- kernel-4.4.0-121.145 (ubuntu-xenial)
- 4.15.0-233.261
- 2023-03-03 13:33:14
- 2023-03-09 06:46:26
- K20230303_09
- CVE-2018-1000199
- Description:
perf/hwbp: Simplify the perf-hwbp code, fix documentation
- CVE: https://access.redhat.com/security/cve/CVE-2018-1000199
- Patch: 3.10.0/perf-hwbp-Simplify-the-perf-hwbp-code-fix-documentat.patch
- From: >3.10.0-862.el7
- CVE-2018-1087
- Description:
kvm/x86: fix icebp instruction handling
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-1087
- Patch: 4.4.0/573851-kvm-x86-fix-icebp-instruction-handling.patch
- From: kernel-4.4.0-124.148
- CVE-2018-8897
- Description:
x86/entry/64: Don't use IST entry for #BP stack
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-8897
- Patch: 4.4.0/573852-x86-entry-64-Don-t-use-IST-entry-for-BP-stack.patch
- From: kernel-4.4.0-124.148
- CVE-2018-8897
- Description:
x86/entry/64: Don't use IST entry for #BP stack (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-8897
- Patch: 4.4.0/573852-x86-entry-64-Don-t-use-IST-entry-for-BP-stack-kpatch-1.patch
- From: kernel-4.4.0-124.148
- CVE-2017-16995
- Description:
Revert "bpf: fix incorrect sign extension in check_alu_op()"
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16995
- Patch: 4.4.0/CVE-2017-16995-Revert-bpf-fix-incorrect-sign-extension-in-check_alu_op.patch
- From: kernel-4.4.0-117.141
- CVE-2017-16995
- Description:
bpf: fix incorrect sign extension in check_alu_op()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16995
- Patch: 4.4.0/CVE-2017-16995-bpf-fix-incorrect-sign-extension-in-check_alu_op.patch
- From: kernel-4.4.0-117.141
- CVE-2017-17862
- Description:
UBUNTU: SAUCE: Add missing hunks from "bpf: fix branch pruning logic"
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-17862
- Patch: 4.4.0/CVE-2017-17862-UBUNTU-SAUCE-Add-missing-hunks-from-bpf-fix-branch-pruning-logic.patch
- From: kernel-4.4.0-117.141
- CVE-2018-7566
- Description:
ALSA: seq: Don't allow resizing pool in use
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7566.html
- Patch: 4.4.0/CVE-2018-7566-0002-ALSA-seq-Dont-alloc-resizing-pool-in-use.patch
- From: kernel-4.4.0-125.150
- CVE-2018-7566
- Description:
ALSA: seq: More protection for concurrent write and ioctl races(kpatch adoptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-7566.html
- Patch: 4.4.0/CVE-2018-7566-0003-ALSA-seq-more-protection-for-concurrent-write-and-ioctl-races.patch
- From: kernel-4.4.0-125.150
- CVE-2017-18193
- Description:
f2fs: fix a bug caused by NULL extent tree
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18193
- Patch: 4.4.0/f2fs-extent-null-tree-bug.patch
- From: kernel-4.4.0-127.153
- CVE-2017-18222
- Description:
net: hns: ethtool_get_strings() overflow in hns driver
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18222
- Patch: 4.4.0/net-nhs-overflow-fix.patch
- From: kernel-4.4.0-127.153
- CVE-2018-1065
- Description:
net: netfilter: add back stackpointer size check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1065
- Patch: 4.4.0/netfilter-add-back-stackpointer-check.patch
- From: kernel-4.4.0-127.153
- CVE-2018-1068
- Description:
net: netfilter: don't trust user-space offsets
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1068
- Patch: 4.4.0/netfilter-ebtables-dont-trust-userspace-offsets.patch
- From: kernel-4.4.0-127.153
- CVE-2018-1130
- Description:
net: dccp: check sk for closed state
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1130
- Patch: 4.4.0/dccp-check-sk-for-closed-state.patch
- From: kernel-4.4.0-127.153
- CVE-2018-5803
- Description:
net: sctp: verify size of a new chunk
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5803.html
- Patch: 4.4.0/sctp-verify-size-of-new-chunk.patch
- From: kernel-4.4.0-127.153
- CVE-2018-7480
- Description:
blkcg: fix doube free of new_blkg in blkcg_init_queue
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7480
- Patch: 4.4.0/blkcg-fix-double-free-of-new_blkg.patch
- From: kernel-4.4.0-127.153
- CVE-2018-7757
- Description:
scsi: libsas: fix memory leak
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7757
- Patch: 4.4.0/scsi-libsas-fix-memory-leak-in-sas_smp_get_phy_events.patch
- From: kernel-4.4.0-127.153
- CVE-2018-7995
- Description:
x86/MCE: serialize sysfs changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7995
- Patch: 4.4.0/x86-MCE-serialize-sysfs-changes.patch
- From: kernel-4.4.0-127.153
- CVE-2018-8781
- Description:
check framebuffer mmap offsets
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8781
- Patch: 4.4.0/drm-udl-properly-check-framebuffer-mmap-offsets.patch
- From: kernel-4.4.0-127.153
- CVE-2018-3639
- Description:
Speculative Store Bypass mitigation
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-3639
- Patch: 4.4.0/sbb_mitigation.patch
- From: 4.4.0-127.153
- CVE-2020-1749
- Description:
sctp: fix dst refcnt leak in sctp_v4_get_dst
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.4.0/573225-sctp-fix-dst-refcnt-leak-in-sctp_v4_get_dst.patch
- From: 4.4.0-179.209
- CVE-2018-8087
- Description:
mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-8087.html
- Patch: 4.4.0/573938-mac80211_hwsim-fix-possible-memory-leak-in-hwsim_n.patch
- From: kernel-4.4.0-128.154
- CVE-2018-1092
- Description:
ext4: fail ext4_iget for root directory if unallocated
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1092.html
- Patch: 4.4.0/573989-ext4-fail-ext4_iget-for-root-directory-if-unalloca.patch
- From: kernel-4.4.0-128.154
- CVE-2018-10940
- Description:
cdrom: information leak in cdrom_ioctl_media_changed()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10940.html
- Patch: 4.4.0/574088-cdrom-information-leak-in-cdrom_ioctl_media_change.patch
- From: kernel-4.4.0-128.154
- CVE-2018-1093
- Description:
ext4: add validity checks for bitmap block numbers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1093.html
- Patch: 4.4.0/574096-ext4-add-validity-checks-for-bitmap-block-numbers.patch
- From: kernel-4.4.0-128.154
- CVE-2018-1093
- Description:
ext4: add validity checks for bitmap block numbers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1093.html
- Patch: 4.4.0/574097-ext4-fix-bitmap-position-validation.patch
- From: kernel-4.4.0-130.156
- CVE-2018-1000204
- Description:
scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000204
- Patch: 4.4.0/cve-2018-1000204-scsi-sg-allocate-with-__GPT_ZERO.patch
- From: kernel-4.4.0-130.156
- CVE-2017-13695
- Description:
ACPI cache leak in early ACPI terminnation.
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-13695
- Patch: 4.4.0/cve-2017-13695-acpica-fix-acpi-operand-cache-leak.patch
- From: kernel-4.4.0-130.156
- CVE-2017-18255
- Description:
perf/core: Fix the perf_cpu_time_max_percent check
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-18255
- Patch: 4.4.0/cve-2017-18255-perf-fix-perf_cpu_time_max.patch
- From: kernel-4.4.0-130.156
- CVE-2018-7755
- Description:
floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-7755
- Patch: 4.4.0/cve-2018-7755-do-not-copy-kernel-pointer-to-user.patch
- From: kernel-4.4.0-130.156
- CVE-2018-10124
- Description:
kernel/signal.c: avoid undefined behaviour in kill_something_info
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10124
- Patch: 4.4.0/cve-2018-10124-signal-avoid-undefined-behaviour.patch
- From: kernel-4.4.0-130.156
- CVE-2018-10087
- Description:
kernel/exit.c: avoid undefined behaviour when calling wait4()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10087
- Patch: 4.4.0/cve-2018-10087-avoid-undefined-behaviour-when-calling-wait4.patch
- From: kernel-4.4.0-130.156
- CVE-2017-18257
- Description:
f2fs: fix a dead loop in f2fs_fiemap()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-18257
- Patch: 4.4.0/cve-2017-18257-f2fs-fix-a-dead-loop-in-f2fs_remap.patch
- From: kernel-4.4.0-130.156
- CVE-2018-10021
- Description:
scsi: libsas: defer ata device eh commands to libata
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10021
- Patch: 4.4.0/cve-2018-10021-scsi-defer-ata-device-eh-commands-to-libata.patch
- From: kernel-4.4.0-130.156
- CVE-2018-5390
- Description:
tcp: avoid collapses in tcp_prune_queue() if possible
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5390
- Patch: 4.4.0/tcp-avoid-collapses-in-tcp_prune_queue-if-possible.patch
- From: kernel-4.4.0-133.159
- CVE-2018-5390
- Description:
tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5390
- Patch: 4.4.0/tcp-detect-malicious-patterns-in-tcp_collapse_ofo_.patch
- From: kernel-4.4.0-133.159
- Description:
- CVE:
- Patch: 4.4.0/574819-Fix-up-non-directory-creation-in-SGID-directories.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/574820-xfs-don-t-call-xfs_da_shrink_inode-with-NULL-bp.patch
- From:
- CVE-2018-5391
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5391
- Patch: 4.4.0/574984-Revert-net-increase-fragment-memory-usage-limits.patch
- From: kernel-4.4.0-133.159
- CVE-2018-5391
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-5391
- Patch: 4.4.0/574984-Revert-net-increase-fragment-memory-usage-limits-kpatch-1.patch
- From: kernel-4.4.0-133.159
- CVE-2018-10883
- Description:
fix possible out-of-bound write in jbd2_journal_dirty_metadata() by mounting crafted ext4 fs
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10883
- Patch: 4.4.0/cve-2018-10883-jbd2.patch
- From: kernel-4.4.0-134.160
- CVE-2018-10938
- Description:
Cipso: cipso_v4_optptr enter infinite loop
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10938
- Patch: 4.4.0/CVE-2018-10938-Cipso-cipso_v4_optptr-enter-infinite-loop.patch
- From: kernel-4.4.0-138.164
- CVE-2018-13096
- Description:
fix to do sanity check with {sit,nat}_ver_bitmap_bytesize
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13096.html
- Patch: 4.4.0/CVE-2018-13096.patch
- From: =< kernel-4.4.0-138.164~14.04.1
- CVE-2017-18174
- Description:
pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18174.html
- Patch: 4.4.0/CVE-2017-18174-pinctrl-amd-Use-devm_pinctrl_register-for-pinctrl-registration.patch
- From: 4.4.0-141.167
- CVE-2017-18174
- Description:
pinctrl: Add devm_ apis for pinctrl_{register, unregister}
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18174.html
- Patch: 4.4.0/CVE-2017-18174-pinctrl-Add-devm_apis-for-pinctrl_register-unregister.patch
- From: 4.4.0-141.167
- CVE-2017-18174
- Description:
pinctrl: Add devm_ apis for pinctrl_{register, unregister}
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18174.html
- Patch: 4.4.0/CVE-2017-18174-kpatch.patch
- From: 4.4.0-141.167
- CVE-2018-12896
- Description:
posix-timers: Sanitize overrun handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12896.html
- Patch: 4.4.0/CVE-2018-12896-posix-timers-Sanitize-overrun-handling.patch
- From: 4.4.0-141.167
- CVE-2018-12896
- Description:
posix-timers: Sanitize overrun handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12896.html
- Patch: 4.4.0/CVE-2018-12896-posix-timers-Sanitize-overrun-handling-kpatch.patch
- From: 4.4.0-141.167
- CVE-2018-18690
- Description:
xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18690.html
- Patch: 4.4.0/CVE-2018-18690-xfs-dont-fail-when-converting-shortform-attr-to-long-form-during-ATTR_REPLACE.patch
- From: 4.4.0-141.167
- CVE-2018-18710
- Description:
cdrom: fix improper type cast, which can leat to information leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18710.html
- Patch: 4.4.0/CVE-2018-18710-cdrom-fix-improper-type-cast-which-can-leat-to-information-leak.patch
- From: 4.4.0-141.167
- CVE-2018-10883
- Description:
fix possible out-of-bound write in jbd2_journal_dirty_metadata() by mounting crafted ext4 fs (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10883
- Patch: 4.4.0/cve-2018-10883-ext4-pre140.patch
- From: kernel-4.4.0-142.168
- CVE-2018-16862
- Description:
cleancache: fix corruption on missed inode invalidation (new file with same inode may contain old file's data)
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16862
- Patch: 4.4.0/cve-2018-16862-ubuntu.patch
- From: kernel-4.4.0-142.168
- CVE-2018-19824
- Description:
fix use-after-free bug in ALSA when supplying a malicious USB Sound device (with zero interfaces)
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19824
- Patch: 4.4.0/cve-2018-19824-ubuntu.patch
- From: kernel-4.4.0-142.168
- CVE-2018-20169
- Description:
add size checks for reading of an extra descriptor in __usb_get_extra_descriptor()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20169
- Patch: 4.4.0/cve-2018-20169-ubuntu.patch
- From: kernel-4.4.0-142.168
- CVE-2018-19407
- Description:
kvm: x86: fix NULL pointer dereference in the vcpu_scan_ioapic()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19407
- Patch: 4.4.0/cve-2018-19407.patch
- From: kernel-4.4.0-142.168
- CVE-2017-18241
- Description:
f2fs: fix a panic caused by NULL flush_cmd_control
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18241
- Patch: 4.4.0/CVE-2017-18241.patch
- From: kernel-4.4.169
- CVE-2018-19985
- Description:
USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CVE: https://access.redhat.com/security/cve/cve-2018-19985
- Patch: 4.4.0/CVE-2018-19985.patch
- From: kernel-4.4.170
- CVE-2018-7740
- Description:
denial of service (system crash)
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
- Patch: 4.4.0/CVE-2018-7740.patch
- From:
- CVE-2019-6133
- Description:
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6133
- Patch: 4.4.0/CVE-2019-6133.patch
- From:
- CVE-2018-1120
- Description:
denial of service
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1120
- Patch: 4.4.0/cve-2018-1120-128.patch
- From:
- CVE-2017-18249
- Description:
f2fs: fix race condition in between free nid allocator/initializer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18249
- Patch: 4.4.0/CVE-2017-18249-1.patch
- From: kernel-4.4.172
- CVE-2017-18249
- Description:
f2fs: fix race condition in between free nid allocator/initializer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18249
