- kernel-ml-4.14.20-1.el7.centos (custom-0)
- 4.14.180-37.el7.centos
- 2021-04-05 08:49:12
- 2021-04-06 09:35:52
- K20210405_05
- CVE-2018-7566, CVSSv2 Score: 4.6
- Description:
ALSA: seq: Fix racy pool initializations
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7566
- Patch: 4.14.0/710355-ALSA-seq-Fix-racy-pool-initializations.patch
- From: v4.14.21
- CVE-2018-1065, CVSSv2 Score: 4.7
- Description:
netfilter: add back stackpointer size checks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1065
- Patch: 4.14.0/710837-netfilter-add-back-stackpointer-size-checks.patch
- From: v4.14.27
- CVE-2018-1068, CVSSv2 Score: 7.2
- Description:
netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1068
- Patch: 4.14.0/710843-netfilter-ebtables-CONFIG_COMPAT-don-t-trust-userl.patch
- From: v4.14.27
- CVE-2018-7995, CVSSv2 Score: 4.7
- Description:
x86/MCE: Serialize sysfs changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7995
- Patch: 4.14.0/710925-x86-MCE-Serialize-sysfs-changes.patch
- From: v4.14.27
- CVE-2018-7740, CVSSv2 Score: 4.9
- Description:
hugetlbfs: check for pgoff value overflow
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7740
- Patch: 4.14.0/711239-hugetlbfs-check-for-pgoff-value-overflow.patch
- From: v4.14.31
- CVE-2018-8781, CVSSv2 Score: 7.8
- Description:
drm: udl: Properly check framebuffer mmap offsets
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8781
- Patch: 4.14.0/711251-drm-udl-Properly-check-framebuffer-mmap-offsets.patch
- From: v4.14.31
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8897
- Patch: 4.14.0/711272-x86-entry-64-Don-t-use-IST-entry-for-BP-stack.patch
- From: v4.14.31
- CVE-2018-8897, CVSSv2 Score: 6.5
- Description:
x86/entry/64: Don't use IST entry for #BP stack (kpatch adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8897
- Patch: 4.14.0/711272-x86-entry-64-Don-t-use-IST-entry-for-BP-stack-kpatch-1.patch
- From: v4.14.31
- CVE-2018-1087, CVSSv2 Score: 8
- Description:
kvm/x86: fix icebp instruction handling
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1087
- Patch: 4.14.0/711277-kvm-x86-fix-icebp-instruction-handling.patch
- From: v4.14.31
- CVE-2018-1130, CVSSv2 Score: 5.5
- Description:
dccp: check sk for closed state in dccp_sendmsg()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1130
- Patch: 4.14.0/711318-dccp-check-sk-for-closed-state-in-dccp_sendmsg.patch
- From: v4.14.32
- CVE-2018-1000199, CVSSv2 Score: 7.8
- Description:
perf/hwbp: Simplify the perf-hwbp code, fix documentation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1000199
- Patch: 4.14.0/711351-perf-hwbp-Simplify-the-perf-hwbp-code-fix-document.patch
- From: v4.14.33
- CVE-2018-7757, CVSSv2 Score: 2.1
- Description:
scsi: libsas: fix memory leak in sas_smp_get_phy_events()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7757
- Patch: 4.14.0/711468-scsi-libsas-fix-memory-leak-in-sas_smp_get_phy_eve.patch
- From: v4.14.34
- CVE-2018-1095, CVSSv2 Score: 5.5
- Description:
ext4: limit xattr size to INT_MAX
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1095
- Patch: 4.14.0/711675-ext4-limit-xattr-size-to-INT_MAX.patch
- From: v4.14.36
- CVE-2018-1092, CVSSv2 Score: 5.5
- Description:
ext4: fail ext4_iget for root directory if unallocated
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1092
- Patch: 4.14.0/711676-ext4-fail-ext4_iget-for-root-directory-if-unalloca.patch
- From: v4.14.36
- CVE-2018-1094, CVSSv2 Score: 5.5
- Description:
ext4: always initialize the crc32c checksum driver
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1094
- Patch: 4.14.0/711677-ext4-always-initialize-the-crc32c-checksum-driver.patch
- From: v4.14.36
- CVE-2018-1094, CVSSv2 Score: 5.5
- Description:
ext4: don't allow r/w mounts if metadata blocks overlap the superblock
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1094
- Patch: 4.14.0/711678-ext4-don-t-allow-r-w-mounts-if-metadata-blocks-ove.patch
- From: v4.14.36
- CVE-2018-1108, CVSSv2 Score: 5.9
- Description:
random: fix crng_ready() test
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1108
- Patch: 4.14.0/711730-random-fix-crng_ready-test.patch
- From: v4.14.36
- CVE-2018-8087, CVSSv2 Score: 5.5
- Description:
mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8087
- Patch: 4.14.0/711821-mac80211_hwsim-fix-possible-memory-leak-in-hwsim_n.patch
- From: v4.14.37
- CVE-2018-10940, CVSSv2 Score: 5.5
- Description:
cdrom: information leak in cdrom_ioctl_media_changed()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10940
- Patch: 4.14.0/712008-cdrom-information-leak-in-cdrom_ioctl_media_change.patch
- From: v4.14.38
- CVE-2018-1093, CVSSv2 Score: 5.5
- Description:
ext4: add validity checks for bitmap block numbers
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1093
- Patch: 4.14.0/712027-ext4-add-validity-checks-for-bitmap-block-numbers.patch
- From: v4.14.39
- CVE-2018-11508, CVSSv2 Score: 5.5
- Description:
compat: fix 4-byte infoleak via uninitialized struct field
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-11508
- Patch: 4.14.0/712180-compat-fix-4-byte-infoleak-via-uninitialized-struc.patch
- From: v4.14.41
- CVE-2018-1000200, CVSSv2 Score: 5.5
- Description:
mm: sections are not offlined during memory hotremove
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1000200
- Patch: 4.14.0/712189-mm-sections-are-not-offlined-during-memory-hotremo.patch
- From: v4.14.41
- CVE-2018-10021, CVSSv2 Score: 5.5
- Description:
scsi: libsas: defer ata device eh commands to libata
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10021
- Patch: 4.14.0/712409-scsi-libsas-defer-ata-device-eh-commands-to-libata.patch
- From: v4.14.44
- CVE-2018-6412, CVSSv2 Score: 7.5
- Description:
fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-6412
- Patch: 4.14.0/712751-fbdev-Fixing-arbitrary-kernel-leak-in-case-FBIOGET.patch
- From: v4.14.45
- CVE-2018-12232, CVSSv2 Score: 5.9
- Description:
socket: close race condition between sock_close() and sockfs_setattr()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-12232
- Patch: 4.14.0/713354-socket-close-race-condition-between-sock_close-and.patch
- From: v4.14.52
- CVE-2018-11412, CVSSv2 Score: 5.9
- Description:
ext4: do not allow external inodes for inline data
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-11412
- Patch: 4.14.0/713362-ext4-do-not-allow-external-inodes-for-inline-data.patch
- From: v4.14.52
- CVE-2018-1118, CVSSv2 Score: 5.5
- Description:
vhost: fix info leak due to uninitialized memory
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1118
- Patch: 4.14.0/713397-vhost-fix-info-leak-due-to-uninitialized-memory.patch
- From: v4.14.52
- CVE-2017-18216, CVSSv2 Score: 5.5
- Description:
ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18216
- Patch: 4.14.0/ocfs2-subsystem.su_mutex-is-required-while-accessing.patch
- From: v4.14.57
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: free batches of packets in tcp_prune_ofo_queue()
- CVE: https://nvd.nist.gov/vuln/detail/cve-2018-5390
- Patch: 4.14.0/713895-tcp-free-batches-of-packets-in-tcp_prune_ofo_queue.patch
- From: v4.14.59
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: avoid collapses in tcp_prune_queue() if possible
- CVE: https://nvd.nist.gov/vuln/detail/cve-2018-5390
- Patch: 4.14.0/713896-tcp-avoid-collapses-in-tcp_prune_queue-if-possible.patch
- From: v4.14.59
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- CVE: https://nvd.nist.gov/vuln/detail/cve-2018-5390
- Patch: 4.14.0/713897-tcp-detect-malicious-patterns-in-tcp_collapse_ofo_.patch
- From: v4.14.59
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: call tcp_drop() from tcp_data_queue_ofo()
