| { |
| "4.4": { |
| "4.4": { |
| "CVE-2016-2070": { |
| "cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction", |
| "cmt_id": "8b8a321ff72c785ed5e8b4cf6eda20b35d427390" |
| }, |
| "CVE-2015-8963": { |
| "cmt_msg": "perf: Fix race in swevent hash", |
| "cmt_id": "12ca6ad2e3a896256f086497a7c7406a547ee373" |
| } |
| }, |
| "4.4.1": { |
| "CVE-2016-0728": { |
| "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", |
| "cmt_id": "e4a46f02b1d0eaadea4e6b00e29922cd00d6de53" |
| }, |
| "CVE-2016-2069": { |
| "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", |
| "cmt_id": "43a2ba8c1a003c82d9f411af8ebcf0fe1e4cbe3e" |
| }, |
| "CVE-2016-2545": { |
| "cmt_msg": "ALSA: timer: Fix double unlink of active_list", |
| "cmt_id": "3c0e535fee2e67d06220e676cbf7b69099d741ce" |
| }, |
| "CVE-2016-2544": { |
| "cmt_msg": "ALSA: seq: Fix race at timer setup and close", |
| "cmt_id": "0058ede73e1f441c003666f61671dfddfcbd5811" |
| }, |
| "CVE-2016-2547": { |
| "cmt_msg": "ALSA: timer: Harden slave timer list handling", |
| "cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" |
| }, |
| "CVE-2016-2546": { |
| "cmt_msg": "ALSA: timer: Fix race among timer ioctls", |
| "cmt_id": "d87622a1662af5782c94b88a613c09de0bde5288" |
| }, |
| "CVE-2016-2543": { |
| "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", |
| "cmt_id": "36d3fc15f50c22bbddfceb6c585f851130fb005f" |
| }, |
| "CVE-2013-4312": { |
| "cmt_msg": "unix: properly account for FDs passed over unix sockets", |
| "cmt_id": "5e226f9689d90ad8ab21b4a969ae3058777f0aff" |
| }, |
| "CVE-2016-2549": { |
| "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", |
| "cmt_id": "dafa57ee81748f6a6950c06f19a160d0a209795e" |
| }, |
| "CVE-2016-2548": { |
| "cmt_msg": "ALSA: timer: Harden slave timer list handling", |
| "cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" |
| } |
| }, |
| "4.4.2": { |
| "CVE-2016-2782": { |
| "cmt_msg": "USB: visor: fix null-deref at probe", |
| "cmt_id": "ee4207bda5e15d0eecb834c4fc39c6069487279d" |
| }, |
| "CVE-2016-2384": { |
| "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", |
| "cmt_id": "fbb430c51d7ac989b79bf1adb40cce7af581682a" |
| }, |
| "CVE-2016-2085": { |
| "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", |
| "cmt_id": "8592536bcfcbc717a3bf7cec57d7c1b38f4eec1d" |
| }, |
| "CVE-2016-0723": { |
| "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", |
| "cmt_id": "d343601a19410f71bf1765df5e2edda66fe5de5f" |
| }, |
| "CVE-2017-13215": { |
| "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", |
| "cmt_id": "fec8beab63283003b546f83eebbbe32efb9acc53" |
| }, |
| "CVE-2017-13167": { |
| "cmt_msg": "ALSA: timer: Fix race at concurrent reads", |
| "cmt_id": "925249d5172a31d7d430fdf364fc9229223c7942" |
| }, |
| "CVE-2015-7566": { |
| "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", |
| "cmt_id": "2dc803d0740f0c493a7db8a1baf6514d5b95b6a3" |
| }, |
| "CVE-2015-8970": { |
| "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", |
| "cmt_id": "b238717c0bb4606e2e36fc0de745306b0c900d83" |
| } |
| }, |
| "4.4.3": { |
| "CVE-2016-0617": { |
| "cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()", |
| "cmt_id": "db33368ca32dd307cdcc191361de34f3937f513a" |
| }, |
| "CVE-2016-1575": { |
| "cmt_msg": "ovl: setattr: check permissions before copy-up", |
| "cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" |
| }, |
| "CVE-2016-1576": { |
| "cmt_msg": "ovl: setattr: check permissions before copy-up", |
| "cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" |
| } |
| }, |
| "4.4.4": { |
| "CVE-2016-2383": { |
| "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion", |
| "cmt_id": "a34f2f9f2034f7984f9529002c6fffe9cb63189d" |
| }, |
| "CVE-2021-20265": { |
| "cmt_msg": "af_unix: fix struct pid memory leak", |
| "cmt_id": "39770be4d6ad29c5ab1f21edbbf01db067f13b52" |
| }, |
| "CVE-2015-8812": { |
| "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", |
| "cmt_id": "64fb3e29bf47e5db029b81fc99ac40f6cd2620ac" |
| } |
| }, |
| "4.4.6": { |
| "CVE-2016-2143": { |
| "cmt_msg": "s390/mm: four page table levels vs. fork", |
| "cmt_id": "5833fac3b88d39b39402309399e8b0aaa54e5f75" |
| }, |
| "CVE-2016-3044": { |
| "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", |
| "cmt_id": "1c463a390a89beb929ed2750c79d6eb6d06c7cdd" |
| } |
| }, |
| "4.4.7": { |
| "CVE-2016-3137": { |
| "cmt_msg": "USB: cypress_m8: add endpoint sanity check", |
| "cmt_id": "ca76906a7753052b00e491ba017393f9071b0406" |
| }, |
| "CVE-2016-3157": { |
| "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", |
| "cmt_id": "0f63ab5873ed78838afa4b2f8bfd9d18f806cf40" |
| }, |
| "CVE-2016-3689": { |
| "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", |
| "cmt_id": "af18c4ca4b1728e2149844656bbf1aa8d7382682" |
| }, |
| "CVE-2016-9685": { |
| "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", |
| "cmt_id": "b34291f71d0fb3d09728fd43d6da350ff6a179d6" |
| }, |
| "CVE-2016-3140": { |
| "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", |
| "cmt_id": "4f6ad5b0d28c84030693fe21b308c0b711fa66f6" |
| }, |
| "CVE-2016-3136": { |
| "cmt_msg": "USB: mct_u232: add sanity checking in probe", |
| "cmt_id": "9deac9454b7a5643a09829f4731276cea6697b72" |
| }, |
| "CVE-2016-2185": { |
| "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", |
| "cmt_id": "a1d0a23831ccde9dbd5279a5d45790a96f18ad32" |
| }, |
| "CVE-2016-2184": { |
| "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", |
| "cmt_id": "57f6ad5f1580a5a06c573fb15ed6dcf701e037f6" |
| }, |
| "CVE-2016-6327": { |
| "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", |
| "cmt_id": "84512e476ce92fbdb60d4687e3ea230dbf0655c8" |
| }, |
| "CVE-2016-2186": { |
| "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", |
| "cmt_id": "fbd40d7beef0b17624bc1f838f4d44dfa4b0326b" |
| }, |
| "CVE-2016-3138": { |
| "cmt_msg": "USB: cdc-acm: more sanity checking", |
| "cmt_id": "1ea680abf7640c777396909102bc22915107cb5b" |
| } |
| }, |
| "4.4.8": { |
| "CVE-2016-7117": { |
| "cmt_msg": "net: Fix use after free in the recvmmsg exit path", |
| "cmt_id": "405f10a39443ae9ccacf51f18511dfc827e09108" |
| }, |
| "CVE-2016-3156": { |
| "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", |
| "cmt_id": "54789759917f127cfadcca730f44ea67d557a9b0" |
| }, |
| "CVE-2016-4805": { |
| "cmt_msg": "ppp: take reference on channels netns", |
| "cmt_id": "046ea8180ecaf5d8b5823e17714a09526ad7d321" |
| } |
| }, |
| "4.4.9": { |
| "CVE-2016-4568": { |
| "cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing", |
| "cmt_id": "19a4e46b4513bab7d6b368175be2e24ad4665e5a" |
| }, |
| "CVE-2016-7914": { |
| "cmt_msg": "assoc_array: don't call compare_object() on a node", |
| "cmt_id": "6905c7a4aa1ef675825bc2ab56fd965a573ffb74" |
| }, |
| "CVE-2016-3955": { |
| "cmt_msg": "USB: usbip: fix potential out-of-bounds write", |
| "cmt_id": "4a1bb501e4b65908b102f0b371b0621ff18ad5c3" |
| }, |
| "CVE-2016-7912": { |
| "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", |
| "cmt_id": "e4c7ab76586146820b394e0176f286f5a2e70cb3" |
| }, |
| "CVE-2016-4565": { |
| "cmt_msg": "IB/security: Restrict use of the write() interface", |
| "cmt_id": "c92003c18feb8159cbf64bc0afa7b048869fe3c6" |
| }, |
| "CVE-2016-2187": { |
| "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", |
| "cmt_id": "197b6c5f0d976420c3eeacc7589ebc5869d2d70f" |
| }, |
| "CVE-2015-8839": { |
| "cmt_msg": "ext4: fix races between page faults and hole punching", |
| "cmt_id": "0b680de452570274716c2c9990903acea525f0d0" |
| }, |
| "CVE-2016-3961": { |
| "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", |
| "cmt_id": "27b3cc048a5275c53e26c15ffcab3fcf9a03cda0" |
| } |
| }, |
| "4.4.10": { |
| "CVE-2016-7916": { |
| "cmt_msg": "proc: prevent accessing /proc/<PID>/environ until it's ready", |
| "cmt_id": "898149d10b855a0d0a5a9f8f05e4359970919eb9" |
| }, |
| "CVE-2016-4581": { |
| "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", |
| "cmt_id": "b17580a3cb901c56e9b9a3dea4d12153f5fc879e" |
| } |
| }, |
| "4.4.11": { |
| "CVE-2016-6198": { |
| "cmt_msg": "vfs: add vfs_select_inode() helper", |
| "cmt_id": "b0dac61d2454b392dbdb4ad565f9dc3dc76fce96" |
| }, |
| "CVE-2016-4557": { |
| "cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()", |
| "cmt_id": "608d2c3c7a046c222cae2e857cf648a9f89e772b" |
| }, |
| "CVE-2016-4580": { |
| "cmt_msg": "net: fix a kernel infoleak in x25 module", |
| "cmt_id": "83857201758ead21e19e36d9ab5b2f87be03dfe2" |
| }, |
| "CVE-2016-4486": { |
| "cmt_msg": "net: fix infoleak in rtnetlink", |
| "cmt_id": "e0c0313681aaa0c4514c6794635aba82691d2154" |
| }, |
| "CVE-2016-2117": { |
| "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", |
| "cmt_id": "b5c9a73c501e8aed86dd578309813c7818ca248c" |
| }, |
| "CVE-2016-4485": { |
| "cmt_msg": "net: fix infoleak in llc", |
| "cmt_id": "52f307b18b1f070f0442fc98515575616b21fa20" |
| }, |
| "CVE-2016-4558": { |
| "cmt_msg": "bpf: fix refcnt overflow", |
| "cmt_id": "3899251bdb9c2b31fc73d4cc132f52d3710101de" |
| }, |
| "CVE-2016-4913": { |
| "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", |
| "cmt_id": "007796c01f0b293c68585397211af2b390bf126d" |
| } |
| }, |
| "4.4.12": { |
| "CVE-2016-3713": { |
| "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", |
| "cmt_id": "1716643bc4725bb92a1f527f759a93e37a2bc1f0" |
| }, |
| "CVE-2016-9754": { |
| "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", |
| "cmt_id": "f199023137853eb1d46e8b7ebc274b29ba99028c" |
| }, |
| "CVE-2019-3901": { |
| "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", |
| "cmt_id": "c5174678e2e5bd691da58a116fbc123c6fbc7b2c" |
| } |
| }, |
| "4.4.13": { |
| "CVE-2016-2847": { |
| "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", |
| "cmt_id": "fa6d0ba12a8eb6a2e9a1646c5816da307c1f93a7" |
| } |
| }, |
| "4.4.14": { |
| "CVE-2016-4951": { |
| "cmt_msg": "tipc: check nl sock before parsing nested attributes", |
