- kernel-4.14.133-88.105.amzn1 (amazon1)
- 4.14.336-180.566.amzn1
- 2024-04-15 14:30:45
- 2024-04-19 08:16:01
- K20240415_05
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-entry_64-include.patch
- From: N/A
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1125.html
- Patch: 4.14.0/CVE-2019-1125-swapgs.patch
- From: 4.14.133-113.112.amzn2
- CVE-2019-15538, CVSSv2 Score: 7.5
- Description:
xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15538.html
- Patch: 4.15.0/CVE-2019-15538-xfs-fix-missing-ILOCK-unlock-when-xfs_setattr_nonsize-fails-due-to-EDQUOT.patch
- From: 4.15.0-65.74
- CVE-2019-14821, CVSSv2 Score: 8.8
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14821
- Patch: 4.14.0/CVE-2019-14821-KVM-coalesced_mmio-add-bounds-checking.patch
- From: kernel-4.14.35-1902.6.3
- CVE-2019-14835, CVSSv2 Score: 9.3
- Description:
host: make sure log_num < in_num
- CVE: https://access.redhat.com/security/cve/CVE-2019-14835
- Patch: 4.14.0/CVE-2019-14835-vhost-make-sure-log_num-in_num.patch
- From: >=5.3
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: Do not release the page inside mmu_set_spte() (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-01-x86-kvm-do-not-release-page-inside-mmu_set_spte.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
CVE-2018-12207 prerequirement - code cleanup and simplification
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-02-cleanup.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-03-x86-kvm-change-kvm_mmu_page_get_gfn-BUG_ON-to-WARN_ON.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: vmx,svm: always run with EFER.NXE=1 when shadow paging is active (CVE-2018-12207 prerequirement)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-04-kvm-vmx-svm-always-run-with-EFER.NXE-1-when-shadow-paging-is-active.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: Convert kvm_lock to a mutex (CVE-2018-12207 prerequirement)
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-12207
- Patch: 4.15.0/CVE-2018-12207-05-kvm-Convert-kvm_lock-to-a-mutex.patch
- From: 4.19.67-2+deb10u2
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2018-12207
- Patch: 4.15.0/CVE-2018-12207-06-mitigation-pve5.patch
- From: 3.10.0-1062.4.2.el7
- CVE-2019-19062, CVSSv2 Score: 7.5
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://access.redhat.com/security/cve/CVE-2019-19062
- Patch: 4.14.0/CVE-2019-19062.patch
- From: 4.14.165-131.185.amzn2 4.14.165-102.185.amzn1
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID
- CVE: https://access.redhat.com/security/cve/CVE-2019-19332
- Patch: 4.14.0/CVE-2019-19332.patch
- From: 4.14.165-131.185.amzn2 4.14.165-102.185.amzn1
- CVE-2019-15918, CVSSv2 Score: 7.8
- Description:
cifs: Fix lease buffer length error
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15918
- Patch: 4.15.0/CVE-2019-15918-cifs-Fix-lease-buffer-length-error.patch
- From: linux-4.15.0-66.75
- CVE-2019-20096, CVSSv2 Score: 5.5
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20096
- Patch: 4.9.0/CVE-2019-20096.patch
- From: 4.9.210-1
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
kvm: nVMX: fixed L2 guest possible tricking the L0 hypervisor to access sensitive L1 resources
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 4.14.0/CVE-2020-2732-amazon.patch
- From: 4.14.173-137.228.amzn2
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://access.redhat.com/security/cve/cve-2020-8648
- Patch: 4.14.0/CVE-2020-8648-amazon.patch
- From: 4.14.173-137.228.amzn2
- CVE-2020-10942, CVSSv2 Score: 5.5
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://linux.oracle.com/cve/CVE-2020-10942.html
- Patch: 4.1.12/cve-2020-10942-vhost-check-docket-sk_family.patch
- From: kernel-uek-4.1.12-124.38.1
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: fixed possible NULL pointer dereference issue while importing some category bitmap into SELinux
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 4.14.0/CVE-2020-10711.patch
- From: 4.14.177-139.254.amzn2
- CVE-2020-12657, CVSSv2 Score: 7.8
- Description:
block, bfq: fix use-after-free in bfq_idle_slice_timer_body
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12657.html
- Patch: ubuntu-bionic/4.15.0-101.102/cve-2020-12657-bfq-fix-use-after-free.patch
- From: 4.15.0-101.102
- CVE-2020-12826, CVSSv2 Score: 8.8
- Description:
signal: Extend exec_id to 64bits
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12826
- Patch: 4.19.0/CVE-2020-12826-signal-Extend-exec_id-to-64bits.patch
- From: 4.19.118-2
- CVE-2020-12826, CVSSv2 Score: 8.8
- Description:
signal: Extend exec_id to 64bits
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12826
- Patch: 4.19.0/CVE-2020-12826-signal-Extend-exec_id-to-64bits-kpatch-1.patch
- From: 4.19.118-2
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: properly handle multiple messages in selinux_netlink_send()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10751
- Patch: 4.14.0/CVE-2020-10751.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
- CVE: https://access.redhat.com/security/cve/CVE-2020-1749
- Patch: 4.14.0/cve-2020-1749-net-ipv6-stub-use-ip6_dst_lookup_flow.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
kpatch adaptation for CVE-2020-1749
- CVE: https://access.redhat.com/security/cve/CVE-2020-1749
- Patch: 4.14.0/cve-2020-1749-net-ipv6-stub-use-ip6_dst_lookup_flow-kpatch-1.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19768, CVSSv2 Score: 6.7
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://access.redhat.com/security/cve/CVE-2019-19768
- Patch: 4.14.0/CVE-2019-19768-amzn.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19768, CVSSv2 Score: 6.7
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://access.redhat.com/security/cve/CVE-2019-19678
- Patch: 4.14.0/CVE-2019-19768-2.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: avoid declaring fs inconsistent due to invalid file handles (dependency for CVE-2019-19319)
- CVE: https://access.redhat.com/security/cve/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319-ext4-avoid-declaring-fs-inconsistent.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: protect journal inode's blocks using block_validity
- CVE: https://access.redhat.com/security/cve/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: don't perform block validity checks on the journal inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319-kpatch-amazon1.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19319, CVSSv2 Score: 6.5
- Description:
ext4: protect journal inode's blocks using block_validity
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19319
- Patch: 4.9.0/cve-2019-19319-kpatch-fix-rbtree.patch
- From: N/A
- CVE-2019-19319, CVSSv2 Score: 6.5
- Description:
ext4: protect journal inode's blocks using block_validity
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319-kpatch-fix-races-amazon1-post-77-70.82.patch
- From: N/A
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://access.redhat.com/security/cve/CVE-2020-12770
- Patch: 4.14.0/CVE-2020-12770.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-10766, CVSSv2 Score: 5.5
- Description:
x86/speculation: Prevent rogue cross-process SSBD shutdown
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10766
- Patch: 4.14.0/725265-x86-speculation-Prevent-rogue-cross-process-SSBD-s.patch
- From: v4.14.185
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Change misspelled STIPB to STIBP
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10767
- Patch: 4.14.0/725284-x86-speculation-Change-misspelled-STIPB-to-STIBP.patch
