- kernel-5.4.110-54.182.amzn2 (amazon2-5.4)
- 5.4.283-195.378.amzn2
- 2024-10-01 09:43:06
- 2024-10-18 08:27:19
- K20241001_08
- CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673, CVSSv2 Score: 7.8
- Description:
A flaw was found in the Linux kernel's eBPF verification code.
- CVE: https://access.redhat.com/security/cve/cve-2020-25673
- Patch: 5.4.0/CVE-2020-25670_25671_25672_25673-nfc.patch
- From: 5.4.110-54.189.amzn2
- CVE-2021-29154, CVSSv2 Score: 7.8
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29154
- Patch: 5.4.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: >kernel-5.4.0-70.78
- CVE-2021-29155 CVE-2021-31829, CVSSv2 Score: 6.3
- Description:
A flaw was found in the Linux kernel's eBPF verification code.
- CVE: https://access.redhat.com/security/cve/cve-2021-31829
- Patch: 5.4.0/CVE-2021-29155-CVE-2021-31829-bpf.patch
- From: 5.4.110-54.189.amzn2
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
A flaw was found in the Linux kernel. A race condition was discovered in the ext4 subsystem. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- CVE: https://access.redhat.com/security/cve/CVE-2021-40490
- Patch: 5.4.0/cve-2021-40490-ext4_fix_race_writing_to_an_inline_data_file_while_its_xattrs_are_changing.patch
- From: 5.4.105-48.177
- CVE-2021-3753, CVSSv2 Score: 6.2
- Description:
vt_kdsetmode: extend console locking
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3753
- Patch: 5.4.0/CVE-2021-3753-890424-vt_kdsetmode-extend-console-locking.patch
- From: kernel-5.4.0-90.101
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 5.4.0/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode-amzn.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
remote stack overflow in Linux kernel
- CVE: https://ubuntu.com/security/CVE-2022-0435
- Patch: 5.4.0/CVE-2022-0435.patch
- From: kernel-5.4.0-105.119
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://ubuntu.com/security/CVE-2020-26139
- Patch: 5.8.0/CVE-2020-26139-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
ath10k: Fix TKIP Michael MIC verification for PCIe
- CVE: https://ubuntu.com/security/CVE-2020-26141
- Patch: 5.8.0/CVE-2020-26141-ath10k-Fix-TKIP-Michael-MIC-verification-for-PCIe.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- CVE: https://ubuntu.com/security/CVE-2020-26145
- Patch: 5.8.0/CVE-2020-26145-ath10k-add-CCMP-PN-replay-protection-for-fragmented-frames-for-PCIe.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for SDIO
- CVE: https://ubuntu.com/security/CVE-2020-26145
- Patch: 5.8.0/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-SDIO.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for PCIe
- CVE: https://ubuntu.com/security/CVE-2020-26145
- Patch: 5.8.0/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-PCIe.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 5.4.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-5.4.0-77.86
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
ath10k: drop MPDU which has discard flag set by firmware for SDIO
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-ath10k-drop-MPDU-which-has-discard-flag-set-by-firmware-for-SDIO.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.4.0/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: kernel-5.4.0-77.86
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042-header.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.4.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From: 5.4.0-77.86
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.4.0/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 5.4.0-77.86
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.4.0/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment-cache-attacks.patch
- From: 5.4.0-77.86
- CVE-2020-26146, CVSSv2 Score: 5.3
- Description:
mac80211: check defrag PN against current frame
- CVE: https://www.openwall.com/lists/oss-security/2021/05/11/12
- Patch: 4.18.0/13735-mac80211-check-defrag-PN-against-current-frame.patch
- From: 4.18.0-348.el8
- CVE-2020-26541, CVSSv2 Score:
- Description:
Affects only secure boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2020-26541.patch
- From:
- CVE-2021-0129 CVE-2020-26558, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-0129
- Patch: 5.4.0/CVE-2020-26558-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From: kernel-5.4.0-77.86
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://ubuntu.com/security/CVE-2021-22543
- Patch: 5.11.0/CVE-2021-22543-KVM-do-not-allow-mapping-valid-but-non-reference-counted-pages.patch
- From: kernel-5.11.0-31.33
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- CVE: https://ubuntu.com/security/CVE-2021-32399
- Patch: 5.4.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the-HCI-controller.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-Bluetooth-verify-AMP-hci_chan-before-amp_destroy.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-kpatch.patch
- From: kernel-5.4.0-77.86
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-34693
- Patch: 5.11.0/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: kernel-5.11.0-34.36
- CVE-2021-3506, CVSSv2 Score: 7.1
- Description:
f2fs: fix to avoid out-of-bounds memory access
- CVE: https://ubuntu.com/security/CVE-2021-3506
- Patch: 5.4.0/CVE-2021-3506-f2fs-fix-to-avoid-out-of-bounds-memory-access.patch
- From: kernel-5.4.0-77.86
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 4.9.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.9.272-1