| "cmt_id": "23cdd8c3cbe9d790f23d7f9ae14e9b828f56f69c" |
| }, |
| "CVE-2016-4997": { |
| "cmt_msg": "netfilter: x_tables: check for bogus target offset", |
| "cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" |
| }, |
| "CVE-2016-4998": { |
| "cmt_msg": "netfilter: x_tables: check for bogus target offset", |
| "cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" |
| }, |
| "CVE-2016-3134": { |
| "cmt_msg": "netfilter: x_tables: fix unconditional helper", |
| "cmt_id": "5ebdccd7685f1c0b451c516f99082642d8d49003" |
| }, |
| "CVE-2016-9806": { |
| "cmt_msg": "netlink: Fix dump skb leak/double free", |
| "cmt_id": "49543942beb1b9ca95709d6cfa67708932aa4d11" |
| }, |
| "CVE-2016-1583": { |
| "cmt_msg": "proc: prevent stacking filesystems on top", |
| "cmt_id": "9beb96b344c846779f67d1be1cdafc66562b94ec" |
| } |
| }, |
| "4.4.16": { |
| "CVE-2016-4470": { |
| "cmt_msg": "KEYS: potential uninitialized variable", |
| "cmt_id": "398051f2f66ef4658c89388441d0c697d50c325c" |
| }, |
| "CVE-2016-6197": { |
| "cmt_msg": "ovl: verify upper dentry before unlink and rename", |
| "cmt_id": "dbf72a4d4531e7e5fb28e76d902d66f05c1bfe12" |
| }, |
| "CVE-2016-1237": { |
| "cmt_msg": "posix_acl: Add set_posix_acl", |
| "cmt_id": "c3fa141c1f288ac785c82ead9d06d1b5acd76d60" |
| }, |
| "CVE-2016-4794": { |
| "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", |
| "cmt_id": "c26ae537f16f653c2541df9e338013653fc3fcc7" |
| }, |
| "CVE-2016-5829": { |
| "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", |
| "cmt_id": "300851ff55f7777be2780207f1b60ad5e1fd1303" |
| }, |
| "CVE-2016-5828": { |
| "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", |
| "cmt_id": "5a35d2f92f1011145315f86a481f4f3e3f853095" |
| } |
| }, |
| "4.4.17": { |
| "CVE-2016-6156": { |
| "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl", |
| "cmt_id": "69ca969a2626dc4b3bb83b953c053a01e3b9f7e6" |
| }, |
| "CVE-2016-7911": { |
| "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", |
| "cmt_id": "5161144c3a9d6ea775b293edbb8523deaeff4442" |
| }, |
| "CVE-2016-4569": { |
| "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", |
| "cmt_id": "90bed827ea910f82ab17ee154f501b5ae71617e6" |
| }, |
| "CVE-2016-5400": { |
| "cmt_msg": "media: fix airspy usb probe error path", |
| "cmt_id": "d863bec646a590584eabcb40550bff0708c26b0d" |
| }, |
| "CVE-2016-4578": { |
| "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", |
| "cmt_id": "3e6af33c73fb7ec7be8dedd01047162ef64a26a5" |
| } |
| }, |
| "4.4.18": { |
| "CVE-2016-3672": { |
| "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", |
| "cmt_id": "979a61a02992e2029fcedcdf32c05050aa652c9c" |
| }, |
| "CVE-2016-5696": { |
| "cmt_msg": "tcp: make challenge acks less predictable", |
| "cmt_id": "72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf" |
| }, |
| "CVE-2016-3951": { |
| "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", |
| "cmt_id": "66e5d7b47c864f1821041f77752930ec3b8dfc22" |
| }, |
| "CVE-2017-7495": { |
| "cmt_msg": "ext4: fix data exposure after a crash", |
| "cmt_id": "5a7f477c725e866729307ff87011f8dd812a3cdf" |
| }, |
| "CVE-2016-7910": { |
| "cmt_msg": "block: fix use-after-free in seq file", |
| "cmt_id": "9a95c0cfc6f21b9ac66269d4782ea5a0f58cdf91" |
| }, |
| "CVE-2016-3857": { |
| "cmt_msg": "arm: oabi compat: add missing access checks", |
| "cmt_id": "0107ea0e0928c8a077f0f912c809f2b86fa7496c" |
| } |
| }, |
| "4.4.19": { |
| "CVE-2016-5412": { |
| "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", |
| "cmt_id": "e1a90eb8afa42b02f46897b881b9e19d3594159c" |
| }, |
| "CVE-2016-4482": { |
| "cmt_msg": "USB: usbfs: fix potential infoleak in devio", |
| "cmt_id": "4077ef4797a8ff007a2de091c9befee4882c4790" |
| }, |
| "CVE-2016-6136": { |
| "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", |
| "cmt_id": "53eaa3910ae67e497fb33188d515c14ed17a7a0e" |
| } |
| }, |
| "4.4.20": { |
| "CVE-2016-6480": { |
| "cmt_msg": "aacraid: Check size values after double-fetch from user", |
| "cmt_id": "e4878ef66e5b8d01d6734b1952f9abb3eeea454c" |
| } |
| }, |
| "4.4.21": { |
| "CVE-2016-10229": { |
| "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", |
| "cmt_id": "dfe2042d96065f044a794f684e9f7976a4ca6e24" |
| }, |
| "CVE-2016-5244": { |
| "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", |
| "cmt_id": "ffd5ce2ad5fd140ddd492ab2064e29e86aaa64ea" |
| }, |
| "CVE-2016-5243": { |
| "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", |
| "cmt_id": "5fb71611925f734f7fe03a45527e14b296fd5167" |
| }, |
| "CVE-2016-7915": { |
| "cmt_msg": "HID: core: prevent out-of-bound readings", |
| "cmt_id": "5349cdd3b49cea2d57dc05bbf3f313979751fed3" |
| }, |
| "CVE-2016-3135": { |
| "cmt_msg": "netfilter: x_tables: check for size overflow", |
| "cmt_id": "cfd6e7fe434a378127e4964fc0b7ccf32ae2baed" |
| }, |
| "CVE-2016-0758": { |
| "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", |
| "cmt_id": "5afbd223e60a130f66bddf7598165ebe2b51f8db" |
| }, |
| "CVE-2016-6130": { |
| "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", |
| "cmt_id": "2d29d6cec3bc5473efdad3b143404d9e32817c86" |
| } |
| }, |
| "4.4.22": { |
| "CVE-2016-9178": { |
| "cmt_msg": "fix minor infoleak in get_user_ex()", |
| "cmt_id": "9d25c78ec01c402dc56272693c44ef9d72ecdd2e" |
| }, |
| "CVE-2016-10318": { |
| "cmt_msg": "fscrypto: add authorization check for setting encryption policy", |
| "cmt_id": "8d693a2e67b5793ee58d106fded28902b7fd0f72" |
| } |
| }, |
| "4.4.23": { |
| "CVE-2016-6828": { |
| "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", |
| "cmt_id": "0f55fa7541d7ff34a6690438bb00b78521b98b54" |
| } |
| }, |
| "4.4.24": { |
| "CVE-2017-15102": { |
| "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", |
| "cmt_id": "62dd9cf78b280c8cd08162f8c4a490fb76deeb23" |
| }, |
| "CVE-2016-10044": { |
| "cmt_msg": "aio: mark AIO pseudo-fs noexec", |
| "cmt_id": "0d9529e1b881ae80b40270b55dcbf7468be0099c" |
| } |
| }, |
| "4.4.26": { |
| "CVE-2016-5195": { |
| "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", |
| "cmt_id": "1294d355881cc5c3421d24fee512f16974addb6c" |
| } |
| }, |
| "4.4.27": { |
| "CVE-2016-7425": { |
| "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", |
| "cmt_id": "24040922827859d1d69597c3bc0c31fad523fd21" |
| } |
| }, |
| "4.4.29": { |
| "CVE-2016-8666": { |
| "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", |
| "cmt_id": "5699b3431e0b14736867484b8669ead2d40f575e" |
| }, |
| "CVE-2016-8658": { |
| "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", |
| "cmt_id": "b82a7f93b4e60d8689d8f4e687ef58ed2098739f" |
| }, |
| "CVE-2016-9644": { |
| "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options", |
| "cmt_id": "fcf5e5198b447969ed2a56ec335dae3c695a6b46" |
| }, |
| "CVE-2016-7097": { |
| "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", |
| "cmt_id": "57c9cfdb61ea270936fab76da99a742c6ef0b86f" |
| } |
| }, |
| "4.4.31": { |
| "CVE-2016-7042": { |
| "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", |
| "cmt_id": "940d7ecbc57c94d6cd174d9d3247e07fd1b1467d" |
| }, |
| "CVE-2016-8633": { |
| "cmt_msg": "firewire: net: guard against rx buffer overflows", |
| "cmt_id": "46e14262a063714610b916404a20880fbd4cd0ce" |
| }, |
| "CVE-2016-8630": { |
| "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)", |
| "cmt_id": "91e1f7b0eb252ce8f88d69227ef5f52f9efb2aae" |
| } |
| }, |
| "4.4.32": { |
| "CVE-2016-7039": { |
| "cmt_msg": "net: add recursion limit to GRO", |
| "cmt_id": "3cb00b90e8b1bd59382f5e1304dd751f9674f027" |
| }, |
| "CVE-2016-9555": { |
| "cmt_msg": "sctp: validate chunk len before actually using it", |
| "cmt_id": "bd891f40f04f8b96d9148ff8a5d538b60171409c" |
| } |
| }, |
| "4.4.34": { |
| "CVE-2015-8964": { |
| "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", |
| "cmt_id": "4e772c53ab9836b083c21acf9d2d76805e1d133e" |
| }, |
| "CVE-2016-8645": { |
| "cmt_msg": "tcp: take care of truncations done by sk_filter()", |
| "cmt_id": "225a24ae97331f3b9d97c1bb97b1e30b3633bcf4" |
| } |
| }, |
| "4.4.36": { |
| "CVE-2016-9756": { |
| "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far", |
| "cmt_id": "b7f9404d1b488b6773c7a2e6da92aa6cb5bd125e" |
| }, |
| "CVE-2016-8650": { |
| "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", |
| "cmt_id": "249090830942565fb0ce7c1e018d927a14282ead" |
| } |
| }, |
| "4.4.37": { |
| "CVE-2016-9794": { |
| "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", |
| "cmt_id": "58cebd1a08ed114e05cc9d16dee9e5423f564c82" |
| } |
| }, |
| "4.4.38": { |
| "CVE-2016-9793": { |
| "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", |
| "cmt_id": "77125815f058d587cac9217ac2c468038a7285c4" |
| }, |
| "CVE-2016-10200": { |
| "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", |
| "cmt_id": "56366fa0ad46a59abe2460b8acb775f7f84fbf16" |
| }, |
| "CVE-2016-8655": { |
| "cmt_msg": "packet: fix race condition in packet_set_ring", |
| "cmt_id": "5a01eaf19858278cc22525be118fe9c6a3c86e83" |
| }, |
| "CVE-2016-8399": { |
| "cmt_msg": "net: ping: check minimum size on ICMP header length", |
| "cmt_id": "06cdad2b6d921dee33c8efc84922533dfb1458c6" |
| } |
| }, |
| "4.4.39": { |
| "CVE-2016-10147": { |
| "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", |
| "cmt_id": "9a3baed9103bc413a5e98e13e31cd8ae7c0b5563" |
| } |
| }, |
| "4.4.40": { |
| "CVE-2015-8709": { |
| "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", |
| "cmt_id": "03eed7afbc09e061f66b448daf7863174c3dc3f3" |
| } |
| }, |
| "4.4.41": { |
| "CVE-2016-9588": { |
| "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", |
| "cmt_id": "19aa9c14989e7a3fe04b444f146a05ff857b058e" |
| }, |
| "CVE-2016-10088": { |
| "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", |
| "cmt_id": "d85727365859108cbcf832c2b3c38358ddc7638b" |
| } |
| }, |
| "4.4.43": { |
| "CVE-2017-7273": { |
| "cmt_msg": "HID: hid-cypress: validate length of report", |
| "cmt_id": "a2f727149ee4e746da55d209a0179b68d31d3915" |
