- kernel-uek-4.1.12-124.19.2.el6uek (oel6-uek4)
- 4.1.12-124.86.1.el6uek
- 2024-06-13 12:01:16
- 2024-06-18 08:30:01
- K20240613_01
- CVE-2018-16658, CVSSv2 Score: 4
- Description:
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16658.html
- Patch: 4.15.0/cve-2018-16658-cdrom-fix-info-leak-oob-read.patch
- From: >4.15.0
- CVE-2018-14634, CVSSv2 Score: 7.8
- Description:
exec: Limit arg stack to at most 75% of _STK_LIM
- CVE: https://security-tracker.debian.org/tracker/CVE-2018-14634
- Patch: 4.9.0/exec-limit-arg-stack-at-most-75-of-_STK_LIM.patch
- From: 4.9.51-1
- CVE-2017-18204, CVSSv2 Score: 5.5
- Description:
ocfs2: should wait dio before inode lock in ocfs2_setattr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-18204
- Patch: 4.1.12/cve-2017-18204-ocfs2-wait-dio-before-inode-lock.patch
- From: 4.1.12-124.22.1.el6uek
- CVE-2017-17805, CVSSv2 Score: 7.8
- Description:
crypto: salsa20 - fix blkcipher_walk API usage
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-17805
- Patch: 4.4.0/572188-crypto-salsa20-fix-blkcipher_walk-API-usage.patch
- From: kernel-4.4.0-117.141
- CVE-2017-17806, CVSSv2 Score: 7.8
- Description:
crypto: hmac - require that the underlying hash algorithm is unkeyed
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-17806
- Patch: 4.4.0/572187-crypto-hmac-require-that-the-underlying-hash-algor.patch
- From: kernel-4.4.0-117.141
- CVE-2018-18386, CVSSv2 Score: 3.3
- Description:
n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18386
- Patch: 4.1.12/CVE-2018-18386.patch
- From: 4.1.12-124.23.2.el6uek
- CVE-2017-18221, CVSSv2 Score: 5.5
- Description:
mlock: fix mlock count can not decrease in race condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-18221
- Patch: 4.1.12/cve-2017-18201-fix-mlock-count-can-not-decrease.patch
- From: 4.1.12-124.24.1
- CVE-2019-9363, CVSSv2 Score: 7.2
- Description:
Bluetooth: hidp: buffer overflow in hidp_process_report
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-9363
- Patch: 4.4.0/CVE-2018-9363.patch
- From: kernel-4.4.149
- CVE-2017-18079, CVSSv2 Score: 5.5
- Description:
Input: i8042 - fix crash at boot time
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-18079
- Patch: 4.13.0/cve-2017-18079-i8042-fix-crash-at-boot-time.patch
- From: kernel-4.9.110-1
- CVE-2017-12153, CVSSv2 Score: 4.4
- Description:
nl80211: check for the required netlink attributes presence
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-12153
- Patch: 4.4.0/571022-nl80211-check-for-the-required-netlink-attributes-.patch
- From: kernel-4.4.0-98.121
- CVE-2018-18559, CVSSv2 Score: 7
- Description:
net/packet: fix a race in packet_bind() and packet_notifier()
- CVE: https://access.redhat.com/security/cve/cve-2018-18559
- Patch: 3.10.0/CVE-2018-18559.patch
- From: 3.10.0-953.5.1.el7
- CVE-2017-17807, CVSSv2 Score: 3.3
- Description:
KEYS: add missing permission check for request_key() destination
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17807
- Patch: 4.1.12/CVE-2017-17807.patch
- From: 4.1.12-124.25.4
- CVE-2018-9568, CVSSv2 Score: 7
- Description:
net: Set sk_prot_creator when cloning sockets to the right proto
- CVE: https://access.redhat.com/security/cve/cve-2018-9568
- Patch: 4.1.12/CVE-2018-9568.patch
- From: 4.1.12-124.26.1
- CVE-2018-12130 CVE-2018-12126 CVE-2018-12127 and CVE-2019-11091, CVSSv2 Score: 6.2
- Description:
MDS CPU Side-channel Attacks mitigation
- CVE: https://access.redhat.com/security/cve/cve-2019-11091
- Patch: 4.1.12/mds.patch
- From: kernel-uek-4.1.12-124.26.11.el6uek
- CVE-2019-11190, CVSSv2 Score: 4.7
- Description:
binfmt_elf: switch to new creds when switching to new mm
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11190
- Patch: 3.10.0/CVE-2019-11190.patch
- From: >4.8
- CVE-2018-19985, CVSSv2 Score: 4.6
- Description:
USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CVE: https://access.redhat.com/security/cve/cve-2018-19985
- Patch: 4.4.0/CVE-2018-19985.patch
- From: kernel-4.4.170
- CVE-2015-5327, CVSSv2 Score: 6.5
- Description:
fix out-of-bound memory read in crypto/asymmetric_keys/x509_cert_parser.c
- CVE: https://linux.oracle.com/cve/CVE-2015-5327.html
- Patch: 4.1.12/cve-2015-5327.patch
- From: 4.1.12-124.27.1
- CVE-2017-18360, CVSSv2 Score: 5.5
- Description:
fix possible division by zero in drivers/usb/serial/io_ti.c
- CVE: https://linux.oracle.com/cve/CVE-2017-18360.html
- Patch: 4.1.12/cve-2017-18360.patch
- From: 4.1.12-124.27.1
- CVE-2019-11884, CVSSv2 Score: 3.3
- Description:
fix buffer overflow in bluetooth hidp ioctl
- CVE: https://linux.oracle.com/cve/CVE-2019-11884.html
- Patch: 4.1.12/cve-2019-11884-uek4.patch
- From: 4.1.12-124.27.3
- CVE-2019-11810, CVSSv2 Score: 7.5
- Description:
fix possible use after free (NULL pointer dereference) in drivers/scsi/megaraid
- CVE: https://linux.oracle.com/cve/CVE-2019-11810.html
- Patch: 4.1.12/cve-2019-11810-uek4.patch
- From: 4.1.12-124.27.3
- CVE-2019-11815, CVSSv2 Score: 8.1
- Description:
fix possible use after free (UAF) in implementation of RDS over TCP
- CVE: https://linux.oracle.com/cve/CVE-2019-11815.html
- Patch: 4.1.12/cve-2019-11815-uek4.patch
- From: 4.1.12-124.27.3
- CVE-2019-3459, CVSSv2 Score: 6.5
- Description:
fix heap address information leak while using bluetooth L2CAP_GET_CONF_OPT
- CVE: https://linux.oracle.com/cve/CVE-2019-3459.html
- Patch: 4.1.12/cve-2019-3459-uek4.patch
- From: 4.1.12-124.27.3
- CVE-2019-3819, CVSSv2 Score: 4.9
- Description:
HID: debug: fix the ring buffer implementation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3819
- Patch: 4.4.0/CVE-2019-3819.patch
- From: kernel-4.4.175
- CVE-2018-14633, CVSSv2 Score: 8.3
- Description:
scsi: target: iscsi: Use hex2bin instead of a re-implementation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-14633
- Patch: 4.4.0/CVE-2018-14633.patch
- From: kernel-4.4.159
- CVE-2018-20836, CVSSv2 Score: 8.1
- Description:
fix race condition and possible use-after-free in drivers/scsi/libsas/sas_expander.c
- CVE: https://linux.oracle.com/cve/CVE-2018-20836.html
- Patch: 4.1.12/cve-2018-20836.patch
- From: 4.1.12-124.27.3
- CVE-2019-11477, CVSSv2 Score:
- Description:
UBUNTU: SAUCE: tcp: limit payload size of sacked skbs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11477
- Patch: 4.1.12/CVE-2019-11477-tcp-limit-payload-size-of-sacked-skbs.patch
- From: 4.1.12-124.28.3
- CVE-2019-11478, CVSSv2 Score:
- Description:
UBUNTU: SAUCE: tcp: tcp_fragment() should apply sane memory limits
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11478
- Patch: 4.4.0/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
- From: 4.4.0-151.178
- CVE-2019-11479, CVSSv2 Score:
- Description:
tcp: add tcp_min_snd_mss sysctl
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.1.12/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl.patch
- From: 4.1.12-124.28.3.el6uek
- CVE-2019-11479, CVSSv2 Score: 7.5
- Description:
tcp: add tcp_min_snd_mss sysctl
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.1.12/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl-kpatch.patch
- From: N/A
- CVE-2019-11479, CVSSv2 Score:
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.4.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From:
- CVE-2019-11479, CVSSv2 Score: 7.5
- Description:
tcp: add tcp_min_snd_mss sysctl
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11479
- Patch: 4.4.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing-kpatch.patch
- From: N/A
- CVE-2019-6133, CVSSv2 Score: 6.7
- Description:
partially fix bypass of the "start time" protection mechanism while fork() (polkit should be updated >0.115)
- CVE: https://linux.oracle.com/cve/CVE-2019-6133.html
- Patch: 4.1.12/cve-2019-6133.patch
- From: 4.14.35-1902.3.0.el7uek
- CVE-2018-7191, CVSSv2 Score: 5.5
- Description:
tun: call dev_get_valid_name() before register_netdevice()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7191
- Patch: 4.4.0/CVE-2018-7191-tun-call-dev_get_valid_name-before-register_netdevice.patch
- From: 4.4.0-117.141
- CVE-2018-7191, CVSSv2 Score: 5.5
- Description:
tun: allow positive return values on dev_get_valid_name() call
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7191
- Patch: 4.4.0/CVE-2018-7191-tun-allow-positive-return-values-on-dev_get_valid_name-call.patch
- From: 4.4.0-117.141
- CVE-2017-18208, CVSSv2 Score: 5.5
- Description:
mm/madvise.c: fix madvise() infinite loop under special circumstances
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-18208
- Patch: 4.4.0/572017-mm-madvise.c-fix-madvise-infinite-loop-under-speci.patch
- From: kernel-4.4.0-117.141
- CVE-2018-20169, CVSSv2 Score: 7.2
- Description:
USB: check usb_get_extra_descriptor for proper size
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20169
- Patch: 4.1.12/CVE-2018-20169.patch
- From: 4.1.12-124.29.1.el6uek
- CVE-2019-11833, CVSSv2 Score: 5.5
- Description:
ext4: zero out the unused memory region in the extent tree block
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11833
- Patch: 4.1.12/CVE-2019-11833.patch
- From: 4.1.12-124.29.1.el6uek
- CVE-2019-12381, CVSSv2 Score: 5.5
- Description:
ip_sockglue: Fix missing-check bug in ip_ra_control()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-12381
- Patch: 4.1.12/CVE-2019-12381.patch
- From: 4.1.12-124.29.1.el6uek
- CVE-2019-12378, CVSSv2 Score: 5.5
- Description:
ip_sockglue: Fix missing-check bug in ip_ra_control()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-12378
- Patch: 4.1.12/CVE-2019-12378.patch
- From: 4.1.12-124.29.1.el6uek
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.4.0/kpatch-add-paravirt-asm-definitions-119.143.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.4.0/kpatch_map_kaiser_kp_text_kp_data_108-109.patch
- From: N/A
- CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-1125.html
- Patch: 4.1.12/swapgs-112.14.15.patch
- From: kernel-4.1.12-129.3.1
- CVE-2019-13631, CVSSv2 Score: 5.3
- Description:
Input: gtco - bounds check collection indent level
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-13631
- Patch: 3.16.0/cve-2019-13631-bounds-check-collection-indent-level.patch
- From: linux-3.16.72-1
- CVE-2019-14821, CVSSv2 Score: 8.8
- Description:
KVM: coalesced_mmio: add bounds checking
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14821
- Patch: 4.9.0/cve-2019-14821-kvm-coalesced_mmio-add-bounds-checking.patch