- Patch: 4.4.0/CVE-2017-18249-2.patch
- From: kernel-4.4.172
- CVE-2017-18249
- Description:
f2fs: fix race condition in between free nid allocator/initializer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18249
- Patch: 4.4.0/CVE-2017-18249.patch
- From: kernel-4.4.172
- CVE-2018-13097
- Description:
f2fs: fix to do sanity check with user_block_count
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13097
- Patch: 4.4.0/CVE-2018-13097-1.patch
- From: kernel-4.4.172
- CVE-2018-13097
- Description:
f2fs: fix to do sanity check with user_block_count
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13097
- Patch: 4.4.0/CVE-2018-13097-2.patch
- From: kernel-4.4.172
- CVE-2018-13097
- Description:
f2fs: fix to do sanity check with user_block_count
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13097
- Patch: 4.4.0/CVE-2018-13097.patch
- From: kernel-4.4.172
- CVE-2018-13099
- Description:
f2fs: fix to do sanity check with reserved blkaddr of inline inode
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13099
- Patch: 4.4.0/CVE-2018-13099.patch
- From: kernel-4.4.172
- CVE-2018-13100
- Description:
f2fs: fix to do sanity check with secs_per_zone
- CVE: https://nvd.nist.gov/vuln/detail/2018-13100
- Patch: 4.4.0/CVE-2018-13100-1.patch
- From: kernel-4.4.172
- CVE-2018-13100
- Description:
f2fs: fix to do sanity check with secs_per_zone
- CVE: https://nvd.nist.gov/vuln/detail/2018-13100
- Patch: 4.4.0/CVE-2018-13100.patch
- From: kernel-4.4.172
- CVE-2018-14610
- Description:
btrfs: Check that each block group has corresponding chunk at mount time
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14610
- Patch: 4.4.0/CVE-2018-14610-1.patch
- From: kernel-4.4.171
- Description:
- CVE:
- Patch: 4.4.0/CVE-2018-14610-2.patch
- From:
- CVE-2018-14610
- Description:
btrfs: Check that each block group has corresponding chunk at mount time
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14610
- Patch: 4.4.0/CVE-2018-14610.patch
- From: kernel-4.4.171
- CVE-2018-14611
- Description:
btrfs: validate type when reading a chunk
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14611
- Patch: 4.4.0/CVE-2018-14611-1.patch
- From: kernel-4.4.171
- CVE-2018-14611
- Description:
btrfs: validate type when reading a chunk
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14611
- Patch: 4.4.0/CVE-2018-14611-2.patch
- From: kernel-4.4.171
- CVE-2018-14611
- Description:
btrfs: validate type when reading a chunk
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14611
- Patch: 4.4.0/CVE-2018-14611.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612-1.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612-2.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612-3.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612-4.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612-5.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612-6.patch
- From: kernel-4.4.171
- CVE-2018-14612
- Description:
btrfs: tree-checker: Detect invalid and empty essential trees
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.4.0/CVE-2018-14612.patch
- From: kernel-4.4.171
- CVE-2018-14613
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14613
- Patch: 4.4.0/CVE-2018-14613.patch
- From: kernel-4.4.171
- CVE-2018-14614
- Description:
f2fs: fix to do sanity check with cp_pack_start_sum
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14614
- Patch: 4.4.0/CVE-2018-14614.patch
- From: kernel-4.4.144-170
- CVE-2018-14616
- Description:
f2fs: fix to do sanity check with block address in main area v2
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14616
- Patch: 4.4.0/CVE-2018-14616-1.patch
- From: kernel-4.4.172
- CVE-2018-14616
- Description:
f2fs: fix to do sanity check with block address in main area v2
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14616
- Patch: 4.4.0/CVE-2018-14616.patch
- From: kernel-4.4.172
- CVE-2018-16884
- Description:
sunrpc: use-after-free in svc_process_common
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16884
- Patch: 4.4.0/CVE-2018-16884.patch
- From: kernel-4.4.171
- CVE-2018-16884
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2019-3459
- Description:
Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer
- CVE: https://access.redhat.com/security/cve/cve-2019-3459
- Patch: 4.4.0/CVE-2019-3459.patch
- From: kernel-4.4.144-170
- CVE-2019-3460
- Description:
Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt
- CVE: https://access.redhat.com/security/cve/cve-2019-3460
- Patch: 4.4.0/CVE-2019-3460.patch
- From: kernel-4.4.144-170
- CVE-2019-3701
- Description:
can: gw: ensure DLC boundaries after CAN frame modification
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3701
- Patch: 4.4.0/CVE-2019-3701.patch
- From: kernel-4.4.172
- CVE-2019-3819
- Description:
HID: debug: fix the ring buffer implementation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3819
- Patch: 4.4.0/CVE-2019-3819.patch
- From: kernel-4.4.175
- CVE-2019-6974
- Description:
kvm: fix kvm_ioctl_create_device() reference counting
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6974
- Patch: 4.4.0/CVE-2019-6974.patch
- From: kernel-4.4.176
- CVE-2019-7221
- Description:
KVM: nVMX: unconditionally cancel preemption timer in free_nested
- CVE: https://access.redhat.com/security/cve/cve-2019-7221
- Patch: 4.4.0/CVE-2019-7221.patch
- From: kernel-4.4.175
- CVE-2019-7222
- Description:
KVM: x86: work around leak of uninitialized stack contents
- CVE: https://access.redhat.com/security/cve/cve-2019-7222
- Patch: 4.4.0/CVE-2019-7222-112.patch
- From: kernel-4.4.175
- CVE-2019-9213
- Description:
mm: enforce min addr even if capable() in expand_downwards()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-9213
- Patch: 4.4.0/CVE-2019-9213.patch
- From: kernel-4.4.144-170
- CVE-2019-9517
- Description:
l2tp: pass tunnel pointer to ->session_create()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-9517
- Patch: 4.4.0/CVE-2019-9517.patch
- From: kernel-4.4.144-170
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
- Description:
mds clear cpu buffers
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.4.0/CVE-2018-12126-CVE-2018-12127-CVE-2018-12130-CVE-2019-11091-xenial-7.patch
- From: 4.4.0-148.174
- Description:
- CVE:
- Patch: 4.4.0/CVE-2018-12126-CVE-2018-12127-CVE-2018-12130-CVE-2019-11091-xenial-entry_64.patch
- From:
- CVE-2019-11190
- Description:
binfmt_elf: switch to new creds when switching to new mm
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11190
- Patch: 3.10.0/CVE-2019-11190.patch
- From: >4.8
- CVE-2019-3882
- Description:
vfio/type1: Limit DMA mappings per container
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3882
- Patch: 4.4.0/CVE-2019-3882-vfio-type1-Limit-DMA-mappings-per-container.patch
- From: 4.4.0-147.173
- Description:
- CVE:
- Patch: 4.4.0/CVE-2019-3882-vfio-type1-Limit-DMA-mappings-per-container-kpatch.patch
- From:
- CVE-2019-3874
- Description:
sctp: implement memory accounting on rx path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3874
- Patch: 4.4.0/CVE-2019-3874-sctp-implement-memory-accounting-on-rx-path.patch
- From: 4.4.0-147.173
- CVE-2019-3874
- Description:
sctp: implement memory accounting on tx path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3874
- Patch: 4.4.0/CVE-2019-3874-sctp-implement-memory-accounting-on-tx-path.patch
- From: 4.4.0-147.173
- CVE-2019-11810
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 4.4.0/CVE-2019-11810-scsi-megaraid_sas-return-error-when-create-DMA-pool-failed.patch
- From: 4.4.0-149.175
- CVE-2019-11815
- Description:
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
- CVE: https://access.redhat.com/security/cve/cve-2019-11815
- Patch: 4.4.0/CVE-2019-11815-net-rds-force-to-destroy-connection-if-t_sock-is-NULL-in-rds_tcp_kill_sock.patch
- From: 4.4.0-149.175
- CVE-2018-20510
- Description:
binder: replace "%p" with "%pK"
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20510
- Patch: 4.4.0/CVE-2018-20510-binder-replace-p-with-pK.patch
- From: 4.4.0-155.182
- CVE-2018-20836
- Description:
scsi: libsas: fix a race condition when smp task timeout
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20836
- Patch: 4.4.0/CVE-2018-20836-scsi-libsas-fix-a-race-condition-when-smp-task-timeout.patch
- From: 4.4.0-155.182
- CVE-2019-9503
- Description:
brcmfmac: screening firmware event packet
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-screening-firmware-event-packet.patch
- From: 4.4.0-155.182
- CVE-2019-9503
- Description:
brcmfmac: revise handling events in receive path
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-revise-handling-events-in-receive-path.patch
- From: 4.4.0-155.182
- CVE-2019-9503
- Description:
brcmfmac: fix incorrect event channel deduction
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-fix-incorrect-event-channel-deduction.patch
- From: 4.4.0-155.182
- CVE-2019-9503
- Description:
brcmfmac: add subtype check for event handling in data path
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-assure-SSID-length-from-firmware-is-limited.patch
- From: 4.4.0-155.182
- CVE-2019-12818
- Description:
denial of service
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-12818
- Patch: 4.4.0/CVE-2019-12818.patch
- From: 4.9.189-3+deb9u1
- CVE-2019-12819
- Description:
denial of service
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-12819
- Patch: 4.4.0/CVE-2019-12819.patch
- From: 4.9.189-3+deb9u1
- CVE-2019-16413
- Description:
9p: use inode->i_lock to protect i_size_write() under 32-bit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16413
- Patch: 4.4.0/CVE-2019-16413-9p-use-inode-i_lock-to-protect-i_size_write-under-32-bit.patch
- From: kernel-4.4.0-146.172
- CVE-2019-16995
- Description:
net: hsr: fix memory leak in hsr_dev_finalize()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16995
- Patch: 4.4.0/CVE-2019-16995-net-hsr-fix-memory-leak-in-hsr_dev_finalize.patch
- From: kernel-4.4.0-146.172
- CVE-2019-2101
- Description:
fixed possible OOB-read with improper input validation in drivers/media/usb/uvc/uvc_driver.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-2101.html
- Patch: 4.4.0/CVE-2019-2101.patch
- From: 4.15.0-58.64
- CVE-2017-18551
- Description:
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18551
- Patch: 4.4.0/CVE-2017-18551-i2c-core-smbus-prevent-stack-corruption-on-read-I2C_BLOCK_DATA.patch
- From: kernel-4.4.0-146.172
- CVE-2019-11477
- Description:
UBUNTU: SAUCE: tcp: limit payload size of sacked skbs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11477
- Patch: 4.4.0/CVE-2019-11477-tcp-limit-payload-size-of-sacked-skbs.patch
- From: 4.4.0-151.178
- CVE-2019-11478
- Description:
UBUNTU: SAUCE: tcp: tcp_fragment() should apply sane memory limits
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11478
- Patch: 4.4.0/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
- From: 4.4.0-151.178
- CVE-2019-11479
- Description:
tcp: add tcp_min_snd_mss sysctl
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.4.0/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl-kpatch.patch
- From:
- CVE-2019-11479
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.4.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing-kpatch.patch
- From:
- CVE-2019-11884
- Description:
fix buffer overflow
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11884
- Patch: 4.4.0/CVE-2019-11884-bluetooth-hidp-fix-buffer-overflow.patch
- From: 4.9.189-3+deb9u1
- CVE-2019-11833
- Description:
local user can obtain sensitive information by reading uninitialized data in the filesystem
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11833
- Patch: 4.4.0/CVE-2019-11833.patch
- From: 4.9.189-3+deb9u1
- CVE-2019-10142
- Description:
drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-10142
- Patch: 4.4.0/CVE-2019-10142-drivers-virt-fsl_hypervisor.c-prevent-integer-overflow-in-ioctl.patch
- From: linux-4.9.189-3
- CVE-2019-3846
- Description:
mwifiex: Abort at too short BSS descriptor element
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3846.html
- Patch: 4.4.0/CVE-2019-3846-mwifiex-fix-possible-buffer-overflows-at-parsing-bss-descriptor.patch
- From: kernel-4.4.0-159.187
- CVE-2019-10126
- Description:
mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-10126
- Patch: 4.4.0/CVE-2019-10126-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_ies.patch
- From: kernel-4.4.0-159.187
- CVE-2019-1125
- Description:
x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1125.html
- Patch: 4.4.0/CVE-2019-1125-x86-speculation-Prepare-entry-code-for-Spectre-v1-swapgs-mitigations-124.patch
- From: kernel-4.4.0-159.187
- CVE-2019-11599
- Description:
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11599.html
- Patch: 4.4.0/CVE-2019-11599-coredump-fix-race-condition-between-mmget_not_zero-get_task_mm-and-core-dumping-124.patch
- From: kernel-4.4.0-159.187
- CVE-2019-13272
- Description:
ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13272.html
- Patch: 4.4.0/CVE-2019-13272-ptrace-Fix-ptracer_cred-handling-for-PTRACE_TRACEME.patch
- From: kernel-4.4.0-159.187
- Description:
- CVE:
- Patch: 4.4.0/kaiser-mds-macro.patch
- From:
- CVE-2019-14835
- Description:
kvm: fix vhost_net log overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14835.html
- Patch: 4.4.0/kvm-vhost_net-log-overflow.patch
- From: 4.4.0-159.187+
- CVE-2018-20856
- Description:
use-after-free
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20856
- Patch: 4.4.0/CVE-2018-20856.patch
- From: kernel-4.4.0-161.189
- CVE-2019-14284
- Description:
denial of service by division-by-zero
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14284
- Patch: 4.4.0/CVE-2019-14284.patch
- From: kernel-4.4.0-161.189
- CVE-2019-14283
- Description:
drivers/block/floppy.c: an integer overflow and out-of-bounds read
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14283