- From: v4.14.185
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10767
- Patch: 4.14.0/725286-x86-speculation-Avoid-force-disabling-IBPB-based-o.patch
- From: v4.14.185
- CVE-2020-10768, CVSSv2 Score: 5.5
- Description:
x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10768
- Patch: 4.14.0/725287-x86-speculation-PR_SPEC_FORCE_DISABLE-enforcement-.patch
- From: v4.14.185
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS. (kpatch adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10767
- Patch: 4.14.0/725286-x86-speculation-Avoid-force-disabling-IBPB-based-o-kpatch-1.patch
- From: v4.14.185
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: spectre_v2.patch
- From: N/A
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2018-20669, CVSSv2 Score: 7.8
- Description:
make 'user_access_begin()' do 'access_ok()'
- CVE: https://access.redhat.com/security/cve/CVE-2018-20669
- Patch: 4.14.0/cve-2018-20669-make-user_access_begin-do-access_ok.patch
- From: 4.14.186-110.268.amzn1
- CVE-2019-19462, CVSSv2 Score: 5.5
- Description:
include/linux/relay.h: fix percpu annotation in struct rchan
- CVE: https://access.redhat.com/security/cve/CVE-2019-19462
- Patch: 4.14.0/CVE-2019-19462.patch
- From: 4.14.35-1902.302.2
- CVE-2020-10757, CVSSv2 Score: 6.1
- Description:
mm: Fix mremap not considering huge pmd devmap
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10757
- Patch: 4.19.0/CVE-2020-10757-mm-Fix-mremap-not-considering-huge-pmd-devmap.patch
- From: 4.19.118-2+deb10u1
- CVE-2020-10732, CVSSv2 Score: 3.3
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10732
- Patch: 4.14.0/cve-2020-10732-fs-binfmt_elf.c-allocate-initialized-memory-in-fill_.patch
- From: 4.14.186-110.268.amzn1
- CVE-2020-14386, CVSSv2 Score: 6.7
- Description:
net/packet: fix overflow in tpacket_rcv
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14386.html
- Patch: 4.15.0/CVE-2020-14386.patch
- From: 4.15.0-117.118
- CVE-2019-19448, CVSSv2 Score: 7.8
- Description:
btrfs only search for left_info if there is no right_info
- CVE: https://access.redhat.com/security/cve/CVE-2019-19448
- Patch: 4.19.0/CVE-2019-19448.patch
- From: linux-4.19.146-1
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.14.0/cve-2020-12888-amazon1.patch
- From: 4.14.35-1902.305.0
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.15.0/CVE-2020-12888-kpatch.patch
- From: kernel-4.15.0-118.119
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2020-14331, CVSSv2 Score: 5.5
- Description:
Fix for missing check in vgacon scrollback handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14331
- Patch: 4.14.0/CVE-2020-14331.patch
- From: 4.14.35-2025.400.9
- CVE-2020-14390, CVSSv2 Score: 5.7
- Description:
fbcon: remove soft scrollback code
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.14.0/CVE-2020-14390-fbcon-remove-soft-scrollback-code.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-14390, CVSSv2 Score: 5.7
- Description:
fbcon: remove soft scrollback code (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-14390
- Patch: 4.19.0/CVE-2020-14390-kpatch.patch
- From: linux-4.19.146-1
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25212
- Patch: 4.4.0/CVE-2020-25212-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: 4.4.0-190.220
- CVE-2020-25284, CVSSv2 Score: 5.5
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.14.0/cve-2020-25284-rbd-require-global-CAP_SYS_ADMIN.patch
- From: 4.14.35-2025.401.4.el7uek
- CVE-2020-25285, CVSSv2 Score: 7.0
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.19.0/cve-2020-25285-hugetlb-fix-a-race-between-sysctl-handlers.patch
- From: linux-4.19.146-1
- CVE-2020-25641, CVSSv2 Score: 5.5
- Description:
block: allow for_each_bvec to support zero len bvec
- CVE: https://access.redhat.com/security/cve/CVE-2020-25641
- Patch: 4.14.0/CVE-2020-25641-block-allow-for_each_bvec-to-support-zero-len-bvec.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-25643, CVSSv2 Score: 7.2
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25643
- Patch: 4.19.0/CVE-2020-25643-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: 4.19.152-1
- CVE-2020-25645, CVSSv2 Score: 7.5
- Description:
geneve: add transport ports in route lookup for geneve
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25645
- Patch: 4.14.0/CVE-2020-25645-geneve-add-transport-ports-in-route-lookup-for-genev.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-26088, CVSSv2 Score: 4.4
- Description:
net/nfc/rawsock.c: add CAP_NET_RAW check
- CVE: https://access.redhat.com/security/cve/CVE-2020-26088
- Patch: 4.19.0/CVE-2020-26088-net-nfc-rawsock.c-add-CAP_NET_RAW-check.patch
- From: linux-4.19.146-1
- CVE-2020-12351 CVE-2020-25661, CVSSv2 Score: 7.5
- Description:
[net] Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel
- CVE: https://access.redhat.com/security/cve/cve-2020-25661
- Patch: 4.18.0/CVE-2020-12351-Bluetooth-L2CAP-Fix-calling-sk_filter-on-non-socket-.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-12352 CVE-2020-25662, CVSSv2 Score: 5.3
- Description:
[net] Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-25662
- Patch: 4.18.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-25211, CVSSv2 Score: 7.0
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://access.redhat.com/security/cve/CVE-2020-25705
- Patch: 4.18.0/icmp-randomize-the-global-rate-limiter-pre-8.2.patch
- From: 4.18.0-240.15.1.el8_3
- CVE-2019-19770, CVSSv2 Score: 5.1
- Description:
blktrace: ensure our debugfs dir exists
- CVE: https://access.redhat.com/security/cve/CVE-2019-19770
- Patch: 4.14.0/CVE-2019-19770-blktrace-ensure-our-debugfs-dir-exists.patch
- From: 4.14.209-117.337.amzn1
- CVE-2019-19770, CVSSv2 Score: 5.1
- Description:
Blktrace: bail out early if block debugfs is not configured
- CVE: https://access.redhat.com/security/cve/CVE-2019-19770
- Patch: 4.14.0/CVE-2019-19770-Blktrace-bail-out-early-if-block-debugfs-is-not-configured.patch
- From: 4.14.209-117.337.amzn1
- CVE-2019-19770, CVSSv2 Score: 5.1
- Description:
blktrace: fix debugfs use after free
- CVE: https://access.redhat.com/security/cve/CVE-2019-19770
- Patch: 4.14.0/CVE-2019-19770-blktrace-fix-debugfs-use-after-free.patch
- From: 4.14.209-117.337.amzn1
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 4.19.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25668, CVSSv2 Score: 7.0
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://access.redhat.com/security/cve/CVE-2020-25668
- Patch: 4.14.0/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: 4.14.209-160.335.amzn2
- CVE-2020-25669, CVSSv2 Score: 4.1
- Description:
Input: sunkbd - avoid use-after-free in teardown paths
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25669
- Patch: 4.19.0/CVE-2020-25669-Input-sunkbd-avoid-use-after-free-in-teardown-paths.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-uek-4.14.35-2025.402.2.1.el7uek
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-kpatch.patch
- From: kernel-uek-4.14.35-2025.401.4.el7uek
- CVE-2020-25704, CVSSv2 Score: 4.1
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25704
- Patch: 4.14.0/CVE-2020-25704-perf-core-Fix-a-memory-leak-in-perf_event_parse_addr_filter.patch
- From: 4.14.35-2025.402.2.1
- CVE-2020-28974, CVSSv2 Score: 4.6
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28974
- Patch: 4.19.0/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-28941, CVSSv2 Score: 5.5
- Description:
speakup: Do not let the line discipline be used several times
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-28941