| } |
| }, |
| "4.4.44": { |
| "CVE-2017-2583": { |
| "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", |
| "cmt_id": "816307c80d4ddad5414a05ff5861f063d29cda6f" |
| }, |
| "CVE-2016-9191": { |
| "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", |
| "cmt_id": "b9d6631395a1e25b210ce112b1bc10f3c665ea20" |
| }, |
| "CVE-2017-5549": { |
| "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", |
| "cmt_id": "3ef5bc0b385f81e88574c29a13edf80f092d515f" |
| }, |
| "CVE-2017-2584": { |
| "cmt_msg": "KVM: x86: Introduce segmented_write_std", |
| "cmt_id": "9d3875c0c462808f4d59dfa18a79d4b5b235acbd" |
| } |
| }, |
| "4.4.45": { |
| "CVE-2017-5547": { |
| "cmt_msg": "HID: corsair: fix DMA buffers on stack", |
| "cmt_id": "0f37d20fdc70ee54f002bd77ce54a2a303ad0437" |
| }, |
| "CVE-2017-5551": { |
| "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", |
| "cmt_id": "36672b8b99e2cf2ab0587f08a19f394f8f65a861" |
| } |
| }, |
| "4.4.46": { |
| "CVE-2016-8405": { |
| "cmt_msg": "fbdev: color map copying bounds checking", |
| "cmt_id": "63db7c91a3c0ebe0e291feea53e4c63391db9465" |
| } |
| }, |
| "4.4.48": { |
| "CVE-2016-10208": { |
| "cmt_msg": "ext4: validate s_first_meta_bg at mount time", |
| "cmt_id": "e21a3cad35bc2f4c7fff317e2c7d38eed363a430" |
| } |
| }, |
| "4.4.49": { |
| "CVE-2017-2618": { |
| "cmt_msg": "selinux: fix off-by-one in setprocattr", |
| "cmt_id": "e72c13d93e9ed2b131ceb9a290ab056ce0dd41ab" |
| } |
| }, |
| "4.4.50": { |
| "CVE-2017-5986": { |
| "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", |
| "cmt_id": "a4226c7ebfb5748447f1640c97f0306ed69e44f8" |
| }, |
| "CVE-2017-5897": { |
| "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", |
| "cmt_id": "eaa3a58f450383aaa8632eea23f2a70d85c55d9d" |
| }, |
| "CVE-2017-6214": { |
| "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", |
| "cmt_id": "82e9f6b90a0e7fbc017bdce23845c7580db6f657" |
| }, |
| "CVE-2017-5970": { |
| "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", |
| "cmt_id": "2d9c2e011fd3f1be4e5643d6ad186faa5e50d4d1" |
| } |
| }, |
| "4.4.52": { |
| "CVE-2017-6345": { |
| "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", |
| "cmt_id": "2b3eb43342a00d03e953208f45866925ca255e15" |
| }, |
| "CVE-2017-6346": { |
| "cmt_msg": "packet: fix races in fanout_add()", |
| "cmt_id": "abd672deb170c4443e41173160de0ba2ae1abc08" |
| }, |
| "CVE-2017-6347": { |
| "cmt_msg": "ip: fix IP_CHECKSUM handling", |
| "cmt_id": "ce9ecb8d7f3c698c48b0885936d0b7275dacde9c" |
| }, |
| "CVE-2017-6348": { |
| "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", |
| "cmt_id": "353dd7290025bc33555282848ab015c1bbf21186" |
| }, |
| "CVE-2017-6074": { |
| "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", |
| "cmt_id": "a95df078e86624ee330e82aad34cfd3b5fcf21ce" |
| } |
| }, |
| "4.4.53": { |
| "CVE-2017-5669": { |
| "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", |
| "cmt_id": "f0ae01568e0cf4b00071d1dfd27c90022c2b6d7e" |
| } |
| }, |
| "4.4.54": { |
| "CVE-2017-2636": { |
| "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", |
| "cmt_id": "999853d941b99ca2ac4a331552c388e2603a9b1d" |
| } |
| }, |
| "4.4.55": { |
| "CVE-2016-2188": { |
| "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", |
| "cmt_id": "179295c38d23874357ca75af104fd6f1fe769cfd" |
| }, |
| "CVE-2017-8924": { |
| "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", |
| "cmt_id": "72bb2b96b8568a74f28e2a2c39e005583595b2c2" |
| }, |
| "CVE-2017-8925": { |
| "cmt_msg": "USB: serial: omninet: fix reference leaks at open", |
| "cmt_id": "54f11a9662b632defe4d75c7574fddbc5c503c9c" |
| } |
| }, |
| "4.4.59": { |
| "CVE-2017-7184": { |
| "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", |
| "cmt_id": "cce7e56dd73f75fef0a7f594fb129285a660fec0" |
| }, |
| "CVE-2017-7374": { |
| "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", |
| "cmt_id": "7a5202190810dde1467718235c1f650fcf57592a" |
| } |
| }, |
| "4.4.60": { |
| "CVE-2017-7187": { |
| "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", |
| "cmt_id": "a92f411914cad6532e82e4607bc4075a5ffaa366" |
| } |
| }, |
| "4.4.61": { |
| "CVE-2017-7261": { |
| "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", |
| "cmt_id": "b26629453c7b2a6c82000b36fbd1cfc4d9101808" |
| }, |
| "CVE-2017-7616": { |
| "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", |
| "cmt_id": "b73d08ce20c5cb2e0cec8c019a27b9574e2c4ec2" |
| }, |
| "CVE-2017-7294": { |
| "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", |
| "cmt_id": "c21636bd64c511160846bdf87ef4c7ff48680c99" |
| } |
| }, |
| "4.4.62": { |
| "CVE-2017-7308": { |
| "cmt_msg": "net/packet: fix overflow in check for priv area size", |
| "cmt_id": "d35f8fa0b93e61dd95b8f86928a783c4d8a32d3e" |
| } |
| }, |
| "4.4.63": { |
| "CVE-2017-6353": { |
| "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", |
| "cmt_id": "e2f5fb9207a6bd7101ad94e73264ac8bb9e3b87a" |
| }, |
| "CVE-2017-7618": { |
| "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", |
| "cmt_id": "2673d1c5122ee2492e24d9a135e230b2d0b2e630" |
| }, |
| "CVE-2017-8064": { |
| "cmt_msg": "dvb-usb-v2: avoid use-after-free", |
| "cmt_id": "0cb03b6e7086e59647cf6eb79fec646cdec69691" |
| }, |
| "CVE-2017-7889": { |
| "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", |
| "cmt_id": "6739cc12f3dbd7e4b3795f6e809d44ea6b490bb6" |
| }, |
| "CVE-2017-2596": { |
| "cmt_msg": "kvm: fix page struct leak in handle_vmon", |
| "cmt_id": "c1fc1d2f214e33f91565a65ad1b4c09dae618d84" |
| } |
| }, |
| "4.4.64": { |
| "CVE-2017-7472": { |
| "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", |
| "cmt_id": "c9460fbceb2f3efa1d20050cdbffa51ec025745a" |
| }, |
| "CVE-2016-9604": { |
| "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", |
| "cmt_id": "b5737b92560efcb956d2def4dcd3f4b6d4118e58" |
| } |
| }, |
| "4.4.65": { |
| "CVE-2016-7913": { |
| "cmt_msg": "xc2028: avoid use after free", |
| "cmt_id": "0d9dac5d7cc31df50757f26bcbdfbcf47277a1b2" |
| }, |
| "CVE-2016-6213": { |
| "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", |
| "cmt_id": "c50fd34e10897114a7be2120133bd7e0b4184024" |
| }, |
| "CVE-2016-8632": { |
| "cmt_msg": "tipc: check minimum bearer MTU", |
| "cmt_id": "65d30f7545ffdddcf10a59f3e54b032c5ade2e9d" |
| }, |
| "CVE-2017-2671": { |
| "cmt_msg": "ping: implement proper locking", |
| "cmt_id": "b7f47c794bc45eae975bf2a52a4463333111bb2a" |
| }, |
| "CVE-2016-9120": { |
| "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", |
| "cmt_id": "a7544fdd1626b65db635022c9d36007bb32dd6d8" |
| }, |
| "CVE-2016-9084": { |
| "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", |
| "cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" |
| }, |
| "CVE-2016-7917": { |
| "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages", |
| "cmt_id": "9540baadb61ba5ed08832bb2a4cbfd876db37ff4" |
| }, |
| "CVE-2016-9083": { |
| "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", |
| "cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" |
| }, |
| "CVE-2017-6001": { |
| "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", |
| "cmt_id": "416bd4a366f3b4cd3f6a3246f91bd9f425891547" |
| } |
| }, |
| "4.4.66": { |
| "CVE-2017-0750": { |
| "cmt_msg": "f2fs: do more integrity verification for superblock", |
| "cmt_id": "716bcfeb12b8d55d278af47b927839b382d2837a" |
| }, |
| "CVE-2017-7645": { |
| "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", |
| "cmt_id": "82a0d8aabe043ac94efa255502754c70363dab0e" |
| } |
| }, |
| "4.4.67": { |
| "CVE-2017-10661": { |
| "cmt_msg": "timerfd: Protect the might cancel mechanism proper", |
| "cmt_id": "911bd54922cdcc259daf73cb1a3a9d0305b9061d" |
| }, |
| "CVE-2017-7895": { |
| "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", |
| "cmt_id": "da1ce38aaac7f08d319b4b76130aa4fd27c4489f" |
| } |
| }, |
| "4.4.68": { |
| "CVE-2017-10662": { |
| "cmt_msg": "f2fs: sanity check segment count", |
| "cmt_id": "4edbdf57bc26a126aa3cbafd63fae4b00e002e2d" |
| } |
| }, |
| "4.4.70": { |
| "CVE-2017-18360": { |
| "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", |
| "cmt_id": "1e6e9c4c36f9626d5ad2b63aa7ad5686dde737e7" |
| }, |
| "CVE-2017-7487": { |
| "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", |
| "cmt_id": "8a5b15e198f1701da75a8223cfe72c04bcb15160" |
| }, |
| "CVE-2017-1000363": { |
| "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", |
| "cmt_id": "cda5c7e625cefed46311cb0b37816fb2ff42a8ee" |
| } |
| }, |
| "4.4.71": { |
| "CVE-2017-9077": { |
| "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", |
| "cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" |
| }, |
| "CVE-2017-9076": { |
| "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", |
| "cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" |
| }, |
| "CVE-2017-9075": { |
| "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", |
| "cmt_id": "ffa551def59c9b0e1747955af6a742443ae152fc" |
| }, |
| "CVE-2017-9074": { |
| "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", |
| "cmt_id": "017fabead5c2aacb36df910bbfbfb1e813517ae3" |
| }, |
| "CVE-2017-18221": { |
| "cmt_msg": "mlock: fix mlock count can not decrease in race condition", |
| "cmt_id": "03489bfc78304a0be057ec827a67c0d87dd97b2e" |
| }, |
| "CVE-2017-8890": { |
| "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", |
| "cmt_id": "5f67a1663c03a73962fb240cf821338f78981a23" |
| }, |
| "CVE-2017-9242": { |
| "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", |
| "cmt_id": "38f02f2ce0ca58c45d95567a5d64f7dc90aa9c95" |
| } |
| }, |
| "4.4.72": { |
| "CVE-2017-9605": { |
| "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", |
| "cmt_id": "74276868b45585f77eae2372c95e016aacfd0d3c" |
| }, |
| "CVE-2017-15274": { |
| "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", |
| "cmt_id": "bc6be3433e694d1ab1d0012b6053ae4e9a3b189e" |
| }, |
| "CVE-2017-7346": { |
| "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", |