- Patch: 4.4.0/CVE-2019-14283.patch
- From: kernel-4.4.0-161.189
- CVE-2018-20976
- Description:
xfs: clear sb->s_fs_info on mount failure
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20976
- Patch: 4.4.0/CVE-2018-20976-xfs-clear-sb-s_fs_info-on-mount-failure.patch
- From: kernel-4.4.0-165.193
- CVE-2016-10905
- Description:
GFS2: don't set rgrp gl_object until it's inserted into rgrp tree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10905
- Patch: 4.4.0/CVE-2016-10905-GFS2-dont-set-rgrp-gl_object-until-its-inserted-into-rgrp-tree.patch
- From: kernel-4.4.0-165.193
- CVE-2017-18509
- Description:
ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18509
- Patch: 4.4.0/CVE-2017-18509-ipv6-check-sk-sk_type-and-protocol-early-in-ip_mroute_set-getsockopt.patch
- From: kernel-4.4.0-165.193
- CVE-2018-20961
- Description:
usb: gadget: f_midi: fail if set_alt fails to allocate requests
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20961
- Patch: 4.4.0/CVE-2018-20961-usb-gadget-f_midi-fail-if-set_alt-fails-to-allocate-requests.patch
- From: kernel-4.4.0-165.193
- CVE-2018-20961
- Description:
USB: gadget: f_midi: fixing a possible double-free in f_midi
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20961
- Patch: 4.4.0/CVE-2018-20961-USB-gadget-f_midi-fixing-a-possible-double-free-in-f_midi-124.148.patch
- From: kernel-4.4.0-165.193
- CVE-2019-0136
- Description:
mac80211: drop robust management frames from unknown TA
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0136
- Patch: 4.4.0/CVE-2019-0136-mac80211-drop-robust-management-frames-from-unknown-TA.patch
- From: kernel-4.4.0-165.193
- CVE-2019-0136
- Description:
mac80211: handle deauthentication/disassociation from TDLS peer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0136
- Patch: 4.4.0/CVE-2019-0136-mac80211-handle-deauthentication-disassociation-from-TDLS-peer.patch
- From: kernel-4.4.0-165.193
- CVE-2019-10207
- Description:
Bluetooth: hci_uart: check for missing tty operations
- CVE: https://access.redhat.com/security/cve/cve-2019-10207
- Patch: 4.4.0/CVE-2019-10207-Bluetooth-hci_uart-check-for-missing-tty-operations.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487
- Description:
pipe: add pipe_buf_get() helper
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-pipe-add-pipe_buf_get-helper.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487
- Description:
mm: add 'try_get_page()' helper function
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-add-try_get_page-helper-function.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487
- Description:
fs: prevent page refcount overflow in pipe_buf_get
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-fs-prevent-page-refcount-overflow-in-pipe_buf_get-143.169.patch
- From: 4.4.0-165.193
- CVE-2019-11487
- Description:
mm: make page ref count overflow check tighter and more explicit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-make-page-ref-count-overflow-check-tighter-and-more-explicit.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487
- Description:
mm, gup: ensure real head page is ref-counted when using hugepages
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-gup-ensure-real-head-page-is-ref-counted-when-using-hugepages.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-prevent-get_user_pages-from-overflowing-page-refcount.patch
- From: kernel-4.4.0-165.193
- CVE-2019-13631
- Description:
Input: gtco - bounds check collection indent level
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-13631
- Patch: 4.4.0/CVE-2019-13631-Input-gtco-bounds-check-collection-indent-level.patch
- From: kernel-4.4.0-165.193
- CVE-2019-15211
- Description:
media: radio-raremono: change devm_k*alloc to k*alloc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15211
- Patch: 4.4.0/CVE-2019-15211-media-radio-raremono-change-devm_kalloc-to-kalloc.patch
- From: kernel-4.4.0-165.193
- CVE-2019-15215
- Description:
media: cpia2_usb: first wake up, then free in disconnect
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15215
- Patch: 4.4.0/CVE-2019-15215-media-cpia2_usb-first-wake-up-then-free-in-disconnect.patch
- From: kernel-4.4.0-165.193
- CVE-2019-15926
- Description:
ath6kl: add some bounds checking
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15926
- Patch: 4.4.0/CVE-2019-15926-ath6kl-add-some-bounds-checking.patch
- From: 4.4.0-165.193
- CVE-2019-15217
- Description:
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15217
- Patch: 4.4.0/CVE-2019-15217-media-usb-zr364xx-Fix-KASAN-null-ptr-deref-Read-in-zr364xx_vidioc_querycap.patch
- From:
- CVE-2017-18232
- Description:
fix possible deadlock with mutex within SCSI libsas (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18232
- Patch: 3.10.0/cve-2017-18232-scsi-libsas-direct-call-probe-and-destruct.patch
- From: 4.15.*
- CVE-2018-21008
- Description:
rsi: add fix for crash during assertions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2019-21008.html
- Patch: 4.4.0/CVE-2018-21008-rsi-add-fix-for-crash-during-assertions.patch
- From: 4.4.0-166.195
- CVE-2019-14814
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14814
- Patch: 4.4.0/CVE-2019-14814-mwifiex-Fix-three-heap-overflow-at-parsing-element.patch
- From: 4.4.0-166.195
- CVE-2019-14816
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14816
- Patch: 4.4.0/CVE-2019-14816-mwifiex-Fix-three-heap-overflow-at-parsing-element.patch
- From: 4.4.0-166.195
- CVE-2019-14821
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14821
- Patch: 4.4.0/CVE-2019-14821-KVM-coalesced_mmio-add-bounds-checking.patch
- From: 4.4.0-166.195
- CVE-2019-15117
- Description:
ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15117
- Patch: 4.4.0/CVE-2019-15117-ALSA-usb-audio-Fix-an-OOB-bug-in-parse_audio_mixer.patch
- From: 4.4.0-166.195
- CVE-2019-15118
- Description:
ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15118
- Patch: 4.4.0/CVE-2019-15118-ALSA-usb-audio-Fix-a-stack-buffer-overflow-bug-in-.patch
- From: 4.4.0-166.195
- CVE-2019-15505
- Description:
media: technisat-usb2: break out of loop at end of buffer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15505
- Patch: 4.4.0/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of-b.patch
- From: 4.4.0-166.195
- CVE-2018-12207
- Description:
x86: kvm: Do not release the page inside mmu_set_spte() (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.4.0/itlb/CVE-2018-12207-01-x86-kvm-Do-not-release-the-page-inside-mmu_set_spte.patch
- From:
- CVE-2018-12207
- Description:
CVE-2018-12207 prerequirement - code cleanup and simplification
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.4.0/itlb/CVE-2018-12207-02-kvm-x86-make-FNAME_fetch-and__direct_map-more-similar.patch
- From:
- CVE-2018-12207
- Description:
x86: kvm: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.4.0/itlb/CVE-2018-12207-03-kvm-x86-change-kvm_mmu_page_get_gfn-BUG_ON-to-WARN_ON.patch
- From:
- CVE-2018-12207
- Description:
x86: kvm: vmx,svm: always run with EFER.NXE=1 when shadow paging is active (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.4.0/itlb/CVE-2018-12207-04-kvm-vmx-svm-always-run-with-EFER.NXE-1-when-shadow-paging-is-active.patch
- From:
- CVE-2018-12207
- Description:
kvm: Convert kvm_lock to a mutex (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.4.0/itlb/CVE-2018-12207-05-kvm-Convert-kvm_lock-to-a-mutex.patch
- From:
- CVE-2018-12207
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.4.0/itlb/CVE-2018-12207-06-mitigation.patch
- From:
- CVE-2019-15098
- Description:
ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15098.html
- Patch: 4.15.0/CVE-2019-15098-ath6kl-fix-a-NULL-ptr-deref-bug-in-ath6kl_usb_alloc_urb_from_pipe.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17052
- Description:
ax25: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17052.html
- Patch: 4.15.0/CVE-2019-17052-ax25-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17053
- Description:
ieee802154: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17053.html
- Patch: 4.15.0/CVE-2019-17053-ieee802154-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17054
- Description:
appletalk: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17054.html
- Patch: 4.15.0/CVE-2019-17054-appletalk-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17055
- Description:
mISDN: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17055.html
- Patch: 4.15.0/CVE-2019-17055-mISDN-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17056
- Description:
nfc: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17056.html
- Patch: 4.15.0/CVE-2019-17056-nfc-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: kernel-4.15.0-67.76
- CVE-2019-17666
- Description:
rtlwifi: enforce CAP_NET_RAW for raw sockets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17666.html
- Patch: 4.15.0/CVE-2019-17666-UBUNTU-SAUCE-rtlwifi-Fix-potential-overflow-on-P2P-code.patch
- From: kernel-4.15.0-67.76
- CVE-2019-2215
- Description:
ANDROID: binder: remove waitqueue when thread exits.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-2215.html
- Patch: 4.4.0/CVE-2019-2215-ANDROID-binder-remove-waitqueue-when-thread-exits-124.148.patch
- From: 4.4.0-168.197
- CVE-2019-16746
- Description:
nl80211: fixed buffer overflow when handling beacon settings
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.4.0/CVE-2019-16746-nl80211-validate-beacon-head.patch
- From: 4.4.0-168.197
- CVE-2019-16746
- Description:
nl80211: fixed buffer overflow when handling beacon settings (helper functions)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.4.0/CVE-2019-16746-helpers.patch
- From: 4.4.0-168.197
- CVE-2019-0155
- Description:
drm/i915/gtt: Add read only pages to gen8_pte_encode
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-gtt-Add-read-only-pages-to-gen8_pte_encode.patch
- From: 4.4.0-169.168
- CVE-2019-0155
- Description:
drm/i915/gtt: Read-only pages for insert_entries on bdw+
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-gtt-Read-only-pages-for-insert_entries-on-bdw.patch
- From: 4.4.0-169.198
- Description:
- CVE:
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-gtt-Read-only-pages-for-insert_entries-on-bdw-kpatch.patch
- From:
- CVE-2019-0155
- Description:
drm/i915/gtt: Disable read-only support under GVT
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-gtt-Disable-read-only-support-under-GVT.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Rename gen7 cmdparser tables
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Rename-gen7-cmdparser-tables.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Disable Secure Batches for gen6+
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155UBUNTU-SAUCE-i915_bpo-drm-i915-Disable-Secure-Batches-for-gen6.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Use binary search for faster register lookup
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-cmdparser-Use-binary-search-for-faster-register-lookup.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Check reg_table_count before derefencing.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-cmdparser-Check-reg_table_count-before-derefencing.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Remove Master tables from cmdparser
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Remove-Master-tables-from-cmdparser.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Add support for mandatory cmdparsing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Add-support-for-mandatory-cmdparsing.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Support ro ppgtt mapped cmdparser shadow buffers
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Support-ro-ppgtt-mapped-cmdparser-shadow-buffers.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Allow parsing of unsized batches
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Allow-parsing-of-unsized-batches.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Add gen9 BCS cmdparsing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Add-gen9-BCS-cmdparsing.patch
- From: 4.4.0-169.198
- Description:
- CVE:
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-Add-gen9-BCS-cmdparsing-kpatch.patch
- From:
- CVE-2019-0155
- Description:
Add support for backward jumps
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-cmdparser-Add-support-for-backward-jumps.patch
- From: 4.4.0-169.198
- Description:
- CVE:
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-cmdparser-Add-support-for-backward-jumps-kpatch.patch
- From:
- CVE-2019-0155
- Description:
drm/i915/cmdparser: Ignore Length operands during command matching
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0155-UBUNTU-SAUCE-i915_bpo-drm-i915-cmdparser-Ignore-Length-operands-during-command-matching.patch
- From: 4.4.0-169.198
- CVE-2019-0155
- Description:
drm/i915: Lower RM timeout to avoid DSI hard hangs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.4.0/i915/CVE-2019-0154-UBUNTU-SAUCE-i915_bpo-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch
- From: 4.4.0-169.198
- CVE-2019-0154
- Description:
drm/i915/gen8+: Add RC6 CTX corruption WA
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0154
- Patch: 4.4.0/i915/CVE-2019-0154-UBUNTU-SAUCE-i915_bpo-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch
- From: 4.4.0-168.197
- Description:
- CVE:
- Patch: 4.4.0/i915/CVE-2019-0154-UBUNTU-SAUCE-i915_bpo-drm-i915-gen8-Add-RC6-CTX-corruption-WA-kpatch.patch
- From:
- CVE-2019-0154
- Description:
drm/i915/cmdparser: Fix jump whitelist clearing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0154
- Patch: 4.4.0/i915/CVE-2019-0154-UBUNTU-SAUCE-drm-i915-cmdparser-Fix-jump-whitelist-clearing.patch
- From: 4.4.0-168.197
- Description:
- CVE:
- Patch: 4.4.0/i915/CVE-2019-0155-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs-kpatch.patch
- From:
- CVE-2019-11135
- Description:
x86/speculation/taa: Add mitigation for TSX Async Abort