- Patch: 4.14.0/CVE-2020-28941-speakup-Do-not-let-the-line-discipline-be-used-several-times.patch
- From: 4.14.209-160.335.amzn2
- CVE-2020-27675, CVSSv2 Score: 4.7
- Description:
xen/events: avoid removing an event channel while handling it
- CVE: https://access.redhat.com/security/cve/CVE-2020-27675
- Patch: 4.14.0/CVE-2020-27675-xen-events-avoid-removing-an-event-channel-while-handling-it-195.patch
- From: 4.14.209-117.337.amzn1
- CVE-2019-19039 CVE-2019-19377, CVSSv2 Score: 5.5
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.15.0/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: 4.15.0-109.110
- CVE-2020-27815, CVSSv2 Score: 7.4
- Description:
jfs: Fix array index bounds check in dbAdjTree
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-27815
- Patch: debian10/4.19.171-2/CVE-2020-27815-jfs-Fix-array-index-bounds-check-in-dbAdjTree.patch
- From: 4.19.171-2
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: debian10/4.19.171-2/CVE-2020-29568-xsa349-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: debian10/4.19.171-2/CVE-2020-29568-xsa349-handle-xenwatch-thread-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2020-29569, CVSSv2 Score: 8.8
- Description:
xen-blkback: set ring->xenblkd to NULL after kthread_stop()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-29569
- Patch: debian10/4.19.171-2/CVE-2020-29569-xsa350-linux.patch
- From: 4.19.171-2
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.14.0/CVE-2020-29660-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 4.14.214-118.339.amzn1
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-29660
- Patch: debian10/4.19.171-2/0003-CVE-2020-29660-CVE-2020-29661-tty-Fix-session-locking.patch
- From: 4.19.171-2
- CVE-2020-27825, CVSSv2 Score: 5.7
- Description:
[PATCH] tracing: Fix race in trace_open and buffer resize call
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-27825
- Patch: debian10/4.19.171-2/upstream/CVE-2020-27825-patch-tracing-fix-race-in-trace-open-and-buffer-resize-call.patch
- From: 4.19.171-2
- CVE-2020-28374, CVSSv2 Score: 6.5
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: 4.15.0/CVE-2020-28374-UBUNTU-SAUCE-target-fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.15.0-132.136
- CVE-2020-28374, CVSSv2 Score: 6.5
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup (adaptation )
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: 4.15.0/CVE-2020-28374-kpatch.patch
- From: 4.15.0-132.136
- CVE-2021-3178, CVSSv2 Score: 5.7
- Description:
nfsd4: readdirplus shouldn't return parent of export
- CVE: https://access.redhat.com/security/cve/CVE-2021-3178
- Patch: 4.14.0/CVE-2021-3178-nfsd4-readdirplus-shouldn-t-return-parent-of-export.patch
- From: 4.14.219-119.340.amzn1
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Ensure the correct return value from futex_lock_pi
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-01-futex-Ensure-the-correct-return-value-from-futex_lock_pi.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Simplify fixup_pi_state_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-03-futex-Simplify-fixup_pi_state_owner.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Replace pointless printk in fixup_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-02-futex-Replace-pointless-printk-in-fixup_owner.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-04-futex-Provide-and-use-pi_state_update_owner-lt-193.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-05-futex-Handle-faults-correctly-for-PI-futexes-lt-240.patch
- From: v5.11
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
nbd: freeze the queue while we're adding connections
- CVE: https://access.redhat.com/security/cve/CVE-2021-3348
- Patch: 4.14.0/CVE-2021-3348-nbd-freeze-the-queue-while-we-re-adding-connections-188.patch
- From: 4.14.219-119.340.amzn1
- CVE-2021-39648, CVSSv2 Score:
- Description:
Out of scope. Android related patch.
- CVE:
- Patch: skipped/CVE-2021-39648.patch
- From:
- CVE-2021-27363 CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://access.redhat.com/security/cve/cve-2021-27364
- Patch: 4.18.0/0001-scsi-iscsi-Restrict-sessions-and-handles-to-admin-ca.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 4.18.0/0002-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sys.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 4.18.0/0003-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PA-193.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/cve-2021-27365
- Patch: 4.18.0/0004-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Prohibit alu ops for pointer types not defining ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.14.0/CVE-2020-27170-bpf-Prohibit-alu-ops-for-pointer-types-not-defining-ptr_limit.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Fix off-by-one for area size in creating mask to left
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0002-bpf-Fix-off-by-one-for-area-size-in-creating-mask-to.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0003-bpf-Simplify-alu_limit-masking-for-pointer-arithmeti.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Add sanity check for upper ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0004-bpf-Add-sanity-check-for-upper-ptr_limit.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0001-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738579-Xen-x86-don-t-bail-early-from-clear_foreign_p2m_ma.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738580-Xen-x86-also-check-kernel-mapping-in-set_foreign_p.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738581-Xen-gntdev-correct-dev_bus_addr-handling-in-gntdev-1844.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct error checking in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738582-Xen-gntdev-correct-error-checking-in-gntdev_map_gr.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533087-xen-blkback-don-t-handle-error-by-BUG-103.9.4.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533088-xen-netback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.14.0/738585-xen-scsiback-don-t-handle-error-by-BUG.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: 4.14.0/CVE-2021-26930-xen-blkback-Avoid-unmapping-unmapped-grant-pages.patch
- From: 4.14.225-121.357.amzn1
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: 4.14.0/CVE-2021-26930-xen-blkback-fix-error-handling-in-xen_blkbk_map.patch
- From: 4.14.225-121.357.amzn1
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2021-28038
- Patch: 4.14.0/CVE-2021-28038-Xen-gnttab-handle-p2m-update-errors-on-a-per-slot-basis.patch
- From: 4.14.225-121.357.amzn1
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
xen-netback: respect gnttab_map_refs()'s return value
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2021-28038
- Patch: 4.14.0/CVE-2021-28038-xen-netback-respect-gnttab_map_refs-s-return-value.patch
- From: 4.14.225-121.357.amzn1
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33033
- Patch: 4.14.0/CVE-2021-33033-net-mac802154-Fix-general-protection-fault.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33033
- Patch: 4.14.0/CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-DOI-refcounts.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix masking negation logic upon negative dst register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-31829
- Patch: 4.14.0/CVE-2021-31829-bpf-Fix-masking-negation-logic-upon-negative-dst-register.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-31916