- From: 4.9.189-3+deb9u1
- CVE-2019-14283, CVSSv2 Score: 5.6
- Description:
floppy: fix out-of-bounds read in copy_buffer
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-14283
- Patch: 4.9.0/cve-2019-14283-floppy-fix-out-of-bounds-in-copy_buffer.patch
- From: linux-4.9.168-1+deb9u5
- CVE-2019-15239, CVSSv2 Score: 7.2
- Description:
tcp: purge write queue in tcp_connect_init()
- CVE: https://access.redhat.com/security/cve/cve-2019-15239
- Patch: 4.1.12/CVE-2019-15239-tcp-purge-write-queue-in-tcp_connect_init.patch
- From: kernel-uek-4.1.12-124.32.1.el6uek
- CVE-2019-15666, CVSSv2 Score: 7.5
- Description:
xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15666
- Patch: 4.9.0/CVE-2019-15666-xfrm-policy-Fix-out-of-bound-array-accesses-in-__xfrm_policy_unlink.patch
- From: linux-4.9.189-3
- CVE-2017-14991, CVSSv2 Score: 5.5
- Description:
scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-14991
- Patch: 4.4.0/570987-scsi-sg-fixup-infoleak-when-using-SG_GET_REQUEST_T.patch
- From: kernel-4.4.0-98.121
- CVE-2017-7495, CVSSv2 Score: 6.2
- Description:
ext4: fix data exposure after a crash
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-7495
- Patch: 4.4.0/570547-ext4-fix-data-exposure-after-a-crash.patch
- From: kernel-4.4.0-93.116
- CVE-2016-9754, CVSSv2 Score: 7.2
- Description:
ring-buffer: Prevent overflow of size in ring_buffer_resize()
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2016-9754
- Patch: 3.13.0/422476-ring-buffer-Prevent-overflow-of-size-in-ring_buffe.patch
- From: kernel-3.13.0-130.179
- CVE-2016-7917, CVSSv2 Score: 4.3
- Description:
netfilter: nfnetlink: correctly validate length of batch messages
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-7917
- Patch: 3.16.7/3.16.39-1-0013-netfilter-nfnetlink-correctly-validate-length-of-bat.patch
- From: linux-3.16.39-1
- CVE-2016-7913, CVSSv2 Score: 9.3
- Description:
xc2028: avoid use after free
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2016-7913.html
- Patch: 4.4.0/569505-xc2028-avoid-use-after-free.patch
- From: kernel-4.4.0-79.100
- CVE-2016-7915, CVSSv2 Score: 4.3
- Description:
HID: core: prevent out-of-bound readings
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-7915
- Patch: 3.16.7/3.16.39-1-0012-hid-core-prevent-out-of-bound-readings.patch
- From: linux-3.16.39-1
- CVE-2019-3901, CVSSv2 Score: 1.9
- Description:
perf/core: Fix perf_event_open() vs. execve() race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3901
- Patch: 4.1.12/CVE-2019-3901-perf-core-Fix-perf_event_open-vs.-execve-race.patch
- From: v4.6
- CVE-2017-18595, CVSSv2 Score: 7.8
- Description:
tracing: Fix possible double free on failure of allocating trace buffer
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-18595
- Patch: 4.9.0/CVE-2017-18595-tracing-Fix-possible-double-free-on-failure-of-allocating-trace-buffer.patch
- From: linux-4.9.80-1
- CVE-2015-8963, CVSSv2 Score: 7
- Description:
perf: Fix race in swevent hash
- CVE: https://security-tracker.debian.org/tracker/CVE-2015-8963
- Patch: 4.1.12/CVE-2015-8963-perf-fix-race-in-swevent-hash.patch
- From: v4.4
- CVE-2019-15927, CVSSv2 Score: 7.8
- Description:
ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15927
- Patch: 4.9.0/CVE-2019-15927-ALSA-usb-audio-Avoid-access-before-bLength-check-in-build_audio_procunit.patch
- From: linux-4.9.189-3
- CVE-2015-8964, CVSSv2 Score: 1.9
- Description:
tty: Prevent ldisc drivers from re-using stale tty fields
- CVE: http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8964.html
- Patch: 4.4.0/567962-tty-Prevent-ldisc-drivers-from-re-using-stale-tty-.patch
- From: kernel-4.4.0-54.75
- CVE-2017-13215, CVSSv2 Score: 5.3
- Description:
crypto: algif_skcipher - Load TX SG list after waiting
- CVE: https://access.redhat.com/security/cve/cve-2017-13215
- Patch: 4.1.12/CVE-2017-13215.patch
- From: v4.4
- CVE-2017-17862, CVSSv2 Score: 5.2
- Description:
bpf: fix branch pruning logic
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-17862
- Patch: 4.1.12/CVE-2017-17862-bpf-fix-branch-pruning-logic.patch
- From: v4.14
- CVE-2017-16914, CVSSv2 Score: 5.9
- Description:
usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16914
- Patch: 4.4.0/572193-usbip-fix-stub_send_ret_submit-vulnerability-to-nu.patch
- From: kernel-4.4.0-117.141
- CVE-2017-13080, CVSSv2 Score: 8.1
- Description:
mac80211: accept key reinstall without changing anything
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-13080
- Patch: 4.4.0/571808-mac80211-accept-key-reinstall-without-changing-any.patch
- From: kernel-4.4.0-117.141
- CVE-2017-15265, CVSSv2 Score: 5.5
- Description:
ALSA: seq: Fix use-after-free at creating a port
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-15265
- Patch: 4.4.0/571183-ALSA-seq-Fix-use-after-free-at-creating-a-port.patch
- From: kernel-4.4.0-99.122
- CVE-2017-1000370 CVE-2017-1000371, CVSSv2 Score: 2.9
- Description:
binfmt_elf: use ELF_ET_DYN_BASE only for PIE
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-1000371
- Patch: 4.9.0/4.9.30-2+deb9u4-0018-binfmt_elf-use-elf_et_dyn_base-only-for-pie.patch
- From: linux-4.9.30-2+deb9u4
- CVE-2017-9605, CVSSv2 Score: 3.3
- Description:
drm/vmwgfx: Make sure backup_handle is always valid
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-9605
- Patch: 4.1.12/CVE-2017-9605.patch
- From: v4.12
- CVE-2017-16537, CVSSv2 Score: 6.6
- Description:
media: imon: Fix null-ptr-deref in imon_probe
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16537
- Patch: 4.4.0/571837-media-imon-Fix-null-ptr-deref-in-imon_probe.patch
- From: kernel-4.4.0-117.141
- CVE-2017-14156, CVSSv2 Score: 3.3
- Description:
video: fbdev: aty: do not leak uninitialized padding in clk to userspace
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-14156
- Patch: 4.4.0/571043-video-fbdev-aty-do-not-leak-uninitialized-padding-.patch
- From: kernel-4.4.0-98.121
- CVE-2017-12762, CVSSv2 Score: 9.8
- Description:
isdn/i4l: fix buffer overflow
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-12762
- Patch: 3.13.0/422858-isdn-i4l-fix-buffer-overflow.patch
- From: kernel-3.13.0-144.193
- CVE-2017-10663, CVSSv2 Score: 4.7
- Description:
f2fs: sanity check checkpoint segno and blkoff
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-10663
- Patch: 4.4.0/570672-f2fs-sanity-check-checkpoint-segno-and-blkoff.patch
- From: kernel-4.4.0-94.117
- CVE-2017-18270, CVSSv2 Score: 4.4
- Description:
prevent creating a different user's keyrings
- CVE: https://access.redhat.com/security/cve/cve-2017-18270
- Patch: 4.1.12/cve-2017-18270.patch
- From: v4.14
- CVE-2017-11089, CVSSv2 Score: 7.5
- Description:
cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-11089
- Patch: 3.13.0/422852-cfg80211-Define-nla_policy-for-NL80211_ATTR_LOCAL_.patch
- From: kernel-3.13.0-144.193
- CVE-2017-11089, CVSSv2 Score: 7.5
- Description:
cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-11089
- Patch: 3.13.0/422852-cfg80211-Define-nla_policy-for-NL80211_ATTR_LOCAL_-kpatch-1.patch
- From: kernel-3.13.0-144.193
- CVE-2017-9984 CVE-2017-9985, CVSSv2 Score: 4.7
- Description:
ALSA: msnd: Optimize / harden DSP and MIDI loops
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-9985
- Patch: 4.4.0/570934-ALSA-msnd-Optimize-harden-DSP-and-MIDI-loops.patch
- From: kernel-4.4.0-98.121
- CVE-2017-9150, CVSSv2 Score: 3.3
- Description:
bpf: don't let ldimm64 leak map addresses on unprivileged
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-9150
- Patch: 4.1.12/CVE-2017-9150-bpf-don-t-let-ldimm64-leak-map-addresses-on-unpriv.patch
- From: v4.11
- CVE-2017-10662, CVSSv2 Score: 4.7
- Description:
f2fs: sanity check segment count
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-10662
- Patch: 4.1.12/cve-2017-10662-f2fs-sanity-check-segment-count.patch
- From: v4.11
- CVE-2017-7487, CVSSv2 Score: 5.6
- Description:
ipx: call ipxitf_put() in ioctl error path
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-7487
- Patch: 4.4.0/569809-ipx-call-ipxitf_put-in-ioctl-error-path.patch
- From: kernel-4.4.0-83.106
- CVE-2017-14340, CVSSv2 Score: 5.5
- Description:
xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-14340
- Patch: 4.4.0/570937-xfs-XFS_IS_REALTIME_INODE-should-be-false-if-no-rt.patch
- From: kernel-4.4.0-98.121
- CVE-2017-0627, CVSSv2 Score: 4.7
- Description:
media: uvcvideo: Prevent heap overflow when accessing mapped controls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2017-0627
- Patch: 4.1.12/CVE-2017-0627.patch
- From: v4.13
- CVE-2017-16528, CVSSv2 Score: 6.6
- Description:
ALSA: seq: Cancel pending autoload work at unbinding device
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16528
- Patch: 4.4.0/571813-ALSA-seq-Cancel-pending-autoload-work-at-unbinding.patch
- From: kernel-4.4.0-117.141
- CVE-2017-7472, CVSSv2 Score: 5.5
- Description:
KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
- CVE: https://access.redhat.com/security/cve/CVE-2017-7472
- Patch: 3.18.0/KEYS-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch
- From: kernel-4.9.25-27.el7
- CVE-2016-8405, CVSSv2 Score: 4.7
- Description:
fbdev: color map copying bounds checking
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-8405
- Patch: 3.16.7/fbdev-color-map-copying-bounds-checking.patch
- From: linux-3.16.39-1+deb8u1
- CVE-2017-7346, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-7346
- Patch: 4.1.12/CVE-2017-7346-drm-vmwgfx-limit-the-number-of-mip-levels-in-vmw_gb_.patch
- From: v4.12
- CVE-2017-2584, CVSSv2 Score: 5.2
- Description:
KVM: x86: Introduce segmented_write_std
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-2584
- Patch: 4.1.12/CVE-2017-2584.patch
- From: v4.10
- CVE-2017-5549, CVSSv2 Score: 3.3
- Description:
USB: serial: kl5kusb105: fix line-state error handling
- CVE: http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5549.html
- Patch: 4.4.0/568601-USB-serial-kl5kusb105-fix-line-state-error-handlin.patch
- From: kernel-4.4.0-63.84
- CVE-2017-6353, CVSSv2 Score: 5.5
- Description:
sctp: deny peeloff operation on asocs with threads sleeping on it
- CVE: https://security-tracker.debian.org/tracker/CVE-2017-6353
- Patch: 3.16.7/3.16.39-1+deb8u2-0004-sctp-deny-peeloff-operation-on-asocs-with-threads-sl.patch
- From: linux-3.16.39-1+deb8u2
- CVE-2017-6348, CVSSv2 Score: 6.2
- Description:
irda: Fix lockdep annotations in hashbin_delete().