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-11135
- Patch: 4.9.0/CVE-2019-11135-TSX-Async-Abort.patch
- From: 4.9.189-3+deb9u2
- CVE-2018-20784
- Description:
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20784
- Patch: 4.4.0/CVE-2018-20784.patch
- From: kernel-4.4.0-170.199
- CVE-2019-17075
- Description:
fixed possible DoS in drivers/infiniband/hw/cxgb4/mem.c via directly calling dma_map_single() from a stack variable
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17075.html
- Patch: 4.4.0/CVE-2019-17075.patch
- From: kernel-4.4.0-170.199
- CVE-2019-17133
- Description:
fixed buffer overflow in cfg80211_mgd_wext_giwessid() in net/wireless/wext-sme.c which does not reject a long SSID IE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17133.html
- Patch: 4.4.0/CVE-2019-17133.patch
- From: kernel-4.4.0-170.199
- CVE-2019-14895
- Description:
mwifiex: fix possible heap overflow in mwifiex_process_country_ie()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14895
- Patch: 4.4.0/CVE-2019-14895-mwifiex-fix-possible-heap-overflow-in.patch
- From: kernel-4.4.0-171.200
- CVE-2019-14896 CVE-2019-14897
- Description:
libertas: Fix two buffer overflows at parsing bss descriptor
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14897
- Patch: 4.4.0/CVE-2019-14896-14897-libertas-Fix-two-buffer-overflows-at-.patch
- From: kernel-4.4.0-171.200
- CVE-2019-14901
- Description:
fix a heap overflow in mmwifiex_process_tdls_action_frame()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14901
- Patch: 4.4.0/CVE-2019-14901-mwifiex-Fix-heap-overflow-in-mmwifiex.patch
- From: kernel-4.4.0-171.200
- CVE-2019-19052
- Description:
can: gs_usb: gs_can_open(): prevent memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19052
- Patch: 5.0.0/cve-2019-19052-can-gs_can_open-revent-memory-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19524
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19524
- Patch: 5.0.0/cve-2019-19524-ff-memless-kill-timer-in-destroy.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19534
- Description:
can: peak_usb: fix slab info leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19534
- Patch: 5.0.0/cve-2019-19534-peak_usb-fix-slab-info-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-14615
- Description:
drm/i915/gen9: Clear residual context state on context switch
- CVE: https://access.redhat.com/security/cve/cve-2019-14615
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-14615-drm-i915-gen9-Clear-residual-context-state-on-context-switch.patch
- From: kernel-4.4.0-173.203
- CVE-2019-15291
- Description:
media: b2c2-flexcop-usb: add sanity checking
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15291
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-15291-media-b2c2-flexcop-usb-add-sanity-checking.patch
- From: kernel-4.4.0-173.203
- Description:
- CVE:
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-14615-kpatch.patch
- From:
- CVE-2019-18683
- Description:
media: vivid: Fix wrong locking that causes race conditions on streaming stop
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-18683
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-18683-media-vivid-Fix-wrong-locking-that-causes-race-conditions-on-streaming-stop.patch
- From: kernel-4.4.0-173.203
- CVE-2019-18885
- Description:
btrfs: abort transaction after failed inode updates in create_subvol
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-18885-btrfs-abort-transaction-after-failed-inode-updates-i.patch
- From: 4.4.0-173.203
- CVE-2019-18885
- Description:
btrfs: Remove btrfs_bio::flags member
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-18885-btrfs-Remove-btrfs_bio-flags-member.patch
- From: 4.4.0-173.203
- CVE-2019-18885
- Description:
btrfs: refactor btrfs_find_device() take fs_devices as argument
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-18885-btrfs-refactor-btrfs_find_device-take-fs_devices-as-.patch
- From: 4.4.0-173.203
- CVE-2019-18885
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-18885-btrfs-merge-btrfs_find_device-and-find_device.patch
- From: 4.4.0-173.203
- CVE-2019-19057
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19057
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19057-mwifiex-pcie-Fix-memory-leak-in-mwifiex_pcie_init_evt_ring.patch
- From: kernel-4.4.0-173.203
- CVE-2019-19062
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19062
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19062-crypto-user-fix-memory-leak-in-crypto_report.patch
- From: kernel-4.4.0-173.203
- CVE-2019-19063
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19063
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19063-rtlwifi-prevent-memory-leak-in-rtl_usb_probe.patch
- From: kernel-4.4.0-173.203
- CVE-2019-19227
- Description:
appletalk: Fix potential NULL pointer dereference in unregister_snap_client
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19227
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19227-appletalk-Fix-potential-NULL-pointer-dereference-in-148.174.patch
- From: 4.4.0-173.203
- CVE-2019-19332
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19332
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19332-KVM-x86-fix-out-of-bounds-write-in-KVM_GET_EMULATED_.patch
- From: 4.4.0-173.203
- CVE-2019-19332
- Description:
Revert "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)"
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19332
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19332-Revert-KVM-x86-fix-out-of-bounds-write-in-KVM_GET_EM.patch
- From: 4.4.0-173.203
- Description:
net: icmp: fix data-race in cmp_global_allow()
- CVE:
- Patch: 4.4.0/CVE-2020-25705-net-icmp-fix-data-race-in-cmp_global_allow.patch
- From: kernel-4.4.0-171.200
- CVE-2019-15220
- Description:
p54usb: Fix race between disconnect and firmware loading
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15220
- Patch: 4.4.0/CVE-2019-15220-p54usb-Fix-race-between-disconnect-and-firmware-loading.patch
- From: 4.4.0-174.204
- CVE-2019-15221
- Description:
ALSA: line6: Fix write on zero-sized buffer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15221
- Patch: 4.4.0/CVE-2019-15221-ALSA-line6-Fix-write-on-zero-sized-buffer.patch
- From: 4.4.0-174.204
- CVE-2019-17351
- Description:
xen: let alloc_xenballooned_pages() fail if not enough memory free
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17351
- Patch: 4.4.0/CVE-2019-17351-xen-let-alloc_xenballooned_pages-fail-if-not-enough-memory-free.patch
- From: 4.4.0-174.204
- CVE-2019-19051
- Description:
wimax: i2400: fix memory leak
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19051
- Patch: 4.4.0/wimax-i2400-fix-memory-leak.patch
- From: 4.4.0-174.204
- CVE-2019-19051
- Description:
wimax: i2400: Fix memory leak in i2400m_op_rfkill_sw_toggle
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19051
- Patch: 4.4.0/CVE-2019-19051-wimax-i2400-Fix-memory-leak-in-i2400m_op_rfkill_sw_toggle.patch
- From: 4.4.0-174.204
- CVE-2019-19056
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19056
- Patch: 4.4.0/CVE-2019-19056-mwifiex-pcie-Fix-memory-leak-in-mwifiex_pcie_alloc_cmdrsp_buf.patch
- From: 4.4.0-174.204
- CVE-2019-19066
- Description:
scsi: bfa: release allocated memory in case of error
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19066
- Patch: 4.4.0/CVE-2019-19066-scsi-bfa-release-allocated-memory-in-case-of-error.patch
- From: 4.4.0-174.204
- CVE-2019-19068
- Description:
rtl8xxxu: prevent leaking urb
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19068
- Patch: 4.4.0/CVE-2019-19068-rtl8xxxu-prevent-leaking-urb.patch
- From: 4.4.0-174.204
- CVE-2019-19965
- Description:
scsi: libsas: stop discovering if oob mode is disconnected
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19965
- Patch: 4.4.0/CVE-2019-19965-scsi-libsas-stop-discovering-if-oob-mode-is-disconnected.patch
- From: 4.4.0-174.204
- CVE-2019-20096
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-20096
- Patch: 4.4.0/CVE-2019-20096-dccp-Fix-memleak-in__feat_register_sp.patch
- From: 4.4.0-174.204
- CVE-2019-5108
- Description:
cfg80211/mac80211: make ieee80211_send_layer2_update a public function
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 4.4.0/cfg80211-mac80211-make-ieee80211_send_layer2_update-a-public-function.patch
- From: 4.4.0-174.204
- CVE-2019-5108
- Description:
mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 4.4.0/CVE-2019-5108-mac80211-Do-not-send-Layer-2-Update-frame-before-authorization.patch
- From: 4.4.0-174.204
- CVE-2020-2732
- Description:
kvm: nVMX: fixed L2 guest possible tricking the L0 hypervisor to access sensitive L1 resources
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 4.1.12/CVE-2020-2732.patch
- From: 4.1.12-124.36.1.1
- CVE-2020-14416
- Description:
can, slip: Protect tty->disc_data in write_wakeup and close with RCU
- CVE: https://linux.oracle.com/cve/CVE-2029-14416.html
- Patch: 4.1.12/cve-2020-14416-can-protect-disc_data-and-close-with-RCU.patch
- From: 4.1.12-124.41.1
- CVE-2019-19768
- Description:
blktrace: fix unlocked registration of tracepoints
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2019-19768-blktrace-fix-unlocked-registration-of-tracepoints.patch
- From: 4.4.0-178.208
- CVE-2019-19768
- Description:
tracing/blktrace: Fix to allow setting same value
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2019-19768-tracing-blktrace-Fix-to-allow-setting-same-value.patch
- From: 4.4.0-178.208
- CVE-2019-19768
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2019-19768-blktrace-Protect-q-blk_trace-with-RCU.patch
- From: 4.4.0-178.208
- CVE-2019-19768
- Description:
blktrace: fix dereference after null check
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19768
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2019-19768-blktrace-fix-dereference-after-null-check.patch
- From: 4.4.0-178.208
- CVE-2019-16233
- Description:
scsi: qla2xxx: fix a potential NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16233
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2019-16233-scsi-qla2xxx-fix-a-potential-NULL-pointer-dereference.patch
- From: 4.4.0-178.208
- CVE-2019-16234
- Description:
iwlwifi: pcie: fix rb_allocator workqueue allocation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16234
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2019-16234-iwlwifi-pcie-fix-rb_allocator-workqueue-allocation-137.patch
- From: 4.4.0-178.208
- CVE-2020-8648
- Description:
vt: selection, close sel_buffer race
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8648
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2020-8648-vt-selection-close-sel_buffer-race.patch
- From: 4.4.0-178.208
- CVE-2020-9383
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9383
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2020-9383-floppy-check-FDC-index-for-errors-before-assigning-i.patch
- From: 4.4.0-178.208
- CVE-2020-11565
- Description:
stack-based out-of-bounds write
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11565
- Patch: 4.9.0/CVE-2020-11565.patch
- From: 4.9.189-3+deb9u2
- CVE-2020-10942
- Description:
kernel stack corruption via crafted system calls
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10942
- Patch: 4.9.0/CVE-2020-10942.patch
- From: 4.9.210-1
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11608
- Patch: 4.15.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: 4.15.0-97.98
- Description:
media: stv06xx: add missing descriptor sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11609
- Patch: 4.15.0/CVE-2020-11609-media-stv06xx-add-missing-descriptor-sanity-checks.patch
- From: 4.15.0-97.98
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11668
- Patch: 4.15.0/CVE-2020-11668-media-xirlink_cit-add-missing-descriptor-sanity-checks.patch
- From: 4.15.0-97.98
- CVE-2019-19060
- Description:
iio: imu: adis16400: release allocated memory on failure
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19060.html
- Patch: ubuntu-xenial/4.4.0-179.209/cve-2019-19060-adis-fix-a-memory-leak.patch
- From: kernel-4.4.0-179.209
- CVE-2020-11494
- Description:
CAN: zero scl_bump properly
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11494.html
- Patch: ubuntu-xenial/4.4.0-179.209/cve-2020-11494-can-leaks-uninitialized-data.patch
- From: kernel-4.4.0-179.209
- CVE-2020-1749
- Description:
sctp: fix possibly using a bad saddr with a given dst
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.4.0/581376-sctp-fix-possibly-using-a-bad-saddr-with-a-given-d.patch
- From: 4.4.0-179.209
- CVE-2020-1749
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.4.0/581410-net-ipv6-add-net-argument-to-ip6_dst_lookup_flow.patch
- From: 4.4.0-180.210
- CVE-2020-1749
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.4.0/581411-net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-i.patch
- From: 4.4.0-180.210
- Description:
- CVE:
- Patch: 4.4.0/581411-net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-i-kpatch-1.patch
- From:
- CVE-2020-12826
- Description:
signal: Extend exec_id to 64bits
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12826
- Patch: 4.4.0/581442-signal-Extend-exec_id-to-64bits.patch
- From: 4.4.0-180.210
- CVE-2020-12826
- Description:
signal: Extend exec_id to 64bits (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12826
- Patch: 4.4.0/581442-signal-Extend-exec_id-to-64bits-kpatch-1.patch
- From: 4.4.0-180.210
- CVE-2020-12826
- Description:
signal: Extend exec_id to 64bits (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12826
- Patch: 4.4.0/581442-signal-Extend-exec_id-to-64bits-kpatch-2.patch
- From: 4.4.0-180.210
- CVE-2020-12114
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12114
- Patch: 4.4.0/581540-fs-namespace.c-fix-mountpoint-reference-counter-ra.patch
- From: 4.4.0-180.210
- CVE-2020-12464
- Description:
drivers: usb: core: Don't disable irqs in usb_sg_wait() during URB submit.