- CVE: https://nvd.nist.gov/vuln/detail/cve-2018-5390
- Patch: 4.14.0/713898-tcp-call-tcp_drop-from-tcp_data_queue_ofo.patch
- From: v4.14.59
- CVE-2018-5390, CVSSv2 Score: 7.5
- Description:
tcp: add tcp_ooo_try_coalesce() helper
- CVE: https://nvd.nist.gov/vuln/detail/cve-2018-5390
- Patch: 4.14.0/713899-tcp-add-tcp_ooo_try_coalesce-helper.patch
- From: v4.14.59
- CVE-2018-12233, CVSSv2 Score: 7.8
- Description:
jfs: Fix inconsistency between memory allocation and ea_buf->max_size
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-12233
- Patch: 4.14.0/714207-jfs-Fix-inconsistency-between-memory-allocation-an.patch
- From: v4.14.62
- CVE-2017-18224, CVSSv2 Score: 4.7
- Description:
ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18224
- Patch: 4.14.0/ocfs2-ip_alloc_sem-should-be-taken-in-ocfs2_get_bloc.patch
- From: >v4.14.52
- CVE-2018-10840, CVSSv2 Score: 7.2
- Description:
ext4: correctly handle a zero-length xattr with a non-zero e_value_offs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10840
- Patch: 4.14.0/ext4_correctly_handle_a_zero_length_xattr_with_a_non_zero_e_value_offs.patch
- From: v4.14.52
- CVE-2018-13406, CVSSv2 Score: 7.2
- Description:
video: uvesafb: Fix integer overflow in allocation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13406
- Patch: 4.14.0/video_uvesafb_fix_integer_overflow_in_allocation.patch
- From: v4.14.53
- CVE-2018-10879, CVSSv2 Score: 6.1
- Description:
ext4: add corruption check in ext4_xattr_set_entry()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10879
- Patch: 4.14.0/ext4_add_corruption_check_in_ext4_xattr_set_entry.patch
- From: v4.14.55
- CVE-2018-10878, CVSSv2 Score: 6.1
- Description:
ext4: always check block group bounds in ext4_init_block_bitmap()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10878
- Patch: 4.14.0/ext4_always_check_block_group_bounds_in_ext4_init_block_bitmap.patch
- From: v4.14.55
- CVE-2018-10881, CVSSv2 Score: 4.9
- Description:
ext4: clear i_data in ext4_inode_info when removing inline data
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10881
- Patch: 4.14.0/ext4_clear_i_data_in_ext4_inode_info_when_removing_inline_data.patch
- From: v4.14.55
- CVE-2018-10880, CVSSv2 Score: 7.1
- Description:
ext4: never move the system.data xattr out of the inode body
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10880
- Patch: 4.14.0/ext4_never_move_the_system.data_xattr_out_of_the_inode_body.patch
- From: v4.14.55
- CVE-2018-10876, CVSSv2 Score: 4.9
- Description:
ext4: only look at the bg_flags field if it is valid
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10876
- Patch: 4.14.0/ext4_only_look_at_the_bg_flags_field_if_it_is_valid.patch
- From: v4.14.55
- CVE-2018-10877, CVSSv2 Score: 6.8
- Description:
ext4: verify the depth of extent tree in ext4_find_extent()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10877
- Patch: 4.14.0/ext4_verify_the_depth_of_extent_tree_in_ext4_find_extent.patch
- From: v4.14.55
- CVE-2018-13405, CVSSv2 Score: 4.6
- Description:
Fix up non-directory creation in SGID directories
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13405
- Patch: 4.14.0/fix_up_non_directory_creation_in_SGID_directories.patch
- From: v4.14.56
- CVE-2018-10902, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Change resized buffers atomically
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10902
- Patch: 4.14.0/ALSA_rawmidi_change_resized_buffers_atomically.patch
- From: v4.14.58
- CVE-2018-14734, CVSSv2 Score: 6.1
- Description:
infiniband: fix a possible use-after-free bug
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14734
- Patch: 4.14.0/infiniband_fix_a_possible_use_after_free_bug.patch
- From: v4.14.60
- CVE-2018-14678, CVSSv2 Score: 7.2
- Description:
x86/entry/64: Remove %ebx handling from error_entry/exit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14678
- Patch: 4.14.0/xsa274-linux-4.17.patch
- From: v4.14.61
- Description:
- CVE:
- Patch: 4.14.0/kpatch-add-paravirt-asm-definition-4.14.0.patch
- From:
- CVE-2018-13094, CVSSv2 Score: 4.3
- Description:
xfs: don't call xfs_da_shrink_inode with NULL bp
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13094
- Patch: 4.14.0/xfs_dont_call_xfs_da_shrink_inode_with_null_bp.patch
- From: v4.14.62
- CVE-2018-13093, CVSSv2 Score: 4.3
- Description:
xfs: validate cached inodes are free when allocated
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13093
- Patch: 4.14.0/xfs_validate_cached_inodes_are_free_when_allocated.patch
- From: v4.14.62
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Add disable SMT knob
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.14.0/CVE-2018-3646-CVE-2018-3620-smt_disable.patch
- From: >= 4.14.63
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
Setup L1TF bug bit
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.14.0/CVE-2018-3646-l1tf-cpu-setup.patch
- From: >= 4.14.63
- CVE-2018-3646 CVE-2018-3620, CVSSv2 Score: 5.6
- Description:
vmx l1d flush
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html
- Patch: 4.14.0/CVE-2018-3646-vmx-l1d-flush.patch
- From: >= 4.14.63
- CVE-2018-1120, CVSSv2 Score: 5.3
- Description:
proc: do not access cmdline nor environ from file-backed areas
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1120
- Patch: 4.14.0/712266-proc-do-not-access-cmdline-nor-environ-from-file-b.patch
- From: v4.14.42
- CVE-2018-1000204, CVSSv2 Score: 6.3
- Description:
scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000204.html
- Patch: 4.15.0/CVE-2018-1000204.patch
- From: 4.15.0-33.36
- CVE-2018-11506, CVSSv2 Score: 7.8
- Description:
sr: pass down correctly sized SCSI sense buffer
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-11506
- Patch: 4.14.0/712549-sr-pass-down-correctly-sized-SCSI-sense-buffer.patch
- From: v4.14.45
- CVE-2018-9363, CVSSv2 Score: 6.1
- Description:
Bluetooth: hidp: buffer overflow in hidp_process_report
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-9363.html
- Patch: 4.15.0/cve-2018-9363-bluetooth-hidp-buffer-overflow.patch
- From: >4.15.0
- CVE-2018-12904, CVSSv2 Score: 4.4
- Description:
kvm: nVMX: Enforce cpl=0 for VMX instructions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2018-12904.html
- Patch: 4.14.0/CVE-2018-12904-kvm-nVMX-Enforce-cpl-0-for-VMX-instructions.patch
- From: 4.14.50
- CVE-2018-8822, CVSSv2 Score: 7.8
- Description:
staging: ncpfs: memory corruption in ncp_read_kernel()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8822
- Patch: 4.14.0/711263-staging-ncpfs-memory-corruption-in-ncp_read_kernel.patch
- From: v4.14.31
- CVE-2018-9516, CVSSv2 Score: 7.8
- Description:
HID: debug: check length before copy_to_user()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-9516.html
- Patch: 4.15.0/CVE-2018-9516-HID-debug-check-length-before-copy_to_user.patch
- From: 4.15.0-45.48
- CVE-2018-9518, CVSSv2 Score: 7.2
- Description:
NFC: llcp: Limit size of SDP URI
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-9518
- Patch: 4.4.0/CVE-2018-9518.patch
- From: kernel-4.4.134
- CVE-2018-9518, CVSSv2 Score: 7.2
- Description:
NFC: llcp: Limit size of SDP URI
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-9518
- Patch: 4.14.0/CVE-2018-9518-kpatch.patch
- From: kernel-4.14.45
- CVE-2018-9415, CVSSv2 Score: 6.1
- Description:
ARM: amba: Fix race condition with driver_override
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-9415
- Patch: 4.15.0/CVE-2018-9415-ARM-amba-Fix-race-condition-with-driver_override-32.35.patch
- From: kernel-4.15.0-33.36
- CVE-2018-9385, CVSSv2 Score: 5.3
- Description:
ARM: amba: Don't read past the end of sysfs "driver_override" buffer
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-9385
