- kernel-uek-4.14.35-1902.300.11.el7uek (oel7-uek5)
- 4.14.35-2047.532.3.1.el7uek
- 2024-01-12 04:03:04
- 2024-01-16 09:04:06
- K20240112_01
- CVE-2019-18809, CVSSv2 Score: 8.5
- Description:
media: usb: fix memory leak in af9005_identify_state
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-18809
- Patch: 4.9.0/CVE-2019-18809.patch
- From: 4.9.210-1
- CVE-2018-5953 CVE-2018-5995 CVE-2018-7754 CVE-2018-7273 CVE-2018-20449, CVSSv2 Score: 5.5
- Description:
add function ptr_to_id() in order not to leak kernel layout info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-7754
- Patch: 4.14.0/lib-vsprintf-printk-hash-addresses-printed-with.patch
- From: 4.15
- CVE-2019-18806, CVSSv2 Score: 5.5
- Description:
net: qlogic: Fix memory leak in ql_alloc_large_buffers
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-18806
- Patch: 4.9.0/CVE-2019-18806.patch
- From: 4.9.210-1
- CVE-2020-10942, CVSSv2 Score: 5.5
- Description:
vhost: Check docket sk_family instead of call getname
- CVE: https://linux.oracle.com/cve/CVE-2020-10942.html
- Patch: 4.1.12/cve-2020-10942-vhost-check-docket-sk_family.patch
- From: kernel-uek-4.1.12-124.38.1
- CVE-2019-14814 CVE-2019-14815 CVE-2019-14816, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix three heap overflow at parsing element in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14814
- Patch: 4.19.0/CVE-2019-14814-14815-14816.patch
- From: 4.19.98-1
- CVE-2020-8648, CVSSv2 Score: 7.1
- Description:
vt: selection, close sel_buffer race
- CVE: https://access.redhat.com/security/cve/cve-2020-8648
- Patch: 4.14.0/CVE-2020-8648-amazon.patch
- From: 4.14.173-137.228.amzn2
- CVE-2020-9383, CVSSv2 Score: 7.1
- Description:
floppy: check FDC index for errors before assigning it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9383
- Patch: ubuntu-xenial/4.4.0-178.208/CVE-2020-9383-floppy-check-FDC-index-for-errors-before-assigning-i.patch
- From: 4.4.0-178.208
- CVE-2019-19965, CVSSv2 Score: 4.7
- Description:
scsi: libsas: stop discovering if oob mode is disconnected
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19965
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19965-scsi-libsas-stop-discovering-if-oob-mode-is-disconne.patch
- From: 4.15.0-88.88
- CVE-2013-1798, CVSSv2 Score: 5.9
- Description:
kernel: kvm: out-of-bounds access in ioapic indirect register reads
- CVE: https://access.redhat.com/security/cve/CVE-2013-1798
- Patch: 4.14.0/CVE-2013-1798.patch
- From: 4.14.35-1902.302.2
- CVE-2019-19532, CVSSv2 Score: 6.8
- Description:
HID: Fix assumption that devices have inputs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19532
- Patch: 5.0.0/CVE-2019-19532-HID-Fix-assumption-that-devices-have-inputs.patch
- From: 5.0.0-1028.30~18.04.1
- CVE-2019-20096, CVSSv2 Score: 3.3
- Description:
dccp: Fix memleak in __feat_register_sp
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-20096
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-20096-dccp-Fix-memleak-in-__feat_register_sp.patch
- From: 4.15.0-88.88
- CVE-2020-11494, CVSSv2 Score: 4.4
- Description:
slcan: Don't transmit uninitialized stack data in padding
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11494
- Patch: 4.1.12/CVE-2020-11494.patch
- From: 4.1.12-124.38.2
- CVE-2020-8649 CVE-2020-8647, CVSSv2 Score: 5.9
- Description:
vgacon: Fix a UAF in vgacon_invert_region
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8649.html
- Patch: 4.1.12/CVE-2020-8649.patch
- From: 4.1.12-124.38.4
- CVE-2019-19462, CVSSv2 Score: 5.5
- Description:
include/linux/relay.h: fix percpu annotation in struct rchan
- CVE: https://access.redhat.com/security/cve/CVE-2019-19462
- Patch: 4.14.0/CVE-2019-19462.patch
- From: 4.14.35-1902.302.2
- CVE-2018-19854, CVSSv2 Score: 3.3
- Description:
crypto: user - fix leaking uninitialized memory to userspace
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19854.html
- Patch: 4.15.0/cve-2018-19854-crypto-fix-leaking-uninitialized-memory-to-user-space.patch
- From: >= kernel-4.15.0-43.46
- CVE-2019-19527, CVSSv2 Score: 4.6
- Description:
HID: hiddev: avoid opening a disconnected device
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19527
- Patch: 4.19.0/CVE-2019-19527.patch
- From: 4.19.98-1
- CVE-2019-19768, CVSSv2 Score: 6.7
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://access.redhat.com/security/cve/CVE-2019-19678
- Patch: 4.14.0/CVE-2019-19768.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-19768, CVSSv2 Score: 6.7
- Description:
blktrace: Protect q->blk_trace with RCU
- CVE: https://access.redhat.com/security/cve/CVE-2019-19678
- Patch: 4.14.0/CVE-2019-19768-2.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-18282, CVSSv2 Score: 5.3
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-18282
- Patch: 4.14.0/CVE-2019-18282.patch
- From: 4.14.35-1902.303.4.1
- CVE-2019-18282, CVSSv2 Score: 5.3
- Description:
net/flow_dissector: switch to siphash
- CVE: https://access.redhat.com/security/cve/cve-2019-18282
- Patch: 4.14.0/CVE-2019-18282-kpatch.patch
- From: 4.14.35-1902.303.4.1
- CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
[wireless] brcmfmac: add subtype check for event handling in data path
- CVE: https://access.redhat.com/security/cve/cve-2019-9503
- Patch: 4.18.0/0171-wireless-brcmfmac-add-subtype-check-for-event-handli.patch
- From: 4.18.0-80.7.2.el8_0
- CVE-2019-19057, CVSSv2 Score: 3.3
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19057
- Patch: 4.9.0/CVE-2019-19057.patch
- From: 4.9.210-1
- CVE-2020-11609, CVSSv2 Score: 4.3
- Description:
media: stv06xx: add missing descriptor sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11609
- Patch: 4.19.0/CVE-2020-11609-media-stv06xx-add-missing-descriptor-sanity-checks.patch
- From: 4.19.118-2
- CVE-2020-11668, CVSSv2 Score: 7.1
- Description:
media: xirlink_cit: add missing descriptor sanity checks
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-11668
- Patch: 4.19.0/CVE-2020-11668-media-xirlink_cit-add-missing-descriptor-sanity-chec.patch
- From: 4.19.118-2
- CVE-2019-9500, CVSSv2 Score: 6.5
- Description:
brcmfmac: assure SSID length from firmware is limited
- CVE: https://access.redhat.com/security/cve/cve-2019-9500
- Patch: 4.15.0/CVE-2019-9500-brcmfmac-assure-SSID-length-from-firmware-is-limited.patch
- From: 4.15.0-49.52
- CVE-2019-12819, CVSSv2 Score: 5.5
- Description:
fix use-after-free in drivers/net/phy/mdio_bus.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12819.html
- Patch: 4.15.0/CVE-2019-12819.patch
- From: 4.15.0-58.64
- CVE-2019-14896 CVE-2019-14897, CVSSv2 Score: 9.8
- Description:
Heap Overflow in add_ie_rates() function of Marvell Wifi Driver in Linux kernel
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-14897
- Patch: 5.0.0/cve-2019-14896-14897-various-issues-in-marvell-libertas-driver.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19045, CVSSv2 Score: 7.5