- Patch: 4.14.0/CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devices.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-28688, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28688
- Patch: 4.14.0/CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from-xen_blkbk_map.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-28964, CVSSv2 Score: 4.1
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old
- CVE: https://access.redhat.com/security/cve/CVE-2021-28964
- Patch: 4.14.0/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of-an-old.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-28971, CVSSv2 Score: 4.7
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://access.redhat.com/security/cve/CVE-2021-28971
- Patch: 5.4.17/CVE-2021-28971-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-status.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2020-29374, CVSSv2 Score: 7.0
- Description:
gup: document and work around "COW can break either way" issue
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29374
- Patch: ubuntu-bionic/4.15.0-136.140/0004-CVE-2020-29374-gup-document-and-work-around-COW-can-break-either-wa.patch
- From: 4.15.0-136.140
- CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_bind() (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: 4.14.0/CVE-2020-25670-nfc-fix-memory-leak-in-llcp_sock_bind.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: 4.14.0/CVE-2020-25670-nfc-fix-refcount-leak-in-llcp_sock_bind.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25671, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25671
- Patch: 4.14.0/CVE-2020-25671-nfc-fix-refcount-leak-in-llcp_sock_connect.patch
- From: 4.14.231-173.360.amzn2
- CVE-2020-25672, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25672
- Patch: 4.14.0/CVE-2020-25672-nfc-fix-memory-leak-in-llcp_sock_connect.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-23133
- Patch: 4.14.0/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2020-25673, CVSSv2 Score: 6.3
- Description:
nfc: Avoid endless loops caused by repeated llcp_sock_connect()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-25673
- Patch: 4.14.0/CVE-2020-25673-nfc-Avoid-endless-loops-caused-by-repeated-llcp_sock_connect.patch
- From: >kernel-4.14.231-173.360.amzn1
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Fix backport of "bpf: restrict unknown scalars of mixed signed bounds for unprivileged"
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Fix-backport-of-bpf-restrict-unknown-scalars-of-mixed-signed-bounds-for-unprivileged.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-all-types.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-error-path.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Improve-verifier-error-messages-for-users.patch
- From: N/A
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Refactor-and-streamline-bounds-check-into-helper.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move sanitize_val_alu out of op switch
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Tighten speculative pointer arithmetic mask
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 4.14.0/CVE-2021-29155-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2020-16119, CVSSv2 Score: 7.8
- Description:
dccp: avoid double free of ccid on child socket
- CVE: https://access.redhat.com/security/cve/CVE-2020-16119
- Patch: 4.14.0/CVE-2020-16119-UBUNTU-SAUCE-dccp-avoid-double-free-of-ccid-on-child-socket.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://ubuntu.com/security/CVE-2021-22543
- Patch: 4.18.0/CVE-2021-22543-17896-KVM-do-not-allow-mapping-valid-but-non-reference-co.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 4.18.0/CVE-2021-3609-17898-can-bcm-delay-release-of-struct-bcm_op-after-synchr.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: validate from_addr_param return
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-validate-from_addr_param-return-160.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: add size validation when walking chunks
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-add-size-validation-when-walking-chunks.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: fix return value check in __sctp_rcv_asconf_lookup
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-fix-return-value-check-in_underscore-sctp_rcv_asconf_lookup.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: validate chunk size in __rcv_asconf_lookup
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-validate-chunk-size-in_underscore-rcv_asconf_lookup.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: add param size validation for SCTP_PARAM_SET_PRIMARY
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-add-param-size-validation-for-SCTP_PARAM_SET_PRIMARY.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-37576, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-37576.patch
- From:
- CVE-2021-38205, CVSSv2 Score: 3.3
- Description:
net: xilinx_emaclite: Do not print real IOMEM pointer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38205
- Patch: ubuntu-bionic/4.15.0-159.167/0008-CVE-2021-38205-net-xilinx_emaclite-Do-not-print-real-IOMEM-pointer.patch
- From: 4.15.0-159.167
- CVE-2021-38204, CVSSv2 Score: 6.8
- Description:
usb: max-3421: Prevent corruption of freed memory
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-bionic/4.15.0-159.167/0002-CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory.patch
- From: 4.15.0-159.167
- CVE-2021-38204, CVSSv2 Score: 6.8
- Description:
usb: max-3421: Prevent corruption of freed memory (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-focal/5.4.0-88.99/CVE-2021-38204-kpatch.patch
- From: 5.4.0-88.99
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: 4.14.0/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-shadow-page.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: 4.14.0/CVE-2021-38198-kpatch.patch
- From: 4.14.243-185.433
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3679
- Patch: ubuntu-bionic/4.15.0-159.167/0003-CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch
- From: 4.15.0-159.167
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3732
- Patch: ubuntu-bionic/4.15.0-159.167/0007-CVE-2021-3732-ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch
- From: 4.15.0-159.167
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its xattrs are changing
- CVE: https://access.redhat.com/security/cve/CVE-2021-40490
- Patch: 4.14.0/CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-its-xattrs-are-changing.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2021-3753, CVSSv2 Score: 5.9
- Description:
vt_kdsetmode: extend console locking
- CVE: https://access.redhat.com/security/cve/CVE-2021-3753
- Patch: 4.14.0/CVE-2021-3753-vt_kdsetmode-extend-console-locking.patch
- From: kernel-4.14.248-129.473.amzn1
- CVE-2022-0001, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://access.redhat.com/security/cve/cve-2020-36322
- Patch: 4.14.35/CVE-2020-36322-fs-fuse-fix-bad-inode.patch
- From: kernel-uek-4.14.35-2047.507.7.5
- CVE-2021-38199, CVSSv2 Score: 6.5
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38199
- Patch: 4.15.0/CVE-2021-38199-750639-NFSv4-Initialise-connection-to-the-server-in-nfs4_.patch
- From: 4.15.0-162.170
- CVE-2018-25020, CVSSv2 Score: 7.8
- Description:
bpf: fix truncated jump targets on heavy expansions
- CVE: https://access.redhat.com/security/cve/CVE-2018-25020
- Patch: 4.14.0/CVE-2018-25020-bpf-fix-truncated-jump-targets-on-heavy-expansions.patch
- From: 4.14.268-205.500.amzn2
- CVE-2021-4197, CVSSv2 Score:
- Description:
Not backported to 4.14.
