- kernel-4.4.0-209.241 (ubuntu-xenial)
- 4.15.0-233.261
- 2022-11-10 02:21:16
- 2022-11-16 10:20:51
- K20221110_01
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: N/A
- Patch: 4.4.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: kernel-4.4.0-212.242
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.4.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write.patch
- From: kernel-4.4.0-213.245
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-3653
- Patch: 4.4.0/CVE-2021-3653-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-in-int_ctl.patch
- From: kernel-4.4.0-214.246
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4002
- Patch: 4.4.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.4.0-218.251
- CVE-2022-30594, CVSSv2 Score: 7.8
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-30594
- Patch: 4.4.0/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
- From: 4.4.0-227.261
- CVE-2022-1966, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1966
- Patch: 4.4.0/CVE-2022-1966-netfilter-nf_tables-disallow-non-stateful-expression-in-sets-earlier.patch
- From: 4.4.0-227.261
- CVE-2022-21499, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://access.redhat.com/security/cve/CVE-2020-26147
- Patch: 4.4.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-4.4.0-219.252
- CVE-2020-26558 CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://access.redhat.com/security/cve/CVE-2020-26558
- Patch: 4.4.0/CVE-2020-26558-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From: kernel-4.4.0-219.252
- CVE-2021-28972, CVSSv2 Score: 6.7
- Description:
PCI: rpadlpar: Fix potential drc_name corruption in store functions
- CVE: https://access.redhat.com/security/cve/CVE-2021-28972
- Patch: 4.4.0/CVE-2021-28972-PCI-rpadlpar-Fix-potential-drc_name-corruption-in-store-functions.patch
- From: kernel-4.4.0-219.252
- CVE-2021-3483, CVSSv2 Score: 7.3
- Description:
firewire: nosy: Fix a use-after-free bug in nosy_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3483
- Patch: 4.4.0/CVE-2021-3483-firewire-nosy-Fix-a-use-after-free-bug-in-nosy_ioctl.patch
- From: kernel-4.4.0-219.252
- CVE-2021-3564, CVSSv2 Score: 6.3
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://access.redhat.com/security/cve/CVE-2021-3564
- Patch: 4.4.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: kernel-4.4.0-219.252
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://access.redhat.com/security/cve/CVE-2021-3679
- Patch: 4.4.0/CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause-deadloop.patch
- From: kernel-4.4.0-219.252
- CVE-2021-42008, CVSSv2 Score: 5.9
- Description:
net: 6pack: fix slab-out-of-bounds in decode_data
- CVE: https://access.redhat.com/security/cve/CVE-2021-42008
- Patch: 4.4.0/CVE-2021-42008-net-6pack-fix-slab-out-of-bounds-in-decode_data.patch
- From: kernel-4.4.0-219.252
- CVE-2021-45485, CVSSv2 Score: 7.5
- Description:
ipv6: use prandom_u32() for ID generation
- CVE: https://access.redhat.com/security/cve/CVE-2021-45485
- Patch: 4.4.0/CVE-2021-45485-ipv6-use-prandom_u32-for-ID-generation.patch
- From: kernel-4.4.0-219.252
- CVE-2021-38204, CVSSv2 Score: 6.6
- Description:
usb: max-3421: Prevent corruption of freed memory
- CVE: https://access.redhat.com/security/cve/CVE-2021-38204
- Patch: 4.4.0/CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory.patch
- From: kernel-4.4.0-219.252
- CVE-2021-38204, CVSSv2 Score: 6.6
- Description:
usb: max-3421: Prevent corruption of freed memory (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38204
- Patch: 4.4.0/CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory-kpatch.patch
- From: kernel-4.4.0-219.252
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-Bluetooth-verify-AMP-hci_chan-before-amp_destroy.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-kpatch.patch
- From: kernel-5.4.0-77.86
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-34693
- Patch: 4.1.12/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.1.12-124.54.6.el6uek
- n/a, CVSSv2 Score: n/a
- Description:
x86/entry: Use the correct fence macro after swapgs in kernel CR3
- CVE: n/a
- Patch: 4.4.0/x86-entry-Use-the-correct-fence-macro-after-swapgs-in-kernel-CR3.patch
- From: v5.16
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.4.0/proc-restrict-pagemap-access.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/kpatch-add-paravirt-asm-definitions.patch
- From:
- CVE-2021-4157, CVSSv2 Score: 8.0
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-4157
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2021-4157-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nf.patch