- Description:
net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19045
- Patch: 5.0.0/cve-2019-19045-mlx5-prevent-memory-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19056, CVSSv2 Score: 7.5
- Description:
mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19056
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19056-mwifiex-pcie-Fix-memory-leak-in-mwifiex_pcie_alloc_c.patch
- From: 4.15.0-91.92
- CVE-2019-19525, CVSSv2 Score: 4.6
- Description:
ieee802154: atusb: fix use-after-free at disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19524
- Patch: 4.9.0/CVE-2019-19525.patch
- From: 4.9.210-1
- CVE-2019-19537, CVSSv2 Score: 4.2
- Description:
USB: core: Fix races in character device registration and deregistraion
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 4.9.0/CVE-2019-19537.patch
- From: 4.9.210-1
- CVE-2019-19767, CVSSv2 Score: 5.5
- Description:
ext4: fix use-after-free race with debug_want_extra_isize
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19767
- Patch: 4.14.0/CVE-2019-19767.patch
- From: 4.14.35-1902.303.4.1
- CVE-2019-20636, CVSSv2 Score: 6.7
- Description:
Input: add safety guards to input_set_keycode()
- CVE: https://access.redhat.com/security/cve/cve-2019-20636
- Patch: 4.1.12/CVE-2019-20636.patch
- From: 4.1.12-124.39.5
- CVE-2020-12768, CVSSv2 Score: 1.9
- Description:
KVM: SVM: Fix potential memory leak in svm_cpu_init()
- CVE: https://access.redhat.com/security/cve/cve-2020-12768
- Patch: 4.14.0/CVE-2020-12768.patch
- From: 4.14.35-1902.303.4.1
- CVE-2019-11599, CVSSv2 Score: 6.9
- Description:
coredump: fix race condition between
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-11599.html
- Patch: 4.14.0/CVE-2019-11599.patch
- From: 5.0.0-23.24~18.04.1
- CVE-2019-11599, CVSSv2 Score: 7.0
- Description:
coredump: fix race condition between mmget_not_zero()/get_task_mm()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2019-11599
- Patch: 4.14.0/CVE-2019-11599-kpatch.patch
- From: N/A
- CVE-2019-15505, CVSSv2 Score: 9.8
- Description:
media: technisat-usb2: break out of loop at end of buffer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15505
- Patch: 4.15.0/CVE-2019-15505-media-technisat-usb2-break-out-of-loop-at-end-of-b.patch
- From: 4.15.0-66.75
- CVE-2019-19058, CVSSv2 Score: 7.5
- Description:
iwlwifi: dbg_ini: fix memory leak in alloc_sgtable
- CVE: https://access.redhat.com/security/cve/cve-2019-19058
- Patch: 4.19.0/CVE-2019-19058.patch
- From: 4.19.98-1
- CVE-2020-0543, CVSSv2 Score: 6.5
- Description:
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
- CVE: https://www.vusec.net/projects/crosstalk/
- Patch: srbds-enable.patch
- From: N/A
- CVE-2019-19534, CVSSv2 Score: 4.6
- Description:
can: peak_usb: fix slab info leak
- CVE: https://access.redhat.com/security/cve/CVE-2019-19534
- Patch: 4.18.0/cve-2019-19534-can-peak_usb-fix-slab-info-leak.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-19533, CVSSv2 Score: 2.4
- Description:
media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19533
- Patch: 3.16.0/cve-2019-19533-media-ttusb_dec-fix-info-leak.patch
- From: 3.16.81-1
- CVE-2020-10690, CVSSv2 Score:
- Description:
Incorrect version of patch were initially used. Work on correct fix is in progress.
- CVE:
- Patch: skipped/CVE-2020-10690.patch
- From:
- CVE-2020-10711, CVSSv2 Score: 5.9
- Description:
netlabel: fixed possible NULL pointer dereference issue while importing some category bitmap into SELinux
- CVE: https://access.redhat.com/security/cve/cve-2020-10711
- Patch: 4.14.0/CVE-2020-10711.patch
- From: 4.14.177-139.254.amzn2
- CVE-2019-3846, CVSSv2 Score: 8.8
- Description:
fixed possible memory corruption in mwifiex kernel module
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3846.html
- Patch: 4.15.0/CVE-2019-3846.patch
- From: 4.15.0-58.64
- CVE-2019-19536, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19536
- Patch: 3.16.0/cve-2019-19536-peak_usb-fix-info-leaks.patch
- From: 3.16.81-1
- CVE-2019-15214, CVSSv2 Score: 6.1
- Description:
ALSA: info: Fix racy addition/deletion of nodes
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15214
- Patch: 4.15.0/CVE-2019-15214-ALSA-info-Fix-racy-addition-deletion-of-nodes.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15214, CVSSv2 Score: 6.1
- Description:
ALSA: core: Fix card races between register and disconnect
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15214
- Patch: 4.15.0/CVE-2019-15214-ALSA-core-Fix-card-races-between-register-and-disconnect.patch
- From: kernel-4.15.0-60.67
- CVE-2019-15220, CVSSv2 Score: 4.6
- Description:
p54usb: Fix race between disconnect and firmware loading
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15220
- Patch: 4.15.0/CVE-2019-15220-p54usb-Fix-race-between-disconnect-and-firmware-loading.patch
- From: kernel-4.15.0-60.67
- CVE-2020-12464, CVSSv2 Score: 6.7
- Description:
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12464.html
- Patch: 4.15.0/744274-USB-core-Fix-free-while-in-use-bug-in-the-USB-S-Gl.patch
- From: 4.15.0-102.103
- CVE-2019-19054, CVSSv2 Score: 4.7
- Description:
media: rc: prevent memory leak in cx23888_ir_probe
- CVE: https://access.redhat.com/security/cve/CVE-2019-19054
- Patch: 4.14.0/cve-2019-19054-media-rc-prevent-memory-leak.patch
- From: 4.14.35-1902.304.6
- CVE-2020-12652, CVSSv2 Score: 4.1
- Description:
scsi: mptfusion: Fix double fetch bug in ioctl
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12652
- Patch: 4.9.0/cve-2020-12652-scsi-mpfusion-fix-double-fetch-bug.patch
- From: 4.9.210-1+deb9u1
- CVE-2020-12655, CVSSv2 Score: 5.5
- Description:
xfs: add agf freeblocks verify in xfs_agf_verify
- CVE: https://access.redhat.com/security/cve/CVE-2020-12655
- Patch: 4.14.0/cve-2020-12655-xfs-add-agf-freeblocks-verify.patch
- From: 4.14.35-1902.304.6
- CVE-2020-10757, CVSSv2 Score: 6.1
- Description:
mm: Fix mremap not considering huge pmd devmap
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10757
- Patch: 4.19.0/CVE-2020-10757-mm-Fix-mremap-not-considering-huge-pmd-devmap.patch
- From: 4.19.118-2+deb10u1
- CVE-2020-12653, CVSSv2 Score: 7.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12653
- Patch: 4.19.0/CVE-2020-12653-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_cmd.patch
- From: 4.19.118-2
- CVE-2020-12654, CVSSv2 Score: 9.8
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-12654
- Patch: 4.19.0/CVE-2020-12654-mwifiex-Fix-possible-buffer-overflows-in-mwifiex_ret.patch
- From: 4.19.118-2
- CVE-2020-12770, CVSSv2 Score: 6.7
- Description:
scsi: sg: add sg_remove_request in sg_write
- CVE: https://access.redhat.com/security/cve/CVE-2020-12770
- Patch: 4.14.0/CVE-2020-12770.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2020-12657, CVSSv2 Score: 7.8
- Description:
block, bfq: fix use-after-free in bfq_idle_slice_timer_body