| "cmt_id": "619cc02fd85d69270c95e7db320b305e975aae00" |
| }, |
| "CVE-2017-1000380": { |
| "cmt_msg": "ALSA: timer: Fix race between read and ioctl", |
| "cmt_id": "f5bc918760c8100410847a6a6e4c25f24e358e0c" |
| } |
| }, |
| "4.4.74": { |
| "CVE-2017-1000364": { |
| "cmt_msg": "mm: larger stack guard gap, between vmas", |
| "cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" |
| }, |
| "CVE-2017-1000379": { |
| "cmt_msg": "mm: larger stack guard gap, between vmas", |
| "cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" |
| } |
| }, |
| "4.4.75": { |
| "CVE-2017-1000365": { |
| "cmt_msg": "fs/exec.c: account for argv/envp pointers", |
| "cmt_id": "1d3d0f8b7cf758136ed36b30620442d989601737" |
| }, |
| "CVE-2017-7482": { |
| "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", |
| "cmt_id": "eab38dfd66d7f13b9eecfae7728ff0d2e49ff16f" |
| } |
| }, |
| "4.4.76": { |
| "CVE-2017-18017": { |
| "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", |
| "cmt_id": "234e649840d191379cd132d89f4b01a2495cfcc3" |
| } |
| }, |
| "4.4.77": { |
| "CVE-2017-11176": { |
| "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", |
| "cmt_id": "034e10b4f8348c2c267e491d1e2872023c35f310" |
| }, |
| "CVE-2017-10810": { |
| "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", |
| "cmt_id": "a080ec466c3412dcf58cff69d6c05d1e670adc0c" |
| }, |
| "CVE-2017-12146": { |
| "cmt_msg": "driver core: platform: fix race condition with driver_override", |
| "cmt_id": "c01ace719ebe6353f0c96e56f6c75c22ad3f67b0" |
| } |
| }, |
| "4.4.78": { |
| "CVE-2019-9457": { |
| "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", |
| "cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" |
| }, |
| "CVE-2018-14634": { |
| "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", |
| "cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" |
| }, |
| "CVE-2017-11089": { |
| "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", |
| "cmt_id": "05bf0b6ef9ce7e8967c96fd419ad0ee5d7fe5418" |
| }, |
| "CVE-2017-7541": { |
| "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", |
| "cmt_id": "4c7021c2fb74047649c03845ce6fd13626a5a418" |
| }, |
| "CVE-2017-1000371": { |
| "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", |
| "cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" |
| }, |
| "CVE-2017-1000370": { |
| "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", |
| "cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" |
| } |
| }, |
| "4.4.79": { |
| "CVE-2017-11473": { |
| "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", |
| "cmt_id": "fa7ddee3485f17c28fe4079954c5716036de6152" |
| }, |
| "CVE-2017-18079": { |
| "cmt_msg": "Input: i8042 - fix crash at boot time", |
| "cmt_id": "bba6b69e11777695256619a77f90081ac7f99de7" |
| } |
| }, |
| "4.4.80": { |
| "CVE-2017-7533": { |
| "cmt_msg": "dentry name snapshots", |
| "cmt_id": "407669f2c9fe9f32aeb39f715d748fe456718aac" |
| }, |
| "CVE-2016-10741": { |
| "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", |
| "cmt_id": "56548b6f505a6df1c43dcb151a18d6190c250ed6" |
| }, |
| "CVE-2017-12762": { |
| "cmt_msg": "isdn/i4l: fix buffer overflow", |
| "cmt_id": "d4b159f14d612132fdb1ade6d5015ee03a263e62" |
| } |
| }, |
| "4.4.81": { |
| "CVE-2017-10663": { |
| "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", |
| "cmt_id": "76517ed2a7fe059840c1984165984e69cb488568" |
| }, |
| "CVE-2017-8831": { |
| "cmt_msg": "saa7164: fix double fetch PCIe access condition", |
| "cmt_id": "deae9956cfb42f3d480c71f416f934d3ce84c033" |
| }, |
| "CVE-2017-7542": { |
| "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", |
| "cmt_id": "f09db7559c1faf6f7c2128a92050b978a480681c" |
| } |
| }, |
| "4.4.82": { |
| "CVE-2017-1000": { |
| "cmt_msg": "udp: consistently apply ufo or fragmentation", |
| "cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" |
| }, |
| "CVE-2017-1000112": { |
| "cmt_msg": "udp: consistently apply ufo or fragmentation", |
| "cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" |
| }, |
| "CVE-2017-1000111": { |
| "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", |
| "cmt_id": "63364a508d24944abb0975bd823cb11367c56283" |
| } |
| }, |
| "4.4.84": { |
| "CVE-2017-12134": { |
| "cmt_msg": "xen: fix bio vec merging", |
| "cmt_id": "c0b397fd6b2b8ed7b39a717340b85b4b1add5332" |
| }, |
| "CVE-2017-14140": { |
| "cmt_msg": "Sanitize 'move_pages()' permission checks", |
| "cmt_id": "46d51a26efbc7cbaa2bc1f01628a00a604193856" |
| }, |
| "CVE-2018-10675": { |
| "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", |
| "cmt_id": "cc971fa12bd2dff6c0432c860d784c6cdaf5a04b" |
| } |
| }, |
| "4.4.87": { |
| "CVE-2017-11600": { |
| "cmt_msg": "xfrm: policy: check policy direction value", |
| "cmt_id": "9b3dcc98d8df16913d260c8dae64ad6e5bfcb953" |
| } |
| }, |
| "4.4.88": { |
| "CVE-2017-14340": { |
| "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", |
| "cmt_id": "ad3903434142953a03b84ec8719ce80373a62266" |
| }, |
| "CVE-2017-1000251": { |
| "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", |
| "cmt_id": "f7ec367c8ea7021517c9c04b0022c225d2d0785a" |
| }, |
| "CVE-2017-9985": { |
| "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", |
| "cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" |
| }, |
| "CVE-2017-9984": { |
| "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", |
| "cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" |
| } |
| }, |
| "4.4.89": { |
| "CVE-2017-14106": { |
| "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", |
| "cmt_id": "611a98c8eca3098173309642df187056c17e0f65" |
| }, |
| "CVE-2017-14991": { |
| "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", |
| "cmt_id": "72896ca30a7f6ceb5238714d5761e4ad4521ccc5" |
| }, |
| "CVE-2017-14051": { |
| "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", |
| "cmt_id": "d8663aa2778965c75b5e75c7948b44f5de601a88" |
| }, |
| "CVE-2017-0627": { |
| "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", |
| "cmt_id": "4931578fbeb525e717a7aa96f83f4d85cf48d0b2" |
| } |
| }, |
| "4.4.90": { |
| "CVE-2020-14353": { |
| "cmt_msg": "KEYS: prevent creating a different user's keyrings", |
| "cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" |
| }, |
| "CVE-2017-14156": { |
| "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", |
| "cmt_id": "27323cb81eae618e68e4dea1345090c37dee5485" |
| }, |
| "CVE-2017-12153": { |
| "cmt_msg": "nl80211: check for the required netlink attributes presence", |
| "cmt_id": "9d74367d1a35e87f46e5e0c2e8dd9f5d21f701b0" |
| }, |
| "CVE-2017-1000252": { |
| "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", |
| "cmt_id": "7520be6a454c28955e711fdb49c81519bc537b39" |
| }, |
| "CVE-2017-12154": { |
| "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", |
| "cmt_id": "21a638c5efd6ec7a10441bfb94e15e5288920f07" |
| }, |
| "CVE-2017-18270": { |
| "cmt_msg": "KEYS: prevent creating a different user's keyrings", |
| "cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" |
| }, |
| "CVE-2017-14489": { |
| "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", |
| "cmt_id": "9d2534917c25a58b67864ea1db930670d48dee75" |
| }, |
| "CVE-2017-12192": { |
| "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", |
| "cmt_id": "638b38505045e1090313ff7ed284911870cd29f8" |
| }, |
| "CVE-2017-15537": { |
| "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", |
| "cmt_id": "d25fea066a8ed4457a9f8b23eb78204b9b6896cf" |
| } |
| }, |
| "4.4.92": { |
| "CVE-2017-16526": { |
| "cmt_msg": "uwb: properly check kthread_run return value", |
| "cmt_id": "5a21af11c6810b936b17a2c5c69518be0da8f4c3" |
| }, |
| "CVE-2017-16534": { |
| "cmt_msg": "USB: core: harden cdc_parse_cdc_header", |
| "cmt_id": "feab51a916ed07219dee38b898fe22bd2a98193a" |
| }, |
| "CVE-2017-16531": { |
| "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", |
| "cmt_id": "13713e63bdb306f9a58d359b15edd60f34eac5ee" |
| }, |
| "CVE-2017-16530": { |
| "cmt_msg": "USB: uas: fix bug in handling of alternate settings", |
| "cmt_id": "5d9a9c3dcc1f63215b5a5b877be589974ec4f31d" |
| }, |
| "CVE-2017-16529": { |
| "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", |
| "cmt_id": "46c7b1fa4911a859a82575e3ffb55b34a89a222d" |
| } |
| }, |
| "4.4.93": { |
| "CVE-2017-0786": { |
| "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", |
| "cmt_id": "6721969c7b8a35f85a41acaabdad190ed32cf704" |
| }, |
| "CVE-2017-16527": { |
| "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", |
| "cmt_id": "dc7c3bd09c7d2063c4d1be23d72ee85f1b3bb947" |
| }, |
| "CVE-2017-16525": { |
| "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", |
| "cmt_id": "208563455aac7540755bb9d8e8edaf7c5ef61d8c" |
| }, |
| "CVE-2017-16533": { |
| "cmt_msg": "HID: usbhid: fix out-of-bounds bug", |
| "cmt_id": "2929cb995378205bceda86d6fd3cbc22e522f97f" |
| }, |
| "CVE-2017-15265": { |
| "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", |
| "cmt_id": "23709ae9b61429502fcd4686e7a97333f3b3544a" |
| }, |
| "CVE-2017-12190": { |
| "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", |
| "cmt_id": "399c46095eb5d41934c8a99732028a9f1cf0ac50" |
| } |
| }, |
| "4.4.94": { |
| "CVE-2018-9568": { |
| "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", |
| "cmt_id": "685699703a0a39896ba0af91e6d2a80103fe4966" |
| }, |
| "CVE-2017-15649": { |
| "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", |
| "cmt_id": "1b6c80e797eeadf643861f8340ed5791d813d80c" |
| } |
| }, |
| "4.4.95": { |
| "CVE-2017-15299": { |
| "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", |
| "cmt_id": "33dea302f9bc1e2c41392a308cfb50f6c02bb096" |
| }, |
| "CVE-2017-16535": { |
| "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", |
| "cmt_id": "9dff499d822660c6dbb2a407a7d85be26f87da07" |
| }, |
| "CVE-2017-15951": { |
| "cmt_msg": "KEYS: Fix race between updating and finding a negative key", |
| "cmt_id": "8a004caec12bf241e567e3640401256cc9bc2e45" |
| } |
| }, |
| "4.4.96": { |