- CVE:
- Patch: skipped/CVE-2021-4197.patch
- From:
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.14.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.14.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-24448
- Patch: 4.14.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0435, CVSSv2 Score: 7.2
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.14.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2021-28711, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28711.patch
- From:
- CVE-2021-28712, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28712.patch
- From:
- CVE-2021-28713, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28713.patch
- From:
- CVE-2021-28714, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28714.patch
- From:
- CVE-2021-28715, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28715.patch
- From:
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.14.0/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOCSP-just-like-fallocate.patch
- From: 4.14.262-200.489.amzn2
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.14.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
use init_tag from inithdr for ABORT chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
fix the processing for COOKIE_ECHO chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-fix-the-processing-for-COOKIE_ECHO-chunk.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_do_8_5_1_E_sa
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_do_8_5_1_E_sa.patch
- From: 4.14.256-197.484.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_ootb
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.14.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_ootb.patch
- From: 4.14.256-197.484.amzn2
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.14.0/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.14.262-200.489.amzn2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/cve-2021-20322
- Patch: 4.14.0/CVE-2021-20322-ipv4-make-exception-cache-less-predictible.patch
- From: v4.14.238
- CVE-2021-20322, CVSSv2 Score: 9.1
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-20322
- Patch: ubuntu-bionic/4.15.0-167.175/CVE-2021-20322-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun.patch
- From: 4.15.0-167.175
- CVE-2021-20322, CVSSv2 Score: 9.1
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun() (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-20322
- Patch: 4.14.0/CVE-2021-20322-ipv4-use-siphash-instead-of-Jenkins-in-fnhe_hashfun-kpatch.patch
- From: 4.14.252-131.483
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 4.14.0/CVE-2022-1016.patch
- From: 4.14.273-207.502
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
Bail out in case userspace uses unsupported registers.
- CVE: https://access.redhat.com/security/cve/cve-2022-1015
- Patch: 4.18.0/CVE-2022-1015.patch
- From: >kernel-4.18.0-348.20.1.el8_5
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://access.redhat.com/security/cve/cve-2022-20368
- Patch: 4.18.0/CVE-2022-20368-2-packet-in-recvmsg-msg_name-return-at-least-sizeof-so.patch.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://access.redhat.com/security/cve/cve-2022-20368
- Patch: 4.18.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.18.0-425.3.1.el8
- CVE-2022-26490, CVSSv2 Score: 7.8
- Description:
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
- CVE: https://access.redhat.com/security/cve/CVE-2022-26490
- Patch: 4.14.0/CVE-2022-26490-nfc-st21nfca-Fix-potential-buffer-overflows-in-EVT_TRANSACTION-140.patch
- From: 4.14.275-207.503.amzn2
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-27666
- Patch: ubuntu-bionic/4.15.0-175.184/0001-CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformati.patch
- From: 4.15.0-175.184
- CVE-2022-28356, CVSSv2 Score: 6.2
- Description:
llc: fix netdevice reference leaks in llc_ui_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2022-28356
- Patch: 4.14.0/CVE-2022-28356-llc-fix-netdevice-reference-leaks-in-llc_ui_bind.patch
- From: 4.14.275-207.503.amzn2
- CVE-2022-0812, CVSSv2 Score: 4.3
- Description:
xprtrdma: fix incorrect header size calculations
- CVE: https://access.redhat.com/security/cve/CVE-2022-0812
- Patch: 4.14.0/CVE-2022-0812-xprtrdma-fix-incorrect-header-size-calculations.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-0494, CVSSv2 Score: 4.4
- Description:
block-map: add __GFP_ZERO flag for alloc_page in function
- CVE: https://access.redhat.com/security/cve/CVE-2022-0494
- Patch: 5.4.0/CVE-2022-0494-block-map-add-__GFP_ZERO-for-alloc_page-in-bio_copy_kern.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make variable "count" signed
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-make-variable-count-signed.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 4.14.0/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-32296, CVSSv2 Score:
- Description:
perturb functionality missing in kernels earlier than 4.14.285-215.501.amzn2
- CVE:
- Patch: skipped/CVE-2022-32296.patch
- From:
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 4.14.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset-211.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-32981, CVSSv2 Score:
- Description:
Out of scope - related to PowerPC 32-bit.
- CVE:
- Patch: skipped/CVE-2022-32981.patch
- From:
- CVE-2022-1966, CVSSv2 Score:
- Description:
Duplicate of CVE-2022-32250
- CVE:
- Patch: skipped/CVE-2022-1966.patch
- From:
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 4.14.0/CVE-2022-32250-netfilter-nf_tables-disallow-non-stateful-expression-in.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-2318, CVSSv2 Score: 5,5
- Description:
net: rose: fix UAF bugs caused by timer handler
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2318
- Patch: 4.14.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler.patch
- From: 4.14.287-148.504
- CVE-2022-2318, CVSSv2 Score: 5.5
- Description:
net: rose: fix UAF bugs caused by timer handler (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2318
- Patch: 5.15.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler-kpatch.patch
- From: 5.15.0-48.54
- CVE-2022-33744, CVSSv2 Score:
- Description:
Out of scope - ARM architecture.
- CVE:
- Patch: skipped/CVE-2022-33744.patch
- From:
- CVE-2022-26365, CVSSv2 Score: 7.1
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-26365
- Patch: 4.4.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages-aws.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33740, CVSSv2 Score: 7.1
- Description:
net: Rename and export copy_skb_header
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 4.4.0/CVE-2022-33740-net-Rename-and-export-copy_skb_header.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33740, CVSSv2 Score: 7.1
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 4.4.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33741, CVSSv2 Score: 7.1
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 4.14.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-kpatch-252.patch
- From: kernel-4.4.0-233.267
- CVE-2022-33742, CVSSv2 Score: 7.1
- Description:
xen/blkfront: force data bouncing when backend is untrusted
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html
- Patch: 4.14.0/CVE-2022-33742-xen-blkfront-force-data-bouncing-when-backend-is-untrusted-kpatch-268.patch
- From: 4.14.287-148.504
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-147.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-147-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://access.redhat.com/security/cve/CVE-2022-1353
- Patch: 4.14.0/CVE-2022-1353.patch
- From: v5.17-rc12
- CVE-2022-28389, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28389
- Patch: 4.14.0/CVE-2022-28389.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28390
- Patch: 4.14.0/CVE-2022-28390.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-1516, CVSSv2 Score: 5.5
- Description:
net/x25: Fix null-ptr-deref caused by x25_disconnect
- CVE: https://access.redhat.com/security/cve/CVE-2022-1516
- Patch: 4.14.0/CVE-2022-1516.patch
- From: v5.17-rc12
- CVE-2022-30594, CVSSv2 Score: 7.8
- Description:
Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
- CVE: https://access.redhat.com/security/cve/CVE-2022-30594
- Patch: 4.14.0/CVE-2022-30594.patch
- From: >kernel-4.14.281-212.502.amzn2
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 4.14.0/CVE-2022-1729.patch
- From: >kernel-4.14.281-212.502.amzn2
- CVE-2022-29581, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: fix netns refcount changes in u32_change()
- CVE: https://access.redhat.com/security/cve/CVE-2022-29581
- Patch: 4.14.0/CVE-2022-29581.patch
- From: >kernel-4.14.281-212.502.amzn2
- CVE-2022-0854, CVSSv2 Score: 5.5
- Description:
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
- CVE: https://access.redhat.com/security/cve/CVE-2022-0854
- Patch: 4.14.0/CVE-2022-0854.patch
- From: v4.14
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-33655