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12657.html
- Patch: ubuntu-bionic/4.15.0-101.102/cve-2020-12657-bfq-fix-use-after-free.patch
- From: 4.15.0-101.102
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/bpf-prevent-memory-disambiguation-attack-uek.patch
- From: N/A
- CVE-2019-7308, CVSSv2 Score: 7.5
- Description:
bpf: Prevent memory disambiguation attack
- CVE: https://alas.aws.amazon.com/AL2/ALAS-2019-1201.html
- Patch: 4.14.0/CVE-2019-7308-uek.patch
- From: kernel-4.14.114-103.97.amzn2
- CVE-2020-10766, CVSSv2 Score: 5.5
- Description:
x86/speculation: Prevent rogue cross-process SSBD shutdown
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10766
- Patch: 4.14.0/725265-x86-speculation-Prevent-rogue-cross-process-SSBD-s-uek.patch
- From: v4.14.185
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10767
- Patch: 4.14.0/725286-x86-speculation-Avoid-force-disabling-IBPB-based-o-uek.patch
- From: v4.14.185
- CVE-2020-10768, CVSSv2 Score: 5.5
- Description:
x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10768
- Patch: 4.14.0/725287-x86-speculation-PR_SPEC_FORCE_DISABLE-enforcement--uek.patch
- From: v4.14.185
- CVE-2020-10767, CVSSv2 Score: 5.5
- Description:
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS. (kpatch adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-10767
- Patch: 4.14.0/725286-x86-speculation-Avoid-force-disabling-IBPB-based-o-uek-kpatch-1.patch
- From: v4.14.185
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: spectre_v2.patch
- From: N/A
- CVE-2019-19049, CVSSv2 Score: 7.5
- Description:
of: unittest: fix memory leak in attach_node_and_children
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19049
- Patch: 4.9.0/CVE-2019-19049.patch
- From: 4.9.210-1
- CVE-2019-16234, CVSSv2 Score: 7.5
- Description:
iwlwifi: pcie: fix rb_allocator workqueue allocation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16234
- Patch: 4.15.0/CVE-2019-16234-iwlwifi-pcie-fix-rb_allocator-workqueue-allocation.patch
- From: 4.15.0-97.98
- CVE-2019-19447, CVSSv2 Score: 7.8
- Description:
ext4: work around deleting a file with i_nlink == 0 safely
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19447
- Patch: 4.19.0/CVE-2019-19447.patch
- From: 4.9.210-1
- CVE-2020-10732, CVSSv2 Score: N/A
- Description:
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-10732
- Patch: 4.19.0/CVE-2020-10732-fs-binfmt_elf.c-allocate-initialized-memory-in-fill_.patch
- From: 4.19.118-2+deb10u1
- CVE-2019-16232, CVSSv2 Score: 7.5
- Description:
libertas: fix a potential NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16232
- Patch: 5.3.0/CVE-2019-16232-libertas-fix-a-potential-NULL-pointer-dereference.patch
- From: 5.3.0-40.32~18.04.1
- CVE-2019-19037, CVSSv2 Score: 5.5
- Description:
ext4: fix ext4_empty_dir() for directories with holes
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19037
- Patch: 4.9.0/CVE-2019-19037-alt-4.9.patch
- From: 4.9.212-36.el7
- CVE-2019-19062, CVSSv2 Score: 7.5
- Description:
crypto: user - fix memory leak in crypto_report
- CVE: https://access.redhat.com/security/cve/CVE-2019-19062
- Patch: 4.14.0/CVE-2019-19062.patch
- From: 4.14.165-131.185.amzn2 4.14.165-102.185.amzn1
- CVE-2019-20811, CVSSv2 Score: 5.5
- Description:
net-sysfs: call dev_hold if kobject_init_and_add success
- CVE: https://access.redhat.com/security/cve/CVE-2019-20811
- Patch: 4.14.0/cve-2019-20811-call-dev_hold-if-kobject_init_and_add-success.patch
- From: 4.14.35-1902.305.0
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.14.0/cve-2020-12888.patch
- From: 4.14.35-1902.305.0
- CVE-2020-12888, CVSSv2 Score: 5.3
- Description:
vfio: access to disabled MMIO space of some devices may lead to DoS scenario
- CVE: https://access.redhat.com/security/cve/cve-2020-12888
- Patch: 4.14.0/cve-2020-12888-kpatch-1.patch
- From: 4.14.35-1902.305.0
- CVE-2019-19535, CVSSv2 Score: 4.6
- Description:
can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-19537
- Patch: 4.9.0/CVE-2019-19535.patch
- From: 4.9.210-1
- CVE-2019-17133, CVSSv2 Score: 9.8
- Description:
fixed buffer overflow in cfg80211_mgd_wext_giwessid() in net/wireless/wext-sme.c which does not reject a long SSID IE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-17133.html
- Patch: 4.15.0/CVE-2019-17133.patch
- From: kernel-4.15.0-72.81
- CVE-2020-12771, CVSSv2 Score: 5.1
- Description:
bcache: fix potential deadlock problem in btree_gc_coalesce
- CVE: https://access.redhat.com/security/cve/CVE-2020-12771
- Patch: 4.14.0/cve-2020-12771-bcache-fix-potential-deadlock.patch
- From: 4.14.186-110.268.amzn1
- CVE-2019-15218, CVSSv2 Score: 4.3
- Description:
media: usb: siano: Fix general protection fault in smsusb
- CVE: http://people.canonical.com/~ubuntu-security/cve/CVE-2019-15218
- Patch: 4.15.0/CVE-2019-15218-media-usb-siano-Fix-general-protection-fault-in-smsusb.patch
- From: kernel-4.15.0-60.67
- CVE-2019-19052, CVSSv2 Score: 7.5
- Description:
can: gs_usb: gs_can_open(): prevent memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19052
- Patch: 5.0.0/cve-2019-19052-can-gs_can_open-revent-memory-leak.patch
- From: linux-5.3.0-26.28~18.04.1
- CVE-2019-19063, CVSSv2 Score: 7.5
- Description:
rtlwifi: prevent memory leak in rtl_usb_probe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19063
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19063-rtlwifi-prevent-memory-leak-in-rtl_usb_probe.patch
- From: 4.15.0-88.88
- CVE-2019-19078, CVSSv2 Score: 7.5
- Description:
ath10k: fix memory leak
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19078
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-19078-ath10k-fix-memory-leak.patch
- From: 4.15.0-88.88
- CVE-2019-19066, CVSSv2 Score: 7.5
- Description:
scsi: bfa: release allocated memory in case of error
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19066
- Patch: ubuntu-bionic/4.15.0-91.92/CVE-2019-19066-scsi-bfa-release-allocated-memory-in-case-of-error.patch
- From: 4.15.0-91.92
- CVE-2019-5108, CVSSv2 Score: 6.5
- Description:
mac80211: fix station inactive_time shortly after boot
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-5108
- Patch: ubuntu-bionic/4.15.0-88.88/CVE-2019-5108-mac80211-fix-station-inactive_time-shortly-after-boo.patch
- From: 4.15.0-88.88
- CVE-2019-20812, CVSSv2 Score: 4.4
- Description:
af_packet: set defaule value for tmo
- CVE: https://linux.oracle.com/cve/CVE-2019-20812.html
- Patch: 4.14.0/cve-2019-20812-af_packet-set-default-value-for-tmo.patch
- From: 4.14.35-1902.306.2
- CVE-2019-19074, CVSSv2 Score: 7.5
- Description:
ath9k: release allocated buffer if timed out
- CVE: https://access.redhat.com/security/cve/CVE-2019-19074
- Patch: 4.18.0/cve-2019-19074-aht9k-release-allocated-buffer-if-timedout.patch
- From: kernel-4.18.0-193.el8
- CVE-2019-16746, CVSSv2 Score: 9.8
- Description:
nl80211: fixed buffer overflow when handling beacon settings
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16746.html
- Patch: 4.9.0/CVE-2019-16746.patch
- From: 4.4.0-168.197
- CVE-2020-12114, CVSSv2 Score: 4.7
- Description:
propagate_one(): mnt_set_mountpoint() needs mount_lock
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-12114.html
- Patch: 4.15.0/744338-propagate_one-mnt_set_mountpoint-needs-mount_lock.patch
- From: 4.15.0-102.103
- CVE-2019-14898, CVSSv2 Score: 7.0
- Description:
fixed incomplete patch for CVE-2019-11599
- CVE: https://linux.oracle.com/cve/CVE-2019-14898.html
- Patch: 4.14.0/cve-2019-14898-fs-userfaultfd_release-always-remove-uffd-flags-and.patch
- From: 4.14.35-1902.306.2
- CVE-2020-10751, CVSSv2 Score: 6.1
- Description:
selinux: properly handle multiple messages in selinux_netlink_send()
- CVE: https://access.redhat.com/security/cve/CVE-2020-10751
- Patch: 4.14.0/CVE-2020-10751.patch
- From: kernel-4.14.181-140.257.amzn2
- CVE-2019-19073, CVSSv2 Score: 4.0
- Description:
ath9k_htc: release allocated buffer if timed out
- CVE: https://access.redhat.com/security/cve/CVE-2019-19073
- Patch: 4.18.0/cve-2019-19073-aht9k_htc-release-allocated-buffer-if-timedout.patch
- From: kernel-4.18.0-193.el8
- CVE-2020-10769, CVSSv2 Score: 5.5
- Description:
crypto: authenc - fix parsing key with misaligned rta_len
- CVE: https://linux.oracle.com/cve/CVE-2020-10769.html
- Patch: 4.14.0/cve-2020-10769-crypto-authenc-fix-parsing-key-with-misaligned-rta_len.patch
- From: 4.14.35-1902.306.2
- CVE-2018-16884, CVSSv2 Score: 8.0
- Description:
sunrpc: use-after-free in svc_process_common()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-16884
- Patch: 4.14.0/CVE-2018-16884.patch
- From: kernel-4.14.94
- CVE-2019-10638 CVE-2019-10639, CVSSv2 Score: 3.7
- Description:
inet: switch IP ID generator to siphash (kpatch adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2019-10638.html
- Patch: 4.14.0/cve-2019-10638-net-switch-IP-ID-generator-to-siphash.patch
- From: 4.14.35-1902.306.2
- CVE-2019-10638 CVE-2019-10639, CVSSv2 Score: 3.7
- Description:
inet: switch IP ID generator to siphash (kpatch adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2019-10638.html
- Patch: 4.14.0/cve-2019-10638-inet-switch-IP-ID-generator-to-siphash-kpatch.patch
- From: 4.14.35-1902.306.2
- CVE-2019-3900, CVSSv2 Score: 6.3
- Description:
vhost_net: fix possible infinite loop
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-3900
- Patch: 4.9.0/cve-2019-3900-vhost-net-rx-infinite-loop.patch
- From: linux-4.9.168-1
- CVE-2019-17075, CVSSv2 Score: 7.5
- Description:
RDMA/cxgb4: Do not dma memory off of the stack
- CVE: https://security-tracker.debian.org/tracker/CVE-2019-17075
- Patch: 4.9.0/CVE-2019-17075.patch
- From: 4.9.210-1
- CVE-2019-18885, CVSSv2 Score: 5.5
- Description:
btrfs: refactor btrfs_find_device() take fs_devices as argument
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: 4.14.0/CVE-2019-18885-btrfs-refactor-btrfs_find_device-take-fs_devices-as-.patch
- From: 4.14.35-2025.400.9
- CVE-2019-18885, CVSSv2 Score: 5.5
- Description:
btrfs: merge btrfs_find_device and find_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18885
- Patch: 4.14.0/CVE-2019-18885-btrfs-merge-btrfs_find_device-and-find_device.patch
- From: 4.14.35-2025.400.9
- CVE-2020-24394, CVSSv2 Score: 7.1
- Description:
nfsd: apply umask on fs without ACL support
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-24394
- Patch: 4.14.0/CVE-2020-24394-nfsd-apply-umask-on-fs-without-ACL-support.patch
- From: 4.14.35-2025.400.9
- CVE-2020-10781, CVSSv2 Score: 5.5
- Description:
Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-10781
- Patch: 4.14.0/CVE-2020-10781.patch
- From: 4.14.35-2025.400.9
- CVE-2020-10781, CVSSv2 Score: 5.5
- Description:
Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-10781
- Patch: 4.14.0/CVE-2020-10781-kpatch.patch
- From: 4.14.35-2025.400.9
- CVE-2020-14331, CVSSv2 Score: 5.5
- Description:
Fix for missing check in vgacon scrollback handling
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14331
- Patch: 4.14.0/CVE-2020-14331.patch
- From: 4.14.35-2025.400.9
- CVE-2020-16166, CVSSv2 Score: 3.7
- Description:
random32: update the net random state on interrupt and activity
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-16166
- Patch: 4.14.0/CVE-2020-16166.patch
- From: 4.14.35-2025.400.9
- CVE-2019-3874, CVSSv2 Score: 6.5
- Description:
sctp: implement memory accounting on tx path
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3874.html
- Patch: 4.15.0/CVE-2019-3874-sctp-implement-memory-accounting-on-tx-path.patch
- From: 4.15.0-49.52
- CVE-2019-3874, CVSSv2 Score: 6.5
- Description:
sctp: implement memory accounting on rx path
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3874.html
- Patch: 4.15.0/CVE-2019-3874-sctp-implement-memory-accounting-on-rx-path.patch
- From: 4.15.0-49.52
- CVE-2018-20669, CVSSv2 Score: 7.2
- Description:
make 'user_access_begin()' do 'access_ok()'
- CVE: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20669.html
- Patch: 4.15.0/CVE-2018-20669-make-user_access_begin-do-access_ok.patch
- From: 5.0.0-1020.20~18.04.1
- CVE-2020-14386, CVSSv2 Score: 6.7
- Description:
net/packet: fix overflow in tpacket_rcv
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14386.html
- Patch: 4.15.0/CVE-2020-14386.patch
- From: 4.15.0-117.118
- CVE-2020-25212, CVSSv2 Score: 7.0
- Description:
nfs: Fix getxattr kernel panic and memory overflow
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25212
- Patch: 4.19.0/cve-2020-25212-nfs-fix-getaddr-kernel-panic.patch
- From: linux-4.19.146-1
- CVE-2020-14314, CVSSv2 Score: 5.5
- Description:
ext4: fix potential negative array index in do_split()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14314
- Patch: 4.19.0/cve-2020-14314-ext4-fix-potential-negative-array-index.patch
- From: linux-4.19.146-1
- CVE-2020-25284, CVSSv2 Score: 5.5
- Description:
rbd: require global CAP_SYS_ADMIN for mapping and unmapping
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25284
- Patch: 4.14.0/cve-2020-25284-rbd-require-global-CAP_SYS_ADMIN.patch
- From: 4.14.35-2025.401.4.el7uek
- CVE-2020-25285, CVSSv2 Score: 7.0
- Description:
mm/hugetlb: fix a race between hugetlb sysctl handlers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25285
- Patch: 4.19.0/cve-2020-25285-hugetlb-fix-a-race-between-sysctl-handlers.patch
- From: linux-4.19.146-1
- CVE-2020-25643, CVSSv2 Score: 7.2
- Description:
hdlc_ppp: add range checks in ppp_cp_parse_cr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25643
- Patch: 4.19.0/CVE-2020-25643-hdlc_ppp-add-range-checks-in-ppp_cp_parse_cr.patch
- From: 4.19.152-1
- CVE-2019-16089, CVSSv2 Score: 4.1
- Description:
UBUNTU: SAUCE: nbd_genl_status: null check for nla_nest_start
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16089