- CVE: http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6348.html
- Patch: 4.4.0/568938-irda-Fix-lockdep-annotations-in-hashbin_delete.patch
- From: kernel-4.4.0-73.94
- CVE-2017-6348, CVSSv2 Score: 6.2
- Description:
irda: Fix lockdep annotations in hashbin_delete(). (kpatch adaptation)
- CVE: http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-6348.html
- Patch: 4.4.0/568938-irda-Fix-lockdep-annotations-in-hashbin_delete-kpatch-1.patch
- From: kernel-4.4.0-73.94
- CVE-2016-5244, CVSSv2 Score: 1.9
- Description:
rds: fix an infoleak in rds_inc_info_copy
- CVE: http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5244.html
- Patch: 4.1.12/CVE-2016-5244.patch
- From: v4.7
- CVE-2016-8658, CVSSv2 Score: 5.4
- Description:
brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()
- CVE: http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-8658.html
- Patch: 4.4.0/567525-brcmfmac-avoid-potential-stack-overflow-in-brcmf_c.patch
- From: kernel-4.4.0-48.69
- CVE-2016-5243, CVSSv2 Score: 1.9
- Description:
tipc: fix an infoleak in tipc_nl_compat_link_dump
- CVE: https://security-tracker.debian.org/tracker/CVE-2016-5243
- Patch: 4.4.0/566403-tipc-fix-an-infoleak-in-tipc_nl_compat_link_dump.patch
- From: kernel-4.4.0-34.53
- CVE-2017-15102, CVSSv2 Score: 6.3
- Description:
usb: misc: legousbtower: Fix NULL pointer deference
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-15102
- Patch: 3.13.0/422656-usb-misc-legousbtower-Fix-NULL-pointer-deference.patch
- From: kernel-3.13.0-142.191
- CVE-2019-14835, CVSSv2 Score: 7.2
- Description:
kvm: fix vhost_net log overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14835.html
- Patch: 4.4.0/kvm-vhost_net-log-overflow.patch
- From: 4.4.0-159.187+
- CVE-2019-16995, CVSSv2 Score: 7.5
- Description:
net: hsr: fix memory leak in hsr_dev_finalize()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16995
- Patch: 4.4.0/CVE-2019-16995-net-hsr-fix-memory-leak-in-hsr_dev_finalize.patch
- From: kernel-4.4.0-146.172
- CVE-2019-17053, CVSSv2 Score: 3.3
- Description:
ieee802154: enforce CAP_NET_RAW for raw sockets
- CVE: https://linux.oracle.com/cve/CVE-2019-17053.html
- Patch: 4.1.12/cve-2019-17053-ieee802154-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: 4.1.12-124.33.4
- CVE-2019-17055, CVSSv2 Score: 3.3
- Description:
enforce CAP_NET_RAW for AF_ISDN sockets
- CVE: https://linux.oracle.com/cve/CVE-2019-17055.html
- Patch: 4.1.12/cve-2019-17055-misdn-enforce-CAP_NET_RAW-for-raw-sockets.patch
- From: 4.1.12-124.33.4
- CVE-2019-15217, CVSSv2 Score: 4.6
- Description:
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15217
- Patch: 4.1.12/cve-2019-15217-media-usb-zr364xx-Fix-KASAN-null-ptr-deref-Read-in-zr364xx_vidioc_querycap.patch
- From: 4.1.12-124.33.4
- CVE-2019-16994, CVSSv2 Score: 7.5
- Description:
net: sit: fix memory leak in sit_init_net()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-16994
- Patch: 4.9.0/cve-2019-16994-net-sit-fix-memory-leak.patch
- From: >kernel-4.9.127-32.el7
- CVE-2019-15213, CVSSv2 Score: 4.6
- Description:
media: dvb: usb: fix use after free in dvb_usb_device_exit
- CVE: https://linux.oracle.com/cve/CVE-2019-15213.html
- Patch: 3.8.13/CVE-2019-15213.patch
- From: 3.8.13-118.41.1
- CVE-2019-15215, CVSSv2 Score: 4.6
- Description:
media: cpia2_usb: first wake up, then free in disconnect
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15215
- Patch: 4.4.0/CVE-2019-15215-media-cpia2_usb-first-wake-up-then-free-in-disconnect.patch
- From: kernel-4.4.0-165.193
- CVE-2017-18551, CVSSv2 Score: 7.8
- Description:
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
- CVE: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-18551
- Patch: 4.4.0/CVE-2017-18551-i2c-core-smbus-prevent-stack-corruption-on-read-I2C_BLOCK_DATA.patch
- From: kernel-4.4.0-146.172
- CVE-2019-15916, CVSSv2 Score: 5.5
- Description:
net-sysfs: Fix mem leak in netdev_register_kobject
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15916
- Patch: 4.9.0/cve-2019-15916-net-sysfs-fix-mem-leak-in-netdev_register_kobject.patch
- From: kernel-4.9.75-29.el7
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: Do not release the page inside mmu_set_spte() (CVE-2018-12207 prerequirement)
- CVE: https://linux.oracle.com/cve/CVE-2018-12207.html
- Patch: 4.1.12/cve-2018-12207-01-x86-kvm-Do-not-release-the-page-inside-mmu_set_spte.patch
- From: 4.1.12-124.33.4
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
CVE-2018-12207 prerequirement - code cleanup and simplification
- CVE: https://linux.oracle.com/cve/CVE-2018-12207.html
- Patch: 4.1.12/cve-2018-12207-02-cleanup.patch
- From: 4.1.12-124.33.4
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (CVE-2018-12207 prerequirement)
- CVE: https://linux.oracle.com/cve/CVE-2018-12207.html
- Patch: 4.1.12/cve-2018-12207-03-x86-kvm-change-kvm_mmu_page_get_gfn-BUG_ON-to-WARN_ON.patch
- From: 4.1.12-124.33.4
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
x86: kvm: vmx,svm: always run with EFER.NXE=1 when shadow paging is active (CVE-2018-12207 prerequirement)
- CVE: https://linux.oracle.com/cve/CVE-2018-12207.html
- Patch: 4.1.12/cve-2018-12207-04-kvm-vmx-svm-always-run-with-EFER.NXE-1-when-shadow-paging-is-active.patch
- From: 4.1.12-124.33.4
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: Convert kvm_lock to a mutex (CVE-2018-12207 prerequirement)
- CVE: https://linux.oracle.com/cve/CVE-2018-12207.html
- Patch: 4.1.12/cve-2018-12207-05-kvm-Convert-kvm_lock-to-a-mutex.patch
- From: 4.1.12-124.33.4
- CVE-2018-12207, CVSSv2 Score: 6.5
- Description:
kvm: mmu: ITLB_MULTIHIT mitigation (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2018-12207.html
- Patch: 4.1.12/cve-2018-12207-06-mitigation.patch
- From: 4.1.12-124.33.4
- CVE-2019-15219, CVSSv2 Score: 4.6
- Description:
USB: sisusbvga: fix oops in error path of sisusb_probe
- CVE: https://linux.oracle.com/cve/CVE-2019-15219.html
- Patch: 2.6.32/CVE-2019-15219.patch
- From: 2.6.39-400.317.1.el6uek
- CVE-2019-15807, CVSSv2 Score: 7.5
- Description:
scsi: libsas: delete sas port if expander discover failed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15807.html
- Patch: 4.15.0/CVE-2019-15807-scsi-libsas-delete-sas-port-if-expander-discover-failed.patch
- From: 4.15.0-15807
- CVE-2019-16233, CVSSv2 Score: 7.5
- Description:
potential NULL dereference in qla2xx SCSI driver.
- CVE: https://linux.oracle.com/cve/CVE-2019-16233.html
- Patch: 4.1.12/cve-2019-16233-qla_os-does-not-check-alloc_workqueue.patch
- From: kernel-uek-4.1.12-124.35.1.el6uek
- CVE-2019-19332, CVSSv2 Score: 6.1
- Description:
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID
- CVE: https://access.redhat.com/security/cve/CVE-2019-19332
- Patch: 4.14.0/CVE-2019-19332.patch
- From: 4.14.165-131.185.amzn2 4.14.165-102.185.amzn1
- CVE-2019-17666, CVSSv2 Score: 8.8
- Description:
rtlwifi: Fix potential overflow on P2P code
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-17666
- Patch: 3.16.0/cve-2019-17666-rtlwifi-fix-potential-overflow-on-P2P-code.patch
- From: 3.16.81-1
- CVE-2020-2732, CVSSv2 Score: 5.8
- Description:
kvm: nVMX: fixed L2 guest possible tricking the L0 hypervisor to access sensitive L1 resources
- CVE: https://access.redhat.com/security/cve/cve-2020-2732
- Patch: 4.1.12/CVE-2020-2732.patch
- From: 4.1.12-124.36.1.1
- CVE-2019-15291, CVSSv2 Score: 4.6
- Description:
media: b2c2-flexcop-usb: add sanity checking
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15291
- Patch: 3.16.0/cve-2019-15291-media-b2c2-flexcop-usb-add-sanity-check.patch
- From: 3.16.81-1
- CVE-2019-14901, CVSSv2 Score: 9.8
- Description:
fix a heap overflow in mmwifiex_process_tdls_action_frame()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14901
- Patch: 4.4.0/CVE-2019-14901-mwifiex-Fix-heap-overflow-in-mmwifiex.patch
- From: kernel-4.4.0-171.200
- CVE-2019-18806, CVSSv2 Score: 5.5
- Description:
net: qlogic: Fix memory leak in ql_alloc_large_buffers
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-18806
- Patch: 4.9.0/CVE-2019-18806.patch
- From: 4.9.210-1
- CVE-2018-5953, CVSSv2 Score: 5.5
- Description:
printk: hash addresses printed with %p
- CVE: https://linux.oracle.com/cve/CVE-2018-5953.html
- Patch: 4.1.12/lib-vsprintf-printk-hash-addresses-printed-with.patch
- From: kernel-uek-4.1.12-124.38.1
- CVE-2020-10942, CVSSv2 Score: 5.5
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://linux.oracle.com/cve/CVE-2020-10942.html
- Patch: 4.1.12/cve-2020-10942-vhost-check-docket-sk_family.patch
- From: kernel-uek-4.1.12-124.38.1
- CVE-2019-19527, CVSSv2 Score: 4.6
- Description:
HID: hiddev: avoid opening a disconnected device
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19527
- Patch: 3.16.0/cve-2019-19527-usb-hid-avoid-opening-disconnected-device.patch
- From: 3.16.81-1
- CVE-2020-8649 CVE-2020-8647, CVSSv2 Score: 5.9
- Description:
vgacon: Fix a UAF in vgacon_invert_region
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8649.html
- Patch: 4.1.12/CVE-2020-8649.patch
- From: 4.1.12-124.38.4
- CVE-2019-14816, CVSSv2 Score: 8.0
- Description:
mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-14816
- Patch: 3.10.0/cve-2019-14816-mwifiex-fix-three-heap-overflow-327.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2020-11494, CVSSv2 Score: 4.4
- Description:
slcan: Don't transmit uninitialized stack data in padding
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11494
- Patch: 4.1.12/CVE-2020-11494.patch
- From: 4.1.12-124.38.2
- CVE-2020-9383, CVSSv2 Score: 7.1
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9383
- Patch: 4.15.0/CVE-2020-9383-floppy-check-FDC-index-for-errors-before-assigning-it.patch
- From: 4.15.0-97.98
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8648
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2020-8648-vt-selection-close-sel_buffer-race.patch
- From: 4.4.0-178.208
- CVE-2019-19056, CVSSv2 Score: 7.5
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19056
- Patch: 3.16.0/cve-2019-19056-mwifiex-pcie-fix-memory-leak.patch
- From: 3.16.81-1
- CVE-2019-19532, CVSSv2 Score: 6.8
- Description:
HID: Fix assumption that devices have inputs
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19532
- Patch: 4.1.12/CVE-2019-19532.patch
- From: 3.16.81-1
- CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: screening firmware event packet
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.1.12/CVE-2019-9503.patch
- From: 4.1.12-124.39.1
- CVE-2019-19523, CVSSv2 Score: 4.6
- Description:
USB: adutux: fix use-after-free on disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19523
- Patch: 3.16.0/cve-2019-19523-adutux-fix-use-after-free-on-disconnect.patch
- From: 3.16.81-1
- CVE-2020-11609, CVSSv2 Score: 4.3
- Description:
media: stv06xx: add missing descriptor sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11609
- Patch: 4.19.0/CVE-2020-11609-media-stv06xx-add-missing-descriptor-sanity-checks.patch
- From: 4.19.118-2
- CVE-2019-12819, CVSSv2 Score: 5.5
- Description:
fix use-after-free in drivers/net/phy/mdio_bus.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12819.html
- Patch: 4.15.0/CVE-2019-12819.patch
- From: 4.15.0-58.64
- CVE-2019-14896 CVE-2019-14897, CVSSv2 Score: 9.8
- Description:
libertas: Fix two buffer overflows at parsing bss descriptor
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14897
- Patch: 4.4.0/CVE-2019-14896-14897-libertas-Fix-two-buffer-overflows-at-.patch
- From: kernel-4.4.0-171.200
- CVE-2019-19528, CVSSv2 Score: 4.6
- Description:
USB: iowarrior: fix use-after-free on release
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19528
- Patch: 4.19.0/CVE-2019-19528-2.patch
- From: 4.19.98-1
- CVE-2019-19537, CVSSv2 Score: 4.2
- Description:
USB: core: Fix races in character device registration and deregistraion
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 3.16.0/cve-2019-19537-usb-core-fix-races-in-character-device-registration.patch
- From: 3.16.81-1
- CVE-2019-19057, CVSSv2 Score: 3.3
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19057
- Patch: 3.16.0/cve-2019-19057-mwifiex-pcie-fix-another-memory-leak.patch
- From: 3.16.81-1
- CVE-2018-18281, CVSSv2 Score: 4.6
- Description:
mremap: properly flush TLB before releasing the page
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-18281
- Patch: 4.4.0/CVE-2018-18281.patch
- From: kernel-4.4.163
- CVE-2019-19524, CVSSv2 Score: 4.6
- Description:
Input: ff-memless - kill timer in destroy()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19524
- Patch: 3.16.0/cve-2019-19524-ff-memless-kill-timer-in-destroy.patch
- From: 3.16.81-1
- CVE-2020-11668, CVSSv2 Score: 7.1
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-11668
- Patch: 4.15.0/CVE-2020-11668-media-xirlink_cit-add-missing-descriptor-sanity-checks.patch
- From: 4.15.0-97.98
- CVE-2019-20636, CVSSv2 Score: 6.7
- Description:
Input: add safety guards to input_set_keycode()
- CVE: https://access.redhat.com/security/cve/cve-2019-20636
- Patch: 4.1.12/CVE-2019-20636.patch
- From: 4.1.12-124.39.5
- CVE-2020-11608, CVSSv2 Score: 4.3
- Description:
media: ov519: add missing endpoint sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11608
- Patch: 4.19.0/CVE-2020-11608-media-ov519-add-missing-endpoint-sanity-checks.patch
- From: 4.19.118-2
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2019-19533, CVSSv2 Score: 2.4
- Description:
media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19533
- Patch: 3.16.0/cve-2019-19533-media-ttusb_dec-fix-info-leak.patch
- From: 3.16.81-1
- CVE-2019-19536, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19536
- Patch: 3.16.0/cve-2019-19536-peak_usb-fix-info-leaks.patch
- From: 3.16.81-1
- CVE-2017-16538, CVSSv2 Score: 4.6
- Description:
media: dvb-usb-v2: lmedm04: Improve logic checking of warm start
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-16538
- Patch: 4.4.0/572851-media-dvb-usb-v2-lmedm04-Improve-logic-checking-of.patch
- From: kernel-4.4.0-120.144
- CVE-2019-15214, CVSSv2 Score: 6.4
- Description:
ALSA: core: Fix card races between register and disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-15214
- Patch: 3.16.0/cve-2019-15214-alsa-fix-card-races-between-init-and-disconnect.patch
- From: linux-3.16.72-1
- CVE-2019-19534, CVSSv2 Score: 2.4
- Description:
can: peak_usb: fix slab info leak
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19534
- Patch: 3.16.0/cve-2019-19534-can-peak_usb-fix-slab-info-leak.patch
- From: 3.16.81-1
- CVE-2019-19054, CVSSv2 Score: 4.7
- Description:
media: rc: prevent memory leak in cx23888_ir_probe
- CVE: https://access.redhat.com/security/cve/CVE-2019-19054
- Patch: 4.14.0/cve-2019-19054-media-rc-prevent-memory-leak.patch
- From: 4.14.35-1902.304.6