- Patch: 4.15.0/CVE-2018-9385-ARM-amba-Dont-read-past-the-end-of-sysfs-driver_override-buffer.patch
- From: kernel-4.15.0-33.36
- CVE-2018-10883, CVSSv2 Score: 4.9
- Description:
jbd2: don't mark block as modified if the handle is out of credits
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10883.html
- Patch: 4.15.0/CVE-2018-10883-jbd2-don-t-mark-block-as-modified-if-the-handle-is.patch
- From: 4.15.0-44.47
- CVE-2018-10883, CVSSv2 Score: 4.9
- Description:
ext4: avoid running out of journal credits when appending to an inline file
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10883.html
- Patch: 4.14.0/CVE-2018-10883-ext4-avoid-running-out-of-journal-credits-when-appending-to-an-inline-file.patch
- From: 4.14.55
- CVE-2018-10882, CVSSv2 Score: 4.8
- Description:
ext4: add more inode number paranoia checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-10882.html
- Patch: 4.15.0/cve-2018-10882-ext4-add-more-paranoja-checks.patch
- From: 4.15.0-44.47
- CVE-2018-16276, CVSSv2 Score: 5.3
- Description:
USB: yurex: fix out-of-bounds uaccess in read handler
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16276.html
- Patch: 4.15.0/cve-2018-16276-usb-yurex-fix-out-of-bond-access.patch
- From: >4.15.0
- CVE-2018-16658, CVSSv2 Score: 4
- Description:
information leak in cdrom_ioctl_drive_status()
- CVE: https://access.redhat.com/security/cve/cve-2018-16658
- Patch: 4.14.0/CVE-2018-16658.patch
- From: >4.14.62
- CVE-2018-20961, CVSSv2 Score: 7.4
- Description:
USB: gadget: f_midi: fixing a possible double-free in f_midi
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-20961
- Patch: 4.15.0/CVE-2018-20961-USB-gadget-f_midi-fixing-a-possible-double-free-in-f_midi.patch
- From: kernel-4.15.0-24.26
- CVE-2018-20510, CVSSv2 Score: 5.5
- Description:
binder: replace "%p" with "%pK"
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20510
- Patch: 4.14.0/CVE-2018-20510-binder-replace-p-with-pK.patch
- From: 4.14.22
- CVE-2018-5803, CVSSv2 Score: 5.5
- Description:
sctp: verify size of a new chunk in _sctp_make_chunk()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-5803
- Patch: 4.14.0/710752-sctp-verify-size-of-a-new-chunk-in-_sctp_make_chun.patch
- From: v4.14.25
- CVE-2018-5814, CVSSv2 Score: 6.9
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-1.patch
- From: 4.15.0-33.36
- CVE-2018-5814, CVSSv2 Score: 6.9
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-2.patch
- From: 4.15.0-33.36
- CVE-2018-5814, CVSSv2 Score: 6.9
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-3.patch
- From: 4.15.0-33.36
- CVE-2018-5814, CVSSv2 Score: 6.9
- Description:
usbip: usbip_host: fix NULL-ptr deref and use-after-free errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-5814.html
- Patch: 4.15.0/CVE-2018-5814-kpatch.patch
- From: 4.15.0-33.36
- CVE-2018-10853, CVSSv2 Score: 4.6
- Description:
KVM: x86: introduce linear_{read,write}_system
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10853
- Patch: 4.14.0/CVE-2018-10853-KVM_x86_introduce_linear_read_write_system.patch
- From: 4.14.50
- CVE-2018-10853, CVSSv2 Score: 4.6
- Description:
KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10853
- Patch: 4.14.0/CVE-2018-10853-KVM-x86-pass-kvm_vcpu-to-kvm_read_guest_virt-and-kvm_write_guest_virt_system.patch
- From: 4.14.50
- CVE-2018-10853, CVSSv2 Score: 4.6
- Description:
kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10853
- Patch: 4.14.0/CVE-2018-10853-kvm-x86-use-correct-privilege-level-for-sgdt-sidt-fxsave-fxrstor-access.patch
- From: 4.14.50
- CVE-2018-10853, CVSSv2 Score: 4.6
- Description:
kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access ( adaptation )
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10853
- Patch: 4.14.0/CVE-2018-10853-kpatch.patch
- From: 4.14.50
- CVE-2017-17975, CVSSv2 Score: 4.9
- Description:
media: usbtv: prevent double free in error case
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-17975
- Patch: 4.4.0/CVE-2017-17975.patch
- From: kernel-4.4.127
- CVE-2017-13695, CVSSv2 Score: 3.3
- Description:
ACPI cache leak in early ACPI terminnation.
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-13695
- Patch: 4.14.0/CVE-2017-13695-ACPICA-acpi-acpica-fix-acpi-operand-cache-leak-in-nseval.c.patch
- From: kernel-4.14.45
- CVE-2017-13168, CVSSv2 Score: 7
- Description:
scsi: sg: mitigate read/write abuse
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-13168.html
- Patch: 4.15.0/cve-2017-13168-sg-mitigate-read-write-abuse.patch
- From: >4.15.0
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-7308-bpf-allow-xadd-only-on-aligned-memory.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-7308-20-addition.patch
- From:
- CVE-2018-8043, CVSSv2 Score: 5.5
- Description:
net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-8043
- Patch: 4.14.0/net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
- From: >v4.14.52
- CVE-2018-10323, CVSSv2 Score: 5.5
- Description:
xfs: set format back to extents if xfs_bmap_extents_to_btree
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-10323
- Patch: 4.14.0/xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch
- From: >v4.14.52
- CVE-2018-1000026, CVSSv2 Score: 7.7
- Description:
net: create skb_gso_validate_mac_len()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1000026
- Patch: 4.14.0/net-create-skb_gso_validate_mac_len.patch
- From: >v4.14.52
- CVE-2018-1000026, CVSSv2 Score: 7.7
- Description:
bnx2x: disable GSO where gso_size is too big for hardware
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1000026
- Patch: 4.14.0/bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
- From: >v4.14.52
- CVE-2018-5391, CVSSv2 Score: 7.5
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: https://access.redhat.com/security/cve/cve-2018-5391
- Patch: 4.14.0/Revert-net-increase-fragment-memory-usage-limits.patch
- From: >v4.14.62
- CVE-2018-5391, CVSSv2 Score: 7.5
- Description:
Revert "net: increase fragment memory usage limits"
- CVE: https://access.redhat.com/security/cve/cve-2018-5391
- Patch: 4.14.0/Revert-net-increase-fragment-memory-usage-limits-kpatch-1.patch
- From: >v4.14.62
- CVE-2018-17182, CVSSv2 Score: 7.1
- Description:
mm: rollback 6b4ebc3a9078
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-17182
- Patch: 4.14.0/cve-2018-17182-revert-mm-optimize-overflow-system-wide-flushing.patch
- From: v4.14.68
- CVE-2018-14609, CVSSv2 Score: 7.1
- Description:
btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14609
- Patch: 4.14.0/btrfs_relocation_only_remove_reloc_rb_trees_if_reloc_control_has_been_initialized.patch
- From: v4.14.70
- CVE-2018-14617, CVSSv2 Score: 7.1
- Description:
hfsplus: fix NULL dereference in hfsplus_lookup()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14617
- Patch: 4.14.0/fix_null_dereference_in_hfsplus_lookup.patch
- From: v4.14.70
- CVE-2018-6555, CVSSv2 Score: 7.4
- Description:
irda: Only insert new objects into the global database via setsockopt
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-6555
- Patch: 4.14.0/irda_only_insert_new_objects_into_the_global_database_via_setsockopt.patch
- From: v4.14.70
- CVE-2018-13099, CVSSv2 Score: 4.3
- Description:
f2fs: fix to do sanity check with reserved blkaddr of inline inode
- CVE: ttps://nvd.nist.gov/vuln/detail/CVE-2018-13099
- Patch: 4.14.0/f2fs_fix_to_do_sanity_check_with_reserved_blkaddr_of_inline_inode.patch
- From: v4.14.71
- CVE-2018-14633, CVSSv2 Score: 7
- Description:
scsi: target: iscsi: Use hex2bin instead of a re-implementation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14633
- Patch: 4.14.0/scsi_target_iscsi_use_bin2hex_instead_of_a_reimplementation.patch
- From: v4.14.73