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3573
- Patch: 4.19.0/CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 4.14.191-1
- CVE-2021-38208, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2021-38208.patch
- From:
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: disallow extremely large seq buffer allocations
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33909
- Patch: 5.4.0/CVE-2021-33909-disallow-extremely-large-seq-buffer-allocations.patch
- From: 5.4.17-2102.204.4.2
- CVE-2020-36311, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Periodically schedule when unregistering regions on destroy
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36311
- Patch: ubuntu-focal/5.4.0-84.94/CVE-2020-36311-KVM-SVM-Periodically-schedule-when-unregistering-regions-on-destroy.patch
- From: 5.4.0-84.94
- CVE-2021-33624, CVSSv2 Score: 4.7
- Description:
bpf: Fix leakage under speculation on mispredicted branches
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33624
- Patch: 5.4.0/CVE-2021-33624-bpf-Fix-leakage-under-speculation-on-mispredicted-br.patch
- From: 5.4.0-88.99
- CVE-2021-33624, CVSSv2 Score: 4.7
- Description:
bpf: Do not mark insn as seen under speculative path verification
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33624
- Patch: ubuntu-focal/5.4.0-88.99/0009-CVE-2021-33624-bpf-Do-not-mark-insn-as-seen-under-speculative-path-.patch
- From: 5.4.0-88.99
- CVE-2021-33624, CVSSv2 Score: 4.7
- Description:
bpf: Inherit expanded/patched seen count from old aux data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33624
- Patch: ubuntu-focal/5.4.0-88.99/0008-CVE-2021-33624-bpf-Inherit-expanded-patched-seen-count-from-old-aux.patch
- From: 5.4.0-88.99
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: validate chunk size in __rcv_asconf_lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3655
- Patch: ubuntu-focal/5.4.0-91.102/0001-CVE-2021-3655-sctp-validate-chunk-size-in-__rcv_asconf_lookup.patch
- From: 5.4.0-91.102
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: add param size validation for SCTP_PARAM_SET_PRIMARY
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3655
- Patch: ubuntu-focal/5.4.0-91.102/0002-CVE-2021-3655-sctp-add-param-size-validation-for-SCTP_PARAM_SET_PR.patch
- From: 5.4.0-91.102
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: add size validation when walking chunks
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 5.4.0/CVE-2021-3655-sctp-add-size-validation-when-walking-chunks.patch
- From: 5.4.141-67.229
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: validate from_addr_param return
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 5.4.0/CVE-2021-3655-sctp-validate-from_addr_param-return.patch
- From: 5.4.141-67.229
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: fix return value check in __sctp_rcv_asconf_lookup
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 5.4.0/CVE-2021-3655-sctp-fix-return-value-check-in__sctp_rcv_asconf_lookup.patch
- From: 5.4.141-67.229
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3679
- Patch: ubuntu-focal/5.4.0-88.99/0007-CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch
- From: 5.4.0-88.99
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38160
- Patch: ubuntu-focal/5.4.0-88.99/0002-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 5.4.0-88.99
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-38198
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-shadow-page.patch
- From: kernel-5.4.0-89.100
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2021-38198-kpatch.patch
- From: kernel-5.4.0-89.100
- CVE-2021-38199, CVSSv2 Score: 6.5
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38199
- Patch: ubuntu-focal/5.4.0-88.99/0003-CVE-2021-38199-NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch
- From: 5.4.0-88.99
- CVE-2020-16119, CVSSv2 Score: 7.8
- Description:
dccp: don't duplicate ccid when cloning dccp sock
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-16119
- Patch: debian11/CVE-2020-16119-dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch
- From: 5.10.46-5
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42252
- Patch: ubuntu-focal-hwe-5.11/5.11.0-44.48~20.04.2/0001-CVE-2021-20321-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 5.11.0-44.48~20.04.2
- CVE-2021-3764 CVE-2021-3744, CVSSv2 Score: 5.5
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-focal/5.4.0-91.102/0008-CVE-2021-3744-CVE-2021-3764-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd.patch
- From: 5.4.0-91.102
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-41864
- Patch: ubuntu-focal/5.4.0-92.103/0002-CVE-2021-41864-bpf-Fix-integer-overflow-in-prealloc_elems_and_freel.patch
- From: 5.4.0-92.103
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: use siphash in rt6_exception_hash()
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 5.4.0/CVE-2021-20322-ipv6-use-siphash-in-rt6-exception-hash.patch
- From: kernel-5.4.156-83.273.amzn2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv6: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 5.4.0/CVE-2021-20322-ipv6-make-exception-cache-less-predictible.patch
- From: kernel-5.4.156-83.273.amzn2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 5.4.0/CVE-2021-20322-ipv4-use-siphash-instead-of-Jenkins-in-fnhe-hashfun.patch
- From: kernel-5.4.156-83.273.amzn2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: use siphash instead of Jenkins in fnhe_hashfun() (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-20322