- CVE-2020-14416, CVSSv2 Score: 4.2
- Description:
can, slip: Protect tty->disc_data in write_wakeup and close with RCU
- CVE: https://linux.oracle.com/cve/CVE-2029-14416.html
- Patch: 4.1.12/cve-2020-14416-can-protect-disc_data-and-close-with-RCU.patch
- From: 4.1.12-124.41.1
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://linux.oracle.com/cve/CVE-2020-12888.html
- Patch: 4.1.12/cve-2020-12888.patch
- From: 4.1.12-124.41.2
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://linux.oracle.com/cve/CVE-2020-12888.html
- Patch: 4.1.12/cve-2020-12888-kpatch-1.patch
- From: 4.1.12-124.41.2
- CVE-2020-10732, CVSSv2 Score: 3.3
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10732
- Patch: 4.1.12/cve-2020-10732-fs-binfmt_elf.c-allocate-initialized-memory-in-fill_.patch
- From: kernel-uek-4.1.12-124.42.3
- CVE-2019-19049, CVSSv2 Score: 6.4
- Description:
of: unittest: fix memory leak in unittest_data_add
- CVE: https://access.redhat.com/security/cve/CVE-2019-19049
- Patch: 4.1.12/cve-2019-19049-of-unittest-data-memory-leak.patch
- From: kernel-uek-4.1.12-124.42.3
- CVE-2019-19062, CVSSv2 Score: 7.5
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19062
- Patch: ubuntu-xenial/4.4.0-173.203/CVE-2019-19062-crypto-user-fix-memory-leak-in-crypto_report.patch
- From: kernel-4.4.0-173.203
- CVE-2019-20811, CVSSv2 Score: 5.5
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20811
- Patch: 4.9.0/cve-2019-20811-call-dev_hold-if-kobject_init_and_add-success.patch
- From: 4.9.210-1+deb9u1
- CVE-2017-16644, CVSSv2 Score: 4.6
- Description:
hdpvr: Fix an error handling path in hdpvr_probe()
- CVE: https://access.redhat.com/security/cve/CVE-2017-16644
- Patch: 4.1.12/cve-2017-16644-hdpvr-fix-an-error-handling-path.patch
- From: kernel-uek-4.1.12-124.42.3
- CVE-2019-19535, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 4.9.0/CVE-2019-19535.patch
- From: 4.9.210-1
- CVE-2016-10905, CVSSv2 Score: 7.8
- Description:
GFS2: don't set rgrp gl_object until it's inserted into rgrp tree
- CVE: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10905
- Patch: 4.1.12/CVE-2016-10905.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2016-10906, CVSSv2 Score: 7.0
- Description:
net: arc_emac: fix koops caused by sk_buff free
- CVE: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10906
- Patch: 4.1.12/CVE-2016-10906.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2017-8924, CVSSv2 Score: 4.3
- Description:
USB: serial: io_ti: fix information leak in completion handler
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-8924
- Patch: 3.13.0/422388-USB-serial-io_ti-fix-information-leak-in-completio.patch
- From: kernel-3.13.0-124.173
- CVE-2017-8925, CVSSv2 Score: 5.5
- Description:
USB: serial: omninet: fix reference leaks at open
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2017-8925
- Patch: 3.13.0/422387-USB-serial-omninet-fix-reference-leaks-at-open.patch
- From: kernel-3.13.0-124.173
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
pipe: add pipe_buf_get() helper
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-pipe-add-pipe_buf_get-helper.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: add 'try_get_page()' helper function
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-add-try_get_page-helper-function.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
fs: prevent page refcount overflow in pipe_buf_get
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.1.12/CVE-2019-11487-fs-prevent-page-refcount-overflow-in-pipe_buf_get-uek.patch
- From: 4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: make page ref count overflow check tighter and more explicit
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-make-page-ref-count-overflow-check-tighter-and-more-explicit.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm, gup: ensure real head page is ref-counted when using hugepages
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.4.0/CVE-2019-11487-mm-gup-ensure-real-head-page-is-ref-counted-when-using-hugepages.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.1.12/CVE-2019-11487-mm-prevent-get_user_pages-from-overflowing-page-refcount.patch
- From: kernel-4.4.0-165.193
- CVE-2019-11487, CVSSv2 Score: 7.8
- Description:
mm: prevent get_user_pages() from overflowing page refcount
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11487
- Patch: 4.1.12/CVE-2019-11487-6.patch
- From: kernel-4.4.0-165.193
- CVE-2018-16884, CVSSv2 Score: 6.7
- Description:
sunrpc: use-after-free in svc_process_common
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16884
- Patch: 4.4.0/CVE-2018-16884.patch
- From: kernel-4.4.171
- CVE-2018-16884, CVSSv2 Score: 6.5
- Description:
CVE-2018-16884 kpatch adaptation
- CVE: https://access.redhat.com/security/cve/CVE-2018-16884
- Patch: 3.10.0/10771-fs-sunrpc-use-after-free-in-svc_process_common-kpatch.patch
- From: kernel-3.10.0-957.27.2.el7
- CVE-2018-20856, CVSSv2 Score: 5.9
- Description:
use-after-free
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-20856
- Patch: 4.4.0/CVE-2018-20856.patch
- From: kernel-4.4.0-161.189
- CVE-2019-3846, CVSSv2 Score: 8.8
- Description:
mwifiex: Abort at too short BSS descriptor element
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3846.html
- Patch: 4.4.0/CVE-2019-3846-mwifiex-fix-possible-buffer-overflows-at-parsing-bss-descriptor.patch
- From: kernel-4.4.0-159.187
- CVE-2019-3874, CVSSv2 Score: 6.5
- Description:
sctp: implement memory accounting on tx path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-3874
- Patch: 4.4.0/CVE-2019-3874-sctp-implement-memory-accounting-on-tx-path-116.140.patch
- From: 4.4.0-147.173
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
cfg80211/mac80211: make ieee80211_send_layer2_update a public function
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 4.4.0/cfg80211-mac80211-make-ieee80211_send_layer2_update-a-public-function.patch
- From: 4.4.0-174.204
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
mac80211: Do not send Layer 2 Update frame before authorization
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-5108
- Patch: 3.8.13/CVE-2019-5108-mac80211-Do-not-send-Layer-2-Update-frame-before-authorization--alt-3.8.patch
- From: 4.9.212-36.el7
- CVE-2019-6974, CVSSv2 Score: 6.8
- Description:
kvm: fix kvm_ioctl_create_device() reference counting
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-6974
- Patch: 4.4.0/CVE-2019-6974.patch
- From: kernel-4.4.176
- CVE-2019-7221, CVSSv2 Score: 7.5
- Description:
KVM: nVMX: unconditionally cancel preemption timer in free_nested
- CVE: https://access.redhat.com/security/cve/cve-2019-7221
- Patch: 4.1.12/CVE-2019-7221-pre-124.26.5.patch
- From: kernel-4.4.175
- CVE-2019-7222, CVSSv2 Score: 2.8
- Description:
KVM: x86: work around leak of uninitialized stack contents
- CVE: https://access.redhat.com/security/cve/cve-2019-7222
- Patch: 4.4.0/CVE-2019-7222-112.patch
- From: kernel-4.4.175
- CVE-2020-10720, CVSSv2 Score: 5.3
- Description:
net-gro: fix use-after-free read in napi_gro_frags()
- CVE: https://access.redhat.com/security/cve/cve-2020-10720
- Patch: 4.18.0/cve-2020-10720-net-gro-fix-use-after-free.patch
- From: kernel-4.18.0-147.el8
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: Print 'sclass' as string when unrecognized netlink message occurs (CVE-2020-10751 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10751
- Patch: 3.16.0/CVE-2020-10751-selinux-print-sclass-as-string-when-unrecognized-net.patch
- From: 3.16.84-1
- CVE-2020-10769, CVSSv2 Score: 5.5
- Description:
crypto: authenc - fix parsing key with misaligned rta_len
- CVE: https://linux.oracle.com/cve/CVE-2020-10769.html
- Patch: 4.14.0/cve-2020-10769-crypto-authenc-fix-parsing-key-with-misaligned-rta_len.patch
- From: 4.14.35-1902.306.2
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2019-14331, CVSSv2 Score: 6.6
- Description:
vgacon: Fix for missing check in scrollback handling
- CVE: vgacon: Fix for missing check in scrollback handling
- Patch: 3.8.13/CVE-2020-14331-vgacon-Fix-for-missing-check-in-scrollback-handlin.patch
- From: 3.8.13-118.49.1
- CVE-2019-16746, CVSSv2 Score: 9.8
- Description:
nl80211: fixed buffer overflow when handling beacon settings
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.9.0/CVE-2019-16746.patch
- From: 4.4.0-168.197
- CVE-2019-17075, CVSSv2 Score: 7.5
- Description:
fixed possible DoS in drivers/infiniband/hw/cxgb4/mem.c via directly calling dma_map_single() from a stack variable
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17075.html
- Patch: 4.4.0/CVE-2019-17075.patch
- From: kernel-4.4.0-170.199
- CVE-2019-18885, CVSSv2 Score: 5.5
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: 4.1.12/CVE-2019-18885.patch
- From: 5.0.0.1029.33
- CVE-2019-19052, CVSSv2 Score: 7.5
- Description:
can: gs_usb: gs_can_open(): prevent memory leak
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19052
- Patch: 3.16.0/cve-2019-19052-can-gs_usb-prevent-memory-leak.patch
- From: 3.16.81-1
- CVE-2019-19073, CVSSv2 Score: 4.0
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19073
- Patch: 4.4.0/CVE-2019-19073-ath9k_htc-release-allocated-buffer-if-timed-out.patch
- From: 4.4.0-190.220
- CVE-2019-19768, CVSSv2 Score: 7.5
- Description:
blktrace: fix dereference after null check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19768
- Patch: 4.1.12/CVE-2019-19768.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2019-19965, CVSSv2 Score: 4.7
- Description:
scsi: libsas: stop discovering if oob mode is disconnected
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19965
- Patch: 4.4.0/CVE-2019-19965-scsi-libsas-stop-discovering-if-oob-mode-is-disconnected.patch
- From: 4.4.0-174.204
- CVE-2019-20054, CVSSv2 Score: 5.5
- Description:
mwifiex: Fix mem leak in mwifiex_tm_cmd
- CVE: https://linux.oracle.com/cve/CVE-2019-20054.html
- Patch: 4.15.0/cve-2019-20054-sysctl-fix-NULL-ptr-dereference.patch
- From: 4.14.35-1902.10.5
- CVE-2019-20096, CVSSv2 Score: 5.5
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-20096
- Patch: 4.4.0/CVE-2019-20096-dccp-Fix-memleak-in__feat_register_sp.patch
- From: 4.4.0-174.204
- CVE-2019-20812, CVSSv2 Score: 5.5
- Description:
af_packet: set defaule value for tmo
- CVE: af_packet: set defaule value for tmo
- Patch: 3.8.13/CVE-2020-20812-af_packet-set-defaule-value-for-tmo.patch
- From: 3.8.13-118.49.1
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.1.12/CVE-2020-1749-pre-124.28.5.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2020-1749, CVSSv2 Score: 7.5
- Description:
net: ipv6: add net argument to ip6_dst_lookup_flow
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2020-1749
- Patch: 4.1.12/CVE-2020-1749-kpatch.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25212
- Patch: 4.4.0/CVE-2020-25212-nfs-Fix-getxattr-kernel-panic-and-memory-overflow.patch
- From: 4.4.0-190.220
- CVE-2020-25284, CVSSv2 Score: 5.5
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.1.12/CVE-2020-25284.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2020-25285, CVSSv2 Score: 7.0
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.1.12/CVE-2020-25285.patch
- From: 4.1.12-124.43.4.el7uek
- CVE-2019-15218, CVSSv2 Score: 4.6
- Description:
media: usb: siano: Fix general protection fault in smsusb
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-15218
- Patch: 4.9.0/cve-2019-15218-media-usb-fix-general-protection-fault.patch
- From: kernel-4.9.75-29.el7
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of buffer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15505
- Patch: 4.4.0/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of-b.patch
- From: 4.4.0-166.195
- CVE-2019-19530, CVSSv2 Score: 5.7
- Description:
usb: cdc-acm: make sure a refcount is taken early enough
- CVE: https://access.redhat.com/security/cve/CVE-2019-19530
- Patch: 4.1.12/CVE-2019-19530.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-25643, CVSSv2 Score: 7.2
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25643
- Patch: 4.19.0/CVE-2020-25643-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: 4.19.152-1
- CVE-2020-26541, CVSSv2 Score: 6.5
- Description:
kexec, KEYS: kexec signature blacklist verify
- CVE: https://access.redhat.com/security/cve/CVE-2020-26541
- Patch: 4.1.12/CVE-2020-25641-uek4.patch
- From: 4.1.12-124.44.4
- CVE-2020-25211, CVSSv2 Score: 7.0
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-uek-4.14.35-2025.402.2.1.el7uek
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-kpatch.patch
- From: kernel-uek-4.14.35-2025.401.4.el7uek
- N/A, CVSSv2 Score: N/A
- Description:
net: icmp: fix data-race in cmp_global_allow()
- CVE: N/A
- Patch: 4.14.0/net-icmp-fix-data-race-in-cmp_global_allow.patch
- From: 4.14.162
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: update the net random state on interrupt and activity
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random32-update-the-net-random-state-on-interrupt-and-activity.patch
- From: 4.1.12-124.45.6
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random: fix circular include dependency on arm64 after addition of percpu.h
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random-fix-circular-include-dependency-on-arm64-after-addition-of-percpu-h.patch
- From: 4.1.12-124.45.6
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: remove net_rand_state from the latent entropy gcc plugin
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random32-remove-net_rand_state-from-the-latent-entropy-gcc-plugin.patch
- From: 4.1.12-124.45.6
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: move the pseudo-random 32-bit definitions to prandom.h
- CVE: https://linux.oracle.com/cve/CVE-2020-16166.html
- Patch: 4.1.12/CVE-2020-16166-random32-move-the-pseudo-random-32-bit-definitions-to-prandom-h.patch
- From: 4.1.12-124.45.6
- CVE-2019-14895, CVSSv2 Score: 9.8
- Description:
mwifiex: fix possible heap overflow in mwifiex_process_country_ie()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14895
- Patch: 4.1.12/cve-2019-14895-mwifiex-fix-possible-heap-overflow-in.patch
- From: 4.1.12-124.46.3
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: cope with NULL catmap
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 3.10.0/CVE-2020-10711.patch
- From: kernel-3.10.0-1127.8.2.el7
- CVE-2020-12464, CVSSv2 Score: 6.7
- Description:
drivers: usb: core: Don't disable irqs in usb_sg_wait() during URB submit. (CVE-2020-12464 dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12464
- Patch: 3.16.0/CVE-2020-12464-drivers-usb-core-don-t-disable-irqs-in-usb_sg_wait-d.patch
- From: 3.16.84-1
- CVE-2020-12652, CVSSv2 Score: 4.1
- Description:
scsi: mptfusion: Fix double fetch bug in ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12652
- Patch: 4.9.0/cve-2020-12652-scsi-mpfusion-fix-double-fetch-bug-30.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19447, CVSSv2 Score: 7.8
- Description:
ext4: work around deleting a file with i_nlink == 0 safely
- CVE: https://access.redhat.com/security/cve/CVE-2019-19447
- Patch: 3.10.0/CVE-2019-19447-0197-fs-ext4-work-around-deleting-a-file-with-i_nlink-O-s.patch
- From: kernel-3.10.0-1160.el7
- CVE-2019-19037, CVSSv2 Score: 5.5
- Description:
ext4: fix ext4_empty_dir() for directories with holes
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19037
- Patch: 4.1.12/cve-2019-19037-ext4_mkempty_dir-fix.patch
- From: 4.1.12-124.46.3
- CVE-2020-14305, CVSSv2 Score: 8.1
- Description:
kernel: memory corruption in Voice over IP nf_conntrack_h323 module
- CVE: https://access.redhat.com/security/cve/cve-2020-14305
- Patch: 3.10.0/CVE-2020-14305.patch
- From: kernel-3.10.0-1160.el7
- CVE-2020-25668, CVSSv2 Score: 7.0
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25668
- Patch: 4.19.0/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.4.0/CVE-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.4.0/CVE-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28974, CVSSv2 Score: 4.6
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28974
- Patch: 4.19.0/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 4.4.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: kernel-4.4.0-197.229
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://www.saddns.net/
- Patch: 4.14.0/icmp-randomize-the-global-rate-limiter.patch
- From: v4.14.203
- CVE-2019-20934, CVSSv2 Score: 5.3
- Description:
sched/fair: Don't free p->numa_faults with concurrent readers
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-20934
- Patch: 4.1.12/cve-2019-20934-dont-free-pnuma_faults-with-concurrent-readers.patch
- From: 4.1.12-124.46.3
- CVE-2020-15436, CVSSv2 Score: 5.3
- Description:
block: Fix use-after-free in blkdev_get()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-15436
- Patch: 4.1.12/cve-2020-15436-fix-use-after-free-in-blkdev_get.patch
- From: 4.1.12-124.46.3
- CVE-2020-28374, CVSSv2 Score: 8.1
- Description:
target: fix XCOPY NAA identifier lookup
- CVE: https://access.redhat.com/security/cve/CVE-2020-28374
- Patch: 4.1.12/CVE-2020-28374-target-fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.1.12-124.46.4.1.el6uek
- CVE-2020-29569, CVSSv2 Score: 8.8
- Description:
set ring->xenblkd to NULL explicitly
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-29569
- Patch: 4.14.0/cve-2020-29569-set-xenblkd-to-NULL.patch
- From: kernel-uek-4.14.35-2025.403.3
- CVE-2020-12653, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12653
- Patch: 3.16.0/CVE-2020-12653-mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 3.16.84-1
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: core: Use correct spinlock flavor in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.1.12/CVE-2020-29660-tty-core-Use-correct-spinlock-flavor-in-tiocspgrp.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.1.12/CVE-2020-29660-tty-Fix-pgrp-locking-in-tiocspgrp.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://access.redhat.com/security/cve/CVE-2020-29660
- Patch: 4.1.12/CVE-2020-29660-tty-Fix-session-locking.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-36158, CVSSv2 Score: 6.7
- Description:
mwifiex: Fix possible buffer overflows in
- CVE: https://access.redhat.com/security/cve/CVE-2020-36158
- Patch: 4.1.12/CVE-2020-36158-mwifiex-Fix-possible-buffer-overflows-in.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- CVE: https://access.redhat.com/security/cve/CVE-2020-27786
- Patch: 4.1.12/CVE-2020-27786-ALSA-rawmidi-Fix-racy-buffer-resize-under-concurrent-accesses-23.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-27786, CVSSv2 Score: 7.8
- Description:
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-27786
- Patch: 4.1.12/CVE-2020-27786-kpatch.patch
- From: 4.1.12-124.47.3.el6uek
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: debian10/4.19.171-2/CVE-2020-29568-xsa349-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 4.1.12/CVE-2020-29568-xsa349-handle-xenwatch-thread-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533083-Xen-x86-don-t-bail-early-from-clear_foreign_p2m_ma.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533084-Xen-x86-also-check-kernel-mapping-in-set_foreign_p.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533085-Xen-gntdev-correct-dev_bus_addr-handling-in-gntdev.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct error checking in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.1.12/533086-Xen-gntdev-correct-error-checking-in-gntdev_map_gr.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533087-xen-blkback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533088-xen-netback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.1.12/533089-xen-scsiback-don-t-handle-error-by-BUG.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: 4.1.12/533090-xen-blkback-fix-error-handling-in-xen_blkbk_map.patch
- From: 4.1.12-124.48.3.1.el7uek
- CVE-2020-0431, CVSSv2 Score: 6.7
- Description:
HID: hid-input: clear unmapped usages.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-0431
- Patch: 4.15.0/CVE-2020-0431-HID-hid-input-clear-unmapped-usages.patch
- From: kernel-4.15.0-91.88
- CVE-2021-27363, CVSSv2 Score: 3.6
- Description:
scsi: iscsi: Restrict sessions and handles to admin
- CVE: https://access.redhat.com/security/cve/CVE-2021-27363
- Patch: 4.1.12/CVE-2021-27363-scsi-iscsi-Restrict-sessions-and-handles-to-admin.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/CVE-2021-27364
- Patch: 4.1.12/CVE-2021-27364-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2021-27365
- Patch: 4.1.12/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/CVE-2021-27365
- Patch: 4.1.12/CVE-2021-27365-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2023-1989, CVSSv2 Score: 7.0
- Description:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work
- CVE: https://linux.oracle.com/cve/CVE-2023-1989.html
- Patch: oel7-uek4/4.1.12-124.85.1.el7uek/CVE-2023-1989-Bluetooth-btsdio-fix-use-after-free-bug-in-btsdio_remove-due-to-unfinished-work.patch
- From: 4.1.12-124.85.1.el7uek
- CVE-2021-33098, CVSSv2 Score: 5.5
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://linux.oracle.com/cve/CVE-2021-33098.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2021-33098-ixgbe-fix-large-MTU-request-from-VF.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://linux.oracle.com/cve/CVE-2023-42752.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-42752-igmp-limit-igmpv3_newpack-packet-size-to-IP_MAX_MTU.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-1077, CVSSv2 Score: 7.0
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://linux.oracle.com/cve/CVE-2023-1077.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 4.1.12-124.82.2.el7uek
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://linux.oracle.com/cve/CVE-2023-4921.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://linux.oracle.com/cve/CVE-2023-4921.html
- Patch: oel7-uek4/4.1.12-124.82.2.el7uek/CVE-2023-4921-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue-kpatch.patch
- From: 4.1.12-124.82.2.el6uek
- CVE-2023-7192, CVSSv2 Score: 5.5
- Description:
netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()
- CVE: https://linux.oracle.com/cve/CVE-2023-7192.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2023-7192-netfilter-ctnetlink-fix-possible-refcount-leak-in-ctnetlink_create_conntrack.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2022-48619, CVSSv2 Score: 6.2
- Description:
Input: add bounds checking to input_set_capability()
- CVE: https://linux.oracle.com/cve/CVE-2022-48619.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2022-48619-Input-add-bounds-checking-to-input_set_capability.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2024-0775, CVSSv2 Score: 6.7
- Description:
ext4: improve error recovery code paths in __ext4_remount()
- CVE: https://linux.oracle.com/cve/CVE-2024-0775.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2024-0775-ext4-improve-error-recovery-code-paths-in-__ext4_remount.patch
- From: 4.1.12-124.83.2.el6uek
- CVE-2021-34981, CVSSv2 Score: 7.5
- Description:
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
- CVE: https://linux.oracle.com/cve/CVE-2021-34981.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2021-34981-Bluetooth-cmtp-fix-file-refcount-when-cmtp_attach_device-fails.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2023-51780, CVSSv2 Score: 7.0
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://linux.oracle.com/cve/CVE-2023-51780.html
- Patch: oel7-uek4/4.1.12-124.83.2.el7uek/CVE-2023-51780-atm-Fix-Use-After-Free-in-do_vcc_ioctl.patch
- From: 4.1.12-124.83.2.el7uek
- CVE-2018-9422, CVSSv2 Score: 7.8
- Description:
futex: Remove unnecessary warning from get_futex_key
- CVE: https://linux.oracle.com/cve/CVE-2018-9422.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2018-9422-futex-remove-requirement-for-lock-page-in-get-futex-key.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://linux.oracle.com/cve/CVE-2020-12770.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2020-12770-scsi-sg-add-sg-remove-request-in-sg-write.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2020-14390, CVSSv2 Score: 5.6
- Description:
fbcon: remove soft scrollback code
- CVE: https://linux.oracle.com/cve/CVE-2020-14390.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2020-14390-fbcon-remove-soft-scrollback-code.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2020-14390, CVSSv2 Score: 5.6
- Description:
fbcon: remove soft scrollback code (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2020-14390.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2020-14390-kpatch.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://linux.oracle.com/cve/CVE-2021-30002.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-30002-media-v4l-ioctl-fix-memory-leak-in-video-usercopy.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://linux.oracle.com/cve/CVE-2021-43976.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-43976-mwifiex-fix-skb-over-panic-in-mwifiex-usb-recv.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation
- CVE: https://linux.oracle.com/cve/CVE-2021-45486.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-45486-inet-use-bigger-hash-table-for-ip-id-generation.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2021-45486.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2021-45486-inet-use-bigger-hash-table-for-ip-id-generation-kpatch.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-0850, CVSSv2 Score: 7.1
- Description:
ext4: fix kernel infoleak via ext4_extent_header
- CVE: https://linux.oracle.com/cve/CVE-2022-0850.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-0850-ext4-fix-kernel-infoleak-via-ext4-extent-header.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it (dependancy for older kernels)
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-1184-1-ext4-verify-dir-block-before-splitting-it.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
[PATCH] af_key: Do not call xfrm_probe_algs in parallel (modified for old kernels)
- CVE: https://linux.oracle.com/cve/CVE-2022-3028.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-3028-1659-patch-af-key-do-not-call-xfrm-probe-algs-in-parallel.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
CVE-2022-2964 dependancy
- CVE: https://linux.oracle.com/cve/CVE-2022-2964.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2964-net-usb-ax88179-178a-fix-packet-alignment-padding.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
- CVE: https://linux.oracle.com/cve/CVE-2022-2964.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2964-net-usb-ax88179-178a-fix-out-of-bounds-accesses-in-rx-fixup.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-36879, CVSSv2 Score: 5.5
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://linux.oracle.com/cve/CVE-2022-36879.html
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-36879-xfrm-xfrm-policy-fix-a-possible-double-xfrm-pols-put-in.patch
- From: 4.1.12-124.67.3.el7uek
- CVE-2022-2503, CVSSv2 Score: 6.7
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag
- CVE: https://ubuntu.com/security/CVE-2022-2503
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2503-dm-verity-set-DM_TARGET_IMMUTABLE-feature-flag.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2022-2503, CVSSv2 Score: 6.7
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-2503
- Patch: oel7-uek4/4.1.12-124.67.3.el7uek/CVE-2022-2503-kpatch.patch
- From: 4.1.12-124.67.1.el7uek
- CVE-2020-0444, CVSSv2 Score: 7.8
- Description:
audit: fix error handling in audit_data_to_entry()
- CVE: https://access.redhat.com/security/cve/CVE-2020-0444
- Patch: 4.1.12/CVE-2020-0444-audit-fix-error-handling-in-audit_data_to_entry.patch
- From: 4.1.12-124.49.3.1.el6uek
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
epoll: Keep a reference on files added to the check list
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0001-epoll-Keep-a-reference-on-files-added-to-the-check-193.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-0466, CVSSv2 Score: 7.8
- Description:
do_epoll_ctl(): clean the failure exits up a bit
- CVE: https://access.redhat.com/security/cve/CVE-2020-0466
- Patch: 4.18.0/CVE-2020-0466-0002-do_epoll_ctl-clean-the-failure-exits-up-a-bit-193.patch
- From: 4.18.0-240.22.1.el8_3
- CVE-2020-0465, CVSSv2 Score: 6.6
- Description:
HID: core: Sanitize event code and type when mapping input
- CVE: https://access.redhat.com/security/cve/CVE-2020-0465
- Patch: 4.1.12/CVE-2020-0465-HID-core-Sanitize-event-code-and-type-when-mapping-input.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2020-35508, CVSSv2 Score: 4.5
- Description:
fork: fix copy_process(CLONE_PARENT) race with the exiting
- CVE: https://access.redhat.com/security/cve/CVE-2020-35508
- Patch: 4.1.12/CVE-2020-35508-fork-fix-copy_processCLONE_PARENT-race-with-the-exiting.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2021-28038
- Patch: 4.14.0/CVE-2021-28038-Xen-gnttab-handle-p2m-update-errors-on-a-per-slot-basis.patch
- From: 4.14.225-121.357.amzn1
- CVE-2019-19061, CVSSv2 Score: 5.9
- Description:
floppy: fix lock_fdc() signal handling
- CVE: https://access.redhat.com/security/cve/CVE-2019-19061
- Patch: ubuntu-xenial/4.4.0-208.240/CVE-2021-20261-floppy-fix-lock_fdc-signal-handling-164.192.patch
- From: 4.4.0-208.240
- CVE-2021-20219, CVSSv2 Score: 5.5
- Description:
n_tty: Fix stall at n_tty_receive_char_special().