- From: kernel-4.4.0-224.257
- CVE-2022-27223, CVSSv2 Score: 8.8
- Description:
USB: gadget: validate endpoint index for xilinx udc
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-27223
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2022-27223-USB-gadget-validate-endpoint-index-for-xilinx-udc.patch
- From: kernel-4.4.0-224.257
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28390
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2022-28390-can-ems_usb-ems_usb_start_xmit-fix-double-dev_kfree_.patch
- From: kernel-4.4.0-224.257
- CVE-2021-39713, CVSSv2 Score: 9.8
- Description:
net: sched: use Qdisc rcu API instead of relying on rtnl lock
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-39713
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2021-39713-net-sched-use-Qdisc-rcu-API-instead-of-relying-on-rt.patch
- From: kernel-4.4.0-224.257
- CVE-2022-26490, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2022-26490.patch
- From:
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm.patch
- From: 4.4.0-229.263
- CVE-2021-4202, CVSSv2 Score: 7
- Description:
NFC: reorder the logic in nfc_{un,}register_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-reorder-the-logic-in-nfc_unregister_device-and-register_device.patch
- From: 4.9.303-1
- CVE-2021-4202, CVSSv2 Score: 7
- Description:
NFC: add NCI_UNREG flag to eliminate the race
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-add-NCI_UNREG-flag-to-eliminate-the-race.patch
- From: 4.9.303-1
- CVE-2021-4202, CVSSv2 Score: 7
- Description:
NFC: reorganize the functions in nci_request
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-reorganize-the-functions-in-nci_request.patch
- From: 4.9.303-1
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://access.redhat.com/security/cve/CVE-2022-1353
- Patch: 4.14.0/CVE-2022-1353.patch
- From: v5.17-rc12
- CVE-2022-1419, CVSSv2 Score: 7.8
- Description:
drm/vgem: Close use-after-free race in vgem_gem_create
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1419
- Patch: 4.4.0/CVE-2022-1419-drm-vgem-Close-use-after-free-race-in-vgem_gem_create.patch
- From: 4.4.0-229.263
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 4.4.0-229.263
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter-kpaptch.patch
- From: 4.14.35-2047.515.0
- CVE-2022-1679, CVSSv2 Score: 7.8
- Description:
ath9k fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://access.redhat.com/security/cve/CVE-2022-1679
- Patch: 4.4.0/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.4.0-229.263
- CVE-2022-1734, CVSSv2 Score: 7
- Description:
nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1734
- Patch: 4.4.0/CVE-2022-1734-nfc-reorder-destructive-operations-in-nfcmrvl_nci_unregister_dev.patch
- From: 4.4.0-229.263
- CVE-2022-28356, CVSSv2 Score: 6.2
- Description:
llc: fix netdevice reference leaks in llc_ui_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2022-28356
- Patch: 4.14.0/CVE-2022-28356-llc-fix-netdevice-reference-leaks-in-llc_ui_bind.patch
- From: 4.14.275-207.503.amzn2
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-25375, CVSSv2 Score: 5.5
- Description:
usb: gadget: rndis: check size of RNDIS_MSG_SET command
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25375
- Patch: 4.9.0/CVE-2022-25375-usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch
- From: 4.9.303-1
- CVE-2022-25258, CVSSv2 Score: 4.6
- Description:
USB: gadget: validate interface OS descriptor requests
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25258
- Patch: 4.9.0/CVE-2022-25258-USB-gadget-validate-interface-OS-descriptor-requests.patch
- From: 4.9.303-1
- CVE-2022-20141, CVSSv2 Score: 7.8
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-20141
- Patch: 4.4.0/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.4.0-230.264
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-34918
- Patch: 4.4.0/CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-data.patch
- From: 4.4.0-230.264
- CVE-2022-33740, CVSSv2 Score: 7.1
- Description:
net: Rename and export copy_skb_header
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 4.4.0/CVE-2022-33740-net-Rename-and-export-copy_skb_header.patch
- From: kernel-4.4.0-233.267
- CVE-2022-26365, CVSSv2 Score: 7.1
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-26365
- Patch: 4.4.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33740, CVSSv2 Score: 7.1
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 4.4.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33741, CVSSv2 Score: 7.1