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12464
- Patch: 4.4.0/581543-drivers-usb-core-Don-t-disable-irqs-in-usb_sg_wait.patch
- From: 4.4.0-180.210
- CVE-2020-12464
- Description:
drivers: usb: core: Minimize irq disabling in usb_sg_cancel()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12464
- Patch: 4.4.0/581544-drivers-usb-core-Minimize-irq-disabling-in-usb_sg_.patch
- From: 4.4.0-180.210
- CVE-2020-12464
- Description:
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12464
- Patch: 4.4.0/581545-USB-core-Fix-free-while-in-use-bug-in-the-USB-S-Gl.patch
- From: 4.4.0-180.210
- CVE-2019-19319
- Description:
ext4: protect journal inode's blocks using block_validity
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-19319
- Patch: 4.4.0/581577-ext4-protect-journal-inode-s-blocks-using-block_va.patch
- From: 4.4.0-180.210
- CVE-2019-19319
- Description:
ext4: unsigned int compared against zero
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-19319
- Patch: 4.4.0/581580-ext4-unsigned-int-compared-against-zero.patch
- From: 4.4.0-180.210
- CVE-2019-19319
- Description:
ext4: don't perform block validity checks on the journal inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.4.0/CVE-2019-19319-kpatch.patch
- From: 4.9.210-1+deb9u1
- Description:
- CVE:
- Patch: 4.9.0/cve-2019-19319-kpatch-fix-rbtree.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-19319-kpatch-fix-races-amazon1.patch
- From:
- CVE-2020-12114
- Description:
propagate_one(): mnt_set_mountpoint() needs mount_lock
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12114
- Patch: 4.4.0/581581-propagate_one-mnt_set_mountpoint-needs-mount_lock.patch
- From: 4.4.0-180.210
- CVE-2020-10751
- Description:
selinux: properly handle multiple messages in selinux_netlink_send()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-10751
- Patch: 4.4.0/581600-selinux-properly-handle-multiple-messages-in-selin.patch
- From: 4.4.0-180.210
- CVE-2020-12769
- Description:
spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-12769
- Patch: 4.4.0/581905-spi-spi-dw-Add-lock-protect-dw_spi-rx-tx-to-preven.patch
- From: 4.4.0-181.211
- CVE-2020-0543
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2020-8992
- Description:
ext4: add cond_resched() to ext4_protect_reserved_inode
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8992.html
- Patch: 4.4.0/CVE-2020-8992-ext4-add-cond_resched-to-ext4_protect_reserved_inode.patch
- From: 4.4.0-185.215
- CVE-2020-10690
- Description:
Incorrect version of patch were initially used. Work on correct fix is in progress.
- CVE:
- Patch: skipped/CVE-2020-10690.patch
- From:
- CVE-2020-12770
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12770
- Patch: 4.9.0/cve-2020-12770-scsi-sg-add-sg_remove_request-in-sg_write.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-10711
- Description:
netlabel: cope with NULL catmap
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 3.10.0/CVE-2020-10711.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2020-13143
- Description:
USB: gadget: fix illegal array access in binding with UDC
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-13143
- Patch: 4.9.0/cve-2020-13143-usb-gadget-fix-illegal-array-access.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-14305
- Description:
kernel: memory corruption in Voice over IP nf_conntrack_h323 module
- CVE: https://access.redhat.com/security/cve/cve-2020-14305
- Patch: 3.10.0/CVE-2020-14305.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19947
- Description:
can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19947
- Patch: 4.4.0/CVE-2019-19947-can-kvaser_usb-kvaser_usb_leaf-Fix-some-info-leaks-to-USB-devices.patch
- From: 4.4.0-186.216
- CVE-2020-10732
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10732
- Patch: 4.9.0/cve-2020-10732-binfmt_elf-allocate-initialized-memory-30.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-20810
- Description:
media: go7007: fix a miss of snd_card_free
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-20810
- Patch: 4.4.0/CVE-2019-20810-media-go7007-fix-a-miss-of-snd_card_free.patch
- From: 4.4.0-186.216
- CVE-2020-13974
- Description:
vt: keyboard: avoid signed integer overflow in k_ascii
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-13974
- Patch: 4.4.0/CVE-2020-13974-vt-keyboard-avoid-signed-integer-overflow-in-k_ascii.patch
- From: 4.4.0-186.216
- CVE-2020-11935
- Description:
aufs: do not call i_readcount_inc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11935.html
- Patch: 4.4.0/CVE-2020-11935-aufs-do-not-call-i_readcount_inc.patch
- From: 4.4.0-186.216
- CVE-2020-11935
- Description:
aufs: bugfix, IMA i_readcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11935.html
- Patch: 4.4.0/CVE-2020-11935-aufs-bugfix-IMA-i_readcount.patch
- From: 4.4.0-186.216
- CVE-2020-12771
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://access.redhat.com/security/cve/CVE-2020-12771
- Patch: 4.14.0/cve-2020-12771-bcache-fix-potential-deadlock.patch
- From: 4.14.186-110.268.amzn1
- CVE-2020-15393
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-15393
- Patch: 4.19.0/CVE-2020-15393.patch
- From: 4.19.131-1
- CVE-2018-10323
- Description:
xfs: set format back to extents if xfs_bmap_extents_to_btree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10323.html
- Patch: 4.4.0/CVE-2018-10323-xfs-set-format-back-to-extents-if-xfs_bmap_extents_to_btree.patch
- From: Ubuntu-4.4.0-188.218
- CVE-2019-9453
- Description:
f2fs: fix to avoid accessing xattr across the boundary
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-9453
- Patch: 4.4.0/CVE-2019-9453-f2fs-fix-to-avoid-accessing-xattr-across-the-boundary.patch
- From: 4.4.0-190.220
- CVE-2019-9445
- Description:
f2fs: check memory boundary by insane namelen
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9445
- Patch: 4.4.0/CVE-2019-9445-f2fs-check-memory-boundary-by-insane-namelen.patch
- From: 4.4.0-190.220
- CVE-2019-9445
- Description:
f2fs: check if file namelen exceeds max value
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9445
- Patch: 4.4.0/CVE-2019-9445-f2fs-check-if-file-namelen-exceeds-max-value.patch
- From: 4.4.0-190.220
- CVE-2019-19054
- Description:
media: rc: prevent memory leak in cx23888_ir_probe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19054
- Patch: 4.4.0/CVE-2019-19054-media-rc-prevent-memory-leak-in-cx23888_ir_probe.patch
- From: 4.4.0-190.220
- CVE-2019-19073
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19073
- Patch: 4.4.0/CVE-2019-19073-ath9k_htc-release-allocated-buffer-if-timed-out.patch
- From: 4.4.0-190.220
- CVE-2019-19074
- Description:
ath9k: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19074
- Patch: 4.4.0/CVE-2019-19074-ath9k-release-allocated-buffer-if-timed-out.patch
- From: 4.4.0-190.220
- CVE-2020-0067
- Description:
f2fs: fix to avoid memory leakage in f2fs_listxattr
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0067.html
- Patch: 4.4.0/CVE-2020-0067-f2fs-fix-to-avoid-memory-leakage-in-f2fs_listxattr.patch
- From: 4.4.0-190.220
- CVE-2019-20811
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 4.4.0/CVE-2019-20811-net-sysfs-call-dev_hold-if-kobject_init_and_add-success.patch
- From: 4.4.0-190.220
- CVE-2020-25212
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25212
- Patch: 4.4.0/CVE-2020-25212-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: 4.4.0-190.220
- CVE-2020-25285
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.1.12/CVE-2020-25285.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2018-10322
- Description:
libxfs: synchronize dinode_verify with userspace
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- Patch: 4.4.0/CVE-2018-10322-libxfs-synchronize-dinode_verify-with-userspace.patch
- From: kernel-4.4.0-190.220
- CVE-2018-10322
- Description:
xfs: sanity check directory inode di_size
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- Patch: 4.4.0/CVE-2018-10322-xfs-sanity-check-directory-inode-di_size.patch
- From: kernel-4.4.0-190.220
- CVE-2018-10322
- Description:
xfs: move inode fork verifiers to xfs_dinode_verify
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- Patch: 4.4.0/CVE-2018-10322-xfs-move-inode-fork-verifiers-to-xfs_dinode_verify.patch
- From: kernel-4.4.0-190.220
- CVE-2018-10322
- Description:
xfs: enhance dinode verifier
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- Patch: 4.4.0/CVE-2018-10322-xfs-enhance-dinode-verifier.patch
- From: kernel-4.4.0-190.220
- CVE-2020-14314
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2020-8694
- Description:
powercap: make attributes only readable by root
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8694
- Patch: 5.4.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-5.4.0-53.59
- CVE-2020-8694
- Description:
powercap: make attributes only readable by root (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8694
- Patch: 4.15.0/CVE-2020-8694-kpatch.patch
- From: kernel-4.15.0-123.126
- CVE-2020-25705
- Description:
icmp: randomize the global rate limiter
- CVE: https://access.redhat.com/security/cve/CVE-2020-25705
- Patch: 4.18.0/icmp-randomize-the-global-rate-limiter.patch
- From: 4.18.0-240.15.1.el8_3
- CVE-2020-25643
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25643
- Patch: 4.19.0/CVE-2020-25643-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: 4.19.152-1
- CVE-2020-14390
- Description:
fbcon: remove soft scrollback code
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.4.0/CVE-2020-14390-fbcon-remove-soft-scrollback-code.patch
- From: kernel-4.4.0-197.229
- CVE-2020-14390
- Description:
fbcon: remove soft scrollback code (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.4.0/CVE-2020-14390-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2020-10135
- Description:
Bluetooth: Disconnect if E0 is used for Level 4
- CVE: https://access.redhat.com/security/cve/CVE-2020-10135
- Patch: 4.4.0/CVE-2020-10135-Bluetooth-Consolidate-encryption-handling-in-hci_enc.patch
- From: kernel-4.4.0-197.229
- CVE-2020-10135
- Description:
Bluetooth: Disconnect if E0 is used for Level 4
- CVE: https://access.redhat.com/security/cve/CVE-2020-10135
- Patch: 4.4.0/CVE-2020-10135-Bluetooth-Disconnect-if-E0-is-used-for-Level-4.patch
- From: kernel-4.4.0-197.229
- CVE-2020-14351
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 4.4.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: kernel-4.4.0-197.229
- CVE-2020-25284
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.4.0/CVE-2020-25284-rbd-require-global-CAP_SYS_ADMIN.patch
- From: kernel-4.4.0-197.229
- CVE-2020-25211
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-25645
- Description:
geneve: add transport ports in route lookup for geneve
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25645
- Patch: 4.4.0/CVE-2020-25645-geneve-add-transport-ports-in-route-lookup-for-genev.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.4.0/CVE-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.4.0/CVE-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2020-25656
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25656
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-25656-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handler.patch
- From: 4.4.0-198.230
- CVE-2020-25656
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25656
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-25656-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.4.0-198.230
- CVE-2020-25656
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25656
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-25656-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.4.0-198.230
- CVE-2020-27675
- Description:
xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27675
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-27675-xen-fix-GCC-warning-and-remove-duplicate-EVTCHN_ROW-EVTCHN_COL-usage.patch
- From: 4.4.0-198.230
- CVE-2020-27675
- Description:
xen/events: avoid removing an event channel while handling it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27675
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-27675-xen-events-avoid-removing-an-event-channel-while-han.patch
- From: 4.4.0-198.230
- CVE-2019-0148
- Description:
i40e: Fix of memory leak and integer truncation in i40e_virtchnl.c.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0148
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2019-0148-i40e-Wrong-truncation-from-u16-to-u8.patch
- From: kernel-4.4.0-198.230
- CVE-2019-0148
- Description:
i40e: Fix of memory leak and integer truncation in i40e_virtchnl.c.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0148
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2019-0148-i40e-Fix-of-memory-leak-and-integer-truncation-in-i40e_virtchnl.c.patch
- From: kernel-4.4.0-198.230
- CVE-2020-25668
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25668
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: 4.4.0-198.230
- CVE-2020-28974
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28974