| "CVE-2017-16643": { |
| "cmt_msg": "Input: gtco - fix potential out-of-bound access", |
| "cmt_id": "2c99438cf66d585ba939068c8b8562e9104cd5c4" |
| }, |
| "CVE-2017-12193": { |
| "cmt_msg": "assoc_array: Fix a buggy node-splitting case", |
| "cmt_id": "1cbbd99f3bfe27115c05332e7db73e23651b9f8b" |
| } |
| }, |
| "4.4.99": { |
| "CVE-2018-7191": { |
| "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", |
| "cmt_id": "4b27fe34a226dd9087cb2e93161ffec03952c05a" |
| }, |
| "CVE-2017-13080": { |
| "cmt_msg": "mac80211: accept key reinstall without changing anything", |
| "cmt_id": "6440f0ee8a1779f53526bccb9de00914daeb9094" |
| }, |
| "CVE-2017-16645": { |
| "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", |
| "cmt_id": "b7c625ce6d279bf3e138c25c0cd3f595923825f3" |
| }, |
| "CVE-2017-16528": { |
| "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", |
| "cmt_id": "1e98fd54c356bb2bcf827a74949c9372c455409f" |
| }, |
| "CVE-2017-16532": { |
| "cmt_msg": "usb: usbtest: fix NULL pointer dereference", |
| "cmt_id": "de46c1adbea694109036d3e7dee1fa6250b72660" |
| } |
| }, |
| "4.4.100": { |
| "CVE-2017-16537": { |
| "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", |
| "cmt_id": "c344019c48a92e559b7f910e53e0c6f9018680fb" |
| }, |
| "CVE-2017-9150": { |
| "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", |
| "cmt_id": "49630dd2e10a3b2fee0cec19feb63f08453b876f" |
| }, |
| "CVE-2017-10911": { |
| "cmt_msg": "xen-blkback: don't leak stack data via response ring", |
| "cmt_id": "11e8e55be18cd39c3d54674362aa18695b243e22" |
| }, |
| "CVE-2017-16646": { |
| "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", |
| "cmt_id": "0a418e57717d2d33275e9340c726ded671be7698" |
| }, |
| "CVE-2017-16650": { |
| "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", |
| "cmt_id": "e455048c7ae95633c8778a0282d1ee86f78c5349" |
| }, |
| "CVE-2017-7518": { |
| "cmt_msg": "KVM: x86: fix singlestepping over syscall", |
| "cmt_id": "07e3aff243cdcb70d1e81e515aea553df3080f43" |
| }, |
| "CVE-2017-16649": { |
| "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", |
| "cmt_id": "caeeef8438c30e7d0e43293fcb7beb9f953bb2a9" |
| }, |
| "CVE-2017-15115": { |
| "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", |
| "cmt_id": "46bdabbca02ebabd292d0ea3f610aa54e53f0e25" |
| } |
| }, |
| "4.4.101": { |
| "CVE-2017-18204": { |
| "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", |
| "cmt_id": "c4baa4a5870cb02f713def1620052bfca7a82bbb" |
| }, |
| "CVE-2017-16994": { |
| "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", |
| "cmt_id": "a3805b10de80953db316985f567453fc18329423" |
| } |
| }, |
| "4.4.103": { |
| "CVE-2017-18203": { |
| "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", |
| "cmt_id": "4e82464aa4a398207e2ecbc4877c82319ecdbafa" |
| }, |
| "CVE-2017-16536": { |
| "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", |
| "cmt_id": "0870fb4c3566088dc222e582e43edbc9ececbce4" |
| } |
| }, |
| "4.4.104": { |
| "CVE-2017-16939": { |
| "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", |
| "cmt_id": "b377c453b3631531679cbe594b7d28c5ecd82cea" |
| }, |
| "CVE-2017-18208": { |
| "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", |
| "cmt_id": "0d05a5593f6309cb0df0df474a807a3220855703" |
| } |
| }, |
| "4.4.106": { |
| "CVE-2017-0861": { |
| "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", |
| "cmt_id": "659e7d2588f0fd970044fe00d9edeb482d375288" |
| }, |
| "CVE-2018-7492": { |
| "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", |
| "cmt_id": "6c154d536d9457bee261d057559e43d3f8ae5fd5" |
| }, |
| "CVE-2017-1000407": { |
| "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", |
| "cmt_id": "477b837533a2f592702d2affab36b8052691287b" |
| }, |
| "CVE-2018-18559": { |
| "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", |
| "cmt_id": "b90f87c641bc9af04f0d8a21008880ae032de72c" |
| } |
| }, |
| "4.4.107": { |
| "CVE-2017-17558": { |
| "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", |
| "cmt_id": "dfdf5fa3e6647c0fc02be8d857b6b8b7098946ff" |
| }, |
| "CVE-2017-17806": { |
| "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", |
| "cmt_id": "43cd7f38612df31fbd929588c065cfbc42102aab" |
| }, |
| "CVE-2017-17805": { |
| "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", |
| "cmt_id": "8a311b0462b59d12cb14e82e626d3612d988135b" |
| }, |
| "CVE-2017-17807": { |
| "cmt_msg": "KEYS: add missing permission check for request_key() destination", |
| "cmt_id": "13e86efb2eee6bd1f2d0aae5b0273e8e65683c9d" |
| }, |
| "CVE-2017-16914": { |
| "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", |
| "cmt_id": "2862cfca39894ac265fbb5cde9a3ff90c02201f3" |
| } |
| }, |
| "4.4.109": { |
| "CVE-2017-17712": { |
| "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", |
| "cmt_id": "be27b620a861dc2a143b78e81e23f5622d9105da" |
| }, |
| "CVE-2017-18595": { |
| "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", |
| "cmt_id": "c2a62f84d49ff71cd7ffbe898c706ccc39955218" |
| }, |
| "CVE-2017-15129": { |
| "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", |
| "cmt_id": "5854ca90c6c6c2ed65355eded45615bf8bcd6fd3" |
| }, |
| "CVE-2018-18386": { |
| "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", |
| "cmt_id": "2e3883922530aa25ecc23cc27bab1d3fda779f5a" |
| }, |
| "CVE-2017-17449": { |
| "cmt_msg": "netlink: Add netns check on taps", |
| "cmt_id": "f778ce6faa0d4c8d7a90b7bd11c3db7fb687c8cc" |
| } |
| }, |
| "4.4.111": { |
| "CVE-2017-18075": { |
| "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", |
| "cmt_id": "3ad85176e78d6671ede52eed588c3588d087b587" |
| } |
| }, |
| "4.4.112": { |
| "CVE-2017-13216": { |
| "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", |
| "cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392" |
| }, |
| "CVE-2017-17741": { |
| "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", |
| "cmt_id": "eb91461daa77eb0ddb4c24aa427051f3669ba1f3" |
| }, |
| "CVE-2018-5333": { |
| "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", |
| "cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b" |
| }, |
| "CVE-2017-1000410": { |
| "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", |
| "cmt_id": "0ae86454c435e554d01c51535c3cd4312577cc74" |
| }, |
| "CVE-2018-5332": { |
| "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", |
| "cmt_id": "10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c" |
| } |
| }, |
| "4.4.113": { |
| "CVE-2018-6927": { |
| "cmt_msg": "futex: Prevent overflow by strengthen input validation", |
| "cmt_id": "58c82be944f58561e77eb9db5039a4b0eca96ac5" |
| } |
| }, |
| "4.4.114": { |
| "CVE-2017-16913": { |
| "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", |
| "cmt_id": "b6f826ba10dce86f74efd3c0953cb9982a3c51e2" |
| }, |
| "CVE-2017-16912": { |
| "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", |
| "cmt_id": "80e733a9b37fb6b40351bf1924d5a90d89c375ae" |
| }, |
| "CVE-2017-16911": { |
| "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", |
| "cmt_id": "28f467e0bdda754aa36390fd90b01823f0d3b18d" |
| }, |
| "CVE-2017-11472": { |
| "cmt_msg": "ACPICA: Namespace: fix operand cache leak", |
| "cmt_id": "4c19b00e5588828f0d3198b926efade766dcf2c8" |
| }, |
| "CVE-2018-1000028": { |
| "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", |
| "cmt_id": "3f84339bd344b2cf0afe64b78d3964bb6422d0f3" |
| }, |
| "CVE-2017-17448": { |
| "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", |
| "cmt_id": "a359a437fbc6bb08aa9cc8e25ef4ac3b77ca727b" |
| }, |
| "CVE-2017-17450": { |
| "cmt_msg": "netfilter: xt_osf: Add missing permission checks", |
| "cmt_id": "d01ceb4722cd8d64176272434fe332b596750d9c" |
| } |
| }, |
| "4.4.115": { |
| "CVE-2018-5344": { |
| "cmt_msg": "loop: fix concurrent lo_open/lo_release", |
| "cmt_id": "b392225467b8066538dfa200dc925c844b76880b" |
| }, |
| "CVE-2018-1000004": { |
| "cmt_msg": "ALSA: seq: Make ioctls race-free", |
| "cmt_id": "623e5c8ae32b39cc8baea83478695dc624935318" |
| }, |
| "CVE-2017-17862": { |
| "cmt_msg": "bpf: fix branch pruning logic", |
| "cmt_id": "1367d854b97493bfb1f3d24cf89ba60cb7f059ea" |
| } |
| }, |
| "4.4.116": { |
| "CVE-2018-5873": { |
| "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", |
| "cmt_id": "49ffe04fcdf29c8925344bce314d9398b2d7743d" |
| }, |
| "CVE-2017-8824": { |
| "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", |
| "cmt_id": "3196c1515ea683bb6f95673feb2998f605ab581d" |
| }, |
| "CVE-2017-16538": { |
| "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", |
| "cmt_id": "ca48c81cff0e5b56e525414b75990bcb64b7cbb9" |
| }, |
| "CVE-2018-5750": { |
| "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", |
| "cmt_id": "591060a7a0a09cbaa5b6c04bd309966586aa9d2e" |
| }, |
| "CVE-2017-13305": { |
| "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", |
| "cmt_id": "33813d43dd593e1c32c567c75483233212b825ae" |
| }, |
| "CVE-2017-18344": { |
| "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", |
| "cmt_id": "77f56f5d39e95a152a755d53b0d870b92fbf466b" |
| } |
| }, |
| "4.4.117": { |
| "CVE-2018-7566": { |
| "cmt_msg": "ALSA: seq: Fix racy pool initializations", |
| "cmt_id": "b374197df2deb08fec55d48763711ea1df8efde7" |
| } |
| }, |
| "4.4.120": { |
| "CVE-2017-18193": { |
| "cmt_msg": "f2fs: fix a bug caused by NULL extent tree", |
| "cmt_id": "023ca5b884d2759b56dc8d480942835881853513" |
| } |
| }, |
| "4.4.121": { |
| "CVE-2018-5803": { |
| "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", |
| "cmt_id": "54b183ea4fe96c7b80439971ee04cf634a6e0459" |
| } |
| }, |
| "4.4.122": { |
| "CVE-2018-1068": { |
| "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", |
| "cmt_id": "6d31b2ef34fd718386a73c983877461bca58d3db" |
| }, |
| "CVE-2018-7995": { |
| "cmt_msg": "x86/MCE: Serialize sysfs changes", |
| "cmt_id": "e882c0baab3325c409d21edc24254c515d90d160" |
| }, |
| "CVE-2018-1065": { |
| "cmt_msg": "netfilter: add back stackpointer size checks", |