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 4.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-kpatch.patch
- From: kernel-4.4.0-233.267
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbcon-Prevent-that-screen-size-is-smaller-than-font-size.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33656, CVSSv2 Score: 7.8
- Description:
vt: drop old FONT ioctls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33656
- Patch: 4.4.0/vt-drop-old-FONT-ioctls.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 4.4.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/CVE-2022-2588
- Patch: 5.4.17/CVE-2022-2588.patch
- From: kernel-uek-5.4.17-2136.309.5.1.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2586
- Patch: 4.4.0//CVE-2022-2586-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-another-table.patch
- From: 4.4.0-231.265
- CVE-2018-5995, CVSSv2 Score: 5.5
- Description:
percpu: stop printing kernel addresses
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5995
- Patch: 4.4.0/CVE-2018-5995.patch
- From: kernel-4.4.0.222.229
- CVE-2019-19449, CVSSv2 Score: 7.8
- Description:
f2fs: fix to do sanity check on segment/section count
- CVE: https://ubuntu.com/security/CVE-2019-19449
- Patch: 4.4.0/CVE-2019-19449.patch
- From: kernel-4.4.0.222.229
- CVE-2020-12655, CVSSv2 Score: 7.8
- Description:
xfs: add agf freeblocks verify in xfs_agf_verify
- CVE: https://ubuntu.com/security/CVE-2020-12655
- Patch: 4.4.0/CVE-2020-12655.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25670 CVE-2021-23134 CVE-2021-38208, CVSSv2 Score: 7.8
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://ubuntu.com/security/CVE-2020-25670
- Patch: 4.4.0/CVE-2020-25670.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25671, CVSSv2 Score: 7.8
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://ubuntu.com/security/CVE-2020-25671
- Patch: 4.4.0/CVE-2020-25671.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25672, CVSSv2 Score: 7.5
- Description:
nfc: fix memory leak in llcp_sock_bind()
- CVE: https://ubuntu.com/security/CVE-2020-25672
- Patch: 4.4.0/CVE-2020-25672.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25673, CVSSv2 Score: 5.5
- Description:
nfc: Avoid endless loops caused by repeated llcp_sock_connect()
- CVE: https://ubuntu.com/security/CVE-2020-25673
- Patch: 4.4.0/CVE-2020-25673.patch
- From: kernel-4.4.0.222.229
- CVE-2021-20292, CVSSv2 Score: 6.7
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20292
- Patch: debian9/4.9.272-1/CVE-2021-20292-drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch
- From: 4.9.272-1
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://ubuntu.com/security/CVE-2021-29650
- Patch: 4.4.0/CVE-2021-29650.patch
- From: kernel-4.4.0.222.229
- CVE-2021-28688, CVSSv2 Score: 6.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://ubuntu.com/security/CVE-2021-28688
- Patch: 4.4.0/CVE-2021-28688.patch
- From: kernel-4.4.0.222.229
- CVE-2020-36322, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-36322.patch
- From:
- CVE-2021-3506, CVSSv2 Score: 7.1
- Description:
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3506
- Patch: 4.4.0/CVE-2021-3506.patch
- From: kernel-4.4.0.222.229
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- CVE: https://ubuntu.com/security/CVE-2021-32399
- Patch: 4.4.0/CVE-2021-32399.patch
- From: kernel-4.4.0.222.229
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.4.0/CVE-2020-26139.patch
- From: kernel-4.4.0.222.229
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33033
- Patch: 4.4.0/CVE-2021-33033.patch
- From: kernel-4.4.0.222.229
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-750671-RDMA-cma-Add-missing-locking-to-rdma_accept-99.patch
- From: 4.15.0-162.170
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.4.0/CVE-2020-36385.patch
- From: kernel-4.4.0.222.229
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3573
- Patch: 4.4.0/CVE-2021-3573.patch
- From: kernel-4.4.0.222.229
- CVE-2021-0129, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-0129.patch
- From:
- CVE-2021-38198, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-38198.patch
- From:
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38160
- Patch: debian9/4.9.290-1/0011-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.9.290-1
- CVE-2021-40490, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-40490.patch
- From:
- CVE-2021-20317, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-20317.patch
- From:
- CVE-2021-43389, CVSSv2 Score: 5.5
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43389