- CVE-2018-14633, CVSSv2 Score: 7
- Description:
scsi: target: iscsi: Use bin2hex instead of a re-implementation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14633
- Patch: 4.14.0/scsi_target_iscsi_use_bin2hex_instead_of_a_reimplementation_2.patch
- From: v4.14.73
- CVE-2018-13053, CVSSv2 Score: 4.6
- Description:
alarmtimer: Prevent overflow for relative nanosleep
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13053
- Patch: 4.14.0/alarmtimer_prevent_overflow_for_relative_nanosleep.patch
- From: v4.14.74
- CVE-2018-17972, CVSSv2 Score: 3.3
- Description:
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-17972
- Patch: 4.14.0/proc_restrict_kernel_stack_dumps_to_root.patch
- From: v4.14.75
- CVE-2018-18445, CVSSv2 Score: 6.1
- Description:
bpf: 32-bit RSH verification must truncate input before the ALU op
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18445
- Patch: 4.14.0/bpf_32_bit_RSH_verification_must_truncate_input_before_the_ALU_op.patch
- From: v4.14.75
- CVE-2019-5489, CVSSv2 Score: 7.1
- Description:
Change mincore() to count "mapped" pages rather than "cached" pages
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5489
- Patch: 4.14.0/cve-2019-5489-page-cache-side-channel-attack.patch
- From: v4.14.92
- CVE-2019-3701, CVSSv2 Score: 4.4
- Description:
can: gw: ensure DLC boundaries after CAN frame modification
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3701
- Patch: 4.14.0/cve-2019-3701-can-allows-for-crash-by-users.patch
- From: v4.14.92
- CVE-2018-16882, CVSSv2 Score: 6.1
- Description:
KVM: Fix UAF in nested posted interrupt processing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16882
- Patch: 4.14.0/cve-2018-16882-kvm-fix-uaf-in-nested-interrupts.patch
- From: v4.14.92
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-use-ENOENT-when-atomic-copy-fails.patch
- From: v4.14.92
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-allocate-anon-memory-for-MAP_PRIVATE.patch
- From: v4.14.92
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-shmem-hugetlbfs-allow-VM_MAYWRITE-vmas-only.patch
- From: v4.14.92
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem: add i_size checks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-recheck-i_size-after-taking-pt-lock.patch
- From: v4.14.92
- CVE-2018-18397, CVSSv2 Score: 6.1
- Description:
userfaultfd: shmem: UFFDIO_COPY: set the page dirty if VM_WRITE is not set
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18397
- Patch: 4.14.0/cve-2018-18397-shmem-UFDIO_COPY-set-the-page-dirty.patch
- From: v4.14.92
- CVE-2018-19824, CVSSv2 Score: 6.6
- Description:
ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-19824
- Patch: 4.14.0/cve-2018-19824-use-after-free-in-sound-usb-card.patch
- From: v4.14.92
- CVE-2018-16862, CVSSv2 Score: 5.3
- Description:
kernel: cleancache: Infoleak of deleted files after reuse of old inodes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16862
- Patch: 4.14.0/cve-2018-16862-cleancache-info-leak-after-reuse-of-old-inodes.patch
- From: v4.14.92
- CVE-2018-19407, CVSSv2 Score: 4.4
- Description:
KVM: X86: Fix scan ioapic use-before-initialization
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-19407
- Patch: 4.14.0/cve-2018-19407-kvm-null-pointer-dereference.patch
- From: v4.14.92
- CVE-2018-18281, CVSSv2 Score: 7.8
- Description:
mremap: properly flush TLB before releasing the page
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18281
- Patch: 4.14.0/cve-2018-18281-mremap-properly-flush-TLB-before-releasing-the-page.patch
- From: v4.14.92
- CVE-2018-18710, CVSSv2 Score: 4.7
- Description:
drom: fix improper type cast, which can leat to information leak.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18710
- Patch: 4.14.0/cve-2018-18710-cdrom-fix-improper-type-cast.patch
- From: v4.14.92
- CVE-2018-18690, CVSSv2 Score: 5.5
- Description:
xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18690
- Patch: 4.14.0/cve-2018-18690-xfs-dont-fail-when-converting-shortform-attr.patch
- From: v4.14.92
- CVE-2019-8912, CVSSv2 Score: 9.8
- Description:
net: crypto set sk to NULL when af_alg_release.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-8912
- Patch: 4.14.0/net-crypto-set-sk-to-NULL-when-af_alg_release.patch
- From: >v4.14.102
- CVE-2018-5848, CVSSv2 Score: 7.8
- Description:
wil6210: missing length check in wmi_set_ie
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-5848
- Patch: 4.14.0/CVE-2018-5848.patch
- From: kernel-4.14.86
- CVE-2018-1129, CVSSv2 Score: 6.5
- Description:
libceph: implement CEPHX_V2 calculation mode
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1129
- Patch: 4.14.0/CVE-2018-1129.patch
- From: kernel-4.4.86
- CVE-2018-13096, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with node footer and iblocks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13096
- Patch: 4.14.0/CVE-2018-13096-1.patch
- From: kernel-4.14.86
- CVE-2018-13098, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with extra_attr feature
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13098
- Patch: 4.14.0/CVE-2018-13098.patch
- From: kernel-4.14.86
- CVE-2018-13096, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with node footer and iblocks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13096
- Patch: 4.14.0/CVE-2018-13096.patch
- From: kernel-4.14.86
- CVE-2018-13097, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with user_block_count
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13097
- Patch: 4.14.0/CVE-2018-13097-1.patch
- From: kernel-4.14.86
- CVE-2018-13097, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with user_block_count
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13097
- Patch: 4.14.0/CVE-2018-13097.patch
- From: kernel-4.14.86
- CVE-2018-13100, CVSSv2 Score: 4.9
- Description:
f2fs: fix to do sanity check with secs_per_zone
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13100
- Patch: 4.14.0/CVE-2018-13100-1.patch
- From: kernel-4.14.86
- CVE-2018-13100, CVSSv2 Score: 4.9
- Description:
f2fs: fix to do sanity check with secs_per_zone
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-13100
- Patch: 4.14.0/CVE-2018-13100.patch
- From: kernel-4.14.86
- CVE-2018-14610, CVSSv2 Score: 5.5
- Description:
btrfs: Check that each block group has corresponding chunk at mount time
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14610
- Patch: 4.14.0/CVE-2018-14610.patch
- From: kernel-4.14.86
- CVE-2018-14611, CVSSv2 Score: 5.5
- Description:
btrfs: validate type when reading a chunk
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14611
- Patch: 4.14.0/CVE-2018-14611.patch
- From: kernel-4.14.86
- CVE-2018-14612, CVSSv2 Score: 5.5
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14612
- Patch: 4.14.0/CVE-2018-14612.patch
- From: kernel-4.14.86
- CVE-2018-14613, CVSSv2 Score: 5.5
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14613
- Patch: 4.14.0/CVE-2018-14613-1.patch
- From: kernel-4.14.86
- CVE-2018-14613, CVSSv2 Score: 5.5
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14613
- Patch: 4.14.0/CVE-2018-14613-2.patch
- From: kernel-4.14.86
- CVE-2018-14613, CVSSv2 Score: 5.5
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14613
- Patch: 4.14.0/CVE-2018-14613-3.patch
- From: kernel-4.14.86
- CVE-2018-14613, CVSSv2 Score: 5.5
- Description:
btrfs: tree-checker: Verify block_group_item
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14613
- Patch: 4.14.0/CVE-2018-14613.patch
- From: kernel-4.14.86
- CVE-2018-14614, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with cp_pack_start_sum
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14614
- Patch: 4.14.0/CVE-2018-14614.patch
- From: kernel-4.14.86