| "cmt_id": "48db3004d40d97d3ac205d2d64ab580a8cfcfe63" |
| }, |
| "CVE-2019-9456": { |
| "cmt_msg": "usb: usbmon: Read text within supplied buffer size", |
| "cmt_id": "abe0ecd5597c31c6b70dc347145789000f4cf68f" |
| } |
| }, |
| "4.4.123": { |
| "CVE-2018-7480": { |
| "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", |
| "cmt_id": "633a5a5235d697b145171ca1e702d3a4f6778131" |
| }, |
| "CVE-2017-16995": { |
| "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", |
| "cmt_id": "a6132276ab5dcc38b3299082efeb25b948263adb" |
| } |
| }, |
| "4.4.124": { |
| "CVE-2017-18222": { |
| "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", |
| "cmt_id": "7d7100094cd83e84ce53c51155ee9f507e2e9028" |
| }, |
| "CVE-2018-1066": { |
| "cmt_msg": "CIFS: Enable encryption during session setup phase", |
| "cmt_id": "26dc7476efad2151aadb7f72c0c8a253823ef289" |
| } |
| }, |
| "4.4.125": { |
| "CVE-2018-8822": { |
| "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", |
| "cmt_id": "badf74b65fc27112f5fee871c7ade9199c74b2e1" |
| }, |
| "CVE-2018-8781": { |
| "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", |
| "cmt_id": "224eaa8a8e644e0d3df35fe232b08fd8fead8864" |
| }, |
| "CVE-2018-1087": { |
| "cmt_msg": "kvm/x86: fix icebp instruction handling", |
| "cmt_id": "5e4e65a940c91b61bfaf8d6e4448522577beb5ef" |
| }, |
| "CVE-2018-8897": { |
| "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", |
| "cmt_id": "c6fe55e30bb6d431ee56cd4bbb582e30766c5e0e" |
| } |
| }, |
| "4.4.126": { |
| "CVE-2018-1130": { |
| "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", |
| "cmt_id": "de31c391673aeb2c1d09552ac75a6b7ee96d65ac" |
| } |
| }, |
| "4.4.127": { |
| "CVE-2018-1000199": { |
| "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", |
| "cmt_id": "d60017da67463bd7a11a7f7e08115be324afe216" |
| }, |
| "CVE-2017-17975": { |
| "cmt_msg": "media: usbtv: prevent double free in error case", |
| "cmt_id": "607a6b7b6a7ad995c4c9cf3c2df66dc3f4febb52" |
| } |
| }, |
| "4.4.128": { |
| "CVE-2018-9422": { |
| "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", |
| "cmt_id": "93dcb09e29bb24a86aa7b7eff65e424f7dc98af2" |
| }, |
| "CVE-2018-7757": { |
| "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", |
| "cmt_id": "92b72d2f84389e27d81c93beaf9093f8cf1ef449" |
| } |
| }, |
| "4.4.129": { |
| "CVE-2018-1092": { |
| "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", |
| "cmt_id": "990251318b97ed7153d9adbf633035536c7d685b" |
| } |
| }, |
| "4.4.130": { |
| "CVE-2018-10940": { |
| "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", |
| "cmt_id": "e47611257d7b46bfdc70726a8a236881180cf990" |
| } |
| }, |
| "4.4.131": { |
| "CVE-2018-9415": { |
| "cmt_msg": "ARM: amba: Fix race condition with driver_override", |
| "cmt_id": "7488404d3bab4eccb590c80c8827520394444630" |
| }, |
| "CVE-2018-9385": { |
| "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", |
| "cmt_id": "30a80ca6dbbda67b0c902448993ed6a35b52612a" |
| }, |
| "CVE-2018-1093": { |
| "cmt_msg": "ext4: add validity checks for bitmap block numbers", |
| "cmt_id": "ea057aed06d8f13d931652bc4faa604ac0c50aa2" |
| } |
| }, |
| "4.4.132": { |
| "CVE-2017-18257": { |
| "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", |
| "cmt_id": "0678adf8f8a99c66c48c608ea9a79588743bc615" |
| }, |
| "CVE-2017-18255": { |
| "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", |
| "cmt_id": "609124d60341bf8870318c201cec50548824f2e2" |
| } |
| }, |
| "4.4.133": { |
| "CVE-2018-5814": { |
| "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", |
| "cmt_id": "02995a5882371a9fca3033fd356598a805d46040" |
| }, |
| "CVE-2018-10087": { |
| "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", |
| "cmt_id": "ea00b22b02f228cb58ee6c6707c86ec270e37fba" |
| }, |
| "CVE-2018-10021": { |
| "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", |
| "cmt_id": "6efcc74e1b0c16aebf5d8107543ce63475af35c1" |
| }, |
| "CVE-2018-1000204": { |
| "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", |
| "cmt_id": "93314640426ddb6af618d0802e622f6fa771792c" |
| } |
| }, |
| "4.4.134": { |
| "CVE-2018-10124": { |
| "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", |
| "cmt_id": "cb1c92e55420dad73ce717ef4029dd6e984dcbd0" |
| }, |
| "CVE-2018-9518": { |
| "cmt_msg": "NFC: llcp: Limit size of SDP URI", |
| "cmt_id": "50e54d56744cda70a1c3bc980c56e461ecde3a6d" |
| }, |
| "CVE-2017-13695": { |
| "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", |
| "cmt_id": "dfcb739c20d88461fbd0dc007670f63ad82db881" |
| }, |
| "CVE-2018-6412": { |
| "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", |
| "cmt_id": "bfffc2c3f56b462cdf5eeea639d898a69b323001" |
| } |
| }, |
| "4.4.137": { |
| "CVE-2019-18675": { |
| "cmt_msg": "mmap: introduce sane default mmap limits", |
| "cmt_id": "bd2f9ce5bacb15ad54fc6c345480c4df0c76c3ee" |
| } |
| }, |
| "4.4.139": { |
| "CVE-2018-13406": { |
| "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", |
| "cmt_id": "842803e4a66bd2a0b663dae18b80535a575d427f" |
| } |
| }, |
| "4.4.140": { |
| "CVE-2018-10878": { |
| "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", |
| "cmt_id": "afa9c75025bd1e24ccdc56fa331e865b626769e6" |
| }, |
| "CVE-2018-9516": { |
| "cmt_msg": "HID: debug: check length before copy_to_user()", |
| "cmt_id": "ef111ea31575bdc50c0c914fe036a1d0ad0cae4e" |
| }, |
| "CVE-2017-13168": { |
| "cmt_msg": "scsi: sg: mitigate read/write abuse", |
| "cmt_id": "9a737329c7c4a341009b7398164db8fa8e5358f0" |
| }, |
| "CVE-2018-10877": { |
| "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", |
| "cmt_id": "353ebd3e98869b50ed47364d05acdf679c2c05c6" |
| }, |
| "CVE-2018-10876": { |
| "cmt_msg": "ext4: only look at the bg_flags field if it is valid", |
| "cmt_id": "db3b00e3f392e9f879f7fd202437e68f90f35765" |
| }, |
| "CVE-2018-10879": { |
| "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", |
| "cmt_id": "b7d29dc8fe8d23243d3d87109099bdc34a684712" |
| }, |
| "CVE-2018-10881": { |
| "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", |
| "cmt_id": "b88fc699a023e0ef86f647c3d48a17d7cfff1f2a" |
| }, |
| "CVE-2018-10882": { |
| "cmt_msg": "ext4: add more inode number paranoia checks", |
| "cmt_id": "ff6c96461be35381399466ad58f02b8d78ab480a" |
| }, |
| "CVE-2018-10883": { |
| "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", |
| "cmt_id": "2cd33a53177ce739fe5f68052b2a737f1c40b425" |
| } |
| }, |
| "4.4.141": { |
| "CVE-2018-13405": { |
| "cmt_msg": "Fix up non-directory creation in SGID directories", |
| "cmt_id": "e71dbad7563db674f91af9e12ef592c107d0c2cd" |
| }, |
| "CVE-2018-16276": { |
| "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", |
| "cmt_id": "2638a67a0c50a97e0564491325c24c2c12083dbb" |
| } |
| }, |
| "4.4.143": { |
| "CVE-2017-18216": { |
| "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", |
| "cmt_id": "b9e22bd82856a794986d75bb3bb585b8bfbf4d99" |
| } |
| }, |
| "4.4.144": { |
| "CVE-2017-5754": { |
| "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", |
| "cmt_id": "7169b43e7c68edd550efa812c295685947ffa8a0" |
| }, |
| "CVE-2018-3639": { |
| "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", |
| "cmt_id": "b2dab2dc776cea8e1f190523456b32b850506ce3" |
| }, |
| "CVE-2018-10902": { |
| "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", |
| "cmt_id": "01b6ca65e10f2669965fbc62440cb9b09a25d086" |
| } |
| }, |
| "4.4.146": { |
| "CVE-2018-14734": { |
| "cmt_msg": "infiniband: fix a possible use-after-free bug", |
| "cmt_id": "52175c849bd4c01dd14038b4401d5044d99a6b0a" |
| } |
| }, |
| "4.4.147": { |
| "CVE-2018-12233": { |
| "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", |
| "cmt_id": "0749d5b3ec62310b747751ea7d4d5ccca51bc80f" |
| } |
| }, |
| "4.4.148": { |
| "CVE-2018-15572": { |
| "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", |
| "cmt_id": "7744abbe29a59db367f59b0c9890356732f25a3b" |
| } |
| }, |
| "4.4.149": { |
| "CVE-2018-9363": { |
| "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", |
| "cmt_id": "17c1e0b1f6a161cc4f533d4869ff574273dbfe8d" |
| } |
| }, |
| "4.4.152": { |
| "CVE-2018-3693": { |
| "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", |
| "cmt_id": "a89f83823b97b6da1ecf7a51184b28822e78cc07" |
| } |
| }, |
| "4.4.154": { |
| "CVE-2018-10938": { |
| "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", |
| "cmt_id": "8ed0ff83f5fd0ca412a52bd71af332598c01ca46" |
| }, |
| "CVE-2018-16658": { |
| "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", |
| "cmt_id": "eb08a285899df82056f712421988c6ccd0b58ba6" |
| } |
| }, |
| "4.4.155": { |
| "CVE-2019-12881": { |
| "cmt_msg": "drm/i915/userptr: reject zero user_size", |
| "cmt_id": "182e963432d867384f2e55487ec60ca7a9f99cd1" |
| } |
| }, |
| "4.4.156": { |
| "CVE-2018-6554": { |
| "cmt_msg": "staging: irda: remove the irda network stack and drivers", |
| "cmt_id": "4a7811bb3ae10d76d9e76c2b0ce7b27bc02a9370" |
| }, |
| "CVE-2018-6555": { |
| "cmt_msg": "staging: irda: remove the irda network stack and drivers", |
| "cmt_id": "131a3b82c853483b1809cad06f8997421dd49500" |
| }, |
| "CVE-2018-14617": { |
| "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", |
| "cmt_id": "fed5bd3352a3fbf9494449ffee3b4bab5e8cc3a6" |
| }, |
| "CVE-2018-14609": { |
| "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", |
| "cmt_id": "510825b3f8c1f5dc29b81660e1eb68e7fb0b8d50" |
| } |
| }, |
| "4.4.157": { |
| "CVE-2018-17182": { |
| "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", |
| "cmt_id": "88d6918401a4ecdc50fe77df3e1e77c1e49d8579" |
| } |
| }, |
| "4.4.159": { |
| "CVE-2018-20511": { |
| "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", |
| "cmt_id": "fee0d234419708192925c9e25a461f1f43dab24f" |
| }, |
| "CVE-2018-14633": { |
| "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", |
| "cmt_id": "afba6121b3b7e1737b7e7dafbf6b7eafbcdc659c" |
| } |
| }, |
| "4.4.160": { |
| "CVE-2018-17972": { |