- CVE: https://access.redhat.com/security/cve/CVE-2021-20219
- Patch: 4.1.12/CVE-2021-20219-n_tty-Fix-stall-at-n_tty_receive_char_special.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-28964, CVSSv2 Score: 4.1
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old root
- CVE: https://access.redhat.com/security/cve/CVE-2021-28964
- Patch: 4.1.12/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: make xt_replace_table wait until old
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-make-xt_replace_table-wait-until-old.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.1.12/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.1.12-124.50.2.el6uek
- CVE-2021-28688, CVSSv2 Score: 6.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28688
- Patch: 4.14.0/CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from.patch
- From: 4.14.35-2047.503.1.el7uek
- CVE-2020-12352 CVE-2020-25662, CVSSv2 Score: 5.3
- Description:
[net] Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-25662
- Patch: 4.18.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-31916
- Patch: debian9/4.9.272-1/0030-CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 4.9.272-1
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2020-36386, CVSSv2 Score: 7.1
- Description:
Bluetooth: Fix slab-out-of-bounds read in
- CVE: https://access.redhat.com/security/cve/CVE-2020-36386
- Patch: 4.1.12/CVE-2020-36386-Bluetooth-Fix-slab-out-of-bounds-read-in.patch
- From: 4.1.12-124.52.4.el7uek
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 4.1.12/CVE-2019-9458-media-v4l-event-Prevent-freeing-event-subscriptions-while.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Prevent freeing event subscriptions while accessed (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 4.1.12/CVE-2019-9458-media-v4l-event-Prevent-freeing-event-subscriptions-while-kpatch.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2019-9458, CVSSv2 Score: 7.0
- Description:
media: v4l: event: Add subscription to list before calling
- CVE: https://access.redhat.com/security/cve/CVE-2019-9458
- Patch: 4.1.12/CVE-2019-9458-media-v4l-event-Add-subscription-to-list-before-calling.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2019-9456, CVSSv2 Score:
- Description:
Omitting for now: Android Pixel C USB monitor driver
- CVE:
- Patch: skipped/CVE-2019-9456.patch
- From:
- CVE-2020-0305, CVSSv2 Score: 6.4
- Description:
kobject: Export kobject_get_unless_zero()
- CVE: https://access.redhat.com/security/cve/CVE-2020-0305
- Patch: 4.1.12/CVE-2020-0305-kobject-Export-kobject_get_unless_zero.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0305, CVSSv2 Score: 6.4
- Description:
[fs] chardev: Avoid potential use-after-free in 'chrdev_open()'
- CVE: https://access.redhat.com/security/cve/cve-2020-0305
- Patch: 4.18.0/CVE-2020-0305-18273-fs-chardev-Avoid-potential-use-after-free-in-chrdev.patch
- From: 4.18.0-240.el8
- CVE-2020-27068, CVSSv2 Score: 4.4
- Description:
cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27068
- Patch: 4.15.0/CVE-2020-27068-cfg80211-add-missing-policy-for-NL80211_ATTR_STATUS_CODE.patch
- From: kernel-4.15.0-99.100
- CVE-2020-27068, CVSSv2 Score: 4.4
- Description:
cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-27068
- Patch: 4.1.12/CVE-2020-27068-cfg80211-add-missing-policy-for-NL80211_ATTR_STATUS_CODE-kpatch.patch
- From: kernel-4.15.0-99.100
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-34693
- Patch: 4.1.12/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From: kernel-5.8.0-59.66
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: Correctly return -EBADF from pppol2tp_getname.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-Correctly-return-EBADF-from-pppol2tp_getname.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
net: l2tp: Make l2tp_ip6 namespace aware
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-net-l2tp-Make-l2tp_ip6-namespace-aware.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix race in l2tp_recv_common()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-race-in-l2tp_recv_common-25.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: ensure session can't get removed during
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-ensure-session-can-t-get-removed-during.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix duplicate session creation
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-duplicate-session-creation.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: Refactor the codes with existing macros instead of literal number
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-Refactor-the-codes-with-existing-macros-instead-of.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: ensure sessions are freed after their PPPOL2TP socket
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-ensure-sessions-are-freed-after-their-PPPOL2TP-socket.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-race-between-l2tp_session_delete-and.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-0429, CVSSv2 Score: 6.7
- Description:
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall() (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-0429
- Patch: 4.1.12/CVE-2020-0429-l2tp-fix-race-between-l2tp_session_delete-and-kpatch.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-28097, CVSSv2 Score: 5.9
- Description:
vgacon: remove software scrollback support (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-28097
- Patch: 4.1.12/CVE-2020-28097-vgacon-remove-software-scrollback-support-kpatch.patch
- From: 4.1.12-124.54.6.el6uek
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 4.1.12/CVE-2020-14304-net-mlx4_en-ethtool-Remove-unsupported-SFP-EEPROM-high.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4: Fix EEPROM dump support
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 4.1.12/CVE-2020-14304-net-mlx4-Fix-EEPROM-dump-support.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when
- CVE: https://access.redhat.com/security/cve/CVE-2021-32399
- Patch: 4.1.12/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://access.redhat.com/security/cve/cve-2021-33909
- Patch: 4.1.12/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://access.redhat.com/security/cve/CVE-2021-22555
- Patch: 3.16.7/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write-39.patch
- From: v5.12
- CVE-2019-19448, CVSSv2 Score: 7.8
- Description:
btrfs only search for left_info if there is no right_info
- CVE: https://access.redhat.com/security/cve/CVE-2019-19448
- Patch: 4.19.0/CVE-2019-19448.patch
- From: linux-4.19.146-1
- CVE-2019-17133, CVSSv2 Score: 8.8
- Description:
cfg80211: wext: avoid copying malformed SSIDs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-17133
- Patch: 3.10.0/cve-2019-17133-cfg80211-wext-avoid-copying-malformed-SSID.patch
- From: kernel-3.10.0-1062.12.1.el7
- CVE-2020-12114, CVSSv2 Score: 4.7
- Description:
fs/namespace.c: fix mountpoint reference counter race
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12114
- Patch: 4.9.0/cve-2020-12114-fs-namespace-fix-mountpoint-ref-counter-race.patch
- From: 4.9.210-1+deb9u1
- CVE-2021-0512, CVSSv2 Score: 7.8
- Description:
HID: make arrays usage and value to be the same
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0512
- Patch: debian9/4.9.272-1/CVE-2021-0512-hid-make-arrays-usage-and-value-to-be-the-same.patch
- From: 4.9.272-1
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: validate from_addr_param return
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.1.12/CVE-2021-3655-sctp-validate-from_addr_param-return.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38160
- Patch: ubuntu-bionic/4.15.0-156.163/0004-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.15.0-156.163
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its
- CVE: https://access.redhat.com/security/cve/CVE-2021-40490
- Patch: 4.1.12/CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-its.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2021-3715, CVSSv2 Score: 7.8
- Description:
net_sched: cls_route: remove the right filter from hashtable
- CVE: https://access.redhat.com/security/cve/CVE-2021-3715
- Patch: 3.10.0/CVE-2021-3715-net-sched-cls-route-remove-the-right-filter-from-hashtable.patch
- From: 3.10.0-1160.42.2.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost-net: set packet weight of tx polling to 2 * vq size
- CVE: https://access.redhat.com/security/cve/cve-2019-3900
- Patch: 3.10.0/0001-vhost-net-set-packet-weight-of-tx-polling-to-2-vq-si-229.20.1.patch
- From: 3.10.0-1062.el7
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: use packet weight for rx handler, too
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost_net-use-packet-weight-for-rx-handler-too.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: introduce vhost_exceeds_weight()
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost_net-introduce-vhost_exceeds_weight.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost: introduce vhost_exceeds_weight()
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost-introduce-vhost_exceeds_weight.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: fix possible infinite loop
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-vhost_net-fix-possible-infinite-loop.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost: introduce vhost_exceeds_weight() (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2019-3900
- Patch: 4.1.12/CVE-2019-3900-kpatch.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 4.15.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-4.15.0-151.157
- CVE-2020-24586, CVSSv2 Score: 4.3
- Description:
mac80211: add fragment cache to sta_info (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-24586
- Patch: 4.1.12/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24586-CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-32.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24586 CVE-2020-24587, CVSSv2 Score: 4.3
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24586-CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042
- CVE: https://access.redhat.com/security/cve/CVE-2020-24588
- Patch: 4.1.12/CVE-2020-24588-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://access.redhat.com/security/cve/CVE-2020-24588
- Patch: 4.1.12/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24588, CVSSv2 Score: 4.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://access.redhat.com/security/cve/CVE-2020-24588
- Patch: 4.1.12/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: check defrag PN against current frame
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-check-defrag-PN-against-current-frame.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2020-24587, CVSSv2 Score: 3.1
- Description:
mac80211: extend protection against mixed key and fragment
- CVE: https://access.redhat.com/security/cve/CVE-2020-24587
- Patch: 4.1.12/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment.patch
- From: 4.1.12-124.54.6.1.el7uek
- CVE-2019-19074, CVSSv2 Score: 7.5
- Description:
ath9k: release allocated buffer if timed out
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19074
- Patch: 4.4.0/CVE-2019-19074-ath9k-release-allocated-buffer-if-timed-out.patch
- From: 4.4.0-190.220
- CVE-2019-19063, CVSSv2 Score: 7.5
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-19063
- Patch: 3.8.13/CVE-2019-19063-alt-3.8.patch
- From: 4.9.212-36.el7
- CVE-2018-9517, CVSSv2 Score: 4.7
- Description:
l2tp: pass tunnel pointer to ->session_create()
- CVE: https://access.redhat.com/security/cve/CVE-2018-9517
- Patch: 4.1.12/CVE-2018-9517-l2tp-pass-tunnel-pointer-to-session_create.patch
- From: 4.1.12-124.56.1.el7uek
- CVE-2017-18216, CVSSv2 Score: 5.5
- Description:
ocfs2: subsystem.su_mutex is required while accessing the
- CVE: https://access.redhat.com/security/cve/CVE-2017-18216
- Patch: 4.1.12/CVE-2017-18216-ocfs2-subsystem-su_mutex-is-required-while-accessing-the.patch
- From: 4.1.12-124.56.1.el7uek
- CVE-2020-12771, CVSSv2 Score: 5.1
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://access.redhat.com/security/cve/CVE-2020-12771
- Patch: 4.14.0/cve-2020-12771-bcache-fix-potential-deadlock.patch
- From: 4.14.186-110.268.amzn1
- CVE-2018-1000026, CVSSv2 Score: 5.8
- Description:
bnx2x: disable GSO where gso_size is too big for hardware
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000026
- Patch: 4.4.0/572546-bnx2x-disable-GSO-where-gso_size-is-too-big-for-ha.patch
- From: kernel-4.4.0-117.141
- CVE-2018-1000026, CVSSv2 Score: 5.8
- Description:
net: create skb_gso_validate_mac_len()
- CVE: https://access.redhat.com/security/cve/CVE-2018-1000026
- Patch: 4.1.12/CVE-2018-1000026-net-create-skb_gso_validate_mac_len.patch
- From: 4.1.12-124.57.1
- CVE-2019-19816 CVE-2019-19813, CVSSv2 Score: 7.8
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19816
- Patch: ubuntu-xenial/4.4.0-201.233/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: kernel-4.4.0-20kernel-4.4.0-201.233
- CVE-2019-19813, CVSSv2 Score: 5.5
- Description:
btrfs: fix return value mixup in btrfs_get_extent
- CVE: https://access.redhat.com/security/cve/CVE-2019-19813
- Patch: 4.1.12/CVE-2019-19813-btrfs-fix-return-value-mixup-in-btrfs_get_extent.patch
- From: 4.1.12-124.57.1
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 4.9.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.9.272-1
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://access.redhat.com/security/cve/CVE-2021-3732
- Patch: 4.1.12/CVE-2021-3732-ovl-prevent-private-clone-if-bind-mount-is-not-allowed.patch
- From: kernel-uek-4.1.12-124.58.2
- CVE-2021-1048, CVSSv2 Score: 7.8
- Description:
fix regression in "epoll: Keep a reference on files added to the
- CVE: https://access.redhat.com/security/cve/CVE-2021-1048