- Patch: 5.4.0/CVE-2021-20322-ipv4-use-siphash-instead-of-Jenkins-in-fnhe-hashfun-kpatch.patch
- From: kernel-5.4.156-83.273.amzn2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4 make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 5.4.0/CVE-2021-20322-ipv4-make-exception-cache-less-predictible.patch
- From: kernel-5.4.156-83.273.amzn2
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-list.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: clean up all clients on device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-clean-up-all-clients-on-device-removal.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list (adaptation)
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-kpatch.patch
- From: 5.4.0-110.124
- CVE-2021-3640, CVSSv2 Score: 7.8
- Description:
Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3640
- Patch: ubuntu-focal/5.4.0-97.110/0002-CVE-2021-3640-Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_.patch
- From: 5.4.0-97.110
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: use init_tag from inithdr for ABORT chunk
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: fix the processing for INIT_ACK chunk
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-fix-the-processing-for-INIT_ACK-chunk.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: fix the processing for COOKIE_ECHO chunk
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-fix-the-processing-for-COOKIE_ECHO-chunk.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_do_8_5_1_E_sa
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_do_8_5_1_E_sa.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_ootb
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_ootb.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: fix the processing for INIT chunk
- CVE: https://ubuntu.com/security/CVE-2021-3772
- Patch: 5.4.0/CVE-2021-3772-sctp-fix-the-processing-for-INIT-chunk.patch
- From: 5.4.162-86.275.amzn2
- CVE-2021-4001, CVSSv2 Score:
- Description:
kernel version 5.4 not affected
- CVE:
- Patch: skipped/CVE-2021-4001.patch
- From:
- CVE-2021-4002, CVSSv2 Score: 4.4
- Description:
tlb: mmu_gather: add tlb_flush_*_range APIs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4002
- Patch: 5.4.0/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 5.4.162-86.275
- CVE-2021-28711, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28711.patch
- From:
- CVE-2021-28712, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28712.patch
- From:
- CVE-2021-28713, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-28713.patch
- From:
- CVE-2021-28714, CVSSv2 Score: 5.0
- Description:
xen/netback: fix rx queue stall detection
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-28714.html
- Patch: 5.4.0/CVE-2021-28714.patch
- From: 5.4.172-90.336.amzn2
- CVE-2021-28715, CVSSv2 Score: 5.0
- Description:
xen/netback: don't queue unlimited number of packages
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-28715.html
- Patch: 5.4.0/CVE-2021-28715.patch
- From: 5.4.172-90.336.amzn2
- CVE-2021-28714, CVSSv2 Score: 5.0
- Description:
xen/netback: fix rx queue stall detection (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-28714.html
- Patch: 5.4.0/CVE-2021-28714_kpatch.patch
- From: 5.4.172-90.336.amzn2
- CVE-2021-4135, CVSSv2 Score: 4.7
- Description:
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2011-4315
- Patch: 5.10.0/CVE-2021-4135-netdevsim-Zero-initialize-memory-for-new-maps-value-in-function-nsim_bpf_map_alloc.patch
- From: kernel-5.10.92-1
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 5.4.0/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like-fallocate.patch
- From: 5.4.172-90.336.amzn2
- CVE-2021-43975, CVSSv2 Score: 6.7
- Description:
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-43975
- Patch: 5.4.0/CVE-2021-43975-atlantic-Fix-OOB-read-and-write-in-hw_atl_utils_fw_r.patch
- From: 5.4.172-90.336.amzn2
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: vfs: Out-of-bounds write of heap buffer in fs_context.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0185
- Patch: 5.4.0/CVE-2022-0185-UBUNTU-SAUCE-vfs-Out-of-bounds-write-of-heap-buffer-in-fs_context.c.patch
- From: 5.4.0-96.109
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: vfs: test that one given mount param is not larger than PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0185
- Patch: 5.4.0/CVE-2022-0185-UBUNTU-SAUCE-vfs-test-that-one-given-mount-param-is-not-larger-than-PAGE_SIZE.patch
- From: 5.4.0-96.109
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 5.4.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 5.4.176-91.338.amzn2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 5.4.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch.patch
- From: 5.4.176-91.338.amzn2
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 5.4.17/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 5.4.17-2136.302.7.2.3
- CVE-2022-0001, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2021-26341, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26341.patch
- From:
- CVE-2022-23960, CVSSv2 Score:
- Description:
Out of scope as the patch is aarch64 related
- CVE:
- Patch: skipped/CVE-2022-23960.patch
- From:
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm.patch
- From: 5.4.181
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks(adaptation).