| "cmt_msg": "proc: restrict kernel stack dumps to root", |
| "cmt_id": "574757073482f77ec10caea5e57726190a2837fa" |
| }, |
| "CVE-2019-9458": { |
| "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", |
| "cmt_id": "bbbc4dabca5d51c608b0fd608eb3cd8659266653" |
| }, |
| "CVE-2018-7755": { |
| "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", |
| "cmt_id": "ef0a9f76fda4a7ffce6ceee5abdd554a719e8bd8" |
| }, |
| "CVE-2018-13053": { |
| "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", |
| "cmt_id": "2e17841715313cab2464b3b6360a289a1cb2744b" |
| }, |
| "CVE-2018-18021": { |
| "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", |
| "cmt_id": "14a65511bc7c1eec560764fe53018b0765fb8d2d" |
| }, |
| "CVE-2018-10880": { |
| "cmt_msg": "ext4: never move the system.data xattr out of the inode body", |
| "cmt_id": "cd3d6463759d21f4093d3434effacc358dd0caf8" |
| } |
| }, |
| "4.4.163": { |
| "CVE-2018-18281": { |
| "cmt_msg": "mremap: properly flush TLB before releasing the page", |
| "cmt_id": "2e3ae534fb98c7a6a5cf3e80a190181154328f80" |
| } |
| }, |
| "4.4.164": { |
| "CVE-2018-18710": { |
| "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", |
| "cmt_id": "661aa0b46dfb23700b569ac319b95e0b0154832f" |
| } |
| }, |
| "4.4.167": { |
| "CVE-2019-2024": { |
| "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", |
| "cmt_id": "4de120cba4ed4ef009edb2b17b2fa21b679b00b2" |
| }, |
| "CVE-2018-19824": { |
| "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", |
| "cmt_id": "82fa3e95432f95254fd07556c55b1018145e1439" |
| }, |
| "CVE-2018-16862": { |
| "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", |
| "cmt_id": "78b572c9e3a1b7edf46da17ad96a86110dd65fe8" |
| }, |
| "CVE-2018-20169": { |
| "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", |
| "cmt_id": "c380600bf71c35dc23aa0c3628a1013ec10cb349" |
| } |
| }, |
| "4.4.168": { |
| "CVE-2018-1120": { |
| "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", |
| "cmt_id": "adc143b97d06a3305707726e69b4247db050cb88" |
| }, |
| "CVE-2018-5953": { |
| "cmt_msg": "printk: hash addresses printed with %p", |
| "cmt_id": "c873dfa0ccbdb08e9fb42f497503e148f79cdebb" |
| }, |
| "CVE-2018-5848": { |
| "cmt_msg": "wil6210: missing length check in wmi_set_ie", |
| "cmt_id": "e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a" |
| }, |
| "CVE-2018-12896": { |
| "cmt_msg": "posix-timers: Sanitize overrun handling", |
| "cmt_id": "954648ebf8e27fcbf23b7954b79a22a5cacc83b1" |
| } |
| }, |
| "4.4.169": { |
| "CVE-2017-18241": { |
| "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", |
| "cmt_id": "0fd7726d69afb0b61817f8d51e80f385cbfb2b10" |
| } |
| }, |
| "4.4.170": { |
| "CVE-2019-15927": { |
| "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", |
| "cmt_id": "a5e09a908ea3c64bf522822b7923d2d8fc1a7af2" |
| }, |
| "CVE-2019-6133": { |
| "cmt_msg": "fork: record start_time late", |
| "cmt_id": "d447cf0ceefa01ee9203145d011eedca6e1194e6" |
| }, |
| "CVE-2018-19985": { |
| "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", |
| "cmt_id": "8846b1dbfd2146b145d73ba31a4caa4a4789aefb" |
| } |
| }, |
| "4.4.171": { |
| "CVE-2018-16884": { |
| "cmt_msg": "sunrpc: use-after-free in svc_process_common()", |
| "cmt_id": "9615b6aeccbfb233fd672107aa6885bf039c3de3" |
| }, |
| "CVE-2018-14611": { |
| "cmt_msg": "btrfs: validate type when reading a chunk", |
| "cmt_id": "50962a7b4877f26d1f3f49cd77ad1814a9e81bac" |
| }, |
| "CVE-2018-14610": { |
| "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", |
| "cmt_id": "ee5e37a26791f9c842b3298e594c6e3c93bb1355" |
| }, |
| "CVE-2018-14613": { |
| "cmt_msg": "btrfs: tree-checker: Verify block_group_item", |
| "cmt_id": "ae94efaf2b609e811bce6280d5c88cf557cd1238" |
| }, |
| "CVE-2018-14612": { |
| "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", |
| "cmt_id": "42d263820480ab1f7eba54590f2c7283b3428723" |
| } |
| }, |
| "4.4.172": { |
| "CVE-2018-14616": { |
| "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", |
| "cmt_id": "4901e126b6e1677c90d3c0a668193e52ecdd4971" |
| }, |
| "CVE-2018-13096": { |
| "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", |
| "cmt_id": "cbe5e5cd70c0f6fd187114e7f146f29830fedf9c" |
| }, |
| "CVE-2018-13097": { |
| "cmt_msg": "f2fs: fix to do sanity check with user_block_count", |
| "cmt_id": "b31ccde086671b372957e1fe1c60968e6d7464d7" |
| }, |
| "CVE-2018-14614": { |
| "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", |
| "cmt_id": "98beb84af7212a2ba50370497e569ae3f61b1c8b" |
| }, |
| "CVE-2018-13099": { |
| "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", |
| "cmt_id": "3bfe2049c222b23342ff2a216cd5a869e8a14897" |
| }, |
| "CVE-2018-13100": { |
| "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", |
| "cmt_id": "056120a8c192871c558e742f83ae18bf8721d97c" |
| }, |
| "CVE-2019-3701": { |
| "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", |
| "cmt_id": "693ae291197429f404e7d9c191e1541f61925278" |
| }, |
| "CVE-2018-18690": { |
| "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", |
| "cmt_id": "f00ebf4f84ed2e9344743d86e274ff77269df02a" |
| }, |
| "CVE-2017-18249": { |
| "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", |
| "cmt_id": "a4f4f97573bfb057bbc30696d803cc37ed629d02" |
| }, |
| "CVE-2020-10769": { |
| "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", |
| "cmt_id": "461652efc1545a1a074bf0df826dcd3bce520db4" |
| } |
| }, |
| "4.4.174": { |
| "CVE-2018-5391": { |
| "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", |
| "cmt_id": "ef0f963de1d2c5bc99d3d6ace3dd44a7d6002717" |
| } |
| }, |
| "4.4.175": { |
| "CVE-2019-7222": { |
| "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", |
| "cmt_id": "1b5fd913a4eb07cb13e969bb8e3b1633a40e683f" |
| }, |
| "CVE-2019-7221": { |
| "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", |
| "cmt_id": "9872ddae1949b46d5310e0e71ca26bb5c4e52a70" |
| } |
| }, |
| "4.4.176": { |
| "CVE-2019-6974": { |
| "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", |
| "cmt_id": "bc4db52485cc6edfd6861417d178bb71f743ced7" |
| } |
| }, |
| "4.4.177": { |
| "CVE-2019-16995": { |
| "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", |
| "cmt_id": "453e3b319d28f2023d45073e6eb30c5efa2fd06b" |
| }, |
| "CVE-2019-9455": { |
| "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", |
| "cmt_id": "7b5115689bf9dafc5127b28ace4589f698d4adfa" |
| }, |
| "CVE-2019-2101": { |
| "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", |
| "cmt_id": "bba078c9fc3c7e44370f870d97c5eed64f6c5d1f" |
| }, |
| "CVE-2019-16413": { |
| "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", |
| "cmt_id": "f289ac1f6eb2d024793732ddb629595ab85674b7" |
| }, |
| "CVE-2019-12818": { |
| "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", |
| "cmt_id": "6e7339d5ee302fcbfe8ef29c058cc85c360849b9" |
| }, |
| "CVE-2019-12819": { |
| "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", |
| "cmt_id": "a1b4ace43842791d908a8837304031e439c2ea39" |
| }, |
| "CVE-2019-15916": { |
| "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", |
| "cmt_id": "d28a029290fd80e9fb40850eb6eb2b7281f1f007" |
| }, |
| "CVE-2019-9213": { |
| "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", |
| "cmt_id": "40952b6a649b9bfad11ae4fa2862fa0108c9ec24" |
| } |
| }, |
| "4.4.178": { |
| "CVE-2019-3459": { |
| "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", |
| "cmt_id": "ade4560e4fea198866e033fe1c02f063d6d7db2e" |
| }, |
| "CVE-2019-20054": { |
| "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", |
| "cmt_id": "6271fa6fc366827c0249864157e8fd18c4eac68a" |
| }, |
| "CVE-2019-3460": { |
| "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", |
| "cmt_id": "d22036003893cbe479404e20fdae10addc6c18dd" |
| } |
| }, |
| "4.4.179": { |
| "CVE-2019-9454": { |
| "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", |
| "cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" |
| }, |
| "CVE-2019-11486": { |
| "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", |
| "cmt_id": "c3e76f072adbcc426fbeef5d7469f847a2f700d6" |
| }, |
| "CVE-2019-15214": { |
| "cmt_msg": "ALSA: core: Fix card races between register and disconnect", |
| "cmt_id": "f94135f92d97d85444691bcc4f79784d995a5458" |
| }, |
| "CVE-2017-18551": { |
| "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", |
| "cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" |
| }, |
| "CVE-2019-15292": { |
| "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", |
| "cmt_id": "d49a75f5add4543eb138fb0a8fe0560fb276352e" |
| }, |
| "CVE-2019-11190": { |
| "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm", |
| "cmt_id": "1eb40df35d99f353e7bdfcbb21f249428ec0f4b6" |
| }, |
| "CVE-2019-11810": { |
| "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", |
| "cmt_id": "09a6db51dcb41990fe020e45af8b2e44010fc1e7" |
| }, |
| "CVE-2019-11815": { |
| "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", |
| "cmt_id": "c4e97b06cfdc5213494c22dd5c2b41ff8b15e0ee" |
| }, |
| "CVE-2019-10639": { |
| "cmt_msg": "netns: provide pure entropy for net_hash_mix()", |
| "cmt_id": "0ede14314f6d9e6a172eb4c4b6b9fe5477aa70bc" |
| } |
| }, |
| "4.4.180": { |
| "CVE-2018-20836": { |
| "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", |
| "cmt_id": "fe3f6511c9af47847e3547c1525de290a3d908eb" |
| }, |
| "CVE-2019-3882": { |
| "cmt_msg": "vfio/type1: Limit DMA mappings per container", |
| "cmt_id": "e1a5cdbf7cb32a168d37a4804379b9b70d31b39b" |
| }, |
| "CVE-2019-11884": { |
| "cmt_msg": "Bluetooth: hidp: fix buffer overflow", |
| "cmt_id": "dd150bcc93ffaa80ca67d5a71d7850fffe5eb549" |
| }, |
| "CVE-2019-10142": { |
| "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", |
| "cmt_id": "9db489ed49711d1575f631b68aaa911d3b6198f9" |
| }, |
| "CVE-2019-15216": { |
| "cmt_msg": "USB: yurex: Fix protection fault after device removal", |
| "cmt_id": "438b075fc77d63472892df735fe2a27d3f23dcbf" |
| } |
| }, |
| "4.4.181": { |
