-29265, CVSSv2 Score: 4.7
- Description:
usbip: fix stub_dev usbip_sockfd_store() races leading to gpf
- CVE: https://access.redhat.com/security/cve/CVE-2021-29265
- Patch: 4.14.0/CVE-2021-29265-usbip-fix-stub_dev-usbip_sockfd_store-races-leading-to-gpf.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: make xt_replace_table wait until old
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-make-xt_replace_table-wait-until-old.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29647, CVSSv2 Score: 5.5
- Description:
net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()
- CVE: https://access.redhat.com/security/cve/CVE-2021-29647
- Patch: 4.14.0/CVE-2021-29647-net-qrtr-fix-a-kernel-infoleak-in-qrtr_recvmsg.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-30002
- Patch: debian9/4.9.272-1/0006-CVE-2021-30002-media-v4l-ioctl-Fix-memory-leak-in-video_usercopy.patch
- From: 4.9.272-1
- CVE-2021-3483, CVSSv2 Score: 7.3
- Description:
firewire: nosy: Fix a use-after-free bug in nosy_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3483
- Patch: 4.14.0/CVE-2021-3483-firewire-nosy-Fix-a-use-after-free-bug-in-nosy_ioctl.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-23133
- Patch: 4.14.0/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-31916
- Patch: debian9/4.9.272-1/0030-CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 4.9.272-1
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-32399
- Patch: debian9/4.9.272-1/0026-CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-whe.patch
- From: 4.9.272-1
- CVE-2021-3587, CVSSv2 Score: 5.1
- Description:
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3587
- Patch: debian9/4.9.272-1/0027-CVE-2021-3587-CVE-2021-23134-net-nfc-fix-use-after-free-llcp_sock_bind-connect.patch
- From: 4.9.272-1
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 5.4.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From:
- CVE-2020-24586, CVSSv2 Score: 5.3
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.9.0/CVE-2020-24586-CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From: 4.9.272-1
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.9.0/CVE-2020-26139-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042-header.patch
- From: 4.9.272-1
- CVE-2020-24588, CVSSv2 Score: 3.5
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24588
- Patch: 4.9.0/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: 4.9.272-1
- CVE-2020-24588, CVSSv2 Score: 3.5
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24588
- Patch: 4.9.0/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: 4.9.272-1
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: add fragment cache to sta_info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.9.0/CVE-2020-26139-mac80211-add-fragment-cache-to-sta_info.patch
- From: 4.9.272-1
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.9.0/CVE-2020-26139-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 4.9.272-1
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.9.0/CVE-2020-26139-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: 4.9.272-1
- CVE-2020-24587, CVSSv2 Score: 2.6
- Description:
mac80211: extend protection against mixed key and fragment cache
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.9.0/CVE-2020-24586-CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment-cache.patch
- From: 4.9.272-1
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 4.9.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.9.272-1
- CVE-2021-0512, CVSSv2 Score: 7.8
- Description:
HID: make arrays usage and value to be the same
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0512
- Patch: debian9/4.9.272-1/CVE-2021-0512-hid-make-arrays-usage-and-value-to-be-the-same.patch
- From: 4.9.272-1
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/CVE-2021-3573
- Patch: 4.9.0/CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-object.patch
- From: 4.9.272-1
- CVE-2021-0129 CVE-2020-26558, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-0129
- Patch: 4.9.0/CVE-2021-0129-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From: 4.9.272-1
- CVE-2021-38208, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-38208.patch
- From:
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix fuse_make_bad to add bad_inode_ops (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36322
- Patch: 4.9.0/CVE-2020-36322-fix-bad_inode_file_ops-kpatch.patch
- From: 4.9.272-1
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: hook file_operations to prevent generation of new requests before pach/unpatch (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36322
- Patch: 4.9.0/CVE-2020-36322-hook-fuse-file-ops-kpatch.patch
- From: 4.9.272-1
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: hook inode_operations to prevent generation of new requests before pach/unpatch (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36322
- Patch: 4.9.0/CVE-2020-36322-hook-fuse-inode-ops-kpatch.patch
- From: 4.9.272-1
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: end up request (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36322
- Patch: 4.9.0/CVE-2020-36322-end-up-requests-kpatch.patch
- From: 4.9.272-1
- CVE-2021-3428, CVSSv2 Score: 4.4
- Description:
ext4: fix EXT4_MAX_LOGICAL_BLOCK macro
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3428
- Patch: 4.9.0/CVE-2021-3428-ext4-fix-EXT4_MAX_LOGICAL_BLOCK-macro.patch
- From: linux-4.9.258-1
- CVE-2021-3428, CVSSv2 Score: 4.4
- Description:
ext4: catch integer overflow in ext4_cache_extents
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3428
- Patch: 4.9.0/CVE-2021-3428-ext4-catch-integer-overflow-in-ext4_cache_extents-228.patch
- From: v4.19.182
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.4.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write.patch
- From: kernel-4.4.0-213.245
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: N/A
- Patch: 4.4.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: kernel-4.4.0-212.242
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-34693
- Patch: 4.19.0/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.19.194-3
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From:
- CVE-2021-21781, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-21781.patch
- From:
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent potential read overflow in ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3612
- Patch: debian9/4.9.290-1/0007-CVE-2021-3612-Input-joydev-prevent-use-of-not-validated-data-in-JS.patch
- From: 4.9.290-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: add size validation when walking chunks
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3655
- Patch: debian9/4.9.290-1/0009-CVE-2021-3655-sctp-add-size-validation-when-walking-chunks.patch
- From: 4.9.290-1
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38160
- Patch: debian9/4.9.290-1/0011-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.9.290-1
- CVE-2021-38204, CVSSv2 Score: 6.8
- Description:
usb: max-3421: Prevent corruption of freed memory
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38204
- Patch: debian9/4.9.290-1/0012-CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory.patch
- From: 4.9.290-1
- CVE-2021-38204, CVSSv2 Score: 6.8
- Description:
usb: max-3421: Prevent corruption of freed memory (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-bionic/4.15.0-159.167/CVE-2021-38204-kpatch.patch
- From: 4.15.0-159.167
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3679
- Patch: debian9/4.9.290-1/0013-CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch
- From: 4.9.290-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: move 198 addresses from unusable to private scope
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3655
- Patch: debian9/4.9.290-1/0016-CVE-2021-3655-sctp-move-198-addresses-from-unusable-to-private-sco.patch
- From: 4.9.290-1
- CVE-2021-38205, CVSSv2 Score: 3.3
- Description:
net: xilinx_emaclite: Do not print real IOMEM pointer
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38205
- Patch: debian9/4.9.290-1/0017-CVE-2021-38205-net-xilinx_emaclite-Do-not-print-real-IOMEM-pointer.patch
- From: 4.9.290-1
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3732
- Patch: debian9/4.9.290-1/0018-CVE-2021-3732-ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch
- From: 4.9.290-1
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3653
- Patch: debian9/4.9.290-1/0019-CVE-2021-3653-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch
- From: 4.9.290-1
- CVE-2021-42008, CVSSv2 Score: 7.8
- Description:
net: 6pack: fix slab-out-of-bounds in decode_data
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-42008
- Patch: debian9/4.9.290-1/0020-CVE-2021-42008-net-6pack-fix-slab-out-of-bounds-in-decode_data.patch
- From: 4.9.290-1
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3732
- Patch: debian9/4.9.290-1/0021-CVE-2021-3732-locks-print-a-warning-when-mount-fails-due-to-lack-o.patch
- From: 4.9.290-1
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
fs: warn about impending deprecation of mandatory locks
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3732
- Patch: debian9/4.9.290-1/0022-CVE-2021-3732-fs-warn-about-impending-deprecation-of-mandatory-loc.patch
- From: 4.9.290-1
- CVE-2021-3753, CVSSv2 Score: 5.9
- Description:
vt_kdsetmode: extend console locking
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3753
- Patch: debian9/4.9.290-1/0023-CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
- From: 4.9.290-1
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its xattrs are
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-40490
- Patch: debian9/4.9.290-1/0024-CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-i.patch
- From: 4.9.290-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: validate chunk size in __rcv_asconf_lookup
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3655
- Patch: debian9/4.9.290-1/0027-CVE-2021-3655-sctp-validate-chunk-size-in-__rcv_asconf_lookup.patch
- From: 4.9.290-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: add param size validation for SCTP_PARAM_SET_PRIMARY
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3655
- Patch: debian9/4.9.290-1/0028-CVE-2021-3655-sctp-add-param-size-validation-for-SCTP_PARAM_SET_PR.patch
- From: 4.9.290-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: validate from_addr_param return
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3655