- Patch: ubuntu-xenial/4.4.0-198.230/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.4.0-198.230
- CVE-2020-28374
- Description:
target: simplify XCOPY wwn->se_dev lookup helper
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: ubuntu-xenial/4.4.0-200.232/CVE-2020-28374-target-simplify-XCOPY-wwn-se_dev-lookup-helper.patch
- From: 4.4.0-200.232
- CVE-2020-28374
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: ubuntu-xenial/4.4.0-200.232/CVE-2020-28374-UBUNTU-SAUCE-target-fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.4.0-200.232
- CVE-2020-28374
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup (adaptation )
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: ubuntu-xenial/4.4.0-200.232/CVE-2020-28374-kpatch.patch
- From: 4.4.0-200.232
- CVE-2019-19816 CVE-2019-19813
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19816
- Patch: ubuntu-xenial/4.4.0-201.233/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: kernel-4.4.0-20kernel-4.4.0-201.233
- Description:
- CVE:
- Patch: ubuntu-xenial/4.4.0-201.233/0001-CVE-2018-13093-xfs-catch-inode-allocation-state-mismatch-corruption.patch
- From:
- Description:
- CVE:
- Patch: ubuntu-xenial/4.4.0-201.233/0002-CVE-2018-13093-xfs-validate-cached-inodes-are-free-when-allocated.patch
- From:
- CVE-2020-25669
- Description:
Input: sunkbd - avoid use-after-free in teardown paths
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25669
- Patch: 4.19.0/CVE-2020-25669-Input-sunkbd-avoid-use-after-free-in-teardown-paths.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-29661
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29661
- Patch: ubuntu-xenial/4.4.0-203.235/0001-CVE-2020-29661-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 4.4.0-203.235
- CVE-2020-29660
- Description:
tty: Fix ->session locking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29660
- Patch: ubuntu-xenial/4.4.0-203.235/0002-CVE-2020-29660-tty-Fix-session-locking.patch
- From: 4.4.0-203.235
- CVE-2020-27815
- Description:
jfs: Fix array index bounds check in dbAdjTree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27815
- Patch: ubuntu-xenial/4.4.0-203.235/CVE-2020-27815-jfs-Fix-array-index-bounds-check-in-dbAdjTree.patch
- From: 4.4.0-203.235
- CVE-2020-29374
- Description:
mm/userfaultfd: do not access vma->vm_mm after calling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29374
- Patch: ubuntu-xenial/4.4.0-203.235/0003-CVE-2020-29374-mm-userfaultfd-do-not-access-vma-vm_mm-after-calling.patch
- From: 4.4.0-203.235
- CVE-2020-29374
- Description:
mm/userfaultfd: do not access vma->vm_mm after calling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29374
- Patch: ubuntu-xenial/4.4.0-203.235/0004-CVE-2020-29374-gup-document-and-work-around-COW-can-break-either-wa.patch
- From: 4.4.0-203.235
- CVE-2020-29568
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.9.0/CVE-2020-29568-xsa349-kpatch.patch
- From: linux-4.9.258-1
- CVE-2020-29568
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.9.0/CVE-2020-29568-xsa349-restart-xenwatch-thread-kpatch.patch
- From: linux-4.9.258-1
- CVE-2021-3178
- Description:
nfsd4: readdirplus shouldn't return parent of export
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3178
- Patch: ubuntu-xenial/4.4.0-204.236/0001-CVE-2021-3178-nfsd4-readdirplus-shouldn-t-return-parent-of-export.patch
- From: 4.4.0-204.236
- CVE-2020-29569
- Description:
xen-blkback: set ring->xenblkd to NULL after kthread_stop()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29569
- Patch: ubuntu-xenial/4.4.0-204.236/CVE-2020-29569-xen-blkback-set-ring-xenblkd-to-NULL-after-kthread_stop.patch
- From: 4.4.0-204.236
- CVE-2020-36158
- Description:
mwifiex: Fix possible buffer overflows in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-36158
- Patch: ubuntu-xenial/4.4.0-204.236/CVE-2020-36158-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd_802_11_ad_hoc_start.patch
- From: 4.4.0-204.236
- CVE-2021-27365
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.0.0/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs-output.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27363 CVE-2021-27364
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27363
- Patch: 5.4.0/CVE-2021-27363-CVE-2021-27364-scsi-iscsi-Restrict-sessions-and-handles-to-admin-capabilities.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27365
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.4.0/CVE-2021-27365-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27365
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 4.4.0/CVE-2021-27365-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: >kernel-4.15.0-203.235
- CVE-2019-19061
- Description:
iio: imu: adis16400: fix memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2019-19061
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2019-19061-iio-imu-adis16400-fix-memory-leak.patch
- From: 4.4.0-208.240
- CVE-2019-16231
- Description:
[netdrv] fjes: Handle workqueue allocation failure
- CVE: https://access.redhat.com/security/cve/cve-2019-16231
- Patch: ubuntu-xenial/4.4.0-208.240/0001-CVE-2019-16231-fjes-Handle-workqueue-allocation-failure.patch
- From: 4.4.0-208.240
- CVE-2018-13095
- Description:
xfs: More robust inode extent count validation
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-13095
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2018-13095-xfs-More-robust-inode-extent-count-validation.patch
- From: 4.4.0-208.240
- CVE-2017-16644
- Description:
hdpvr: Fix an error handling path in hdpvr_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2017-16644
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2017-16644-media-hdpvr-Fix-an-error-handling-path-in-hdpvr_probe.patch
- From: 4.4.0-208.240
- CVE-2015-1350
- Description:
vfs: Move security_inode_killpriv() after permission checks
- CVE: https://access.redhat.com/security/cve/cve-2015-1350
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2015-1350-133.159.patch
- From: 4.4.0-208.240
- CVE-2019-16232
- Description:
libertas: fix a potential NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16232
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2019-16232-libertas-fix-a-potential-NULL-pointer-dereference.patch
- From: 4.4.0-208.240
- CVE-2021-26930
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-26930-xsa365-linux.patch
- From: 4.4.0-208.240
- CVE-2021-26931
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-26931-xsa362-linux-1.patch
- From: 4.4.0-208.240
- CVE-2021-26931
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-26931-xsa362-linux-2.patch
- From: 4.4.0-208.240
- CVE-2021-26931
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-26931-xsa362-linux-3.patch
- From: 4.4.0-208.240
- CVE-2021-28038
- Description:
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28038
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-28038-Xen-x86-also-check-kernel-mapping-in-set_foreign_p2m_mapping.patch
- From: 4.4.0-208.240
- CVE-2021-28038
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28038
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-28038-xsa367-linux.patch
- From: 4.4.0-208.240
- CVE-2019-19061
- Description:
floppy: fix lock_fdc() signal handling
- CVE: https://access.redhat.com/security/cve/CVE-2019-19061
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-20261-floppy-fix-lock_fdc-signal-handling-164.192.patch
- From: 4.4.0-208.240
- CVE-2017-5967
- Description:
timer: Restrict timer_stats to initial PID namespace
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-5967
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2017-5967-kpatch.patch
- From: 4.4.0-208.240
- CVE-2021-3347
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/cve-2021-3347
- Patch: 4.4.0/CVE-2021-3347-futex-Handle-faults-correctly-for-PI-futexes-kpatch.patch
- From: >kernel-4.4.0-201.233
- CVE-2021-29154
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29154
- Patch: 4.4.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: >kernel-4.4.0-206.238
- CVE-2021-3493
- Description:
Introduce v3 namespaced file capabilities
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 4.4.0/CVE-2021-3493-Introduce-v3-namespaced-file-capabilities.patch
- From: kernel-4.4.0-209.241
- CVE-2021-3493
- Description:
Introduce v3 namespaced file capabilities (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 4.4.0/CVE-2021-3493-kpatch.patch
- From: kernel-4.4.0-209.241
- CVE-2021-3493
- Description:
vfs: move cap_convert_nscap() call into vfs_setxattr()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 4.4.0/CVE-2021-3493-vfs-move-cap_convert_nscap-call-into-vfs_setxattr.patch
- From: kernel-4.4.0-209.241
- CVE-2021-3493
- Description:
UBUNTU: SAUCE: vfs_setxattr: free converted value if xattr_permission returns error
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 4.4.0/CVE-2021-3493-UBUNTU-SAUCE-vfs_setxattr-free-converted-value-if-xattr_permission-returns-error.patch
- From: kernel-4.4.0-209.241
- CVE-2021-33909
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: N/A
- Patch: 4.4.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: kernel-4.4.0-212.242
- CVE-2021-22555
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.4.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write.patch
- From: kernel-4.4.0-213.245
- CVE-2021-3653
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-3653
- Patch: 4.4.0/CVE-2021-3653-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-in-int_ctl.patch
- From: kernel-4.4.0-214.246
- CVE-2021-4002
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4002
- Patch: 4.4.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.4.0-218.251
- CVE-2022-30594
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-30594
- Patch: 4.4.0/CVE-2022-30594-ptrace-Check-PTRACE_O_SUSPEND_SECCOMP-permission-on-PTRACE_SEIZE.patch
- From: 4.4.0-227.261
- CVE-2022-1966
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1966
- Patch: 4.4.0/CVE-2022-1966-netfilter-nf_tables-disallow-non-stateful-expression-in-sets-earlier.patch
- From: 4.4.0-227.261
- CVE-2022-21499
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2020-26147
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://access.redhat.com/security/cve/CVE-2020-26147
- Patch: 4.4.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-4.4.0-219.252
- CVE-2020-26558 CVE-2021-0129
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://access.redhat.com/security/cve/CVE-2020-26558
- Patch: 4.4.0/CVE-2020-26558-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From: kernel-4.4.0-219.252
- CVE-2021-28972
- Description:
PCI: rpadlpar: Fix potential drc_name corruption in store functions
- CVE: https://access.redhat.com/security/cve/CVE-2021-28972
- Patch: 4.4.0/CVE-2021-28972-PCI-rpadlpar-Fix-potential-drc_name-corruption-in-store-functions.patch
- From: kernel-4.4.0-219.252
- CVE-2021-3483
- Description:
firewire: nosy: Fix a use-after-free bug in nosy_ioctl()
- CVE: https://access.redhat.com/security/cve/CVE-2021-3483
- Patch: 4.4.0/CVE-2021-3483-firewire-nosy-Fix-a-use-after-free-bug-in-nosy_ioctl.patch
- From: kernel-4.4.0-219.252
- CVE-2021-3564
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://access.redhat.com/security/cve/CVE-2021-3564
- Patch: 4.4.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: kernel-4.4.0-219.252
- CVE-2021-3612
- Description:
Input: joydev - prevent potential read overflow in ioctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-3612
- Patch: 4.4.0/CVE-2021-3612-Input-joydev-prevent-potential-read-overflow-in-ioctl.patch
- From: kernel-4.4.0-208.240
- CVE-2021-3679
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://access.redhat.com/security/cve/CVE-2021-3679
- Patch: 4.4.0/CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause-deadloop.patch
- From: kernel-4.4.0-219.252
- CVE-2021-42008
- Description:
net: 6pack: fix slab-out-of-bounds in decode_data
- CVE: https://access.redhat.com/security/cve/CVE-2021-42008
- Patch: 4.4.0/CVE-2021-42008-net-6pack-fix-slab-out-of-bounds-in-decode_data.patch
- From: kernel-4.4.0-219.252
- CVE-2021-45485
- Description:
ipv6: use prandom_u32() for ID generation
- CVE: https://access.redhat.com/security/cve/CVE-2021-45485
- Patch: 4.4.0/CVE-2021-45485-ipv6-use-prandom_u32-for-ID-generation-1.patch
- From: kernel-4.4.0-219.252
- CVE-2021-38204
- Description:
usb: max-3421: Prevent corruption of freed memory
- CVE: https://access.redhat.com/security/cve/CVE-2021-38204
- Patch: 4.4.0/CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory.patch
- From: kernel-4.4.0-219.252
- CVE-2021-38204
- Description:
usb: max-3421: Prevent corruption of freed memory (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38204
- Patch: 4.4.0/CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory-kpatch.patch
- From: kernel-4.4.0-219.252
- CVE-2021-33034
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-Bluetooth-verify-AMP-hci_chan-before-amp_destroy.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-kpatch.patch
- From: kernel-5.4.0-77.86
- CVE-2021-34693