- Patch: 4.1.12/CVE-2021-1048-fix-regression-in-epoll-Keep-a-reference-on-files-added-to-the.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 4.1.12/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 4.1.12/CVE-2021-0920-kpatch.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.1.12/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: Add bt_dev logging macros
- CVE: https://access.redhat.com/security/cve/CVE-2021-0129
- Patch: 4.1.12/CVE-2021-0129-Bluetooth-Add-bt_dev-logging-macros.patch
- From: 4.1.12-124.60.1.el6uek
- CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: use constant time memory comparison for secret
- CVE: https://access.redhat.com/security/cve/CVE-2021-0129
- Patch: 4.1.12/CVE-2021-0129-Bluetooth-use-constant-time-memory-comparison-for-secret.patch
- From: 4.1.12-124.60.1.el6uek
- CVE-2021-0129, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are
- CVE: https://access.redhat.com/security/cve/CVE-2021-0129
- Patch: 4.1.12/CVE-2021-0129-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are.patch
- From: 4.1.12-124.60.1.el6uek
- CVE-2021-3753, CVSSv2 Score: 5.9
- Description:
vt_kdsetmode: extend console locking (CVE-2021-3753)
- CVE: https://access.redhat.com/security/cve/CVE-2021-3753
- Patch: 4.14.0/CVE-2021-3753.patch
- From: 4.14.243-185.433
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://access.redhat.com/security/cve/CVE-2021-20231
- Patch: 4.14.0/CVE-2021-20321-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 4.14.252-195.483.amzn2
- CVE-2022-0330, CVSSv2 Score: 7.4
- Description:
drm/i915: Reduce locking in execlist command submission
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.1.12/CVE-2022-0330-drm-i915-Reduce-locking-in-execlist-command-submission.patch
- From: 4.1.12-124.61.2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.1.12/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 4.1.12-124.61.2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: n/a
- Patch: 4.1.12/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: 4.14.268-205.500.amzn2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: use init_tag from inithdr for ABORT chunk
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.1.12/CVE-2021-3772-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: 4.1.12-124.61.2
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://access.redhat.com/security/cve/CVE-2021-3772
- Patch: 4.1.12/CVE-2021-3772-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: 4.1.12-124.61.2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
route: also update fnhe_genid when updating a route cache
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 4.1.12/CVE-2021-20322-route-also-update-fnhe_genid-when-updating-a-route-cache.patch
- From: 4.1.12-124.61.2
- CVE-2021-20322, CVSSv2 Score: 7.4
- Description:
ipv4: make exception cache less predictible
- CVE: https://access.redhat.com/security/cve/CVE-2021-20322
- Patch: 4.1.12/CVE-2021-20322-ipv4-make-exception-cache-less-predictible.patch
- From: 4.1.12-124.61.2
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 4.1.12/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 4.1.12-124.61.2
- CVE-2022-26966, CVSSv2 Score: 4.6
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 4.1.12/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 4.1.12-124.61.2
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/CVE-2021-3573
- Patch: 4.9.0/CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-object.patch
- From: 4.9.272-1
- CVE-2021-4002, CVSSv2 Score: 5.1
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.1.12/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare-23.patch
- From: 4.1.12-124.62.3
- CVE-2021-45095, CVSSv2 Score: 5.5
- Description:
phonet: refcount leak in pep_sock_accep
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-45095
- Patch: 4.9.0/CVE-2021-45095-phonet-refcount-leak-in-pep_sock_accep.patch
- From: 4.9.303-1
- CVE-2021-4157, CVSSv2 Score: 5.9
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://access.redhat.com/security/cve/CVE-2021-4157
- Patch: 4.1.12/CVE-2021-4157-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nfs_fh.patch
- From: 4.1.12-124.62.3
- CVE-2021-4149, CVSSv2 Score: 4.7
- Description:
btrfs: unlock newly allocated extent buffer after error
- CVE: https://access.redhat.com/security/cve/CVE-2021-4149
- Patch: 4.1.12/CVE-2021-4149-btrfs-unlock-newly-allocated-extent-buffer-after-error.patch
- From: 4.1.12-124.62.3
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.1.12/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.1.12-124.62.3
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.1.12/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.1.12-124.62.3
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 3.10.0/CVE-2022-1016-lt-1062.patch
- From: >kernel-3.10.0-1160.62.1.el7
- CVE-2021-45868, CVSSv2 Score: 5.1
- Description:
quota: check block number when reading the block in quota
- CVE: https://access.redhat.com/security/cve/CVE-2021-45868
- Patch: 4.1.12/CVE-2021-45868-quota-check-block-number-when-reading-the-block-in-quota.patch
- From: 4.1.12-124.62.3
- CVE-2021-45868, CVSSv2 Score: 5.1
- Description:
quota: correct error number in free_dqentry()
- CVE: https://access.redhat.com/security/cve/CVE-2021-45868
- Patch: 4.1.12/CVE-2021-45868-quota-correct-error-number-in-free_dqentry.patch
- From: 4.1.12-124.62.3
- CVE-2021-4203, CVSSv2 Score: 5.8
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses
- CVE: https://access.redhat.com/security/cve/CVE-2021-4203
- Patch: 4.1.12/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses.patch
- From: 4.1.12-124.62.3
- CVE-2021-4203, CVSSv2 Score: n/a
- Description:
af_unix: fix races in sk_peer_pid and sk_peer_cred accesses (adaptation)
- CVE: n/a
- Patch: 4.1.12/CVE-2021-4203-af_unix-fix-races-in-sk_peer_pid-and-sk_peer_cred-accesses-kpatch.patch
- From: 4.1.12-124.62.3
- CVE-2022-21499, CVSSv2 Score:
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
fix double dev_kfree_skb() in error path
- CVE: https://access.redhat.com/security/cve/CVE-2022-28390
- Patch: 4.14.0/CVE-2022-28390.patch
- From: >kernel-4.14.276-211.499.amzn2
- CVE-2022-28388, CVSSv2 Score: 7.8
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28388
- Patch: ubuntu-bionic/4.15.0-188.199/0001-CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfre.patch
- From: 4.15.0-188.199
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 4.4.0-229.263
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.4.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter-kpaptch.patch
- From: 4.14.35-2047.515.0
- CVE-2022-0492, CVSSv2 Score: 7.8
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.1.12/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.1.12-124.65.1
- CVE-2022-32250, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in
- CVE: https://access.redhat.com/security/cve/CVE-2022-32250
- Patch: 3.10.0/CVE-2022-32250-nf_tables-disallow-non-stateful-expression-in-sets-earlier.patch
- From: 3.10.0-1160.71.1
- CVE-2022-33981, CVSSv2 Score: 3.3
- Description:
floppy: disable FDRAWCMD by default
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/0009-CVE-2022-33981-floppy-disable-FDRAWCMD-by-default.patch
- From: 5.4.0-122.138
- CVE-2022-33981, CVSSv2 Score: 3.3
- Description:
floppy: disable FDRAWCMD by default (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-33981-kpatch.patch
- From: 5.4.0-122.138
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/cve-2022-2588
- Patch: ubuntu-bionic/4.15.0-191.202/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: kernel-4.15.0-191.202
- CVE-2019-9213, CVSSv2 Score: 5.5
- Description:
mm: enforce min addr even if capable() in expand_downwards()
- CVE: https://linux.oracle.com/cve/CVE-2019-9213.html
- Patch: 4.1.12/CVE-2019-9213-mm-enforce-min-addr-even-if-capable-in-expand_downwa-1.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ip: constify ip_build_and_send_pkt() socket argument
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-1-ip-constify-ip_build_and_send_pkt-socket-argument.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
inet: constify ip_dont_fragment() arguments
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-2-inet-constify-ip_dont_fragment-arguments.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: Cache net in ip_build_and_send_pkt and ip_queue_xmit
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-4-ipv4-Cache-net-in-ip_build_and_send_pkt-and-ip_queue.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: tcp: send zero IPID in SYNACK messages
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-5-ipv4-tcp-send-zero-IPID-in-SYNACK-messages.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
- CVE: https://linux.oracle.com/cve/CVE-2020-36557.html
- Patch: 4.1.12/CVE-2020-36557-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtua.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36557, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2020-36557.html
- Patch: 4.1.12/CVE-2020-36557-vt-vt_ioctl-fix-VT_DISALLOCATE-freeing-in-use-virtua-kpatch.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
VT_RESIZEX: get rid of field-by-field copyin
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-VT_RESIZEX-get-rid-of-field-by-field-copyin.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36558, CVSSv2 Score: 5.1
- Description:
vt: vt_ioctl: fix race in VT_RESIZEX
- CVE: https://linux.oracle.com/cve/CVE-2020-36558.html
- Patch: 4.1.12/CVE-2020-36558-vt-vt_ioctl-fix-race-in-VT_RESIZEX.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2021-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://ubuntu.com/security/CVE-2022-33655
- Patch: 4.4.0/CVE-2021-33655-fbcon-Disallow-setting-font-bigger-than-screen-size.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-1011, CVSSv2 Score: 7.8
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1011
- Patch: 4.9.0/CVE-2022-1011-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: 4.9.320
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.9.0/CVE-2022-1011-fuse-fix-pipe-buffer-lifetime-for-direct_io-kpatch.patch
- From: 4.9.320
- CVE-2021-33656, CVSSv2 Score: 7.8
- Description:
vt: drop old FONT ioctls
- CVE: https://linux.oracle.com/cve/CVE-2021-33656.html
- Patch: 4.1.12/CVE-2021-33656-vt-drop-old-FONT-ioctls.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: igmp: guard against silly MTU values
- CVE: https://linux.oracle.com/cve/CVE-2020-36516.html
- Patch: 4.1.12/CVE-2020-36516-3-ipv4-igmp-guard-against-silly-MTU-values-1.patch
- From: 4.1.12-124.66.3.el7uek
- CVE-2022-43750, CVSSv2 Score: 7.8
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: 4.14.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.19.15
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: keep backlog updated with qlen
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0005-sch_sfb-keep-backlog-updated-with-qlen.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Don't assume the skb is still around after enqueueing to child
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0010-sch_sfb-Don-t-assume-the-skb-is-still-around-after-e.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Also store skb len before calling child enqueue
- CVE: https://linux.oracle.com/cve/CVE-2022-3586.html
- Patch: 4.1.12/CVE-2022-3586-0020-sch_sfb-Also-store-skb-len-before-calling-child-enqu.patch
- From: kernel-uek-4.1.12-124.70.1
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Fix forged IP logic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-2663
- Patch: 4.14.0/CVE-2022-2663-netfilter-nf_conntrack_irc-Fix-forged-IP-logic.patch
- From: 4.14.293
- CVE-2022-3594, CVSSv2 Score: 7.5
- Description:
r8152: Rate limit overflow messages
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
- Patch: 4.14.0/CVE-2022-3594-r8152-rate-limit-overflow-messages.patch
- From: 4.14.296-222.539
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
- Patch: 4.14.0/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.19.12
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: oel7-uek4/4.1.12-124.69.5.1.el7uek/CVE-2022-4378.patch
- From: 4.1.12-124.69.5.1.el7uek
- CVE-2022-3629, CVSSv2 Score: 3.3
- Description:
vsock: Fix memory leak in vsock_connect()
- CVE: https://linux.oracle.com/cve/CVE-2022-3629.html
- Patch: 4.1.12/CVE-2022-3629-vsock-fix-memory-leak-in-vsock_connect.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Tighten matching on DCC message
- CVE: https://access.redhat.com/security/cve/CVE-2022-2663
- Patch: 4.19.0/CVE-2022-2663-netfilter-nf_conntrack_irc-tighten-matching-on-DCC-message.patch
- From: 4.19.260-1
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-3565.html
- Patch: 4.1.12/CVE-2022-3565-kpatch.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
- Patch: 4.14.0/CVE-2022-40768-scsi-stex-properly-zero-out-the-passthrough-command-structure.patch
- From: 4.14.296-222.539
- CVE-2019-19377, CVSSv2 Score: 7.8
- Description:
btrfs: Don't submit any btree write bio if the fs has errors
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.1.12/CVE-2019-19377-btrfs-Dont-submit-any-btree-write-bio-if-the-fs-has-errors.patch
- From: 4.1.12-124.69.5.el6uek
- CVE-2021-20292, CVSSv2 Score: 6.7
- Description:
drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-20292
- Patch: debian9/4.9.272-1/CVE-2021-20292-drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch
- From: 4.9.272-1
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
packet: in recvmsg msg_name return at least sizeof sockaddr_ll
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-packet-in-recvmsg-msg_name-return-at-least-sizeof-sockaddr_ll.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-20368, CVSSv2 Score: 7.8
- Description:
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
- CVE: https://ubuntu.com/security/CVE-2022-20368
- Patch: 4.4.0/CVE-2022-20368-net-packet-fix-slab-out-of-bounds-access-in-packet_recvmsg.patch
- From: 4.15.0-192.203~16.04.1
- CVE-2022-3524, CVSSv2 Score: 5.5
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options().