- Patch: 4.15.0/CVE-2019-16089-UBUNTU-SAUCE-nbd_genl_status-null-check-for-nla_nest_start.patch
- From: 4.9.210-1+deb9u1
- CVE-2019-19448, CVSSv2 Score: 7.8
- Description:
btrfs only search for left_info if there is no right_info
- CVE: https://access.redhat.com/security/cve/CVE-2019-19448
- Patch: 4.19.0/CVE-2019-19448.patch
- From: linux-4.19.146-1
- CVE-2020-25211, CVSSv2 Score: 7.0
- Description:
netfilter: ctnetlink: add a range check for l3/l4 protonum
- CVE: https://access.redhat.com/security/cve/CVE-2020-25211
- Patch: 4.14.0/cve-2020-25211-netfilter-add-range-check.patch
- From: 4.14.198-152.320
- CVE-2020-25645, CVSSv2 Score: 7.5
- Description:
geneve: add transport ports in route lookup for geneve
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25645
- Patch: 4.14.0/CVE-2020-25645-geneve-add-transport-ports-in-route-lookup-for-genev.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: fix cgroup_sk_alloc() for sk_clone_lock()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.15.0/CVE-2020-14356-cgroup-fix-cgroup_sk_alloc-for-sk_clone_lock-96.97.patch
- From: kernel-4.15.0-112.113
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: Fix sock_cgroup_data on big-endian.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.19.0/CVE-2020-14356-cgroup-Fix-sock_cgroup_data-on-big-endian.patch
- From: linux-4.19.146-1
- CVE-2020-14356, CVSSv2 Score: 7.8
- Description:
cgroup: add missing skcd->no_refcnt check in cgroup_sk_clone()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14356
- Patch: 4.19.0/CVE-2020-14356-cgroup-add-missing-skcd-no_refcnt-check-in-cgroup_sk_clone.patch
- From: linux-4.19.146-1
- CVE-2020-14385, CVSSv2 Score: 5.5
- Description:
xfs: fix boundary test in xfs_attr_shortform_verify
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-14385
- Patch: 4.19.0/cve-2020-14385-xfs-fix-boundary-test-in-xfs_attr_shortform_verify.patch
- From: linux-4.19.146-1
- CVE-2020-25641, CVSSv2 Score: 5.5
- Description:
block: allow for_each_bvec to support zero len bvec
- CVE: https://access.redhat.com/security/cve/CVE-2020-25641
- Patch: 4.14.0/CVE-2020-25641-block-allow-for_each_bvec-to-support-zero-len-bvec.patch
- From: 4.14.200-155.322.amzn2
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-powercap-make-attributes-only-readable-by-root.patch
- From: kernel-uek-4.14.35-2025.402.2.1.el7uek
- CVE-2020-8694, CVSSv2 Score: 5.1
- Description:
powercap: make attributes only readable by root (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2020-8694
- Patch: 4.14.0/CVE-2020-8694-kpatch.patch
- From: kernel-uek-4.14.35-2025.401.4.el7uek
- CVE-2020-12352 CVE-2020-25662, CVSSv2 Score: 5.3
- Description:
[net] Bluetooth: A2MP: Fix not initializing all members
- CVE: https://access.redhat.com/security/cve/cve-2020-25662
- Patch: 4.18.0/CVE-2020-12352-Bluetooth-A2MP-Fix-not-initializing-all-members.patch
- From: 4.18.0-193.28.1.el8_2
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-tty-vt-fix-write-write-race-in-ioctl-KDSKBSENT-handler.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, simplify vt_kdgkbsent
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-vt-keyboard-simplify-vt_kdgkbsent.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25656, CVSSv2 Score: 4.1
- Description:
vt: keyboard, extend func_buf_lock to readers
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25656
- Patch: 4.19.0/CVE-2020-25656-vt-keyboard-extend-func_buf_lock-to-readers.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25668, CVSSv2 Score: 7.0
- Description:
tty: make FONTX ioctl use the tty pointer they were actually passed
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25668
- Patch: 4.19.0/CVE-2020-25668-tty-make-FONTX-ioctl-use-the-tty-pointer-they-were-actually-passed.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-25704, CVSSv2 Score: 4.1
- Description:
perf/core: Fix a memory leak in perf_event_parse_addr_filter()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-25704
- Patch: 4.14.0/CVE-2020-25704-perf-core-Fix-a-memory-leak-in-perf_event_parse_addr_filter.patch
- From: 4.14.35-2025.402.2.1
- CVE-2020-28974, CVSSv2 Score: 4.6
- Description:
vt: Disable KD_FONT_OP_COPY
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-28974
- Patch: 4.19.0/CVE-2020-28974-vt-Disable-KD_FONT_OP_COPY.patch
- From: 4.19.160-2~deb9u1
- CVE-2019-19039 CVE-2019-19377, CVSSv2 Score: 5.5
- Description:
btrfs: inode: Verify inode mode to avoid NULL pointer dereference
- CVE: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19377
- Patch: 4.15.0/CVE-2019-19816-CVE-2019-19813-btrfs-inode-Verify-inode-mode-to-avoid-NULL-pointer-dereference.patch
- From: 4.15.0-109.110
- CVE-2020-28374, CVSSv2 Score: 6.5
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: 4.15.0/CVE-2020-28374-UBUNTU-SAUCE-target-fix-XCOPY-NAA-identifier-lookup.patch
- From: 4.15.0-132.136
- CVE-2020-28374, CVSSv2 Score: 6.5
- Description:
UBUNTU: SAUCE: target: fix XCOPY NAA identifier lookup (adaptation )
- CVE: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-28374
- Patch: 4.15.0/CVE-2020-28374-kpatch.patch
- From: 4.15.0-132.136
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
limit size of watch_events dom0 queue.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: debian10/4.19.171-2/CVE-2020-29568-xsa349-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2020-29568, CVSSv2 Score: 6.8
- Description:
handle xenwatch_thread patching.
- CVE: https://linux.oracle.com/cve/CVE-2020-29568.html
- Patch: 5.4.17/CVE-2020-29568-xsa349-handle-xenwatch-thread-kpatch.patch
- From: kernel-4.19.171-2
- CVE-2020-29569, CVSSv2 Score: 8.8
- Description:
set ring->xenblkd to NULL explicitly
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-29569
- Patch: 4.14.0/cve-2020-29569-set-xenblkd-to-NULL.patch
- From: kernel-uek-4.14.35-2025.403.3
- CVE-2020-14351, CVSSv2 Score: 7.0
- Description:
perf/core: Fix race in the perf_mmap_close() function
- CVE: https://access.redhat.com/security/cve/CVE-2020-14351
- Patch: 4.19.0/CVE-2020-14351-perf-core-Fix-race-in-the-perf_mmap_close-function.patch
- From: 4.19.160-2~deb9u1
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-fbcon-Fix-global-out-of-bounds-read-in-fbcon_get_fon.patch
- From: kernel-4.4.0-197.229
- CVE-2020-28915, CVSSv2 Score: 5.5
- Description:
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
- CVE: https://ubuntu.com/security/CVE-2020-28915
- Patch: 4.14.0/cve-2020-28915-kpatch.patch
- From: kernel-4.4.0-197.229
- CVE-2020-15436, CVSSv2 Score: 5.3
- Description:
block: Fix use-after-free in blkdev_get()
- CVE: https://security-tracker.debian.org/tracker/CVE-2020-15436
- Patch: 4.1.12/cve-2020-15436-fix-use-after-free-in-blkdev_get.patch
- From: 4.1.12-124.46.3
- CVE-2020-15437, CVSSv2 Score: 4.5
- Description:
fix a tty8250 serial driver.