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm-kpatch.patch
- From: 5.4.17-2136.308.7
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action
- CVE: https://access.redhat.com/security/cve/CVE-2022-25636
- Patch: 5.4.0/CVE-2022-25636-netfilter-nf_tables_offload-incorrect-flow-offload.patch
- From: 5.4.186-102.354.amzn2
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array size (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-25636
- Patch: 5.4.0/CVE-2022-25636-netfilter-nf_tables_offload-incorrect-flow-offload-kpatch.patch
- From: 5.4.186-102.354.amzn2
- CVE-2022-1015, CVSSv2 Score:
- Description:
kernel version 5.4, 5.10 not affected
- CVE:
- Patch: skipped/CVE-2022-1015.patch
- From:
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: initialize registers in nft_do_chain()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1016
- Patch: 5.4.17/CVE-2022-1016-netfilter-nf_tables-initialize-registers-in-nft_do_chain.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-1055, CVSSv2 Score: 6.3
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1055
- Patch: 5.4.0/CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: kernel-5.4.186-102.354.amzn2
- CVE-2022-26490, CVSSv2 Score: 7.8
- Description:
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-26490
- Patch: 5.10.0/CVE-2022-26490-nfc-st21nfca-Fix-potential-buffer-overflows-in-EVT_TRANSACTION.patch
- From: 5.10.113-1
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 5.4.0/CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformation.patch
- From: v5.4
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
sock: remove one redundant SKB_FRAG_PAGE_ORDER macro (CVE-2022-27666 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-27666
- Patch: 5.4.0/CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformation-dependency.patch
- From: v5.14
- CVE-2022-28356, CVSSv2 Score: 7.5
- Description:
llc: fix netdevice reference leaks in llc_ui_bind()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28356
- Patch: 5.10.0/CVE-2022-28356-llc-fix-netdevice-reference-leaks-in-llc_ui_bind.patch
- From: 5.10.113-1
- CVE-2022-0494, CVSSv2 Score: 4.4
- Description:
block-map: add __GFP_ZERO flag for alloc_page in function
- CVE: https://access.redhat.com/security/cve/CVE-2022-0494
- Patch: 5.4.0/CVE-2022-0494-block-map-add-__GFP_ZERO-for-alloc_page-in-bio_copy_kern.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2022-0854, CVSSv2 Score: 5.1
- Description:
swiotlb: fix info leak with DMA_FROM_DEVICE
- CVE: https://access.redhat.com/security/cve/CVE-2022-0854
- Patch: 5.4.0/CVE-2022-0854-swiotlb-fix-info-leak-with-DMA_FROM_DEVICE-1.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 5.4.17/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 5.4.17-2136.307.3.2.el8uek
- CVE-2022-1836, CVSSv2 Score: 5.1
- Description:
floppy: disable FDRAWCMD by default
- CVE: https://access.redhat.com/security/cve/CVE-2022-1836
- Patch: 5.4.0/CVE-2022-1836-floppy-disable-FDRAWCMD-by-default.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2022-28893, CVSSv2 Score: 6.2
- Description:
SUNRPC: Ensure we flush any closed sockets before
- CVE: https://access.redhat.com/security/cve/CVE-2022-28893
- Patch: 5.4.0/CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-xs_xprt_free.patch
- From: kernel-5.4.196-108.356.amzn2
- CVE-2022-29581, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: fix netns refcount changes in
- CVE: https://ubuntu.com/security/CVE-2022-29581
- Patch: 5.4.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 5.4.0-113.127
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1184
- Patch: 5.10.0/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 5.10.127-1
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make variable "count" signed
- CVE: https://access.redhat.com/security/cve/CVE-2022-1184
- Patch: 5.10.0/CVE-2022-1184-ext4-make-variable-count-signed.patch
- From: 4.14.285-215.501.amzn2
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1184
- Patch: 5.10.0/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 5.10.127-1
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 5.10.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset.patch
- From: 5.10.120-1
- CVE-2022-1966, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets earlier
- CVE: https://access.redhat.com/security/cve/cve-2022-1966
- Patch: 5.4.0/CVE-2022-1966-netfilter-nf_tables-disallow-non-stateful-expression-in-sets.patch
- From: linux_5.4.0-117.132
- CVE-2022-32296, CVSSv2 Score:
- Description:
perturb functionality missing in kernels earlier than 4.14.285-215.501.amzn2
- CVE:
- Patch: skipped/CVE-2022-32296.patch
- From:
- CVE-2022-21499, CVSSv2 Score:
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-32981, CVSSv2 Score:
- Description:
Out of scope - related to PowerPC 32-bit.
- CVE:
- Patch: skipped/CVE-2022-32981.patch
- From:
- CVE-2022-32250, CVSSv2 Score:
- Description:
Duplicate of CVE-2022-1966
- CVE:
- Patch: skipped/CVE-2022-32250.patch
- From:
- CVE-2022-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-disallow-setting-font-bigger-than-screen-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-prevent-that-screen-size-is-smaller-than-font-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655, CVSSv2 Score: 6.7
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbmem-check-virtual-screen-sizes-in-fb_set_var.patch
- From: 5.4.209-116.363
- CVE-2022-21505, CVSSv2 Score: 6.7
- Description:
Kernel lockdown bypass when UEFI secure boot is disabled / unavailable and IMA appraisal is enabled.