- Patch: debian9/4.9.290-1/0036-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 4.9.290-1
- CVE-2021-33098, CVSSv2 Score: 5.5
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://access.redhat.com/security/cve/CVE-2021-33098
- Patch: 4.4.0/CVE-2021-33098.patch
- From: kernel-4.4.0.222.229
- CVE-2020-26145, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-26145.patch
- From:
- CVE-2020-26141, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-26141.patch
- From:
- CVE-2020-3702, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-3702.patch
- From:
- CVE-2020-12888, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2020-12888.patch
- From:
- CVE-2021-45486, CVSSv2 Score:
- Description:
- CVE:
- Patch: skipped/CVE-2021-45486.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/CVE-2021-4083-fget-check-that-the-fd-still-exists-after-getting-a-ref-to-it.patch
- From:
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://ubuntu.com/security/CVE-2021-43976
- Patch: 4.4.0/CVE-2021-43976-mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
- From: 4.4.0-223.256
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://ubuntu.com/security/CVE-2021-31916
- Patch: 4.4.0/CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devices.patch
- From: 4.4.0-223.256
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2021-0920
- Patch: 4.4.0/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 4.4.0-223.256
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-0920
- Patch: 4.4.0/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK-kpatch.patch
- From: 4.4.0-223.256
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-0920
- Patch: 4.4.0/CVE-2021-0920-kpatch.patch
- From: 4.4.0-223.256
- CVE-2021-28964, CVSSv2 Score: 4.7
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old root
- CVE: https://ubuntu.com/security/CVE-2021-28964
- Patch: 4.4.0/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of-an-old-root.patch
- From: 4.4.0-223.256
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://ubuntu.com/security/CVE-2021-42739
- Patch: 4.4.0/CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-avc_ca_pmt.patch
- From: 4.4.0-223.256
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://ubuntu.com/security/CVE-2021-37159
- Patch: 4.4.0/CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_device.patch
- From: 4.4.0-223.256
- CVE-2021-0935, CVSSv2 Score: 6.7
- Description:
l2tp: fix races with ipv4-mapped ipv6 addresses
- CVE: https://ubuntu.com/security/CVE-2021-0935
- Patch: 4.4.0/CVE-2021-0935-l2tp-fix-races-with-ipv4-mapped-ipv6-addresses.patch
- From: 4.4.0-223.256
- CVE-2021-0935, CVSSv2 Score: 6.7
- Description:
l2tp: fix races with ipv4-mapped ipv6 addresses (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-0935
- Patch: 4.4.0/CVE-2021-0935-l2tp-fix-races-with-ipv4-mapped-ipv6-addresses-kpatch.patch
- From: 4.4.0-223.256
- CVE-2021-0935, CVSSv2 Score: 6.7
- Description:
net: ipv6: keep sk status consistent after datagram connect failure
- CVE: https://ubuntu.com/security/CVE-2021-0935
- Patch: 4.4.0/CVE-2021-0935-net-ipv6-keep-sk-status-consistent-after-datagram-connect-failure.patch
- From: 4.4.0-223.256
- CVE-2021-39636, CVSSv2 Score: 4.4
- Description:
xtables: add xt_match, xt_target and data copy_to_user functions
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-xtables-add-xt_match-xt_target-and-data-copy_to_user-functions_1.patch
- From: 4.4.0-223.256
- CVE-2021-39636, CVSSv2 Score: 4.4
- Description:
iptables: use match, target and data copy_to_user helpers
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-iptables-use-match-target-and-data-copy_to_user-helpers_2.patch
- From: 4.4.0-223.256
- CVE-2021-39636, CVSSv2 Score: 4.4
- Description:
ip6tables: use match, target and data copy_to_user helpers
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-ip6tables-use-match-target-and-data-copy_to_user-helpers_3.patch
- From: 4.4.0-223.256
- CVE-2021-39636, CVSSv2 Score: 4.4
- Description:
xtables: extend matches and targets with .usersize
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-xtables-extend-matches-and-targets-with-usersize_4.patch
- From: 4.4.0-223.256
- CVE-2021-39636, CVSSv2 Score: 4.4
- Description:
netfilter: x_tables: fix pointer leaks to userspace
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-netfilter-x_tables-fix-pointer-leaks-to-userspace_5.patch
- From: 4.4.0-223.256
- CVE-2021-39636, CVSSv2 Score: 4.4
- Description:
iptables: use match, target and data copy_to_user helpers (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-kpatch.patch
- From: 4.4.0-223.256