- Patch: 4.14.0/CVE-2021-33655-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.14.290-217.505
- CVE-2022-36123, CVSSv2 Score: 7.0
- Description:
x86: Clear .brk area at early boot
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36123
- Patch: 4.14.0/CVE-2022-36123-x86-Clear-brk-area-at-early-boot.patch
- From: 4.14.290-217.505
- CVE-2022-36879, CVSSv2 Score: 5.5
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36879
- Patch: 5.10.0/CVE-2022-36879-xfrm-xfrm_policy-fix-a-possible-double-xfrm_pols_put-in.patch
- From: 5.10.136-1
- CVE-2022-1679, CVSSv2 Score: 7.8
- Description:
[PATCH v4 1/2] ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1679
- Patch: ubuntu-bionic/4.15.0-191.202/0010-CVE-2022-1679-UBUNTU-SAUCE-ath9k-fix-use-after-free-in-ath9k_hif_u.patch
- From: 4.15.0-191.202
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: ubuntu-bionic/4.15.0-191.202/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: kernel-4.15.0-191.202
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 4.4.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Fix forged IP logic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-2663
- Patch: 4.14.0/CVE-2022-2663-netfilter-nf_conntrack_irc-Fix-forged-IP-logic.patch
- From: 4.14.293
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 5.10.0/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.10.140-1
- CVE-2022-40307, CVSSv2 Score: 4.7
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-40307
- Patch: 4.14.0/CVE-2022-40307-efi-capsule-loader-Fix-use-after-free-in-efi_capsule_write.patch
- From: 4.14.293
- CVE-2022-40307, CVSSv2 Score: 4.7
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-40307
- Patch: 4.14.0/CVE-2022-40307-efi-capsule-loader-Fix-use-after-free-in-efi_capsule_write-kpatch.patch
- From: 4.14.293
- CVE-2021-4159, CVSSv2 Score: 4.4
- Description:
bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-4159
- Patch: 4.14.0/CVE-2021-4159-bpf-Verifer-adjust_scalar_min_max_vals-to-always-call.patch
- From: kernel-4.14.273-207.502.amzn2
- CVE-2022-1462, CVSSv2 Score: 6.3
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: 5.4.0/CVE-2022-1462-tty-extract-tty_flip_buffer_commit-from-tty_flip_buffer_push.patch
- From: v5.4
- CVE-2022-1462, CVSSv2 Score: 6.3
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: 4.14.0/CVE-2022-1462-tty-use-new-tty_insert_flip_string_and_push_buffer-in-pty_write-2.patch
- From: v5.4
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 4.14.0/CVE-2022-2153-KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-SynIC-wasnt-activated.patch
- From: 4.14.275
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 5.15.0/CVE-2022-2153-KVM-x86-Check-lapic_in_kernel-before-attempting-to-set-a-SynIC-irq.patch
- From: 5.15.35-36
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 5.15.0/CVE-2022-2153-KVM-x86-Avoid-theoretical-NULL-pointer-dereference-in-kvm_irq_delivery_to_apic_fast.patch
- From: 5.15.35-36
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 4.14.0/CVE-2022-2153-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugged.patch
- From: 4.14.291
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 4.14.0/CVE-2022-2153-KVM-x86-Check-lapic_in_kernel-before-attempting-to-set-a-SynIC-irq-kpatch.patch
- From: 4.14.291
- CVE-2022-3524, CVSSv2 Score: 5.5
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3524.html
- Patch: amazon1/4.14.301-153.528.amzn1/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.14.301-153.528.amzn1
- CVE-2023-1838, CVSSv2 Score: 7.1
- Description:
Fix double fget() in vhost_net_set_backend()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1838.html
- Patch: amazon1/4.14.313-162.533.amzn1/CVE-2023-1838-Fix-double-fget-in-vhost_net_set_backend.patch
- From: kernel-4.14.313-162.533.amzn1
- CVE-2023-2124, CVSSv2 Score: 7.0
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2124.html
- Patch: amazon1/4.14.313-162.533.amzn1/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: kernel-4.14.313-162.533.amzn1
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23454.html
- Patch: amazon1/4.14.313-162.533.amzn1/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-t.patch
- From: kernel-4.14.313-162.533.amzn1
- CVE-2023-33203, CVSSv2 Score: 4.8
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-33203.html
- Patch: amazon1/4.14.313-162.533.amzn1/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-.patch
- From: kernel-4.14.313-162.533.amzn1
- CVE-2023-31436, CVSSv2 Score: 6.1
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-31436.html
- Patch: amazon1/4.14.314-164.533.amzn1/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
- From: 4.14.314-164.533.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nf_tables-split-set-destruction-in-deactivate-and-destroy-phase.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nft_hash: fix nft_hash_deactivate
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nft_hash-fix-nft_hash_deactivate-165.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: bogus EBUSY when deleting set after flush
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nf_tables-bogus-EBUSY-when-deleting-set-after-flush.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nf_tables-split-set-destruction-in-deactivate-and-destroy-phase-kpatch.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: bogus EBUSY when deleting set after flush (Revert)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nf_tables-bogus-EBUSY-when-deleting-set-after-flush-kpatch.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-nf_tables-unbind-kpatch.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: split set destruction in deactivate and destroy phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon1/4.14.314-164.539.amzn1/CVE-2023-32233-netfilter-kpatch.patch
- From: 4.14.314-164.539.amzn1
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-28466.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_g.patch
- From: 4.14.318-166.529.amzn1
- CVE-2023-34256, CVSSv2 Score: 4.0
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34256.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2023-34256-ext4-avoid-a-potential-slab-out-of-bounds-in-ext4_gr.patch
- From: 4.14.318-166.529.amzn1
- CVE-2023-2269, CVSSv2 Score: 5.5
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2269.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove.patch
- From: 4.14.318-166.529.amzn1
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow RULE_ID to refer to another chain
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2022-2586-netfilter-nf-tables-do-not-allow-rule-id-to-refer-to-another-chain.patch
- From: 4.14.318-166.529.amzn1
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2022-2586-netfilter-nf-tables-do-not-allow-set-id-to-refer-to-another-table.patch
- From: 4.14.318-166.529.amzn1
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2022-2586-netfilter-nf-tables-do-not-allow-set-id-to-refer-to-another-table-kpatch.patch
- From: 4.14.318-166.529.amzn1
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-d.patch
- From: 4.14.318-166.529.amzn1
- CVE-2023-3111, CVSSv2 Score: 6.7
- Description:
btrfs: check return value of btrfs_commit_transaction in relocation
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2023-3111-1-btrfs-check-return-value-of-btrfs_commit_transaction.patch
- From: 4.14.318-166.529.amzn1
- CVE-2023-3111, CVSSv2 Score: 6.7
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fail.patch
- From: 4.14.318-166.529.amzn1
- CVE-2024-0775, CVSSv2 Score: 6.7
- Description:
ext4: improve error recovery code paths in __ext4_remount()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-0775.html
- Patch: amazon1/4.14.318-166.529.amzn1/CVE-2024-0775-ext4-improve-error-recovery-code-paths-in-__ext4_rem.patch
- From: 4.14.318-166.529.amzn1
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3117, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3117.html
- Patch: amazon1/4.14.320-168.534.amzn1/CVE-2023-3117-netfilter-nf_tables-incorrect-error-path-handling-wi.patch
- From: 4.14.320-168.534.amzn1
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-35001.html
- Patch: amazon1/4.14.320-168.534.amzn1/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteor.patch
- From: kernel-4.14.320-168.534.amzn1
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3609.html
- Patch: 4.14.0/CVE-2023-3609-net-sched-cls_u32-Fix-reference-counter-leak-leading-to-overflow.patch
- From: kernel-4.14.320-243.544.amzn2
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3611.html
- Patch: 4.14.0/CVE-2023-3611-net-sched-sch_qfq-account-for-stab-overhead-in-qfq_enqueue.patch
- From: kernel-4.14.320-243.544.amzn2
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3776.html
- Patch: 4.14.0/CVE-2023-3776-net-sched-cls_fw-Fix-improper-refcount-update-leads-to-use-after-free.patch
- From: kernel-4.14.320-243.544.amzn2
- CVE-2023-4128, CVSSv2 Score:
- Description:
Rejected by NIST. Consult CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.