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-34693
- Patch: 4.1.12/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.1.12-124.54.6.el6uek
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 4.4.0/x86-kvm-vmx_vcpu_run-wrapper-3.patch
- From:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.4.0/proc-restrict-pagemap-access.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/kpatch-add-paravirt-asm-definitions.patch
- From:
- CVE-2021-4157
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-4157
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2021-4157-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nf.patch
- From: kernel-4.4.0-224.257
- CVE-2022-27223
- Description:
USB: gadget: validate endpoint index for xilinx udc
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-27223
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2022-27223-USB-gadget-validate-endpoint-index-for-xilinx-udc.patch
- From: kernel-4.4.0-224.257
- CVE-2022-28390
- Description:
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28390
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2022-28390-can-ems_usb-ems_usb_start_xmit-fix-double-dev_kfree_.patch
- From: kernel-4.4.0-224.257
- CVE-2021-39713
- Description:
net: sched: use Qdisc rcu API instead of relying on rtnl lock
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-39713
- Patch: ubuntu-xenial/4.4.0-224.257/CVE-2021-39713-net-sched-use-Qdisc-rcu-API-instead-of-relying-on-rt.patch
- From: kernel-4.4.0-224.257
- CVE-2022-26490
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2022-26490.patch
- From:
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 4.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm.patch
- From: 4.4.0-229.263
- CVE-2021-4202
- Description:
NFC: reorder the logic in nfc_{un,}register_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-reorder-the-logic-in-nfc_unregister_device-and-register_device.patch
- From: 4.9.303-1
- CVE-2021-4202
- Description:
NFC: add NCI_UNREG flag to eliminate the race
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-add-NCI_UNREG-flag-to-eliminate-the-race.patch
- From: 4.9.303-1
- CVE-2021-4202
- Description:
NFC: reorganize the functions in nci_request
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-4202
- Patch: 4.9.0/CVE-2021-4202-NFC-reorganize-the-functions-in-nci_request.patch
- From: 4.9.303-1
- CVE-2022-1353
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://access.redhat.com/security/cve/CVE-2022-1353
- Patch: 4.14.0/CVE-2022-1353.patch
- From: v5.17-rc12
- CVE-2022-1419
- Description:
drm/vgem: Close use-after-free race in vgem_gem_create
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1419
- Patch: 4.4.0/CVE-2022-1419-drm-vgem-Close-use-after-free-race-in-vgem_gem_create.patch
- From: 4.4.0-229.263
- CVE-2022-1652
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 4.4.0-229.263
- CVE-2022-1652
- Description:
floppy: use a statically allocated error counter (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter-kpaptch.patch
- From: 4.14.35-2047.515.0
- CVE-2022-1679
- Description:
ath9k fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://access.redhat.com/security/cve/CVE-2022-1679
- Patch: 4.4.0/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.4.0-229.263
- CVE-2022-1734
- Description:
nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1734
- Patch: 4.4.0/CVE-2022-1734-nfc-reorder-destructive-operations-in-nfcmrvl_nci_unregister_dev.patch
- From: 4.4.0-229.263
- CVE-2022-28356
- Description:
llc: fix netdevice reference leaks in llc_ui_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2022-28356
- Patch: 4.4.0/CVE-2022-28356-llc-fix-netdevice-reference-leaks-in-llc_ui_bind.patch
- From: 4.4.0-229.263
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-25375
- Description:
usb: gadget: rndis: check size of RNDIS_MSG_SET command
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25375
- Patch: 4.9.0/CVE-2022-25375-usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch
- From: 4.9.303-1
- CVE-2022-25258
- Description:
USB: gadget: validate interface OS descriptor requests
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25258
- Patch: 4.9.0/CVE-2022-25258-USB-gadget-validate-interface-OS-descriptor-requests.patch
- From: 4.9.303-1
- CVE-2022-20141
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-20141
- Patch: 4.4.0/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.4.0-230.264
- CVE-2022-34918
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-34918
- Patch: 4.4.0/CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-data.patch
- From: 4.4.0-230.264
- CVE-2022-33740
- Description:
net: Rename and export copy_skb_header
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 4.4.0/CVE-2022-33740-net-Rename-and-export-copy_skb_header.patch
- From: kernel-4.4.0-233.267
- CVE-2022-26365
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-26365
- Patch: 4.4.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33740
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 4.4.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33741
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 4.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-kpatch.patch
- From: kernel-4.4.0-233.267
- CVE-2022-20368
- Description:
packet: in recvmsg msg_name return at least sizeof sockaddr_ll
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-packet-in-recvmsg-msg_name-return-at-least-sizeof-sockaddr_ll.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-20368
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33655
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33655
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbcon-Prevent-that-screen-size-is-smaller-than-font-size.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33655
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbmem-Check-virtual-screen-sizes-in-fb_set_var.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2021-33656
- Description:
vt: drop old FONT ioctls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33656
- Patch: 4.4.0/vt-drop-old-FONT-ioctls.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-36946
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 4.4.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-2588
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/CVE-2022-2588
- Patch: 5.4.17/CVE-2022-2588.patch
- From: kernel-uek-5.4.17-2136.309.5.1.el8uek
- CVE-2022-2586
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2586
- Patch: 4.4.0//CVE-2022-2586-netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-another-table.patch
- From: 4.4.0-231.265
- CVE-2018-5995
- Description:
percpu: stop printing kernel addresses
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5995
- Patch: 4.4.0/CVE-2018-5995.patch
- From: kernel-4.4.0.222.229
- CVE-2019-19449
- Description:
f2fs: fix to do sanity check on segment/section count
- CVE: https://ubuntu.com/security/CVE-2019-19449
- Patch: 4.4.0/CVE-2019-19449.patch
- From: kernel-4.4.0.222.229
- CVE-2020-12655
- Description:
xfs: add agf freeblocks verify in xfs_agf_verify
- CVE: https://ubuntu.com/security/CVE-2020-12655
- Patch: 4.4.0/CVE-2020-12655.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25670
- Description:
nfc: fix memory leak in llcp_sock_bind()
- CVE: https://ubuntu.com/security/CVE-2020-25670
- Patch: 4.4.0/CVE-2020-25670-nfc-fix-memory-leak-in-llcp_sock_bind.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25670 CVE-2021-23134 CVE-2021-38208
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://ubuntu.com/security/CVE-2020-25670
- Patch: 4.4.0/CVE-2020-25670.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25671
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://ubuntu.com/security/CVE-2020-25671
- Patch: 4.4.0/CVE-2020-25671.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25672
- Description:
nfc: fix memory leak in llcp_sock_bind()
- CVE: https://ubuntu.com/security/CVE-2020-25672
- Patch: 4.4.0/CVE-2020-25672.patch
- From: kernel-4.4.0.222.229
- CVE-2020-25673
- Description:
nfc: Avoid endless loops caused by repeated llcp_sock_connect()
- CVE: https://ubuntu.com/security/CVE-2020-25673
- Patch: 4.4.0/CVE-2020-25673.patch
- From: kernel-4.4.0.222.229
- CVE-2021-20292
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20292
- Patch: debian9/4.9.272-1/CVE-2021-20292-drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch
- From: 4.9.272-1
- CVE-2021-29650
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://ubuntu.com/security/CVE-2021-29650
- Patch: 4.4.0/CVE-2021-29650.patch
- From: kernel-4.4.0.222.229
- CVE-2021-28688
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://ubuntu.com/security/CVE-2021-28688
- Patch: 4.4.0/CVE-2021-28688.patch
- From: kernel-4.4.0.222.229
- CVE-2020-36322
- Description:
fuse: fix bad inode
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36322
- Patch: 4.4.0/CVE-2020-36322-750669-fuse-fix-bad-inode.patch
- From: kernel-4.4.0.222.229
- CVE-2021-3506
- Description:
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3506
- Patch: 4.4.0/CVE-2021-3506.patch
- From: kernel-4.4.0.222.229
- CVE-2021-32399
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- CVE: https://ubuntu.com/security/CVE-2021-32399
- Patch: 4.4.0/CVE-2021-32399.patch
- From: kernel-4.4.0.222.229
- CVE-2020-26139
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26139
- Patch: 4.4.0/CVE-2020-26139.patch
- From: kernel-4.4.0.222.229
- CVE-2021-33033
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33033
- Patch: 4.4.0/CVE-2021-33033.patch
- From: kernel-4.4.0.222.229
- CVE-2020-36385
- Description:
RDMA/ucma: check fd type in ucma_migrate_id()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.4.0/CVE-2020-36385-RDMA-ucma-check-fd-type-in-ucma_migrate_id.patch
- From: kernel-4.4.0.222.229
- CVE-2020-36385
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.15.0/CVE-2020-36385-750671-RDMA-cma-Add-missing-locking-to-rdma_accept-99.patch
- From: 4.15.0-162.170
- CVE-2020-36385
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 4.4.0/CVE-2020-36385.patch
- From: kernel-4.4.0.222.229
- CVE-2021-3573
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3573
- Patch: 4.4.0/CVE-2021-3573.patch
- From: kernel-4.4.0.222.229
- CVE-2021-0129
- Description:
Same as CVE-2020-26558 patch
- CVE:
- Patch: skipped/CVE-2021-0129.patch
- From:
- CVE-2021-38198
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38198
- Patch: 4.4.0/CVE-2021-38198-167.patch
- From: kernel-4.4.0.222.229
- CVE-2021-38160
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-38160
- Patch: debian9/4.9.290-1/0011-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.9.290-1
- CVE-2021-40490
- Description:
ext4: fix race writing to an inline_data file while its xattrs are changing
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-40490
- Patch: 4.4.0/CVE-2021-40490-1.patch
- From: kernel-4.4.0.222.229
- CVE-2021-20317
- Description:
rbtree: cache leftmost node internally
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20317
- Patch: 4.4.0/rbtree-cache-leftmost-node-internally.patch
- From: kernel-4.4.0.222.229
- CVE-2021-20317
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20317
- Patch: debian9/4.9.290-1/debian/CVE-2021-20317-lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch
- From: 4.9.290-1
- CVE-2021-20317
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20317
- Patch: 4.4.0/CVE-2021-20317-kpatch.patch
- From: kernel-4.4.0.222.229
- CVE-2021-43389
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43389
- Patch: debian9/4.9.290-1/0036-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 4.9.290-1
- CVE-2021-33098
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://access.redhat.com/security/cve/CVE-2021-33098
- Patch: 4.4.0/CVE-2021-33098.patch
- From: kernel-4.4.0.222.229
- CVE-2016-2853 CVE-2016-2854
- Description:
aufs: security bugfix, test mnt_ns in open(2) for fuse branch
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2016-2853
- Patch: 4.4.0/CVE-2016-2853-CVE-2016-2854.patch
- From: kernel-4.4.0.222.229
- CVE-2016-2853 CVE-2016-2854
- Description:
aufs: security bugfix, test mnt_ns in open(2) for fuse branch (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2016-2853
- Patch: 4.4.0/CVE-2016-2853-CVE-2016-2854-kpatch.patch
- From: kernel-4.4.0.222.229
- CVE-2020-26145
- Description:
Ignored (was needed ESM criteria)
- CVE:
- Patch: skipped/CVE-2020-26145.patch
- From:
- CVE-2020-26141
- Description:
Ignored (Code / Infra not present)
- CVE:
- Patch: skipped/CVE-2020-26141.patch
- From:
- CVE-2020-3702
- Description:
Ignored (Complex adaptation required)
- CVE:
- Patch: skipped/CVE-2020-3702.patch
- From:
- CVE-2020-12888
- Description:
Ignored (Complex adaptation required)
- CVE:
- Patch: skipped/CVE-2020-12888.patch
- From:
- CVE-2021-45486
- Description:
Ignored (Complex adaptation required)
- CVE:
- Patch: skipped/CVE-2021-45486.patch
- From:
- Description:
- CVE:
- Patch: 4.4.0/CVE-2021-4083-fget-check-that-the-fd-still-exists-after-getting-a-ref-to-it.patch