- CVE-2018-14615, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with i_extra_isize
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14615
- Patch: 4.14.0/CVE-2018-14615.patch
- From: kernel-4.14.86
- CVE-2019-2024, CVSSv2 Score: 6.2
- Description:
media: em28xx: Fix use-after-free when disconnecting
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-2024
- Patch: 4.14.0/CVE-2019-2024.patch
- From: kernel-4.14.86
- CVE-2018-14616, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check with block address in main area v2
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14616
- Patch: 4.14.0/CVE-2018-14616-20.patch
- From: kernel-4.14.88
- CVE-2018-20169, CVSSv2 Score: 6.8
- Description:
USB: check usb_get_extra_descriptor for proper size
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20169
- Patch: 4.14.0/CVE-2018-20169.patch
- From: kernel-4.14.88
- CVE-2018-19985, CVSSv2 Score: 4.6
- Description:
USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CVE: https://access.redhat.com/security/cve/cve-2018-19985
- Patch: 4.14.0/CVE-2018-19985.patch
- From: kernel-4.14.91
- CVE-2018-20784, CVSSv2 Score: 9.8
- Description:
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20784
- Patch: 4.14.0/CVE-2018-20784.patch
- From: kernel-4.14.93
- CVE-2019-6133, CVSSv2 Score: 6.7
- Description:
fork: record start_time late
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6133
- Patch: 4.14.0/CVE-2019-6133.patch
- From: kernel-4.14.93
- CVE-2019-6974, CVSSv2 Score: 8.1
- Description:
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6974
- Patch: 4.14.0/CVE-2019-6974.patch
- From: kernel-4.14.99
- CVE-2019-7221, CVSSv2 Score: 7.5
- Description:
KVM: nVMX: unconditionally cancel preemption timer in free_nested
- CVE: https://access.redhat.com/security/cve/cve-2019-7221
- Patch: 4.14.0/CVE-2019-7221.patch
- From: kernel-4.14.99
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-7222-20.patch
- From:
- CVE-2019-9213, CVSSv2 Score: 5.5
- Description:
mm: enforce min addr even if capable() in expand_downwards()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-9213
- Patch: 4.14.0/CVE-2019-9213.patch
- From: kernel-4.14.105
- CVE-2019-8980, CVSSv2 Score: 7.5
- Description:
exec: Fix mem leak in kernel_read_file
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-8980
- Patch: 4.14.0/CVE-2019-8980.patch
- From: kernel-4.14.106
- CVE-2018-16884, CVSSv2 Score: 8.0
- Description:
sunrpc: use-after-free in svc_process_common()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16884
- Patch: 4.14.0/CVE-2018-16884.patch
- From: kernel-4.14.94
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-14625, CVSSv2 Score: 4.4
- Description:
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14625.html
- Patch: 4.15.0/CVE-2018-14625-vhost-vsock-fix-use-after-free-in-network-stack-ca.patch
- From: 4.15.0-44.47
- CVE-2018-14625, CVSSv2 Score: 4.4
- Description:
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14625.html
- Patch: 4.15.0/CVE-2018-14625-vhost-vsock-fix-use-after-free-in-network-stack-ca-kpatch.patch
- From: 4.15.0-44.47
- CVE-2018-5703, CVSSv2 Score: 9.8
- Description:
tls: Use correct sk->sk_prot for IPV6
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-5703
- Patch: 4.14.0/CVE-2018-5703-1.patch
- From: kernel-4.14.86
- CVE-2018-5703, CVSSv2 Score: 9.8
- Description:
tls: Use correct sk->sk_prot for IPV6
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-5703
- Patch: 4.14.0/CVE-2018-5703.patch
- From: kernel-4.14.86
- CVE-2018-5703, CVSSv2 Score: 9.8
- Description:
tls: Use correct sk->sk_prot for IPV6
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-5703
- Patch: 4.14.0/CVE-2018-5703-kpatch.patch
- From: kernel-4.14.86
- CVE-2018-1128, CVSSv2 Score: 7.5
- Description:
libceph: factor out encrypt_authorizer()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1128
- Patch: 4.14.0/CVE-2018-1128-1.patch
- From: kernel-4.4.86
- CVE-2018-1128, CVSSv2 Score: 7.5
- Description:
libceph: factor out __prepare_write_connect()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1128
- Patch: 4.14.0/CVE-2018-1128-2.patch
- From: kernel-4.4.86
- Description:
- CVE:
- Patch: 4.14.0/CVE-2018-1128-3.patch
- From:
- CVE-2018-1128, CVSSv2 Score: 7.5
- Description:
libceph: add authorizer challenge
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1128
- Patch: 4.14.0/CVE-2018-1128.patch
- From: kernel-4.4.86
- CVE-2018-1128, CVSSv2 Score: 7.5
- Description:
libceph: add authorizer challenge
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-1128
- Patch: 4.14.0/CVE-2018-1128-kpatch.patch
- From: kernel-4.4.86
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731780-kvm-x86-Report-STIBP-on-GET_SUPPORTED_CPUID-4.14.20-1.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731781-locking-atomics-asm-generic-Move-some-macros-from-.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
tools include: Adopt linux/bits.h
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731782-tools-include-Adopt-linux-bits.h.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731787-x86-kvm-Expose-X86_FEATURE_MD_CLEAR-to-guests-4.14.20-1.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
x86/speculation/mds: Clear CPU buffers on exit to user
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731789-x86-speculation-mds-Clear-CPU-buffers-on-exit-to-u-kpatch.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731790-x86-kvm-vmx-Add-MDS-protection-when-L1D-Flush-is-n-4.14.20-1.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-731791-x86-speculation-mds-Conditionally-clear-CPU-buffer.patch
- From: 4.15.0-50.54
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091, CVSSv2 Score: 6.5
- Description:
mds clear cpu buffers
- CVE: https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
- Patch: 4.14.0/CVE-2018-12130-fix-usermode-exit-4.14.20-1.patch
- From: 4.15.0-50.54
- CVE-2019-11477, CVSSv2 Score: 7.8
- Description:
tcp: limit payload size of sacked skbs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11477.html
- Patch: 4.14.0/CVE-2019-11477.patch
- From: >4.14.68-1
- CVE-2019-11478, CVSSv2 Score: 5
- Description:
tcp: tcp_fragment() should apply sane memory limits
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11478.html
- Patch: 4.14.0/CVE-2019-11478.patch
- From: >4.14.68-1
- CVE-2019-11479, CVSSv2 Score: 5
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11479.html
- Patch: 4.14.0/CVE-2019-11479-1.patch
- From: >4.14.68-1
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-11479-1-kpatch.patch
- From:
- CVE-2019-11479, CVSSv2 Score: 5
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11479.html
- Patch: 4.14.0/CVE-2019-11479-2.patch
- From: >4.14.68-1
- CVE-2018-7755, CVSSv2 Score: 5.5
- Description:
floppy: Do not copy a kernel pointer to user
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7755
- Patch: 4.14.0/CVE-2018-7755.patch
- From: 4.18
- CVE-2018-12896, CVSSv2 Score: 2.1
- Description:
posix-timers: Sanitize overrun handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12896.html
- Patch: 4.15.0/CVE-2018-12896-posix-timers-Sanitize-overrun-handling.patch
- From: 4.15.0-43.46
- CVE-2018-12896, CVSSv2 Score: 2.1
- Description:
posix-timers: Sanitize overrun handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12896.html
- Patch: 4.15.0/CVE-2018-12896-posix-timers-Sanitize-overrun-handling-kpatch.patch
- From: 4.15.0-43.46
- CVE-2018-15471, CVSSv2 Score: 8.2
- Description:
xen-netback: fix input validation in xenvif_set_hash_mapping()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-15471.html
- Patch: 4.15.0/cve-2018-15471-xen-netback-fix-input-validation.patch
- From: >4.15.0