- CVE: https://linux.oracle.com/cve/CVE-2022-21505.html
- Patch: 5.4.17/CVE-2022-21505.patch
- From: 5.4.17-2136.309.5
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-34918
- Patch: ubuntu-focal/5.4.0-124.140/0010-CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-d.patch
- From: 5.4.0-124.140
- CVE-2022-36879, CVSSv2 Score: 5.5
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36879
- Patch: 5.10.0/CVE-2022-36879-xfrm-xfrm_policy-fix-a-possible-double-xfrm_pols_put-in.patch
- From: 5.10.136-1
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36946
- Patch: 5.10.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below.patch
- From: 5.10.136-1
- CVE-2022-26365, CVSSv2 Score: 7.1
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-26365
- Patch: 5.4.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages.patch
- From: v5.19
- CVE-2022-33744, CVSSv2 Score:
- Description:
Out of scope - ARM architecture.
- CVE:
- Patch: skipped/CVE-2022-33744.patch
- From:
- CVE-2022-33740, CVSSv2 Score: 7.1
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33740
- Patch: 5.4.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: v5.4
- CVE-2022-33741, CVSSv2 Score: 7.1
- Description:
xen/netfront: force data bouncing when backend is untrusted
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33741
- Patch: 5.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-amazon.patch
- From: v5.4
- CVE-2022-33741, CVSSv2 Score: 7.1
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33741
- Patch: 5.4.0/CVE-2022-33741-kpatch-amazon.patch
- From: v5.19
- CVE-2022-33742, CVSSv2 Score: 7.1
- Description:
xen/blkfront: force data bouncing when backend is untrusted
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33742
- Patch: 5.4.0/CVE-2022-33742-xen-blkfront-force-data-bouncing-when-backend-is-untrusted-amazon.patch
- From: v5.4
- CVE-2022-33742, CVSSv2 Score: 7.1
- Description:
xen/blkfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33742
- Patch: 5.4.0/CVE-2022-33742-kpatch-amazon.patch
- From: v5.19
- CVE-2022-1462, CVSSv2 Score: 6.3
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: 5.4.0/CVE-2022-1462-tty-extract-tty_flip_buffer_commit-from-tty_flip_buffer_push.patch
- From: v5.4
- CVE-2022-1462, CVSSv2 Score: 6.3
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: 5.4.0/CVE-2022-1462-tty-use-new-tty_insert_flip_string_and_push_buffer-in-pty_write.patch
- From: v5.4
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/CVE-2022-2588
- Patch: 5.4.17/CVE-2022-2588.patch
- From: kernel-uek-5.4.17-2136.309.5.1.el8uek
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://access.redhat.com/security/cve/cve-2022-2586
- Patch: ubuntu-focal/5.4.0-124.140/0011-CVE-2022-2586-UBUNTU-SAUCE-netfilter-nf_tables-do-not-allow-SET_ID.patch
- From: 5.4.0-124.140
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another table
- CVE: https://access.redhat.com/security/cve/cve-2022-2586
- Patch: ubuntu-focal/5.4.0-124.140/0012-CVE-2022-2586-UBUNTU-SAUCE-netfilter-nf_tables-do-not-allow-RULE_I.patch
- From: 5.4.0-124.140
- CVE-2022-20369, CVSSv2 Score: 6.7
- Description:
media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-20369.html
- Patch: 5.4.0/CVE-2022-20369-media-v4l2-mem2mem-Apply-DST_QUEUE_OFF_BASE-on-MMAP-buffers-across-ioctls.patch
- From: kernel-5.4.214-120.368.amzn2
- CVE-2022-26373, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2021-4159, CVSSv2 Score: 4.4
- Description:
bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-4159
- Patch: 4.14.0/CVE-2021-4159-bpf-Verifer-adjust_scalar_min_max_vals-to-always-call.patch
- From: kernel-4.14.273-207.502.amzn2
- CVE-2022-1679, CVSSv2 Score: 7.8
- Description:
[PATCH v4 1/2] ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1679
- Patch: ubuntu-focal/5.4.0-124.140/0004-CVE-2022-1679-UBUNTU-SAUCE-ath9k-fix-use-after-free-in-ath9k_hif_u.patch
- From: 5.4.0-124.140
- CVE-2022-41222, CVSSv2 Score: 7.0
- Description:
mm/mremap: hold the rmap lock in write mode when moving page table
- CVE: https://ubuntu.com/security/CVE-2022-41222
- Patch: ubuntu-focal/5.4.0-132.148/0003-CVE-2022-41222-mm-mremap-hold-the-rmap-lock-in-write-mode-when-movi.patch
- From: 5.4.0-132.148
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Fix forged IP logic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-2663
- Patch: 4.14.0/CVE-2022-2663-netfilter-nf_conntrack_irc-Fix-forged-IP-logic.patch
- From: 4.14.293
- CVE-2022-40307, CVSSv2 Score: 4.7
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-40307
- Patch: 4.14.0/CVE-2022-40307-efi-capsule-loader-Fix-use-after-free-in-efi_capsule_write.patch
- From: 4.14.293
- CVE-2022-40307, CVSSv2 Score: 4.7
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-40307
- Patch: 4.14.0/CVE-2022-40307-efi-capsule-loader-Fix-use-after-free-in-efi_capsule_write-kpatch.patch
- From: 4.14.293
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 4.14.35/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel-1.patch
- From: 5.10.140-1
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged
- CVE: https://linux.oracle.com/cve//CVE-2022-2153.html
- Patch: 5.4.17/CVE-2022-2153-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugged-200.patch
- From: 5.4.17-2136.310.7
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged (adaptation)
- CVE: https://linux.oracle.com/cve//CVE-2022-2153.html
- Patch: 5.4.17/CVE-2022-2153-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugged-kpatch-206.patch
- From: 5.4.17-2136.310.7