- From:
- CVE-2021-43976
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://ubuntu.com/security/CVE-2021-43976
- Patch: 4.4.0/CVE-2021-43976-mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch
- From: 4.4.0-223.256
- CVE-2021-31916
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://ubuntu.com/security/CVE-2021-31916
- Patch: 4.4.0/CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devices.patch
- From: 4.4.0-223.256
- CVE-2021-0920
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2021-0920
- Patch: 4.4.0/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 4.4.0-223.256
- CVE-2021-0920
- Description:
af_unix: fix garbage collect vs MSG_PEEK (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-0920
- Patch: 4.4.0/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK-kpatch.patch
- From: 4.4.0-223.256
- CVE-2021-0920
- Description:
af_unix: fix garbage collect vs MSG_PEEK (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-0920
- Patch: 4.4.0/CVE-2021-0920-kpatch.patch
- From: 4.4.0-223.256
- CVE-2021-28964
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old root
- CVE: https://ubuntu.com/security/CVE-2021-28964
- Patch: 4.4.0/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of-an-old-root.patch
- From: 4.4.0-223.256
- CVE-2021-42739
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://ubuntu.com/security/CVE-2021-42739
- Patch: 4.4.0/CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-avc_ca_pmt.patch
- From: 4.4.0-223.256
- CVE-2021-37159
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://ubuntu.com/security/CVE-2021-37159
- Patch: 4.4.0/CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_device.patch
- From: 4.4.0-223.256
- CVE-2021-0935
- Description:
l2tp: fix races with ipv4-mapped ipv6 addresses
- CVE: https://ubuntu.com/security/CVE-2021-0935
- Patch: 4.4.0/CVE-2021-0935-l2tp-fix-races-with-ipv4-mapped-ipv6-addresses-5.patch
- From: 4.4.0-223.256
- CVE-2021-0935
- Description:
l2tp: fix races with ipv4-mapped ipv6 addresses (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-0935
- Patch: 4.4.0/CVE-2021-0935-l2tp-fix-races-with-ipv4-mapped-ipv6-addresses-kpatch.patch
- From: 4.4.0-223.256
- CVE-2021-0935
- Description:
net: ipv6: keep sk status consistent after datagram connect failure
- CVE: https://ubuntu.com/security/CVE-2021-0935
- Patch: 4.4.0/CVE-2021-0935-net-ipv6-keep-sk-status-consistent-after-datagram-connect-failure.patch
- From: 4.4.0-223.256
- CVE-2021-39636
- Description:
xtables: add xt_match, xt_target and data copy_to_user functions
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-xtables-add-xt_match-xt_target-and-data-copy_to_user-functions_1.patch
- From: 4.4.0-223.256
- CVE-2021-39636
- Description:
iptables: use match, target and data copy_to_user helpers
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-iptables-use-match-target-and-data-copy_to_user-helpers_2.patch
- From: 4.4.0-223.256
- CVE-2021-39636
- Description:
ip6tables: use match, target and data copy_to_user helpers
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-ip6tables-use-match-target-and-data-copy_to_user-helpers_3.patch
- From: 4.4.0-223.256
- CVE-2021-39636
- Description:
xtables: extend matches and targets with .usersize
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-xtables-extend-matches-and-targets-with-usersize_4.patch
- From: 4.4.0-223.256
- CVE-2021-39636
- Description:
netfilter: x_tables: fix pointer leaks to userspace
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-netfilter-x_tables-fix-pointer-leaks-to-userspace_5.patch
- From: 4.4.0-223.256
- CVE-2021-39636
- Description:
iptables: use match, target and data copy_to_user helpers (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-39636
- Patch: 4.4.0/CVE-2021-39636-kpatch.patch
- From: 4.4.0-223.256
- CVE-2022-3239
- Description:
media: em28xx: initialize refcount before kref_get
- CVE: https://ubuntu.com/security/CVE-2022-3239
- Patch: 4.4.0/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref_get.patch
- From: 4.4.0-235.269
- CVE-2022-3524
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://ubuntu.com/security/CVE-2022-3524
- Patch: 4.4.0/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.4.0-235.269
- CVE-2022-3564
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: 4.4.0/CVE-2022-3564-bluetooth-l2cap-fix-use-after-free-caused-by-l2cap_reassemble_sdu.patch
- From: 4.4.0-235.269
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/CVE-2022-3565-kpatch.patch
- From: 4.15.0-200.211
- CVE-2022-3566
- Description:
ipv6: annotate some data-races around sk->sk_prot
- CVE: https://ubuntu.com/security/CVE-2022-3566
- Patch: ubuntu-bionic/4.15.0-200.211/0006-CVE-2022-3524-CVE-2022-3566-CVE-2022-3567-ipv6-annotate-some-data-races-around-sk-sk_prot.patch
- From: 4.15.0-200.211
- CVE-2022-3567
- Description:
ipv6: Fix data races around sk->sk_prot.
- CVE: https://ubuntu.com/security/CVE-2022-3567
- Patch: 4.4.0/CVE-2022-3567-ipv6-Fix-data-races-around-sk-sk_prot.patch
- From: 4.4.0-235.269
- CVE-2022-3566
- Description:
tcp: Fix data races around icsk->icsk_af_ops.
- CVE: https://ubuntu.com/security/CVE-2022-3566
- Patch: ubuntu-bionic/4.15.0-200.211/0008-CVE-2022-3524-CVE-2022-3566-CVE-2022-3567-tcp-Fix-data-races-around-icsk-icsk_af_ops.patch
- From: 4.15.0-200.211
- CVE-2022-3594
- Description:
r8152: Rate limit overflow messages
- CVE: https://ubuntu.com/security/CVE-2022-3594
- Patch: 4.4.0/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: 4.4.0-235.269
- CVE-2022-3621
- Description:
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
- CVE: https://ubuntu.com/security/CVE-2022-3621
- Patch: 4.4.0/CVE-2022-3621-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lookup_at_level.patch
- From: 4.4.0-235.269
- CVE-2022-3635
- Description:
atm: idt77252: fix use-after-free bugs caused by tst_timer
- CVE: https://ubuntu.com/security/CVE-2022-3635
- Patch: 4.4.0/CVE-2022-3635-atm-idt77252-fix-use-after-free-bugs-caused-by-tst_timer.patch
- From: 4.4.0-235.269
- CVE-2022-3649
- Description:
nilfs2: fix use-after-free bug of struct nilfs_root
- CVE: https://ubuntu.com/security/CVE-2022-3649
- Patch: 4.4.0/CVE-2022-3649-nilfs2-fix-use-after-free-bug-of-struct-nilfs_root.patch
- From: 4.4.0-235.269
- CVE-2022-40768
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://ubuntu.com/security/CVE-2022-40768
- Patch: 4.4.0/CVE-2022-40768-scsi-stex-properly-zero-out-the-passthrough-command-structure.patch
- From: 4.4.0-235.269
- CVE-2022-43750
- Description:
usb: mon: make mmapped memory read only
- CVE: https://ubuntu.com/security/CVE-2022-43750
- Patch: 4.4.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 4.4.0-235.269
- CVE-2021-4037
- Description:
xfs: fix up non-directory creation in SGID directories
- CVE: https://access.redhat.com/security/cve/cve-2021-4037
- Patch: 4.4.0/CVE-2021-4037-xfs-fix-up-non-directory-creation-in-SGID-directorie.patch
- From: 4.4.0-234.268
- CVE-2022-0850
- Description:
ext4: fix kernel infoleak via ext4_extent_header
- CVE: https://access.redhat.com/security/cve/cve-2022-0850
- Patch: 4.4.0/CVE-2022-0850-ext4-fix-kernel-infoleak-via-ext4_extent_header.patch
- From: 4.4.0-234.268
- CVE-2022-1199
- Description:
ax25: fix a use-after-free in ax25_fillin_cb()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: 4.15.0/CVE-2022-1199-ax25-fix-a-use-after-free-in-ax25_fillin_cb.patch
- From: 4.15.0-189.200
- CVE-2022-1199
- Description:
ax25: NPD bug when detaching AX25 device
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: 4.15.0/CVE-2022-1199-ax25-NPD-bug-when-detaching-AX25-device.patch
- From: 4.15.0-189.200
- CVE-2022-1199
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: 4.15.0/CVE-2022-1199-ax25-improve-the-incomplete-fix-to-avoid-UAF-and-NPD-bugs.patch
- From: 4.15.0-189.200
- CVE-2022-1205
- Description:
ax25: Fix NULL pointer dereference in ax25_kill_by_device
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1205
- Patch: 5.10.0/CVE-2022-1205-ax25-Fix-NULL-pointer-dereference-in-ax25_kill_by_device.patch
- From: 5.10.113-1
- CVE-2022-1204
- Description:
ax25: add refcount in ax25_dev to avoid UAF bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 4.15.0/CVE-2022-1204-ax25-add-refcount-in-ax25_dev-to-avoid-UAF-bugs.patch
- From: 4.15.0-189.200
- CVE-2022-1204
- Description:
ax25: fix reference count leaks of ax25_dev
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 4.15.0/CVE-2022-1204-ax25-fix-reference-count-leaks-of-ax25_dev.patch
- From: 4.15.0-189.200
- CVE-2022-1204
- Description:
ax25: fix UAF bugs of net_device caused by rebinding operation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 4.15.0/CVE-2022-1204-ax25-fix-UAF-bugs-of-net_device-caused-by-rebinding-operation.patch
- From: 4.15.0-189.200
- CVE-2022-1204
- Description:
ax25: Fix refcount leaks caused by ax25_cb_del
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 4.15.0/CVE-2022-1204-ax25-Fix-refcount-leaks-caused-by-ax25_cb_del.patch
- From: 4.15.0-189.200
- CVE-2022-1204
- Description:
ax25: fix UAF bug in ax25_send_control()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 4.15.0/CVE-2022-1204-ax25-fix-UAF-bug-in-ax25_send_control.patch
- From: 4.15.0-189.200
- CVE-2022-1204
- Description:
ax25: add refcount in ax25_dev to avoid UAF bugs (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 4.4.0/CVE-2022-1204-ax25-add-refcount-in-ax25_dev-to-avoid-UAF-bugs-kpatch.patch
- From: 4.19.249-2
- CVE-2022-1199
- Description:
ax25: fix NPD bug in ax25_disconnect
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: 4.15.0/CVE-2022-1199-ax25-fix-NPD-bug-in-ax25_disconnect.patch
- From: 4.15.0-189.200
- CVE-2022-1729
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 4.4.0/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 4.4.0-234.268
- CVE-2022-2639
- Description:
openvswitch: fix OOB access in reserve_sfa_size()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2639
- Patch: 4.4.0/CVE-2022-2639-openvswitch-fix-OOB-access-in-reserve_sfa_size-1.patch
- From: 4.4.0-234.268
- CVE-2022-2964
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2964
- Patch: 4.4.0/CVE-2022-2964-net-usb-ax88179_178a-fix-out-of-bounds-accesses-in-rx-fixup-1.patch
- From: 4.4.0-234.268
- CVE-2022-2978
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://ubuntu.com/security/CVE-2022-2978
- Patch: 4.4.0/CVE-2022-2978-fs-fix-UAF-GPF-bug-in-nilfs_mdt_destroy-1.patch
- From: 4.4.0-234.268
- CVE-2022-3028
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 5.10.0/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.10.140-1
- CVE-2022-3202
- Description:
jfs: prevent NULL deref in diFree
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3202
- Patch: 4.4.0/CVE-2022-3202-jfs-prevent-NULL-deref-in-diFree.patch
- From: 4.4.0-234.268
- Description:
- CVE:
- Patch: 4.4.0/kpatch_map_kaiser_kp_text_kp_data.patch
- From:
- CVE-2018-16884
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10772-sunrpc-use-SVC_NET-in-svcauth_gss_-functions.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-10880
- Description:
ext4: never move the system.data xattr out of the inode body
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10880.html
- Patch: 4.4.0/CVE-2018-10880.patch
- From: =< kernel-4.4.0-138.164~14.04.1
- CVE-2018-13053
- Description:
alarmtimer: Prevent overflow for relative nanosleep
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13053.html
- Patch: 4.4.0/CVE-2018-13053.patch
- From: =< kernel-4.4.0-138.164~14.04.1
- CVE-2018-14609
- Description:
btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14609.html
- Patch: 4.4.0/CVE-2018-14609.patch
- From: =< kernel-4.4.0-138.164~14.04.1
- CVE-2018-14617
- Description:
hfsplus: fix NULL dereference in hfsplus_lookup()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14617.html
- Patch: 4.4.0/CVE-2018-14617.patch
- From: =< kernel-4.4.0-138.164~14.04.1
- CVE-2018-17972
- Description:
proc: restrict kernel stack dumps to root
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-17972.html
- Patch: 4.4.0/CVE-2018-17972.patch
- From: =< kernel-4.4.0-138.164~14.04.1
- CVE-2018-3646 CVE-2018-3620
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.4.0/CVE-2018-3646-CVE-2018-3620-smt_disable.patch
- From: kernel-4.4.0-133.159
- CVE-2018-3646
- Description:
x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.4.0/CVE-2018-3646-x86-topology-Update-the-cpu_core-field.patch
- From: kernel-4.4.0-133.159
- CVE-2018-3646
- Description:
x86/topology: Add topology_max_smt_threads()
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.4.0/CVE-2018-3646-x86-topology-Add-topology_max_smt_threads.patch
- From: kernel-4.4.0-133.159
- CVE-2018-3646 CVE-2018-3620
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.4.0/CVE-2018-3646-l1tf-cpu-setup-124.148.patch
- From: kernel-4.4.0-133.159
- CVE-2018-3646
- Description:
Add ability to flush l1d cache on vmexit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.4.0/CVE-2018-3646-vmx-l1d-flush.patch
- From: kernel-4.4.0-133.159