- CVE-2018-16871, CVSSv2 Score: 7.5
- Description:
nfsd: COPY and CLONE operations require the saved filehandle to be set
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16871.html
- Patch: 4.15.0/CVE-2018-16871-nfsd-COPY-and-CLONE-operations-require-the-saved-filehandle-to-be-set.patch
- From: 4.15.0-46.49
- CVE-2018-20836, CVSSv2 Score: 8.1
- Description:
scsi: libsas: fix a race condition when smp task timeout
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20836.html
- Patch: 4.15.0/CVE-2018-20836-scsi-libsas-fix-a-race-condition-when-smp-task-timeout.patch
- From: 4.15.0-44.47
- CVE-2018-20856, CVSSv2 Score: 7.8
- Description:
fixed possible use-after-free in block/blk-core.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20856
- Patch: 4.14.0/CVE-2018-20856.patch
- From: 4.18
- CVE-2018-20511, CVSSv2 Score: 5.5
- Description:
fixed information leakage to userspace in drivers/net/appletalk/ipddp.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20511
- Patch: 4.14.0/CVE-2018-20511.patch
- From: 4.19
- CVE-2018-19854, CVSSv2 Score: 3.3
- Description:
crypto: user - fix leaking uninitialized memory to userspace
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19854.html
- Patch: 4.15.0/cve-2018-19854-crypto-fix-leaking-uninitialized-memory-to-user-space.patch
- From: >= kernel-4.15.0-43.46
- CVE-2018-6554, CVSSv2 Score: 5.5
- Description:
The irda_bind() function allocates memory for self->ias_obj without checking to see if the socket is already bound
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-6554
- Patch: 4.14.0/CVE-2018-6554.patch
- From: 4.14.93
- CVE-2019-10142, CVSSv2 Score: 7.8
- Description:
drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-10142
- Patch: 4.14.0/CVE-2019-10142-drivers-virt-fsl_hypervisor-c-prevent-integer-overflow-in-ioctl.patch
- From: 4.14.120
- CVE-2019-10638 CVE-2019-10639, CVSSv2 Score: 3.7
- Description:
inet: switch IP ID generator to siphash
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-10638
- Patch: 4.14.0/CVE-2019-10638-inet-switch-IP-ID-generator-to-siphash.patch
- From: 4.14.124
- CVE-2019-10638 CVE-2019-10639, CVSSv2 Score: 3.7
- Description:
inet: switch IP ID generator to siphash (adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-10638
- Patch: 4.14.0/CVE-2019-10638-inet-switch-IP-ID-generator-to-siphash-kpatch.patch
- From: 4.14.124
- CVE-2019-0136, CVSSv2 Score: 7.4
- Description:
mac80211: drop robust management frames from unknown TA
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0136
- Patch: 4.14.0/CVE-2019-0136-mac80211-drop-robust-management-frames-from-unknown-TA.path
- From: 4.14.130
- CVE-2019-0136, CVSSv2 Score: 7.4
- Description:
mac80211: handle deauthentication/disassociation from TDLS peer
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-0136
- Patch: 4.14.0/CVE-2019-0136-mac80211-handle-deauthentication-disassociation-from-TDLS-peer.patch
- From: 4.14.130
- CVE-2019-11810, CVSSv2 Score: 6.2
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- CVE: https://access.redhat.com/security/cve/cve-2019-11810
- Patch: 4.14.0/CVE-2019-11810-scsi-megaraid_sas-return-error-when-create-DMA-pool-failed.patch
- From: 4.14.111
- CVE-2019-11815, CVSSv2 Score: N/A
- Description:
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
- Patch: 4.15.0/CVE-2019-11815-net-rds-force-to-destroy-connection-pve5.patch
- From:
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
fs: prevent page refcount overflow in pipe_buf_get
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.14.0/CVE-2019-11487-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch
- From: 4.14.116
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: add 'try_get_page()' helper function
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-mm-add-try_get_page-helper-function.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-mm-prevent-get_user_pages-from-overflowing-page-refcount.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: make page ref count overflow check tighter and more explicit
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11487
- Patch: 4.15.0/CVE-2019-11487-mm-make-page-ref-count-overflow-check-tighter-and-more-explicit.patch
- From: kernel-4.15.0-60.67
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-11487-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-11085-1.patch
- From:
- CVE-2019-11085, CVSSv2 Score: 7.8
- Description:
drm/i915/gvt: Fix mmap range check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11085
- Patch: 4.15.0/CVE-2019-11085-drm-i915-gvt-Fix-mmap-range-check.patch
- From: 4.15.0-55.60
- CVE-2019-11486, CVSSv2 Score: 7.0
- Description:
tty: mark Siemens R3964 line discipline as BROKEN
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-11486
- Patch: 4.9.0/CVE-2019-11486-tty-mark-Siemens-R3964-line-discipline-as-BROKEN.patch
- From: linux-4.9.168-1+deb9u3
- CVE-2019-11599, CVSSv2 Score: 6.1
- Description:
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-11599
- Patch: 4.15.0/CVE-2019-11599-coredump-fix-race-condition-between-mmget_not_zero-get_task_mm-and-core-dumping-55.60.patch
- From: kernel-4.15.0-60.67
- CVE-2019-11833, CVSSv2 Score: 5.5
- Description:
ext4: zero out the unused memory region in the extent tree block
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11833
- Patch: 4.15.0/CVE-2019-11833-ext4-zero-out-the-unused-memory-region-in-the-extent-tree-block.patch
- From: 4.15.0-55.60
- CVE-2019-12818, CVSSv2 Score: 7.5
- Description:
fix NULL pointer dereference in net/nfc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12818.html
- Patch: 4.15.0/CVE-2019-12818.patch
- From: 4.15.0-58.64
- CVE-2019-12819, CVSSv2 Score: 5.5
- Description:
fix use-after-free in drivers/net/phy/mdio_bus.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12819.html
- Patch: 4.15.0/CVE-2019-12819.patch
- From: 4.15.0-58.64
- CVE-2019-14763, CVSSv2 Score: 6.2
- Description:
USB: gadget: f_hid: fix deadlock in f_hidg_write()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-14763
- Patch: 4.15.0/CVE-2019-14763-USB-gadget-f_hid-fix-deadlock-in-f_hidg_write.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15090, CVSSv2 Score: 5.4
- Description:
scsi: qedi: remove memset/memcpy to nfunc and use func instead
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15090
- Patch: 4.15.0/CVE-2019-15090-scsi-qedi-remove-memset-memcpy-to-nfunc-and-use-func-instead.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15212, CVSSv2 Score: 6.1
- Description:
USB: rio500: refuse more than one device at a time
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15212
- Patch: 4.15.0/CVE-2019-15212-USB-rio500-refuse-more-than-one-device-at-a-time.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15214, CVSSv2 Score: 6.1
- Description:
ALSA: core: Fix card races between register and disconnect
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15214
- Patch: 4.15.0/CVE-2019-15214-ALSA-core-Fix-card-races-between-register-and-disconnect.patch
- From: kernel-4.15.0-60.67
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-15216-USB-yurex-Fix-protection-fault-after-device-removal.patch
- From:
- CVE-2019-15218, CVSSv2 Score: 4.3
- Description:
media: usb: siano: Fix general protection fault in smsusb
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15218
- Patch: 4.15.0/CVE-2019-15218-media-usb-siano-Fix-general-protection-fault-in-smsusb.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15292, CVSSv2 Score: 4.7
- Description:
appletalk: Fix use-after-free in atalk_proc_exit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15292
- Patch: 4.14.0/CVE-2019-15292-appletalk-Fix-use-after-free-in-atalk_proc_exit.patch
- From: 4.14.113