- Patch: debian9/4.9.290-1/0029-CVE-2021-3655-sctp-validate-from_addr_param-return-130-2.patch
- From: 4.9.290-1
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: fix return value check in __sctp_rcv_asconf_lookup
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-fix-return-value-check-in_underscore-sctp_rcv_asconf_lookup.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
net: hso: fix muxed tty registration
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-37159
- Patch: debian9/4.9.290-1/0030-CVE-2021-37159-net-hso-fix-muxed-tty-registration.patch
- From: 4.9.290-1
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20321
- Patch: debian9/4.9.290-1/0033-CVE-2021-20321-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 4.9.290-1
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-41864
- Patch: debian9/4.9.290-1/0034-CVE-2021-41864-bpf-Fix-integer-overflow-in-prealloc_elems_and_freel.patch
- From: 4.9.290-1
- CVE-2021-3760, CVSSv2 Score: 7.0
- Description:
nfc: nci: fix the UAF of rf_conn_info object
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3760
- Patch: debian9/4.9.290-1/0035-CVE-2021-3760-nfc-nci-fix-the-UAF-of-rf_conn_info-object.patch
- From: 4.9.290-1
- CVE-2021-43389, CVSSv2 Score: 5.5
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43389
- Patch: debian9/4.9.290-1/0036-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 4.9.290-1
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
net: hso: register netdev later to avoid a race condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-37159
- Patch: debian9/4.9.290-1/0038-CVE-2021-37159-net-hso-register-netdev-later-to-avoid-a-race-condit.patch
- From: 4.9.290-1
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-37159
- Patch: debian9/4.9.290-1/0039-CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_de.patch
- From: 4.9.290-1
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-42739
- Patch: debian9/4.9.290-1/debian/CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch
- From: 4.9.290-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Use safer key clearing with key cache entries
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: debian9/4.9.290-1/CVE-2020-3702-ath-Use-safer-key-clearing-with-key-cache-entries.patch
- From: 4.9.290-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath9k: Clear key cache explicitly on disabling hardware
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: debian9/4.9.290-1/CVE-2020-3702-ath9k-Clear-key-cache-explicitly-on-disabling-hardware.patch
- From: 4.9.290-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Export ath_hw_keysetmac()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: debian9/4.9.290-1/CVE-2020-3702-ath-Export-ath_hw_keysetmac.patch
- From: 4.9.290-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Modify ath_key_delete() to not need full key entry
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: 4.19.0/CVE-2020-3702-ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch
- From: 4.19.208-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath9k: Postpone key cache entry deletion for TXQ frames reference it
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: 4.19.0/CVE-2020-3702-ath9k-Postpone-key-cache-entry-deletion-for-TXQ-frames-reference-it.patch
- From: 4.19.208-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath9k: Postpone key cache entry deletion for TXQ frames reference it (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: debian9/4.9.290-1/CVE-2020-3702-ath9k-Postpone-key-cache-entry-deletion-for-TXQ-frames-reference-it-kpatch.patch
- From: 4.9.290-1
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Export ath_hw_keysetmac (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: 4.19.0/CVE-2020-3702-ath-Export-ath_hw_keysetmac-kpatch.patch
- From: 4.19.208-1
- CVE-2021-38199, CVSSv2 Score: 6.5
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38199
- Patch: debian9/4.9.290-1/debian/CVE-2021-38199-nfsv4-initialise-connection-to-the-server-in-nfs4_al.patch
- From: 4.9.290-1
- CVE-2021-38199, CVSSv2 Score: 6.5
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38199
- Patch: debian11/CVE-2021-38199-kpatch.patch
- From: 5.10.46-5
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
mm: add follow_pte_pmd()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-22543
- Patch: debian9/4.9.290-1/debian/mm-add-follow_pte_pmd.patch
- From: 4.9.290-1
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not assume PTE is writable after follow_pfn
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-22543
- Patch: debian9/4.9.290-1/debian/CVE-2021-22543-kvm-do-not-assume-pte-is-writable-after-follow_pfn.patch
- From: 4.9.290-1
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
[PATCH] KVM: Use kvm_pfn_t for local PFN variable in
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-22543
- Patch: debian9/4.9.290-1/CVE-2021-22543-patch-kvm-use-kvm-pfn-t-for-local-pfn-variable-in.patch
- From: 4.9.290-1
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-22543
- Patch: debian9/4.9.290-1/CVE-2021-22543-kvm-do-not-allow-mapping-valid-but-non-reference-counted-pages.patch
- From: 4.9.290-1
- CVE-2020-16119, CVSSv2 Score: 7.8
- Description:
dccp: avoid double free of ccid on child socket