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 5.15.0/CVE-2022-2153-KVM-x86-Check-lapic_in_kernel-before-attempting-to-set-a-SynIC-irq.patch
- From: 5.15.35-36
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: 5.15.0/CVE-2022-2153-KVM-x86-Avoid-theoretical-NULL-pointer-dereference-in-kvm_irq_delivery_to_apic_fast.patch
- From: 5.15.35-36
- CVE-2022-2602, CVSSv2 Score: 8.8
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc-amazon1.patch
- From: 5.4.0-131.147
- CVE-2022-2602, CVSSv2 Score: 8.8
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc-kpatch.patch
- From: 5.4.0-131.147
- CVE-2022-3303, CVSSv2 Score: 4.7
- Description:
ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3303
- Patch: 5.4.0/CVE-2022-3303.patch
- From: 5.4.0-131.147
- CVE-2022-39842, CVSSv2 Score: 6.1
- Description:
pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-39842
- Patch: 5.4.0/CVE-2022-39842.patch
- From: v5.19
- CVE-2022-23816, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-23816.patch
- From:
- CVE-2022-29900, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From:
- CVE-2022-3169, CVSSv2 Score: 5.5
- Description:
nvme: ensure subsystem reset is single threaded
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3169.html
- Patch: 5.4.0/CVE-2022-3169-nvme-ensure-subsystem-reset-is-single-threaded.patch
- From: 5.4.226-129.415.amzn2
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net/l2tp: Fix reference count leak in l2tp_udp_recv_core
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0001-net_l2tp_Fix_reference_count_leak_in_l2tp_udp_recv_core.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
net: fix a concurrency bug in l2tp_tunnel_register()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0002-net_fix_a_concurrency_bug_in_l2tp_tunnel_register.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0003-l2tp_Serialize_access_to_sk_user_data_with_sk_callback_lock.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: 5.4.0/CVE-2022-4129-0004-l2tp_Dont_sleep_and_disable_BH_under_writer-side_sk_callback_lock.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23455.html
- Patch: 5.4.0/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-23455.html
- Patch: 5.4.0/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-0045, CVSSv2 Score: 6.3
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0045.html
- Patch: 5.4.0/CVE-2023-0045-x86-bugs-Flush-IBP-in-ib_prctl_set.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-47929, CVSSv2 Score: 5.5
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-47929.html
- Patch: 5.4.0/CVE-2022-47929-net_sched_disallow_noqueue_for_qdisc_classes.patch
- From: 5.4.231-137.341.amzn2
- CVE-2023-0394, CVSSv2 Score: 6.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0394.html
- Patch: 5.4.0/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.4.231-137.341.amzn2
- CVE-2022-3649, CVSSv2 Score: 7.0
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
- CVE: https://access.redhat.com/security/cve/cve-2022-3649
- Patch: 4.14.0/CVE-2022-3649-nilfs2-fix-use-after-free-bug-of-struct-nilfs_root.patch
- From: 4.14.296
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/0001-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 5.4.0-135.152
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/CVE-2022-3565-kpatch.patch
- From: 5.4.0-135.152
- CVE-2022-3594, CVSSv2 Score: 7.5
- Description:
r8152: Rate limit overflow messages
- CVE: https://ubuntu.com/security/CVE-2022-3594
- Patch: ubuntu-focal/5.4.0-135.152/0001-CVE-2022-3594-r8152-Rate-limit-overflow-messages.patch
- From: 5.4.0-135.152
- CVE-2022-3564, CVSSv2 Score: 8.0
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: ubuntu-focal/5.4.0-135.152/0003-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 5.4.0-135.152
- CVE-2021-3759, CVSSv2 Score: 5.5
- Description:
memcg: enable accounting of ipc resources
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3759
- Patch: 5.4.0/CVE-2021-3759-890617-memcg-enable-accounting-of-ipc-resources.patch
- From: kernel-5.4.0-90.101
- CVE-2022-3542, CVSSv2 Score: 5.5
- Description:
bnx2x: fix potential memory leak in bnx2x_tpa_stop()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3542
- Patch: 4.14.0/CVE-2022-3542-bnx2x-fix-potential-memory-leak-in-bnx2x_tpa_stop.patch
- From: 4.14.296
- CVE-2022-41849, CVSSv2 Score: 4.2
- Description:
fbdev: smscufx: Fix use-after-free in ufx_ops_open()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849
- Patch: 4.14.0/CVE-2022-41849-fbdev-smscufx-Fix-use-after-free-in-ufx_ops_open.patch
- From: 5.19.12
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
- Patch: 4.14.0/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.19.12
- CVE-2022-3535, CVSSv2 Score: 3.5
- Description:
net: mvpp2: fix mvpp2 debugfs leak
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3535.html
- Patch: 5.4.0/CVE-2022-3535-mvpp2-fix-mvpp2-debugfs-leak.patch
- From: 5.4.220
- CVE-2022-3535, CVSSv2 Score: 3.5
- Description:
net: mvpp2: fix mvpp2 debugfs leak (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3535.html
- Patch: 5.4.0/CVE-2022-3535-mvpp2-fix-mvpp2-debugfs-leak-kpatch.patch
- From: 5.4.220
- CVE-2022-2196, CVSSv2 Score: 8.8
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-2196.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2022-2196-patch-kvm-vmx-execute-ibpb-on-emulated-vm-exit-when-guest-has.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-26545.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-26545-patch-net-mpls-fix-stale-pointer-if-allocation-fails-during.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-1078, CVSSv2 Score: 7.8