- CVE: https://linux.oracle.com/cve/CVE-2022-3524.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-3524-tcp-udp-fix-memory-leak-in-ipv6-renew-options.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: remove unneeded variable in l2cap_stream_rx
- CVE: https://linux.oracle.com/cve/CVE-2022-3564.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/0001-CVE-2022-3564-Bluetooth-remove-unneeded-variable-in-l2cap_stream_r.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3564, CVSSv2 Score: 7.1
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://linux.oracle.com/cve/CVE-2022-3564.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/0002-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Introduce proper defines for PSM ranges
- CVE: https://linux.oracle.com/cve/CVE-2022-42896.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42896-Bluetooth-L2CAP-Introduce-proper-defines-for-PSM-ran.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://linux.oracle.com/cve/CVE-2022-42896.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42896-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-42895, CVSSv2 Score: 6.5
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://linux.oracle.com/cve/CVE-2022-42895.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitializ.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in
- CVE: https://linux.oracle.com/cve/CVE-2022-3628.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls
- CVE: https://linux.oracle.com/cve/CVE-2022-4662.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-4662.html
- Patch: oel7-uek4/4.1.12-124.71.3.el7uek/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls-kpatch.patch
- From: 4.1.12-124.71.3.el7uek
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-2873-i2c-ismt-Fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-41858, CVSSv2 Score: 7.1S
- Description:
drivers: net: slip: fix NPD bug in sl_tx_timeout()
- CVE: https://access.redhat.com/security/cve/CVE-2022-41858
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-41858-drivers-net-slip-fix-NPD-bug-in-sl_tx_timeout.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2022-45934-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2022-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: oel7-uek4/4.1.12-124.72.2.el7uek/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.1.12-124.72.2.el7uek
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://linux.oracle.com/cve/CVE-2023-0394.html
- Patch: oel6-uek4/4.1.12-124.73.1.el6uek/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_pus.patch
- From: 4.1.12-124.73.1
- CVE-2019-5489, CVSSv2 Score: 5.5
- Description:
mm/mincore.c: make mincore() more conservative
- CVE: https://linux.oracle.com/cve/CVE-2019-5489.html
- Patch: oel6-uek4/4.1.12-124.73.1.el6uek/CVE-2019-5489-mm-mincore.c-make-mincore-more-conservative.patch
- From: 4.1.12-124.73.1
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://linux.oracle.com/cve/CVE-2023-1073.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1073-HID-check-empty-report_list-in-hid_validate_values.patch
- From: 4.1.12-124.73.2
- CVE-2023-1095, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: fix null deref due to zeroed list head
- CVE: https://linux.oracle.com/cve/CVE-2023-1095.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1095-netfilter-nf_tables-fix-null-deref-due-to-zeroed-lis.patch
- From: 4.1.12-124.73.2
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://linux.oracle.com/cve/CVE-2023-1074.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-a-gi.patch
- From: 4.1.12-124.73.2
- CVE-2020-0404, CVSSv2 Score: 5.5
- Description:
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
- CVE: https://linux.oracle.com/cve/CVE-2020-0404.html
- Patch: oel6-uek4/4.1.12-124.73.2.el6uek/CVE-2020-0404-media-uvcvideo-Avoid-cyclic-entity-chains-due-to-mal.patch
- From: 4.1.12-124.73.2
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://linux.oracle.com/cve/CVE-2023-0458.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-0458-array_index_nospec-Sanitize-speculative-array-de-references.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-0458, CVSSv2 Score: 5.3
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://linux.oracle.com/cve/CVE-2023-0458.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-0458-patch-prlimit-do-prlimit-needs-to-have-a-speculation-check.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-2248, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://linux.oracle.com/cve/CVE-2023-2248.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-2248-patch-net-sched-sch-qfq-prevent-slab-out-of-bounds-in.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-1670, CVSSv2 Score: 7.8
- Description:
xirc2ps_cs: Fix use after free bug in xirc2ps_detach
- CVE: https://linux.oracle.com/cve/CVE-2023-1670.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-1670-patch-xirc2ps-cs-fix-use-after-free-bug-in-xirc2ps-detach.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://linux.oracle.com/cve/CVE-2023-23454.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-23454-patch-net-sched-cbq-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-28328, CVSSv2 Score: 5.5
- Description:
media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()
- CVE: https://linux.oracle.com/cve/CVE-2023-28328.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-28328-patch-media-dvb-usb-az6027-fix-null-ptr-deref-in.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
- CVE: https://linux.oracle.com/cve/CVE-2023-2162.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2022-3169, CVSSv2 Score: 5.5
- Description:
nvme: restrict management ioctls to admin
- CVE: https://linux.oracle.com/cve/CVE-2022-3169.html
- Patch: oel7-uek4/4.1.12-124.75.3.el7uek/CVE-2022-3169-patch-nvme-restrict-management-ioctls-to-admin.patch
- From: 4.1.12-124.75.3.el7uek
- CVE-2022-4095, CVSSv2 Score: 7.8
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://linux.oracle.com/cve/CVE-2022-4095.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2022-4095-staging-rtl8712-rtl8712_cmd.c-fixed-comparison-to-null.patch
- From: 4.1.12-124.74.2
- CVE-2022-4095, CVSSv2 Score: 7.8
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://linux.oracle.com/cve/CVE-2022-4095.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2022-4095-staging-rtl8712-fix-use-after-free-bugs.patch
- From: 4.1.12-124.74.2
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it to userspace
- CVE: https://linux.oracle.com/cve/CVE-2023-1513.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-1513-kvm-initialize-all-of-the-kvm_debugregs-structure-before-sending-it-to-userspace.patch
- From: 4.1.12-124.74.2
- CVE-2023-23559, CVSSv2 Score: 7.8
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://linux.oracle.com/cve/CVE-2023-23559.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_query_oid.patch
- From: 4.1.12-124.74.2
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://linux.oracle.com/cve/CVE-2023-26545.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 4.1.12-124.74.2
- CVE-2023-28772, CVSSv2 Score: 6.7
- Description:
seq_buf: Fix overflow in seq_buf_putmem_hex()
- CVE: https://linux.oracle.com/cve/CVE-2023-28772.html
- Patch: oel6-uek4/4.1.12-124.74.2.el6uek/CVE-2023-28772-seq_buf-Fix-overflow-in-seq_buf_putmem_hex.patch
- From: 4.1.12-124.74.2
- CVE-2023-34256, CVSSv2 Score: 5.5
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://linux.oracle.com/cve/CVE-2023-34256.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-34256-ext4-avoid-a-potential-slab-out-of-bounds-in-ext4_group_desc_csum.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2022-1679, CVSSv2 Score: 7.8
- Description:
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://linux.oracle.com/cve/CVE-2022-1679.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2022-1679-ath9k-fix-use-after-free-in-ath9k_hif_usb_rx_cb.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2022-20141, CVSSv2 Score: 7.0
- Description:
igmp: Add ip_mc_list lock in ip_check_mc_rcu
- CVE: https://linux.oracle.com/cve/CVE-2022-20141.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2022-20141-igmp-Add-ip_mc_list-lock-in-ip_check_mc_rcu.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://linux.oracle.com/cve/CVE-2023-1118.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-1118-media-rc-Fix-use-after-free-bugs-caused-by-ene_tx_irqsim.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-2269, CVSSv2 Score: 4.4
- Description:
fix nested locking in table_clear() to remove deadlock concern
- CVE: https://linux.oracle.com/cve/CVE-2023-2269.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove-deadlock-concern.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-3159, CVSSv2 Score: 6.7
- Description:
firewire: fix potential uaf in outbound_phy_packet_callback()
- CVE: https://linux.oracle.com/cve/CVE-2023-3159.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2023-3159-firewire-fix-potential-uaf-in-outbound_phy_packet_callback.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2022-3424, CVSSv2 Score: 7.8
- Description:
misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os
- CVE: https://linux.oracle.com/cve/CVE-2022-3424.html
- Patch: oel6-uek4/4.1.12-124.76.2.el6uek/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_context_option-gru_fault-and-gru_handle_user_call_os.patch
- From: 4.1.12-124.76.2.el7uek
- CVE-2023-22024, CVSSv2 Score: 5.5
- Description:
rds: Fix lack of reentrancy for connection reset with dst addr zero
- CVE: https://linux.oracle.com/cve/CVE-2023-22024.html
- Patch: oel7-uek4/4.1.12-124.78.4.1.el7uek/CVE-2023-22024-rds-Fix-lack-of-reentrancy-for-connection-reset-with-dst-addr-zero.patch
- From: 4.1.12-124.78.4.1.el7uek
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://linux.oracle.com/cve/CVE-2023-3090.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-3090-ipvlan-Fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-1380, CVSSv2 Score: 7.1
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://linux.oracle.com/cve/CVE-2023-1380.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-1380-wifi-brcmfmac-slab-out-of-bounds-read-in-brcmf_get_assoc_ies.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-35824, CVSSv2 Score: 6.4
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2023-35824.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove-due-to-race-condition.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-3141, CVSSv2 Score: 6.4
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2023-3141.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race-condition.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://linux.oracle.com/cve/CVE-2023-3161.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-3161-fbcon-Check-font-dimension-limits.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb_frontend: fix locking issues at dvb_frontend_get_event()
- CVE: https://linux.oracle.com/cve/CVE-2023-31084.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-31084-media-dvb_frontend-fix-locking-issues-at-dvb_frontend_get_event.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://linux.oracle.com/cve/CVE-2023-31084.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2023-31084-media-dvb-core-Fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2022-41218, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://linux.oracle.com/cve/CVE-2022-41218.html
- Patch: oel7-uek4/4.1.12-124.77.2.el7uek/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 4.1.12-124.77.2.el7uek
- CVE-2023-4206, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
- CVE: https://linux.oracle.com/cve/CVE-2023-4206.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-4206-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://linux.oracle.com/cve/CVE-2023-3611.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-3772, CVSSv2 Score: 5.5
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://linux.oracle.com/cve/CVE-2023-3772.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-3772-patch-xfrm-add-null-check-in-xfrm-update-ae-params.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-4459, CVSSv2 Score: 6.5
- Description:
net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()
- CVE: https://linux.oracle.com/cve/CVE-2023-4459.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-4459-patch-net-vmxnet3-fix-possible-null-pointer-dereference-in.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-4387, CVSSv2 Score: 7.1
- Description:
net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()
- CVE: https://linux.oracle.com/cve/CVE-2023-4387.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-4387-patch-net-vmxnet3-fix-possible-use-after-free-bugs-in.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-3776, CVSSv2 Score: 7
- Description:
net/sched: cls_fw: Fix improper refcount update leads to use-after-free
- CVE: https://linux.oracle.com/cve/CVE-2023-3776.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://linux.oracle.com/cve/CVE-2023-35001.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-35001-patch-netfilter-nf-tables-prevent-oob-access-in.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: fix use-after-free in ext4_xattr_set_entry
- CVE: https://linux.oracle.com/cve/CVE-2023-2513.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-2513-patch-ext4-fix-use-after-free-in-ext4-xattr-set-entry.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2023-2513, CVSSv2 Score: 6.7
- Description:
ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h
- CVE: https://linux.oracle.com/cve/CVE-2023-2513.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2023-2513-patch-ext4-add-ext4-inode-has-xattr-space-macro-in-xattr-h.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://linux.oracle.com/cve/CVE-2022-34918.html
- Patch: oel7-uek4/4.1.12-124.79.2.el7uek/CVE-2022-34918-patch-netfilter-nf-tables-stricter-validation-of-element-data.patch
- From: 4.1.12-124.79.2.el7uek
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel6-uek4/4.1.12-124.84.2.el6uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters.patch
- From: 4.1.12-124.84.2.el6uek
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://linux.oracle.com/cve/CVE-2023-45863.html
- Patch: oel6-uek4/4.1.12-124.84.2.el6uek/CVE-2023-45863-kobject-Fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 4.1.12-124.84.2.el6uek
- CVE-2023-39194, CVSSv2 Score: 3.2
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://linux.oracle.com/cve/CVE-2023-39194.html
- Patch: oel6-uek4/4.1.12-124.84.2.el6uek/CVE-2023-39194-net-xfrm-Fix-xfrm_address_filter-OOB-read.patch
- From: 4.1.12-124.84.2.el6uek
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: validate registers coming from userspace
- CVE: https://linux.oracle.com/cve/CVE-2022-1015.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2022-1015-netfilter-nf_tables-validate-registers-coming-from-userspace.patch
- From: 4.1.12-124.78.2
- CVE-2022-1015, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: validate registers coming from userspace
- CVE: https://linux.oracle.com/cve/CVE-2022-1015.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2022-1015-netfilter-nf_tables-validate-registers-coming-from-userspace-kpatch.patch
- From: 4.1.12-124.78.2
- CVE-2023-3567, CVSSv2 Score: 6.6
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://linux.oracle.com/cve/CVE-2023-3567.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs_read-to-avoid-UAF.patch
- From: 4.1.12-124.78.2
- CVE-2023-3106, CVSSv2 Score: 7.8
- Description:
xfrm: fix crash in XFRM_MSG_GETSA netlink handler
- CVE: https://linux.oracle.com/cve/CVE-2023-3106.html
- Patch: oel7-uek4/4.1.12-124.78.2.el7uek/CVE-2023-3106-xfrm-fix-crash-in-XFRM_MSG_GETSA-netlink-handler.patch
- From: 4.1.12-124.78.2
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.1.12/x86-kvm-vmx_vcpu_run-wrapper.patch
- From: N/A