- CVE: https://access.redhat.com/security/cve/CVE-2020-16119
- Patch: 4.14.0/CVE-2020-16119-UBUNTU-SAUCE-dccp-avoid-double-free-of-ccid-on-child-socket.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: debian9/4.9.290-1/0015-CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 4.9.290-1
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: debian9/4.9.290-1/CVE-2021-0920-kpatch.patch
- From: 4.9.290-1
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20322
- Patch: debian9/4.9.290-1/CVE-2021-20322-ipv4-make-exception-cache-less-predictible.patch
- From: 4.9.290-1
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38198
- Patch: debian9/4.9.290-1/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-shadow-page-130-2.patch
- From: 4.9.290-1
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38198
- Patch: debian9/4.9.290-1/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-shadow-page-kpatch-130-2.patch
- From: 4.9.290-1
- CVE-2021-20317, CVSSv2 Score: 4.4
- Description:
rbtree: cache leftmost node internally
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20317
- Patch: debian9/4.9.290-1/debian/rbtree-cache-leftmost-node-internally.patch
- From: 4.9.290-1
- CVE-2021-20317, CVSSv2 Score: 4.4
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20317
- Patch: debian9/4.9.290-1/debian/CVE-2021-20317-lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch
- From: 4.9.290-1
- CVE-2021-20317, CVSSv2 Score: 4.4
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20317
- Patch: debian9/4.9.290-1/CVE-2021-20317-kpatch.patch
- From: 4.9.290-1
- CVE-2021-29264, CVSSv2 Score: 5.5
- Description:
gianfar: fix jumbo packets+napi+rx overrun crash
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-29264
- Patch: 4.9.0/CVE-2021-29264-gianfar-fix-jumbo-packets-napi-rx-overrun-crash.patch
- From: 4.9.303-1
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-33033
- Patch: 4.9.0/CVE-2021-33033-net-mac802154-Fix-general-protection-fault.patch
- From: 4.9.303-1
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-33033
- Patch: 4.9.0/CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-DOI-refcounts.patch
- From: 4.9.303-1
- CVE-2021-3752, CVSSv2 Score: 7.1
- Description:
Bluetooth: fix use-after-free error in lock_sock_nested()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3752
- Patch: 4.9.0/CVE-2021-3752-Bluetooth-fix-use-after-free-error-in-lock_sock_nested().patch
- From: 4.9.303-1
- CVE-2021-3640, CVSSv2 Score: 7.0
- Description:
Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3640
- Patch: 4.9.0/CVE-2021-3640-Bluetooth-sco-Fix-lock_sock()-blockage-by-memcpy_from_msg().patch
- From: 4.9.303-1
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43976
- Patch: 4.9.0/CVE-2021-43976-mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv().patch
- From: 4.9.303-1
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4002
- Patch: 4.9.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.9.303-1
- CVE-2021-45095, CVSSv2 Score: 5.5
- Description:
phonet: refcount leak in pep_sock_accep
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-45095
- Patch: 4.9.0/CVE-2021-45095-phonet-refcount-leak-in-pep_sock_accep.patch
- From: 4.9.303-1
- CVE-2021-4083, CVSSv2 Score: 7.0
- Description:
fs: add fget_many() and fput_many()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4083
- Patch: 4.9.0/CVE-2021-4083-fs-add-fget_many-and-fput_many.patch
- From: 4.9.303-1
- CVE-2021-4083, CVSSv2 Score: 7.0
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4083
- Patch: 4.9.0/CVE-2021-4083-fget-check-that-the-fd-still-exists-after-getting-a-ref-to-it.patch
- From: 4.9.303-1
- CVE-2021-39685, CVSSv2 Score: N/A
- Description:
USB: gadget: detect too-big endpoint 0 requests
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-39685
- Patch: 4.9.0/CVE-2021-39685-USB-gadget-detect-too-big-endpoint-0-requests.patch
- From: 4.9.303-1
- CVE-2021-28711, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-28711.patch
- From:
- CVE-2021-28712, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-28712.patch
- From:
- CVE-2021-28713, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-28713.patch
- From:
- CVE-2021-28714, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-28714.patch
- From:
- CVE-2021-28715, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-28715.patch
- From:
- CVE-2021-4202, CVSSv2 Score: 7
- Description:
NFC: reorganize the functions in nci_request
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-reorganize-the-functions-in-nci_request.patch
- From: 4.9.303-1
- CVE-2021-4202, CVSSv2 Score: 7
- Description:
NFC: reorder the logic in nfc_{un,}register_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-reorder-the-logic-in-nfc_unregister_device-and-register_device.patch
- From: 4.9.303-1
- CVE-2021-4202, CVSSv2 Score: 7
- Description:
NFC: add NCI_UNREG flag to eliminate the race
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-add-NCI_UNREG-flag-to-eliminate-the-race.patch
- From: 4.9.303-1
- CVE-2021-4155, CVSSv2 Score: N/A
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4155
- Patch: 4.9.0/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOCSP-and-FREESP-just-like-fallocate.patch
- From: 4.9.303-1
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-24448