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1078.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-1078-patch-rds-rds-rm-zerocopy-callback-use-list-first-entry.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-1077, CVSSv2 Score: 7.0
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1077.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-1077-patch-sched-rt-pick-next-rt-entity-check-list-entry.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2162.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0458.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-2985, CVSSv2 Score: 5.5
- Description:
fs: hfsplus: fix UAF issue in hfsplus_put_super
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2985.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-2985-patch-fs-hfsplus-fix-uaf-issue-in-hfsplus-put-super.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3161.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-3161-patch-fbcon-check-font-dimension-limits.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-45862, CVSSv2 Score: 7.5
- Description:
USB: ene_usb6250: Allocate enough memory for full object
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-45862.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-45862-patch-usb-ene-usb6250-allocate-enough-memory-for-full-object.patch
- From: 5.4.235-144.344.amzn2
- CVE-2023-7192, CVSSv2 Score: 6.1
- Description:
netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-7192.html
- Patch: amazon2-5.4/5.4.235-144.344.amzn2/CVE-2023-7192-patch-netfilter-ctnetlink-fix-possible-refcount-leak-in.patch
- From: 5.4.235-144.344.amzn2
- CVE-2021-4037, CVSSv2 Score: 7.8
- Description:
xfs: fix up non-directory creation in SGID directories
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2021-4037.html
- Patch: amazon2-5.4/CVE-2021-4037-xfs-fix-up-non-directory-creation-in-SGID-directorie.patch
- From: 5.4.241-150.347.amzn2
- CVE-2022-4744, CVSSv2 Score: 7.8
- Description:
tun: avoid double free in tun_free_netdev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4744.html
- Patch: amazon2-5.4/CVE-2022-4744-tun-avoid-double-free-in-tun_free_netdev.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2124.html
- Patch: 5.4.0/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-28466.html
- Patch: 5.4.0/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_g.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2194.html
- Patch: 5.4.0/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: kernel-5.4.241-150.347.amzn2
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race condition
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-33203.html
- Patch: 5.4.0/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-0590, CVSSv2 Score: 4.7
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-0590.html
- Patch: amazon2-5.4/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc_graft.patch
- From: 5.4.241-150.347.amzn2
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: fix use-after-free in ext4_xattr_set_entry
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2513.html
- Patch: amazon2-5.4/5.4.242-155.348.amzn2/CVE-2023-2513-ext4-fix-use-after-free-in-ext4_xattr_set_entry.patch
- From: 5.4.242-155.348.amzn2
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2513.html
- Patch: amazon2-5.4/5.4.242-155.348.amzn2/CVE-2023-2513-ext4-add-EXT4_INODE_HAS_XATTR_SPACE-macro-in-xattr.h.patch
- From: 5.4.242-155.348.amzn2
- CVE-2023-2163, CVSSv2 Score: 8.8
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision taints
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-2163.html
- Patch: amazon2-5.4/5.4.242-155.348.amzn2/CVE-2023-2163-bpf-Fix-incorrect-verifier-pruning-due-to-missing-register-precision-taints.patch
- From: 5.4.242-155.348.amzn2
- CVE-2023-31436, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-31436.html
- Patch: amazon2-5.4/5.4.242-155.348.amzn2/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_activate_agg.patch
- From: 5.4.242-155.348.amzn2
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-32233.html
- Patch: amazon2-5.4/5.4.242-156.349.amzn2/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-preparation-phase.patch
- From: 5.4.242-156.349.amzn2
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3090.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3090-ipvlan-Fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3111, CVSSv2 Score: 7.8
- Description:
btrfs: check return value of btrfs_commit_transaction in relocation
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3111-btrfs-check-return-value-of-btrfs_commit_transaction-in-relocation.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3111, CVSSv2 Score: 7.8
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3111.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fails-in-prepare_to_relocate.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-35788.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-35788-net-sched-flower-fix-possible-OOB-write-in-fl_set_geneve_opt.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3141.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race-condition.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
kernel/relay.c: fix read_pos error when multiple readers
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3268.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3268-kernel-relay.c-fix-read_pos-error-when-multiple-readers.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3268.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay_file_read.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: don't clobber return value in vcs_read