- CVE-2019-15666, CVSSv2 Score: 7.5
- Description:
xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15666
- Patch: 4.14.0/CVE-2019-15666-xfrm-policy-Fix-out-of-bound-array-accesses-in-__xfrm_policy_unlink.patch
- From: kernel-4.14.35-1902.6.4
- CVE-2019-15807, CVSSv2 Score: 7.5
- Description:
scsi: libsas: delete sas port if expander discover failed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15807.html
- Patch: 4.15.0/CVE-2019-15807-scsi-libsas-delete-sas-port-if-expander-discover-failed.patch
- From: 4.15.0-15807
- CVE-2019-15916, CVSSv2 Score: 7.5
- Description:
net-sysfs: Fix mem leak in netdev_register_kobject
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15916
- Patch: 4.15.0/CVE-2019-15916-net-sysfs-Fix-mem-leak-in-netdev_register_kobject.patch
- From: linux-4.15.0-59.66
- CVE-2019-15917, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15917
- Patch: 4.14.0/CVE-2019-15917-Bluetooth-hci_ldisc-Postpone-HCI_UART_PROTO_READY-bit-set-in-hci_uart_set_proto.patch
- From: 4.14.109
- CVE-2019-15921, CVSSv2 Score: 7.8
- Description:
genetlink: Fix a memory leak on error path
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15921
- Patch: 4.15.0/CVE-2019-15921-genetlink-Fix-a-memory-leak-on-error-path.patch
- From: linux-4.15.0-59.66
- CVE-2019-15927, CVSSv2 Score: 7.8
- Description:
fixed OOB access in sound/usb/mixer.c
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15927
- Patch: 4.14.0/CVE-2019-15927.patch
- From: 5.0
- CVE-2019-1999, CVSSv2 Score: 7.8
- Description:
binder: fix race between munmap() and direct reclaim
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1999
- Patch: 4.14.0/CVE-2019-1999-binder-fix-race-between-munmap-and-direct-reclaim.patch
- From: 4.14.124
- CVE-2019-2101, CVSSv2 Score: 5.5
- Description:
fixed possible OOB-read with improper input validation in drivers/media/usb/uvc/uvc_driver.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-2101.html
- Patch: 4.15.0/CVE-2019-2101.patch
- From: 4.15.0-58.64
- CVE-2018-3459, CVSSv2 Score: 3.5
- Description:
Bluetooth: Verify that l2cap_get_conf_opt provides large
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
- Patch: 4.18.0/CVE-2019-3459-771136-Bluetooth-Verify-that-l2cap_get_conf_opt-provides-.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2018-3460, CVSSv2 Score: 3.5
- Description:
Bluetooth: Check L2CAP option sizes returned from
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html
- Patch: 4.18.0/CVE-2019-3460-Bluetooth-Check-L2CAP-option-sizes-returned-from-l.patch
- From: 4.18.0-17.18~18.04.1
- CVE-2019-3882, CVSSv2 Score: 5.5
- Description:
vfio/type1: Limit DMA mappings per container
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2019-3882.html
- Patch: 4.15.0/CVE-2019-3882-vfio-type1-Limit-DMA-mappings-per-container.patch
- From: 4.15.0-49.52
- Description:
- CVE:
- Patch: 4.15.0/CVE-2019-3882-vfio-type1-Limit-DMA-mappings-per-container-kpatch.patch
- From:
- CVE-2019-7300, CVSSv2 Score: 7.2
- Description:
bpf: Prevent memory disambiguation attack
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7300
- Patch: 4.14.0/CVE-2019-7300-bpf-Prevent-memory-disambiguation-attack.patch
- From: 4.14.75
- CVE-2019-7308, CVSSv2 Score: 7.5
- Description:
bpf: Prevent memory disambiguation attack
- CVE: https://alas.aws.amazon.com/AL2/ALAS-2019-1201.html
- Patch: 4.14.0/CVE-2019-7308.patch
- From: kernel-4.14.114-103.97.amzn2
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-7308-eig.patch
- From:
- CVE-2019-9500, CVSSv2 Score: 6.5
- Description:
brcmfmac: assure SSID length from firmware is limited
- CVE: https://access.redhat.com/security/cve/cve-2019-9500
- Patch: 4.15.0/CVE-2019-9500-brcmfmac-assure-SSID-length-from-firmware-is-limited.patch
- From: 4.15.0-49.52
- CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: add subtype check for event handling in data path
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.15.0/CVE-2019-9503-brcmfmac-add-subtype-check-for-event-handling-in-data-path.patch
- From: 4.15.0-49.52
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-gtt-Add-read-only-pages-to-gen8_pte_encode.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-gtt-Read-only-pages-for-insert_entries-on-bdw.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-gtt-Disable-read-only-support-under-GVT.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Prevent-writing-into-a-read-only-object-via-a-GGTT-mmap.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Prevent-writing-into-a-read-only-object-via-a-GGTT-mmap-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-cmdparser-Check-reg_table_count-before-derefencing.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-cmdparser-Do-not-check-past-the-cmd-length.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Silence-smatch-for-cmdparser.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Dont-use-GPU-relocations-prior-to-cmdparser-stalls.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Move-engine-needs_cmd_parser-to-engine-flags.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 7.8
- Description:
drm/i915: Rename gen7 cmdparser tables
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Rename-gen7-cmdparser-tables.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Disable-Secure-Batches-for-gen6.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 7.8
- Description:
drm/i915: Remove Master tables from cmdparser
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Remove-Master-tables-from-cmdparser.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Add-support-for-mandatory-cmdparsing.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Support-ro-ppgtt-mapped-cmdparser-shadow-buffers.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Allow-parsing-of-unsized-batches.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-Add-gen9-BCS-cmdparsing.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Add-gen9-BCS-cmdparsing-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-cmdparser-Use-explicit-goto-for-error-paths.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0155-drm-i915-cmdparser-Add-support-for-backward-jumps.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Add-support-for-backward-jumps-kpatch.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 7.8
- Description:
drm/i915/cmdparser: Ignore Length operands during command matching
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Ignore-Length-operands-during-command-matching.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-cmdparser-Ignore-Length-operands-during-command-matching-kpatch.patch
- From:
- CVE-2019-0154, CVSSv2 Score: 5.5
- Description:
drm/i915: Lower RM timeout to avoid DSI hard hangs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0154
- Patch: 4.15.0/i915/CVE-2019-0155-UBUNTU-SAUCE-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch
- From: 4.15.0-70.79
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0154-drm-i915-gen8-Add-RC6-CTX-corruption-WA-20.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/i915/CVE-2019-0154-drm-i915-gen8-Add-RC6-CTX-corruption-WA-kpatch.patch
- From:
- CVE-2019-0155, CVSSv2 Score: 7.8
- Description:
drm/i915/cmdparser: Fix jump whitelist clearing
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-0155
- Patch: 4.15.0/i915/CVE-2019-0154-UBUNTU-SAUCE-drm-i915-cmdparser-Fix-jump-whitelist-clearing.patch
- From: 4.15.0-69.78
- Description:
- CVE:
- Patch: 4.15.0/i915/CVE-2019-0155-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs-kpatch.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/kpatch-add-paravirt-asm-definitions-proofpoint-20-1.patch
- From:
- Description:
- CVE:
- Patch: 4.15.0/kpatch-pti-add-KernelCare-mapping-into-shadow-PGD-1.patch
- From:
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
Spectre v1 swapgs mitigations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1125.html
- Patch: 4.15.0/CVE-2019-1125-proofpoint-20-1.patch
- From: 4.15.0-58.64
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: properly handle multiple messages in selinux_netlink_send()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10751
- Patch: 4.14.0/CVE-2020-10751.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: avoid declaring fs inconsistent due to invalid file handles (dependency for CVE-2019-19319)
- CVE: https://access.redhat.com/security/cve/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319-ext4-avoid-declaring-fs-inconsistent.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: protect journal inode's blocks using block_validity
- CVE: https://access.redhat.com/security/cve/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19319, CVSSv2 Score: 7.8
- Description:
ext4: don't perform block validity checks on the journal inode
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19319
- Patch: 4.14.0/CVE-2019-19319-kpatch.patch
- From: 4.9.210-1+deb9u1
- Description:
- CVE:
- Patch: 4.9.0/cve-2019-19319-kpatch-fix-rbtree.patch
- From:
- Description:
- CVE:
- Patch: 4.14.0/CVE-2019-19319-kpatch-fix-races-amazon1.patch
- From:
- CVE-2018-5953 CVE-2018-5995 CVE-2018-7754 CVE-2018-7273 CVE-2018-20449, CVSSv2 Score: 5.5
- Description:
add function ptr_to_id() in order not to leak kernel layout info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7754
- Patch: 4.14.0/lib-vsprintf-printk-hash-addresses-printed-with.patch
- From: 4.15
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2019-15291, CVSSv2 Score: 4.6
- Description:
media: b2c2-flexcop-usb: add sanity checking
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15291
- Patch: 5.3.0/CVE-2019-15291-media-b2c2-flexcop-usb-add-sanity-checking.patch
- From: 5.3.0-40.32~18.04.1
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: fixed possible NULL pointer dereference issue while importing some category bitmap into SELinux
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 4.14.0/CVE-2020-10711.patch
- From: 4.14.177-139.254.amzn2
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
- CVE: https://access.redhat.com/security/cve/CVE-2020-1749
- Patch: 4.14.0/cve-2020-1749-net-ipv6-stub-use-ip6_dst_lookup_flow-lt-4.14.133.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
kpatch adaptation for CVE-2020-1749
- CVE: https://access.redhat.com/security/cve/CVE-2020-1749
- Patch: 4.14.0/cve-2020-1749-net-ipv6-stub-use-ip6_dst_lookup_flow-kpatch-1.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://access.redhat.com/security/cve/CVE-2020-12770
- Patch: 4.14.0/CVE-2020-12770.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2018-20669, CVSSv2 Score: 7.8
- Description:
make 'user_access_begin()' do 'access_ok()'
- CVE: https://access.redhat.com/security/cve/CVE-2018-20669
- Patch: 4.14.0/cve-2018-20669-make-user_access_begin-do-access_ok-eig.patch
- From: 4.14.186-110.268.amzn1
- CVE-2019-19462, CVSSv2 Score: 5.5
- Description:
include/linux/relay.h: fix percpu annotation in struct rchan
- CVE: https://access.redhat.com/security/cve/CVE-2019-19462
- Patch: 4.14.0/CVE-2019-19462.patch
- From: 4.14.35-1902.302.2
- CVE-2020-10757, CVSSv2 Score: 6.1
- Description:
mm: Fix mremap not considering huge pmd devmap
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10757
- Patch: 4.19.0/CVE-2020-10757-mm-Fix-mremap-not-considering-huge-pmd-devmap.patch
- From: 4.19.118-2+deb10u1
- CVE-2020-10732, CVSSv2 Score: 3.3
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10732
- Patch: 4.14.0/cve-2020-10732-fs-binfmt_elf.c-allocate-initialized-memory-in-fill_-eig.patch
- From: pp-4.14.180
- CVE-2017-18232, CVSSv2 Score: 5.5
- Description:
fix possible deadlock with mutex within SCSI libsas (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-18232
- Patch: 4.14.0/cve-2017-18232-scsi-libsas-direct-call-probe-and-destruct-low-2x.patch
- From: kernel-4.14.192-147.314.amzn2
- CVE-2019-18808, CVSSv2 Score: 5.5
- Description:
crypto: ccp - Release all allocated memory if sha type is invalid
- CVE: https://access.redhat.com/security/cve/CVE-2019-18808
- Patch: 4.14.0/cve-2019-18808-release-all-allocated-memory-if-sha-type-invalid.patch
- From: 4.14.35-1902.302.2
- CVE-2019-19054, CVSSv2 Score: 4.7
- Description:
media: rc: prevent memory leak in cx23888_ir_probe
- CVE: https://access.redhat.com/security/cve/CVE-2019-19054
- Patch: 4.14.0/cve-2019-19054-media-rc-prevent-memory-leak.patch
- From: 4.14.35-1902.304.6
- CVE-2019-19061, CVSSv2 Score: 5.9
- Description:
iio: imu: adis16400: fix memory leak
- CVE: https://access.redhat.com/security/cve/CVE-2019-19061
- Patch: 4.14.0/cve-2019-19061-iio-imu-fix-memory-leak.patch
- From: 4.14.35-1902.302.2
- CVE-2019-19073, CVSSv2 Score: 4.0
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://access.redhat.com/security/cve/CVE-2019-19073
- Patch: 4.18.0/cve-2019-19073-aht9k_htc-release-allocated-buffer-if-timedout.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-19074, CVSSv2 Score: 7.5
- Description:
th9k: release allocated buffer if timed out
- CVE: https://access.redhat.com/security/cve/CVE-2019-19074
- Patch: 4.18.0/cve-2019-19074-aht9k-release-allocated-buffer-if-timedout.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-9445, CVSSv2 Score: 4.4
- Description:
f2fs: check if file namelen exceeds max value
- CVE: https://access.redhat.com/security/cve/CVE-2019-9445
- Patch: 4.14.0/cve-2019-9445-f2fs-check-if-name-length-too-big.patch
- From: 4.14.35-1902.302.2
- CVE-2020-12655, CVSSv2 Score: 5.5
- Description:
xfs: add agf freeblocks verify in xfs_agf_verify
- CVE: https://access.redhat.com/security/cve/CVE-2020-12655
- Patch: 4.14.0/cve-2020-12655-xfs-add-agf-freeblocks-verify.patch
- From: 4.14.35-1902.304.6
- CVE-2020-15393, CVSSv2 Score: 5.5
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-15393
- Patch: 4.19.0/CVE-2020-15393.patch
- From: 4.19.131-1
- Description:
net/packet: fix overflow in tpacket_rcv
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14386.html
- Patch: 4.15.0/CVE-2020-14386.patch
- From: 4.15.0-117.118
- Description:
vmx_vcpu_run wrapper
- CVE:
- Patch: 4.15.0/x86-kvm-vmx_vcpu_run-wrapper.patch
- From:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From:
- CVE-2018-15594, CVSSv2 Score: 5.6
- Description:
x86/paravirt: Fix spectre-v2 mitigations for paravirt guests
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-15594
- Patch: 4.14.0/x86_paravirt_fix_spectre_v2_mitigations_for_paravirt_guests.patch
- From: v4.14.63
- CVE-2018-15572, CVSSv2 Score: 5.6
- Description:
x86/speculation: Protect against userspace-userspace spectreRSB
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-15572
- Patch: 4.14.0/x86_speculation_protect_against_userspace_userspace_spectrersb.patch
- From: v4.14.63
- CVE-2019-9456, CVSSv2 Score: 6.7
- Description:
usb: usbmon: Read text within supplied buffer size
- CVE: https://access.redhat.com/security/cve/cve-2019-9456
- Patch: 4.14.0/CVE-2019-9456.patch
- From: 4.14.68-1.el7
- CVE-2018-3639, CVSSv2 Score: 5.5
- Description:
Speculative Store Bypass mitigation
- CVE: https://access.redhat.com/security/cve/CVE-2018-3639
- Patch: 4.14.0/ssb_mitigation.patch
- From: 4.14.68-1.el7
- CVE-2019-15239, CVSSv2 Score: 7.2
- Description:
tcp: purge write queue in tcp_connect_init()
- CVE: https://access.redhat.com/security/cve/cve-2019-15239
- Patch: 4.1.12/CVE-2019-15239-tcp-purge-write-queue-in-tcp_connect_init.patch
- From: kernel-uek-4.1.12-124.32.1.el6uek