- CVE: https://access.redhat.com/security/cve/CVE-2020-15437
- Patch: 4.14.0/cve-2020-15437-serial-8250-fix-NULL-ptr-deref-in-serial8250_start_tx.patch
- From: 4.14.35-2025.403.4
- N/A, CVSSv2 Score: N/A
- Description:
net: icmp: fix data-race in cmp_global_allow()
- CVE: N/A
- Patch: 4.14.0/net-icmp-fix-data-race-in-cmp_global_allow.patch
- From: 4.14.162
- CVE-2020-25705, CVSSv2 Score: 7.4
- Description:
icmp: randomize the global rate limiter
- CVE: https://www.saddns.net/
- Patch: 4.14.0/icmp-randomize-the-global-rate-limiter.patch
- From: v4.14.203
- CVE-2020-29368, CVSSv2 Score: 7.0
- Description:
thp: make the THP mapcount atomic against __split_huge_pmd_locked()
- CVE: https://access.redhat.com/security/cve/CVE-2013-1798
- Patch: 4.14.0/cve-2020-29368-mm-make-the-THP-mapcount-atmomic.patch
- From: 4.14.35-2025.304
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->pgrp locking in tiocspgrp()
- CVE: https://linux.oracle.com/cve/CVE-2020-29660.html
- Patch: 4.14.0/CVE-2020-29660-tty-Fix-pgrplocking-in-tiocspgrp.patch
- From: 4.14.35-2025.405.0
- CVE-2020-29660, CVSSv2 Score: 4.4
- Description:
tty: Fix ->session locking
- CVE: https://linux.oracle.com/cve/CVE-2020-29660.html
- Patch: 4.14.0/CVE-2020-29660-tty-fix-session-locking.patch
- From: 4.14.35-2025.405.0
- CVE-2020-36158, CVSSv2 Score: 6.5
- Description:
mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
- CVE: https://linux.oracle.com/cve/CVE-2020-36158.html
- Patch: 4.14.0/cve-2020-36158-mwifiex-possible-buffer-overflow.patch
- From: 4.14.35-2025.405.0
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: 4.14.0/738716-xen-blkback-Avoid-unmapping-unmapped-grant-pages.patch
- From: 4.14.35-2025.400.8.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738579-Xen-x86-don-t-bail-early-from-clear_foreign_p2m_ma.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738580-Xen-x86-also-check-kernel-mapping-in-set_foreign_p.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738581-Xen-gntdev-correct-dev_bus_addr-handling-in-gntdev.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26932, CVSSv2 Score: 5.5
- Description:
Xen/gntdev: correct error checking in gntdev_map_grant_pages()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26932
- Patch: 4.14.0/738582-Xen-gntdev-correct-error-checking-in-gntdev_map_gr.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.14.0/738583-xen-blkback-don-t-handle-error-by-BUG.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.14.0/738584-xen-netback-don-t-handle-error-by-BUG.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26931
- Patch: 4.14.0/738585-xen-scsiback-don-t-handle-error-by-BUG.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: 4.14.0/738586-xen-blkback-fix-error-handling-in-xen_blkbk_map.patch
- From: 4.14.35-2047.500.10.el7uek
- CVE-2020-16120, CVSSv2 Score: 5.3
- Description:
ovl: pass correct flags for opening real directory
- CVE: https://ubuntu.com/security/CVE-2020-16120
- Patch: 4.15.0/CVE-2020-16120-ovl-pass-correct-flags-for-opening-real-directory.patch
- From:
- CVE-2020-16120, CVSSv2 Score: 4.1
- Description:
ovl: switch to mounter creds in readdir
- CVE: https://access.redhat.com/security/cve/CVE-2020-16120
- Patch: 4.14.0/CVE-2020-16120-ovl-switch-to-mounter-creds-in-readdir.patch
- From: 4.14.35-2047.501.1.el7uek
- CVE-2020-16120, CVSSv2 Score: 5.3
- Description:
ovl: verify permissions in ovl_path_open()
- CVE: https://ubuntu.com/security/CVE-2020-16120
- Patch: 4.15.0/cve-2020-16120-part-two.patch
- From:
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Ensure the correct return value from futex_lock_pi
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-01-futex-Ensure-the-correct-return-value-from-futex_lock_pi-lt-193.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Simplify fixup_pi_state_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-03-futex-Simplify-fixup_pi_state_owner-lt-193.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Replace pointless printk in fixup_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-02-futex-Replace-pointless-printk-in-fixup_owner.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Provide and use pi_state_update_owner
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-04-futex-Provide-and-use-pi_state_update_owner-lt-193.patch
- From: v5.11
- CVE-2021-3347, CVSSv2 Score: 7.4
- Description:
futex: Handle faults correctly for PI futexes
- CVE: https://access.redhat.com/security/cve/CVE-2021-3347
- Patch: 4.18.0/CVE-2021-3347-05-futex-Handle-faults-correctly-for-PI-futexes-lt-240.patch
- From: v5.11
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
nbd: freeze the queue while we're adding connections
- CVE: https://access.redhat.com/security/cve/CVE-2021-3348
- Patch: 4.14.0/CVE-2021-3348-nbd-freeze-the-queue-while-we-re-adding-connections-188.patch
- From: 4.14.219-119.340.amzn1
- CVE-2021-27363, CVSSv2 Score: 3.6
- Description:
scsi: iscsi: Restrict sessions and handles to admin
- CVE: https://access.redhat.com/security/cve/CVE-2021-27363
- Patch: 4.14.0/CVE-2021-27363-iscsi-Restrict-sessions-and-handles-to-admin-capabilities.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27364, CVSSv2 Score: 6.3
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://access.redhat.com/security/cve/CVE-2021-27364
- Patch: 4.14.0/CVE-2021-27364-scsi-Verify-lengths-on-passthrough-PDUs.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://access.redhat.com/security/cve/CVE-2021-27365
- Patch: 4.14.0/CVE-2021-27365-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-27365, CVSSv2 Score: 7.0
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2021-27365
- Patch: 4.14.0/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs-output.patch
- From: 4.1.12-124.48.6.el6uek
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://nvd.nist.gov/vuln/detail//CVE-2021-28038
- Patch: 4.14.0/CVE-2021-28038-Xen-gnttab-handle-p2m-update-errors-on-a-per-slot-basis.patch
- From: 4.14.225-121.357.amzn1
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Prohibit alu ops for pointer types not defining ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.14.0/CVE-2020-27170-bpf-Prohibit-alu-ops-for-pointer-types-not-defining-ptr_limit.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Fix off-by-one for area size in creating mask to left
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0002-bpf-Fix-off-by-one-for-area-size-in-creating-mask-to.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0003-bpf-Simplify-alu_limit-masking-for-pointer-arithmeti.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2020-27170 CVE-2020-27171, CVSSv2 Score: 5.1
- Description:
bpf: Add sanity check for upper ptr_limit
- CVE: https://access.redhat.com/security/cve/cve-2020-27171
- Patch: 4.18.0/0004-bpf-Add-sanity-check-for-upper-ptr_limit.patch
- From: >4.18.0-240.15.1.el8_3
- CVE-2021-3428, CVSSv2 Score: 4.4
- Description:
ext4: handle error of ext4_setup_system_zone() on remount
- CVE: https://access.redhat.com/security/cve/CVE-2021-3428
- Patch: 4.14.0/CVE-2021-3428-ext4-handle-error-of-ext4_setup_system_zone-on-remount.patch
- From: 4.14.35-2047.503.1.el7uek
- CVE-2021-28971, CVSSv2 Score: 4.7
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://access.redhat.com/security/cve/CVE-2021-28971
- Patch: 5.4.17/CVE-2021-28971-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-status.patch
- From: 5.4.17-2102.201.3.el8uek
- CVE-2021-28964, CVSSv2 Score: 4.1
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old
- CVE: https://access.redhat.com/security/cve/CVE-2021-28964
- Patch: 4.14.0/CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rewind-of-an-old.patch
- From: 4.14.231-173.360.amzn2
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: make xt_replace_table wait until old
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.14.0/CVE-2021-29650-netfilter-x_tables-make-xt_replace_table-wait-until-old.patch
- From: 4.14.35-2047.503.1.el7uek
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers.
- CVE: https://access.redhat.com/security/cve/CVE-2021-29650
- Patch: 4.14.0/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 4.14.35-2047.503.1.el7uek
- CVE-2021-28688, CVSSv2 Score: 6.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-28688
- Patch: 4.14.0/CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from.patch
- From: 4.14.35-2047.503.1.el7uek
- CVE-2021-29154, CVSSv2 Score: 7.0
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://access.redhat.com/security/cve/CVE-2021-29154
- Patch: 4.18.0/CVE-2021-29154-0001-bpf-x86-Validate-computation-of-branch-displacements.patch
- From: >kernel-4.18.0-240.22.1.el8_3
- CVE-2020-4788, CVSSv2 Score:
- Description:
IBM Power9 is unsupported
- CVE:
- Patch: skipped/CVE-2020-4788.patch
- From:
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-31916
- Patch: 4.14.0/CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devices.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22555
- Patch: 4.4.0/CVE-2021-22555-netfilter-x_tables-fix-compat-match-target-pad-out-of-bound-write.patch
- From: kernel-4.4.0-213.245
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-23133
- Patch: 4.14.0/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
race condition for removal of the HCI controller.