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3567-vc_screen-don-t-clobber-return-value-in-vcs_read.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: modify vcs_size() handling in vcs_read()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3567.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-3567-vc_screen-modify-vcs_size-handling-in-vcs_read.patch
- From: 5.4.247-161.349.amzn2
- CVE-2024-0775, CVSSv2 Score: 7.1
- Description:
ext4: improve error recovery code paths in __ext4_remount()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-0775.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2024-0775-ext4-improve-error-recovery-code-paths-in-__ext4_remount.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-34256, CVSSv2 Score: 5.5
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-34256.html
- Patch: amazon2-5.4/5.4.247-161.349.amzn2/CVE-2023-34256-ext4-avoid-a-potential-slab-out-of-bounds-in-ext4_group_desc_csum.patch
- From: 5.4.247-161.349.amzn2
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3390.html
- Patch: amazon2-5.4/5.4.249-163.359.amzn2/CVE-2023-3390-netfilter-nf_tables-incorrect-error-path-handling-with-NFT_MSG_NEWRULE.patch
- From: 5.4.249-163.359.amzn2
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-35001.html
- Patch: amazon2-5.4/5.4.249-163.359.amzn2/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.4.249-163.359.amzn2
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3609.html
- Patch: amazon2-5.4/5.4.249-163.359.amzn2/CVE-2023-3609-net-sched-cls_u32-Fix-reference-counter-leak-leading-to-overflow.patch
- From: 5.4.249-163.359.amzn2
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3611.html
- Patch: amazon2-5.4/5.4.250-166.369.amzn2/CVE-2023-3611-net-sched-sch_qfq-account-for-stab-overhead-in-qfq_enqueue.patch
- From: 5.4.250-166.369.amzn2
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-3776.html
- Patch: amazon2-5.4/5.4.250-166.369.amzn2/CVE-2023-3776-net-sched-cls_fw-Fix-improper-refcount-update-leads-to-use-after-free.patch
- From: 5.4.250-166.369.amzn2
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-1086.html
- Patch: amazon2-5.4/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parame.patch
- From: 5.4.268-181.370.amzn2
- CVE-2024-26857, CVSSv2 Score: 4.4
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26857-net-add-atomic_long_t-to-net_device_stats-fields.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-26857, CVSSv2 Score: 4.4
- Description:
net: add atomic_long_t to net_device_stats fields
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26857-net-add-atomic_long_t-to-net_device_stats-fields-kpatch.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-26857, CVSSv2 Score: 4.4
- Description:
geneve: make sure to pull inner header in geneve_rx()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26857-geneve-make-sure-to-pull-inner-header-in-geneve-rx.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-27024, CVSSv2 Score: 5.5
- Description:
net/rds: fix WARNING in rds_conn_connect_if_down
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-27024.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-27024-net-rds-fix-warning-in-rds-conn-connect-if-down.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-26851, CVSSv2 Score: 5.5
- Description:
netfilter: nf_conntrack_h323: Add protection for bmp length
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-26851.html
- Patch: amazon2-5.4/5.4.272-185.370.amzn2/CVE-2024-26851-netfilter-nf-conntrack-h323-add-protection-for-bmp-length.patch
- From: 5.4.272-185.370.amzn2
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41011.html
- Patch: amazon2-5.4/5.4.283-195.378.amzn2/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-MMIO-HDP-page-with-large-pages.patch
- From: 5.4.283-195.378.amzn2
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-41098.html
- Patch: amazon2-5.4/5.4.283-195.378.amzn2/CVE-2024-41098-ata-libata-core-Fix-null-pointer-dereference-on-error.patch
- From: 5.4.283-195.378.amzn2
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2024-42228.html
- Patch: amazon2-5.4/5.4.283-195.378.amzn2/CVE-2024-42228-drm-amdgpu-Using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.4.283-195.378.amzn2
- CVE-2022-3643, CVSSv2 Score: 10.0
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://ubuntu.com/security/CVE-2022-3643
- Patch: 5.10.0/CVE-2022-3643-0001-xen-netback-Ensure-protocol-headers-don-t-fall-in-th.patch
- From: 5.10.158-1
- CVE-2022-3623, CVSSv2 Score: 7.5
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3623
- Patch: 5.4.0/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page-kpatch.patch
- From: 5.4.228-131.415.amzn2
- CVE-2022-3621, CVSSv2 Score: 7.5
- Description:
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
- CVE: https://access.redhat.com/security/cve/cve-2022-3621
- Patch: 5.4.0/CVE-2022-3621-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: kernel-5.4.219-126.410
- CVE-2022-3646, CVSSv2 Score: 5.3
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3646.html
- Patch: 5.4.0/CVE-2022-3646-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: kernel-5.4.219-126.410
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://access.redhat.com/security/cve/cve-2022-40768
- Patch: 5.4.0/CVE-2022-40768-scsi-stex-Properly-zero-out-the-passthrough-command-.patch
- From: kernel-5.4.219-126.410