- CVE:
- Patch: skipped/CVE-2023-4128.patch
- From:
- CVE-2024-0639, CVSSv2 Score: 4.7
- Description:
sctp: fix potential deadlock on &net->sctp.addr_wq_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-0639.html
- Patch: amazon1/4.14.322-170.535.amzn1/CVE-2024-0639-sctp-fix-potential-deadlock-on-net-sctp.addr_wq_lock.patch
- From: 4.14.322-170.535.amzn1
- CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4206.html
- Patch: amazon1/4.14.322-170.535.amzn1/CVE-2023-4206-net-sched-cls_route-No-longer-copy-tcf_result-on-update-to-avoid-use-after-free.patch
- From: 4.14.322-170.535.amzn1
- CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4208.html
- Patch: amazon1/4.14.322-170.535.amzn1/CVE-2023-4208-net-sched-cls_u32-No-longer-copy-tcf_result-on-update-to-avoid-use-after-free.patch
- From: 4.14.322-170.535.amzn1
- CVE-2023-3772, CVSSv2 Score: 5.5
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3772.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-4207, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4207.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-4207-net-sched-cls_fw-No-longer-copy-tcf_result-on-update-to-avoid-use-after-free.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-4622, CVSSv2 Score: 7.8
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4622.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-4622-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4623.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-4623-net-sched-sch_hfsc-Ensure-inner-classes-have-fsc-cur.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-4921.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-42753.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-42755, CVSSv2 Score:
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39192.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-39192-netfilter-xt_u32-validate-user-space-input.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39192.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-39193, CVSSv2 Score: 5.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39193.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-39193-netfilter-xt_sctp-validate-the-flag_info-count.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-39194, CVSSv2 Score: 3.2
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-39194.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-45871, CVSSv2 Score: 8.1
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45871.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-45871-igb-set-max-size-RX-buffer-when-store-bad-packet-is-.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-45871, CVSSv2 Score: 8.1
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45871.html
- Patch: amazon1/4.14.326-171.539.amzn1/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 4.14.326-171.539.amzn1
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon1/4.14.330-176.540.amzn1/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs_read-to-avoid-UAF.patch
- From: kernel-4.14.330-176.540.amzn1
- CVE-2023-3397, CVSSv2 Score: 6.3
- Description:
fs/jfs: Add a mutex named txEnd_lmLogClose_mutex to prevent a race condition between txEnd and lmLogClose functions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3397.html
- Patch: amazon1/4.14.328-174.540.amzn1/CVE-2023-3397-fs_jfs-Add-a-mutex-named-txEnd_lmLogClose_mutex-to-prevent-a-race-condition-between-txEnd-and-lmLogClose-functions.patch
- From: 4.14.328-174.540.amzn1
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-5717.html
- Patch: amazon1/4.14.328-174.540.amzn1/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 4.14.328-174.540.amzn1
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-5717.html
- Patch: amazon1/4.14.328-174.540.amzn1/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 4.14.328-174.540.amzn1
- CVE-2023-0590, CVSSv2 Score: 7.0
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0590.html
- Patch: amazon1/4.14.334-177.552.amzn1/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc_graft.patch
- From: 4.14.334-177.552.amzn1
- CVE-2023-6932, CVSSv2 Score: 7.8
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6932.html
- Patch: amazon1/4.14.334-177.552.amzn1/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 4.14.334-177.552.amzn1
- CVE-2023-52340, CVSSv2 Score: 7.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html
- Patch: amazon1/4.14.334-177.552.amzn1/CVE-2023-52340-ipv6-remove-max_size-check-inline-with-ipv4-pre-320-168.534.patch
- From: 4.14.334-177.552.amzn1
- CVE-2023-52340, CVSSv2 Score: 7.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-52340.html
- Patch: amazon1/4.14.334-177.552.amzn1/CVE-2023-52340-ipv6-remove-max_size-check-inline-with-ipv4-kpatch.patch
- From: 4.14.334-177.552.amzn1
- CVE-2023-6606, CVSSv2 Score: 8.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6606.html
- Patch: amazon1/4.14.336-178.554.amzn1/CVE-2023-6606-patch-smb-client-fix-oob-in-smbcalcsize.patch
- From: 4.14.336-178.554.amzn1
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6040.html
- Patch: amazon1/4.14.336-179.557.amzn1/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-fam.patch
- From: 4.14.336-179.557.amzn1
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-6931.html
- Patch: amazon1/4.14.336-179.557.amzn1/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 4.14.336-179.557.amzn1
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-1086.html
- Patch: amazon1/4.14.336-179.559.amzn1/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-pre322.patch
- From: 4.14.336-179.559.amzn1
- CVE-2024-23849, CVSSv2 Score: 5.5
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-23849.html
- Patch: amazon1/4.14.336-180.562.amzn1/CVE-2024-23849-patch-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 4.14.336-180.562.amzn1
- CVE-2023-6270, CVSSv2 Score:
- Description:
Complex adaptation is required, vendor retired ATA over Ethernet driver.