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-32399
- Patch: 4.19.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-whe.patch
- From: 4.14.191-1
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy (kcare adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-33034
- Patch: 4.18.0/CVE-2021-33034-kpatch.patch
- From: 4.18.0-305.7.1.el8_4
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33033
- Patch: 4.14.0/CVE-2021-33033-net-mac802154-Fix-general-protection-fault.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-33033, CVSSv2 Score: 5.5
- Description:
cipso,calipso: resolve a number of problems with the DOI refcounts
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33033
- Patch: 4.14.0/CVE-2021-33033-cipso-calipso-resolve-a-number-of-problems-with-the-DOI-refcounts.patch
- From: >kernel-4.14.231-173.360.amzn2
- CVE-2021-33909, CVSSv2 Score: 7.8
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://ubuntu.com/security/CVE-2021-33909
- Patch: 4.15.0/CVE-2021-33909-seq_file-Disallow-extremely-large-seq-buffer-allocations.patch
- From: >kernel-4.15.0-147.151
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 4.14.35/CVE-2020-14304-net-mlx4_en-ethtool-Remove-unsupported-SFP-EEPROM-high.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2020-14304, CVSSv2 Score: 4.4
- Description:
net/mlx4: Fix EEPROM dump support
- CVE: https://access.redhat.com/security/cve/CVE-2020-14304
- Patch: 4.14.35/CVE-2020-14304-net-mlx4-Fix-EEPROM-dump-support.patch
- From: >4.1.12-124.48.6.el6uek
- CVE-2020-25672, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2020-25672.patch
- From:
- CVE-2020-25671, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2020-25671.patch
- From:
- CVE-2020-25670, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2020-25670.patch
- From:
- n/a, CVSSv2 Score: n/a
- Description:
KVM: nSVM: do not change host intercepts while nested VM is running (CVE-2021-3656 dependency)
- CVE: n/a
- Patch: 5.4.17/KVM_nSVM-do-not-change-host-intercepts-while-nested-VM-is-running.patch
- From: 5.4.17-2033
- CVE-2021-3656, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested
- CVE: https://access.redhat.com/security/cve/CVE-2021-3656
- Patch: 5.4.17/CVE-2021-3656-KVM_nSVM-always-intercept-VMLOAD_VMSAVE-when-nested.patch
- From: 5.4.17-2102.204.4.3
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://access.redhat.com/security/cve/CVE-2021-3653
- Patch: 5.4.17/CVE-2021-3653-KVM_nSVM-avoid-picking-up-unsupported-bits-from-L2-in-int_ctl.patch
- From: 5.4.17-2102.204.4.3
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-bionic/4.15.0-156.163/CVE-2021-3653-kpatch.patch
- From: 4.15.0-156.163
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-34693
- Patch: ubuntu-bionic/4.15.0-156.163/0001-CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 4.15.0-156.163
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent use of not validated data in JSIOCSBTNMAP
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3612
- Patch: ubuntu-bionic/4.15.0-156.163/0003-CVE-2021-3612-Input-joydev-prevent-use-of-not-validated-data-in-JS.patch
- From: 4.15.0-156.163
- CVE-2021-23134, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2021-23134.patch
- From:
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-26147
- Patch: 4.19.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: 4.14.191-1
- CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: add fragment cache to sta_info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24586
- Patch: 4.19.0/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: 4.14.191-1
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.19.0/CVE-2020-24587-1-mac80211-prevent-mixed-key-and-fragment-cache-attack.patch
- From: 4.14.191-1
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.19.0/CVE-2020-24587-1-mac80211-prevent-mixed-key-and-fragment-cache-attack-kpatch.patch
- From: 4.14.191-1
- CVE-2020-24587, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.19.0/CVE-2020-24587-2-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 4.14.191-1
- CVE-2020-24587, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.19.0/CVE-2020-24587-2-mac80211-prevent-attacks-on-TKIP-WEP-as-well-kpatch.patch
- From: 4.14.191-1
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 4.19.0/CVE-2020-24587-3-mac80211-extend-protection-against-mixed-key-and-fra.patch
- From: 4.14.191-1
- CVE-2020-24588, CVSSv2 Score: 3.5
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24588
- Patch: 4.19.0/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: 4.14.191-1
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 4.18.0/CVE-2021-3609-17898-can-bcm-delay-release-of-struct-bcm_op-after-synchr.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://ubuntu.com/security/CVE-2021-22543
- Patch: 4.18.0/CVE-2021-22543-17896-KVM-do-not-allow-mapping-valid-but-non-reference-co.patch
- From: kernel-4.18.0-305.12.1.el8
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3564
- Patch: 4.19.0/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 4.14.191-1
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://access.redhat.com/security/cve/CVE-2021-3573
- Patch: 4.9.0/CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-object.patch
- From: 4.9.272-1
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: validate from_addr_param return
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-validate-from_addr_param-return-160.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-3655, CVSSv2 Score: 5.3
- Description:
sctp: add size validation when walking chunks
- CVE: https://access.redhat.com/security/cve/CVE-2021-3655
- Patch: 4.14.0/CVE-2021-3655-sctp-add-size-validation-when-walking-chunks.patch
- From: >4.14.232-177.418.amzn2
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38160
- Patch: ubuntu-bionic/4.15.0-156.163/0004-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 4.15.0-156.163
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3679
- Patch: ubuntu-focal/5.4.0-88.99/0007-CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch
- From: 5.4.0-88.99
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its
- CVE: https://access.redhat.com/security/cve/CVE-2021-40490
- Patch: 4.14.35/CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-its.patch
- From: 4.14.35-2047.507.7.5.el7uek
- CVE-2020-36322, CVSSv2 Score: 5.5
- Description:
fuse: fix bad inode
- CVE: https://access.redhat.com/security/cve/cve-2020-36322
- Patch: 4.14.35/CVE-2020-36322-fs-fuse-fix-bad-inode.patch
- From: kernel-uek-4.14.35-2047.507.7.5
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28950
- Patch: 4.15.0/CVE-2021-28950-750670-fuse-fix-live-lock-in-fuse_iget.patch
- From: 4.15.0-162.170
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 4.14.35/CVE-2021-0920-af_unix-fix-garbage-collect-vs-MSG_PEEK.patch
- From: 4.14.35-2047.510.5.2
- CVE-2021-0920, CVSSv2 Score: 6.4
- Description:
af_unix: fix garbage collect vs MSG_PEEK (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-0920
- Patch: 4.14.35/CVE-2021-0920-kpatch-uek5.patch
- From: 4.1.12-124.59.1.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
fs: add fget_many() and fput_many() (dependency)
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 4.14.35/CVE-2021-0920-fs-add-fget_many-and-fput_many.patch
- From: 4.14.35-2047.510.5.2
- CVE-2021-0920, CVSSv2 Score: 7.4
- Description:
fget: check that the fd still exists after getting a ref to
- CVE: https://access.redhat.com/security/cve/CVE-2021-0920
- Patch: 4.14.35/CVE-2021-0920-fget-check-that-the-fd-still-exists-after-getting-a-ref-to.patch
- From: 4.14.35-2047.510.5.2
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://access.redhat.com/security/cve/CVE-2021-4155
- Patch: 4.1.12/CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_ALLOC-FREESP-just-like.patch
- From: 4.1.12-124.59.1.2
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.14.35/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.14.35-2047.511.5.2
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 4.14.0/CVE-2022-1016.patch
- From: 4.14.273-207.502
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-20317, CVSSv2 Score: 4.4
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer
- CVE: https://access.redhat.com/security/cve/CVE-2021-20317
- Patch: 4.18.0/CVE-2021-20317-lib-timerqueue-Rely-on-rbtree-semantics-for-next-timer.patch
- From: 4.18.0-348.2.1.el8_5
- CVE-2021-20317, CVSSv2 Score: 4.4
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-20317
- Patch: 4.18.0/CVE-2021-20317-lib-timerqueue-Rely-on-rbtree-semantics-for-next-timer-kpatch.patch
- From: 4.18.0-348.2.1.el8_5
- CVE-2021-4002, CVSSv2 Score: 5.1
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.14.35/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.14.35-2047.512.6.el7uek
- CVE-2021-4149, CVSSv2 Score: 4.7
- Description:
btrfs: unlock newly allocated extent buffer after error
- CVE: https://access.redhat.com/security/cve/CVE-2021-4149
- Patch: 4.19.0/CVE-2021-4149.patch
- From: 4.19.235-1
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.14.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.14.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
stale file descriptors on failed usercopy
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-22942
- Patch: 4.19.0/CVE-2022-22942.patch
- From: <kernel-4.19.208-1
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-24448
- Patch: 4.14.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0435, CVSSv2 Score: 7.2