- Patch: 4.9.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.9.303-1
- CVE-2022-25258, CVSSv2 Score: 4.6
- Description:
USB: gadget: validate interface OS descriptor requests
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25258
- Patch: 4.9.0/CVE-2022-25258-USB-gadget-validate-interface-OS-descriptor-requests.patch
- From: 4.9.303-1
- CVE-2022-25375, CVSSv2 Score: 5.5
- Description:
usb: gadget: rndis: check size of RNDIS_MSG_SET command
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25375
- Patch: 4.9.0/CVE-2022-25375-usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch
- From: 4.9.303-1
- CVE-2022-0617, CVSSv2 Score: 5.5
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0617
- Patch: 4.9.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.9.303-1
- CVE-2022-0617, CVSSv2 Score: 5.5
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0617
- Patch: 4.9.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.9.303-1
- CVE-2022-0492, CVSSv2 Score: 7.8
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0492
- Patch: 4.9.0/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.9.303-1
- CVE-2022-0487, CVSSv2 Score: 5.5
- Description:
moxart: fix potential use-after-free on remove path
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0487
- Patch: 4.9.0/CVE-2022-0487-moxart-fix-potential-use-after-free-on-remove-path.patch
- From: 4.9.303-1
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
tipc: improve size validations for received domain records
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0435
- Patch: 4.9.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records.patch
- From: 4.9.303-1
- CVE-2022-0330, CVSSv2 Score: 7
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0330
- Patch: 4.9.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 4.9.303-1
- CVE-2022-0330, CVSSv2 Score: 7
- Description:
drm/i915: Flush TLBs before releasing backing store (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0330
- Patch: 4.9.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch.patch
- From: 4.9.303-1
- CVE-2021-39698, CVSSv2 Score: 7.8
- Description:
wait: add wake_up_pollfree()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-39698
- Patch: 4.9.0/CVE-2021-39698-wait-add-wake_up_pollfree.patch
- From: 4.9.303-1
- CVE-2021-39698, CVSSv2 Score: 7.8
- Description:
signalfd: use wake_up_pollfree()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-39698
- Patch: 4.9.0/CVE-2021-39698-signalfd-use-wake_up_pollfree.patch
- From: 4.9.303-1
- CVE-2021-39686, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-39686.patch
- From:
- CVE-2021-39714, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-39714.patch
- From:
- CVE-2022-0001, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- n/a, CVSSv2 Score: n/a
- Description:
x86/entry: Use the correct fence macro after swapgs in kernel CR3
- CVE: n/a
- Patch: 4.9.0/x86-entry-Use-the-correct-fence-macro-after-swapgs-in-kernel-CR3.patch
- From: v5.16
- Description:
- CVE:
- Patch: 4.9.0/kpatch-add-paravirt-asm-definitions-168.patch
- From:
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 4.9.0/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.4.0/proc-restrict-pagemap-access.patch
- From:
- CVE-2020-0427, CVSSv2 Score: 5.5
- Description:
pinctrl: devicetree: Avoid taking direct reference to device name string
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0427
- Patch: 4.9.0/cve-2020-0427-pinctr-avoid-taking-direct-reference-to-device-name.patch
- From: 4.9.246-2
- CVE-2020-27675, CVSSv2 Score: 4.7
- Description:
xen/events: avoid removing an event channel while handling it
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27675
- Patch: 4.9.0/cve-2020-27675-avoid-removing-event-channel-while-handling-it.patch
- From: 4.9.246-2
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 4.4.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: kernel-4.4.0-197.229
- CVE-2020-25645, CVSSv2 Score: 7.5
- Description:
geneve: add transport ports in route lookup for geneve
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-25645
- Patch: 4.9.0/cve-2020-25645-geneve-add-transport-ports-in-route-lookup-for-genev.patch
- From: 4.9.246-2
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25668, CVSSv2 Score: 7.0
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25668
- Patch: 4.19.0/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25669, CVSSv2 Score: 4.1
- Description:
Input: sunkbd - avoid use-after-free in teardown paths
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25669
- Patch: 4.19.0/CVE-2020-25669-Input-sunkbd-avoid-use-after-free-in-teardown-paths.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25704, CVSSv2 Score: 6.2
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-25704
- Patch: 4.9.0/cve-2020-25704-perf-core-Fix-a-memory-leak-in-perf_event_parse_addr_filter.patch
- From: 4.9.246-2
- CVE-2020-28974, CVSSv2 Score: 4.6
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28974
- Patch: 4.19.0/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-uek-4.14.35-2025.402.2.1.el7uek
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://www.saddns.net/
- Patch: 4.9.0/icmp-randomize-the-global-rate-limiter.patch
- From: 4.19.153