- CVE:
- Patch: skipped/CVE-2023-6270.patch
- From:
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.14.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-2.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-pti-add-KernelCare-mapping-into-shadow-PGD.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-add-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-fense_swapgs_entry-1.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A
- N/A, CVSSv2 Score:
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 4.14.0/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- CVE-2023-20588, CVSSv2 Score: 5.5
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: amazon1/4.14.322-170.538.amzn1/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-26545, CVSSv2 Score: 7.8
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://access.redhat.com/security/cve/CVE-2023-26545
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://access.redhat.com/security/cve/CVE-2023-2162
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-2162-scsi-iscsi_tcp-Fix-UAF-during-login-when-accessing-the-shost-ipaddress.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-2985, CVSSv2 Score: 5.5
- Description:
fs: hfsplus: fix UAF issue in hfsplus_put_super
- CVE: https://ubuntu.com/security/CVE-2023-2985
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-2985-fs-hfsplus-fix-UAF-issue-in-hfsplus_put_super.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-7192, CVSSv2 Score: 4.4
- Description:
netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()
- CVE: https://ubuntu.com/security/CVE-2023-7192
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-7192-netfilter-ctnetlink-fix-possible-refcount-leak-in-ct.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-45862, CVSSv2 Score: 7.5
- Description:
USB: ene_usb6250: Allocate enough memory for full object
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45862.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-45862-USB-ene_usb6250-Allocate-enough-memory-for-full-object.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-1829, CVSSv2 Score:
- Description:
Disabling tcindex classifier
- CVE: https://access.redhat.com/security/cve/CVE-2023-1829
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-1829-net-sched-Deactivate-tcindex-classifier.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-0458, CVSSv2 Score: 4.7
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://access.redhat.com/security/cve/CVE-2023-0458
- Patch: amazon1/4.14.305-155.531.amzn1/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: 4.14.305-155.531.amzn1
- CVE-2023-1281, CVSSv2 Score:
- Description:
Issue is absorbed by CVE-2023-1829.
- CVE:
- Patch: skipped/CVE-2023-1281.patch
- From:
- CVE-2023-0459, CVSSv2 Score: 6.5
- Description:
uaccess: Add speculation barrier to copy_from_user()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0459.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-0459-uaccess-Add-speculation-barrier-to-copy_from_user.patch
- From: 4.14.309-159.529.amzn1
- CVE-2022-3643, CVSSv2 Score: 6.5
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3643.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2022-3643-xen-netback-Ensure-protocol-headers-don-t-fall-in-th.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0394.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_pus.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0461.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-0461-net-ulp-prevent-ULP-without-clone-op-from-entering-t.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-1073, CVSSv2 Score: 6.3
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1073.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-1073-HID-check-empty-report_list-in-hid_validate_values.patch
- From: 4.14.309-159.529.amzn1
- CVE-2023-0045, CVSSv2 Score: 7.5
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0045.html
- Patch: amazon1/4.14.309-159.529.amzn1/CVE-2023-0045-x86-bugs-Flush-IBP-in-ib_prctl_set.patch
- From: 4.14.309-159.529.amzn1
- CVE-2022-42328, CVSSv2 Score:
- Description:
Code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch
- CVE:
- Patch: skipped/CVE-2022-42328.patch
- From:
- CVE-2022-42329, CVSSv2 Score:
- Description:
Code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch
- CVE:
- Patch: skipped/CVE-2022-42329.patch
- From:
- CVE-2022-20369, CVSSv2 Score: 6.7
- Description:
media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-20369.html
- Patch: 4.14.0/CVE-2022-20369-v4l2-mem2mem-apply-DST_QUEUE_OFF_BASE-on-MMAP-buffers-across-ioctls.patch
- From: 4.14.298
- CVE-2022-26373, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-2978, CVSSv2 Score: 7.8
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://ubuntu.com/security/CVE-2022-2978
- Patch: ubuntu-focal/5.4.0-132.148/0001-CVE-2022-2978-fs-fix-UAF-GPF-bug-in-nilfs_mdt_destroy.patch
- From: 5.4.0-132.148
- CVE-2022-3542, CVSSv2 Score: 5.5
- Description:
bnx2x: fix potential memory leak in bnx2x_tpa_stop()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3542
- Patch: 4.14.0/CVE-2022-3542-bnx2x-fix-potential-memory-leak-in-bnx2x_tpa_stop.patch
- From: 4.14.296
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: ubuntu-bionic/4.15.0-200.211/0010-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 4.15.0-200.211
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/CVE-2022-3565-kpatch.patch
- From: 4.15.0-200.211
- CVE-2022-3594, CVSSv2 Score: 7.5
- Description:
r8152: Rate limit overflow messages
- CVE: https://ubuntu.com/security/CVE-2022-3594
- Patch: ubuntu-bionic/4.15.0-200.211/0005-CVE-2022-3594-r8152-Rate-limit-overflow-messages.patch
- From: 4.15.0-200.211
- CVE-2022-3621, CVSSv2 Score: 7.5
- Description:
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
- CVE: https://ubuntu.com/security/CVE-2022-3621
- Patch: ubuntu-bionic/4.15.0-200.211/0004-CVE-2022-3621-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: 4.15.0-200.211
- CVE-2022-3646, CVSSv2 Score: 5.3
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3646.html
- Patch: 4.14.0/CVE-2022-3646-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo-181.patch
- From: kernel-5.4.219-126.410
- CVE-2022-3649, CVSSv2 Score: 7.0
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
- CVE: https://access.redhat.com/security/cve/cve-2022-3649
- Patch: 4.14.0/CVE-2022-3649-nilfs2-fix-use-after-free-bug-of-struct-nilfs_root.patch
- From: 4.14.296
- CVE-2022-39842, CVSSv2 Score: 6.1
- Description:
pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-39842
- Patch: 5.4.0/CVE-2022-39842.patch
- From: v5.19
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://access.redhat.com/security/cve/cve-2022-40768
- Patch: 5.4.0/CVE-2022-40768-scsi-stex-Properly-zero-out-the-passthrough-command-.patch
- From: kernel-5.4.219-126.410
- CVE-2022-41849, CVSSv2 Score: 4.2
- Description:
fbdev: smscufx: Fix use-after-free in ufx_ops_open()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849
- Patch: 4.14.0/CVE-2022-41849-fbdev-smscufx-Fix-use-after-free-in-ufx_ops_open.patch
- From: 5.19.12
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
- Patch: 4.14.0/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.19.12
- CVE-2022-43750, CVSSv2 Score: 7.8
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: 4.14.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.19.15
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://ubuntu.com/security/CVE-2021-33909
- Patch: 4.15.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: >kernel-4.15.0-147.151
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.4.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write.patch
- From: kernel-4.4.0-213.245
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.14.0/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers-amzn.patch
- From: >4.14.225-121.362.amzn1
- CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix leakage of uninitialized bpf stack under speculation
- CVE: https://ubuntu.com/security/CVE-2021-31829
- Patch: 5.8.0/CVE-2021-31829-bpf-Fix-leakage-of-uninitialized-bpf-stack-under-speculation.patch
- From: kernel-5.8.0-59.66
- CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Wrap aux data inside bpf_sanitize_info container
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 5.4.0/CVE-2021-33200-bpf-Wrap-aux-data-inside-bpf_sanitize_info-container.patch
- From: 5.4.0-77.86
- CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Fix mask direction swap upon off reg sign change
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 5.4.0/CVE-2021-33200-bpf-Fix-mask-direction-swap-upon-off-reg-sign-change.patch
- From: 5.4.0-77.86
- CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: No need to simulate speculative domain for immediates
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 5.4.0/CVE-2021-33200-bpf-No-need-to-simulate-speculative-domain-for-immediates.patch
- From: 5.4.0-77.86