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.14.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617, CVSSv2 Score: 4.7
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2020-36516, CVSSv2 Score: 5.9
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 4.1.12/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 4.1.12-124.61.2
- CVE-2022-26966, CVSSv2 Score: 4.6
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 4.1.12/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 4.1.12-124.61.2
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://access.redhat.com/security/cve/CVE-2022-27666
- Patch: 4.14.35/CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformation-1.patch
- From: 4.14.35-2047.513.1
- CVE-2021-38199, CVSSv2 Score: 6.5
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38199
- Patch: 4.15.0/CVE-2021-38199-750639-NFSv4-Initialise-connection-to-the-server-in-nfs4_.patch
- From: 4.15.0-162.170
- CVE-2022-21499, CVSSv2 Score:
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-0487, CVSSv2 Score: 5.5
- Description:
memstick: rtsx_usb_ms: fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2022-0487
- Patch: 4.14.35/CVE-2022-0487-memstick-rtsx_usb_ms-fix-UAF.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-23036 CVE-2022-23038, CVSSv2 Score: 7.0
- Description:
xen/grant-table: add gnttab_try_end_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23036-CVE-2022-23038-xen-grant-table-add-gnttab_try_end_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23040, CVSSv2 Score: 7.0
- Description:
xen/xenbus: Fix granting of vmalloc'd memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-23040
- Patch: 4.14.35/CVE-2022-23040-xen-xenbus-Fix-granting-of-vmalloc-d-memory.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-23040, CVSSv2 Score: 7.0
- Description:
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23040
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23040-xen-xenbus-dont-let-xenbus_grant_ring-remove-grants-in-error-case.patch
- From: 4.15.0-177.186
- CVE-2022-23038, CVSSv2 Score: 7.0
- Description:
xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23038
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23038-xen-scsifront-dont-use-gnttab_query_foreign_access-for-mapped-status.patch
- From: 4.15.0-177.186
- CVE-2022-23039, CVSSv2 Score: 7.0
- Description:
xen/gntalloc: don't use gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23039
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23039-xen-gntalloc-dont-use-gnttab_query_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/9p: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23041-xen-9p-use-alloc-free_pages_exact.patch
- From: 4.15.0-177.186
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://access.redhat.com/security/cve/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prepare and
- CVE: https://access.redhat.com/security/cve/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free
- CVE: https://access.redhat.com/security/cve/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
N/A
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-kpatch.patch
- From: N/A
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.14.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 4.14.35-2047.515.0
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.14.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter-kpatch.patch
- From: 4.14.35-2047.515.0
- CVE-2022-2588, CVSSv2 Score: 6.7
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/CVE-2022-2588
- Patch: 5.4.17/CVE-2022-2588.patch
- From: kernel-uek-5.4.17-2136.309.5.1.el8uek
- CVE-2022-21385, CVSSv2 Score: 6.2
- Description:
rds: copy_from_user only once per rds_sendmsg system call
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21385
- Patch: 4.14.35/CVE-2022-21385-rds-copy_from_user-only-once-per-rds_sendmsg-system-call-402.patch
- From: 4.14.35-2047.516.2.1
- n/a, CVSSv2 Score: n/a
- Description:
scsi: target: Fix protect handling in WRITE SAME(32)
- CVE: n/a
- Patch: 4.14.35/scsi-target-Fix-protect-handling-in-WRITE-SAME-32.patch
- From: 5.14
- CVE-2022-21546, CVSSv2 Score: n/a
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: n/a
- Patch: 4.14.35/CVE-2022-21546-scsi-target-Fix-WRITE_SAME-No-Data-Buffer-crash.patch
- From: kernel-uek-4.14.35-2047.517.3.el7uek
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 4.14.35/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel-1.patch
- From: 5.10.140-1
- CVE-2022-3239, CVSSv2 Score: 7.8
- Description:
media: em28xx: initialize refcount before kref_get
- CVE: https://linux.oracle.com/cve/CVE-2022-3239.html
- Patch: oel7-uek5/4.14.35-2047.519.2.1.el7uek/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref-get.patch
- From: 4.14.35-2047.519.2.1.el7uek
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc/sysctl: fix return error for proc_doulongvec_minmax()
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0100-proc-sysctl-fix-return-error-for-proc_doulongvec_min.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0200-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0300-proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-C-strings.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://linux.oracle.com/cve/CVE-2022-40768.html
- Patch: 4.14.35/CVE-2022-40768-scsi-stex-Properly-zero-out-the-passthrough-command-structure.patch
- From: 4.14.35-2047.520.1.el7uek
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-3565.html
- Patch: 4.14.35/CVE-2022-3565-kpatch.patch
- From: 4.14.35-2047.520.0
- CVE-2022-3303, CVSSv2 Score: 4.7
- Description:
ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
- CVE: https://access.redhat.com/security/cve/CVE-2022-3303
- Patch: 4.14.35/CVE-2022-3303-ALSA-pcm-oss-Fix-race-at-SNDCTL_DSP_SYNC.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-3524, CVSSv2 Score: 5.5
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: 4.14.35/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-3640, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3640
- Patch: 4.14.35/CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-42895, CVSSv2 Score: 6.5
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: 4.14.35/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitialized-memory.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 4.14.35/CVE-2022-42896-0001-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 4.14.35/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-accepting-connection-request-for-invalid-SPSM.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://access.redhat.com/security/cve/CVE-2023-0394
- Patch: 4.14.35/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-2873, CVSSv2 Score: 5.5
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: 4.14.35/CVE-2022-2873-i2c-ismt-Fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-3545, CVSSv2 Score: 7.8
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: 4.14.35/CVE-2022-3545-nfp-fix-use-after-free-in-area_cache_get.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: 4.14.35/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-41218, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://access.redhat.com/security/cve/CVE-2022-41218
- Patch: 4.14.35/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: 4.14.35/CVE-2022-45934-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-47929, CVSSv2 Score: 5.5
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://access.redhat.com/security/cve/CVE-2022-47929
- Patch: 4.14.35/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2023-23559, CVSSv2 Score: 7.0
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://access.redhat.com/security/cve/CVE-2023-23559
- Patch: oel7-uek5/4.14.35-2047.524.5.el7uek/CVE-2023-23559-patch-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_que.patch
- From: 4.14.35-2047.524.5
- CVE-2022-3107, CVSSv2 Score: 3.6
- Description:
hv_netvsc: Add check for kvmalloc_array
- CVE: https://access.redhat.com/security/cve/CVE-2022-3107
- Patch: oel7-uek5/4.14.35-2047.524.5.el7uek/CVE-2022-3107-patch-add-check-for-kvmalloc_array.patch
- From: 4.14.35-2047.524.5
- CVE-2023-3567, CVSSv2 Score: 7.1
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://linux.oracle.com/cve/CVE-2023-3567.html
- Patch: oel7-uek5/4.14.35-2047.529.3.el7uek/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs_read-to-avoid-UAF.patch
- From: 4.14.35-2047.529.3
- CVE-2023-22024, CVSSv2 Score: 5.5
- Description:
rds: Fix lack of reentrancy for connection reset with dst addr zero
- CVE: https://linux.oracle.com/cve/CVE-2023-22024.html
- Patch: oel7-uek5/4.14.35-2047.529.3.el7uek/CVE-2023-22024-rds-Fix-lack-of-reentrancy-for-connection-reset-with-dst-addr-zero-2025.405.3.patch
- From: 4.14.35-2047.529.3.2
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://linux.oracle.com/cve/CVE-2023-42753.html
- Patch: oel7-uek5/4.14.35-2047.529.3.el7uek/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 4.14.35-2047.529.3.2
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://linux.oracle.com/cve/CVE-2023-4623.html
- Patch: oel7-uek5/4.14.35-2047.532.3.el7uek/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 4.14.35-2047.532.3.el7uek
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.14.35/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-add-asm-definitions-uek.patch
- From: N/A
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 4.14.0/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 4.14.35-2047.513.2.1.el7uek