| "CVE-2020-10720": { |
| "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", |
| "cmt_id": "4f9c73aa293051359ef1f2f6d816895ab50c9f3e" |
| }, |
| "CVE-2018-20510": { |
| "cmt_msg": "binder: replace \"%p\" with \"%pK\"", |
| "cmt_id": "c53c1a821d62eb8476425ebe79c0c0054ab45315" |
| }, |
| "CVE-2019-15219": { |
| "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", |
| "cmt_id": "30e66d7d2fb978f7b59fbf6106bdc1092acbb7ef" |
| }, |
| "CVE-2019-15218": { |
| "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", |
| "cmt_id": "b1782be70e1e281216f58ba283a0e55ad6364aaf" |
| }, |
| "CVE-2019-15666": { |
| "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", |
| "cmt_id": "86040d722b29976dfef0ef2b68eab832c358d04b" |
| }, |
| "CVE-2019-15212": { |
| "cmt_msg": "USB: rio500: refuse more than one device at a time", |
| "cmt_id": "b92be99a0c8b2c1c66fe37f1fb21ef069c7732f1" |
| }, |
| "CVE-2019-9466": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" |
| }, |
| "CVE-2019-11833": { |
| "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", |
| "cmt_id": "98529ecd313bbeff006930056dad26529510054f" |
| }, |
| "CVE-2019-9503": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" |
| }, |
| "CVE-2018-1000026": { |
| "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", |
| "cmt_id": "c55a2cffa5caaf72db415558f8058f995578a773" |
| }, |
| "CVE-2019-19966": { |
| "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", |
| "cmt_id": "a04e71a0dbc62083bd31ae4d252d2c07a0035e4a" |
| } |
| }, |
| "4.4.182": { |
| "CVE-2019-11479": { |
| "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", |
| "cmt_id": "e757d052f3b8ce739d068a1e890643376c16b7a9" |
| }, |
| "CVE-2019-11478": { |
| "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", |
| "cmt_id": "ad472d3a9483abc155e1644ad740cd8c039b5170" |
| }, |
| "CVE-2019-11477": { |
| "cmt_msg": "tcp: limit payload size of sacked skbs", |
| "cmt_id": "4657ee0fe05e15ab572b157f13a82e080d4b7d73" |
| } |
| }, |
| "4.4.183": { |
| "CVE-2019-11599": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" |
| }, |
| "CVE-2019-3892": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" |
| }, |
| "CVE-2019-15807": { |
| "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", |
| "cmt_id": "39c7c903c63db10c99b1083ea9a688f63fb2c4a7" |
| } |
| }, |
| "4.4.185": { |
| "CVE-2019-13272": { |
| "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", |
| "cmt_id": "54562d2b0be5c120b01c8bb94baef1aca37fd329" |
| }, |
| "CVE-2018-16597": { |
| "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes", |
| "cmt_id": "b24be4acd17a8963a29b2a92e1d80b9ddf759c95" |
| }, |
| "CVE-2019-0136": { |
| "cmt_msg": "mac80211: drop robust management frames from unknown TA", |
| "cmt_id": "c7c680979b503a1bb64ee26ffa34207f886090ab" |
| }, |
| "CVE-2019-9506": { |
| "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", |
| "cmt_id": "993699d9de09097e2bfd49100b8904774e5304fb" |
| } |
| }, |
| "4.4.186": { |
| "CVE-2019-10126": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", |
| "cmt_id": "3a611df229a90247c9a5159d136c60f4008c29a2" |
| }, |
| "CVE-2019-3846": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", |
| "cmt_id": "5d43b417e60ab25984fc7c41175f3ce8cee992bd" |
| } |
| }, |
| "4.4.187": { |
| "CVE-2019-13631": { |
| "cmt_msg": "Input: gtco - bounds check collection indent level", |
| "cmt_id": "3ca20e950203a6c7759186ec4e89cbd33ee2bf81" |
| }, |
| "CVE-2019-20934": { |
| "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", |
| "cmt_id": "da358f365dab8fea00c6254621e2cfb2fd817d01" |
| }, |
| "CVE-2019-15211": { |
| "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", |
| "cmt_id": "56ea214b175643476a7f2979118c2ac560f29b3f" |
| }, |
| "CVE-2019-10207": { |
| "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", |
| "cmt_id": "37fb924139954a28a1f04959070c3cc762b0de4c" |
| }, |
| "CVE-2019-15215": { |
| "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", |
| "cmt_id": "63a80df0ea2b94813f60e8372f9ee93856bcfd5b" |
| }, |
| "CVE-2019-15926": { |
| "cmt_msg": "ath6kl: add some bounds checking", |
| "cmt_id": "c1e1288d2e61727c1a9b9f28d0cf61da592a76bc" |
| }, |
| "CVE-2017-18509": { |
| "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", |
| "cmt_id": "ee2f25641633ffb03fb88e4fa8a6424d24d3f295" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown", |
| "cmt_id": "8f0b77b71f3fec09f86f80cd98c36a1a35109499" |
| }, |
| "CVE-2019-14284": { |
| "cmt_msg": "floppy: fix div-by-zero in setup_format_params", |
| "cmt_id": "26d6284d5d392bd96c414f745bcbf3620e93c8fd" |
| }, |
| "CVE-2019-14283": { |
| "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", |
| "cmt_id": "d105eaf5fb67a193df8fe72e64690c43e343a560" |
| }, |
| "CVE-2019-13648": { |
| "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", |
| "cmt_id": "e67fd28f9ed887d0c8124bda96b66dab87823eac" |
| } |
| }, |
| "4.4.189": { |
| "CVE-2018-20856": { |
| "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", |
| "cmt_id": "e6ea77dd5a6a72583453e8703583ce0ef538aea4" |
| }, |
| "CVE-2019-1125": { |
| "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", |
| "cmt_id": "e3d8c979c49d6113566acf4b3002073979cd35c3" |
| } |
| }, |
| "4.4.190": { |
| "CVE-2019-19536": { |
| "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", |
| "cmt_id": "abea9fa28b64d0a875cc3659002dc87b64836265" |
| }, |
| "CVE-2019-19537": { |
| "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", |
| "cmt_id": "8f67bc7c8da8622fddf4d29a2f422678dfbadf77" |
| }, |
| "CVE-2019-19527": { |
| "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", |
| "cmt_id": "8e73f43b6772a262d1884511f694e0f90c3dfa68" |
| }, |
| "CVE-2019-19535": { |
| "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", |
| "cmt_id": "67112944e756484c5d62529597a0181f846340d0" |
| }, |
| "CVE-2018-20961": { |
| "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", |
| "cmt_id": "3dae85a803a265c65e6032cd68a13fb717d766d9" |
| }, |
| "CVE-2019-19530": { |
| "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", |
| "cmt_id": "8fed007578dba671e131781360dd87c4683672e7" |
| }, |
| "CVE-2019-19531": { |
| "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", |
| "cmt_id": "2ef494ad6274e963dc0fe64a8b405d22e0700e9b" |
| } |
| }, |
| "4.4.191": { |
| "CVE-2019-3900": { |
| "cmt_msg": "vhost_net: fix possible infinite loop", |
| "cmt_id": "bb85b4cbd8f69cdea3a0caa9aa4edb1d4d7bc24f" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown", |
| "cmt_id": "61263fbe574b0b74c50552983bdcc2bb9a409b1e" |
| }, |
| "CVE-2019-15118": { |
| "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", |
| "cmt_id": "735a16d1afc01320392669f4ea64c84d435faf1c" |
| }, |
| "CVE-2016-10906": { |
| "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free", |
| "cmt_id": "b31c9932f84ce06b08735884ae7e19eca2b6c80a" |
| }, |
| "CVE-2016-10905": { |
| "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree", |
| "cmt_id": "d61e517e39149bff6be936c922f47af99d54509a" |
| }, |
| "CVE-2019-10638": { |
| "cmt_msg": "inet: switch IP ID generator to siphash", |
| "cmt_id": "66f8c5ff8ed3d99dd21d8f24aac89410de7a4a05" |
| }, |
| "CVE-2019-15117": { |
| "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", |
| "cmt_id": "a485888b5189845f0b6c58ae89661a402a80402a" |
| } |
| }, |
| "4.4.193": { |
| "CVE-2019-14835": { |
| "cmt_msg": "vhost: make sure log_num < in_num", |
| "cmt_id": "35b29a78cc9b2523f6b0c080e6b44d2eeb367023" |
| } |
| }, |
| "4.4.194": { |
| "CVE-2019-14816": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" |
| }, |
| "CVE-2019-14814": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" |
| }, |
| "CVE-2019-15505": { |
| "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", |
| "cmt_id": "db38be77199f16dd23d1504a9dfddf7e4479652a" |
| }, |
| "CVE-2019-14821": { |
| "cmt_msg": "KVM: coalesced_mmio: add bounds checking", |
| "cmt_id": "ae41539657ce0a4e9f4588e89e5e19a8b8f11928" |
| } |
| }, |
| "4.4.195": { |
| "CVE-2019-19533": { |
| "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", |
| "cmt_id": "b54d1e51bba72256f977912b6b4197bd1494c72e" |
| }, |
| "CVE-2019-17053": { |
| "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "a279cd311c1e3870de25fe48e948487b4785e9cd" |
| }, |
| "CVE-2019-17052": { |
| "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "c15d89b5cb86dfcdee536d093ece512091ed6e5c" |
| }, |
| "CVE-2019-17054": { |
| "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "ec1e04b8979464990e000850d14d3e562999a82d" |
| }, |
| "CVE-2019-17056": { |
| "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "001ff467264f3e51c8bb18de5cbe62e91d05cfc5" |
| }, |
| "CVE-2019-17055": { |
| "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "a03818269bfbc2ff6d25e3e44eb2247df53648ca" |
| }, |
| "CVE-2019-18680": { |
| "cmt_msg": "unknown", |
| "cmt_id": "91573ae4aed0a49660abdad4d42f2a0db995ee5e" |
| } |
| }, |
| "4.4.196": { |
| "CVE-2019-2215": { |
| "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", |
| "cmt_id": "80eb98a4ee70428d5b4b7202195a916385a76809" |
| }, |
| "CVE-2020-0030": { |
| "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", |
| "cmt_id": "fcf46dcedbc419633771e16bfdf97a528f4d7dab" |
| }, |
| "CVE-2019-18806": { |
| "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", |
| "cmt_id": "a35f1bb8c300a46c194bb5154ee8fc040c5ae392" |
| } |
| }, |
| "4.4.197": { |
| "CVE-2019-19525": { |
| "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", |
| "cmt_id": "1fb673245b24832acb411db7ffe207fb470559ab" |
| }, |
| "CVE-2019-16746": { |
| "cmt_msg": "nl80211: validate beacon head", |
| "cmt_id": "fd27e0779cf62f72bd8242d003d30742d11e451e" |
| }, |
| "CVE-2018-20976": { |
| "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", |
| "cmt_id": "748edae843c30f41fdcb320f1a8335bc2238b961" |
| }, |
| "CVE-2019-19523": { |
| "cmt_msg": "USB: adutux: fix use-after-free on disconnect", |
| "cmt_id": "cd3cfbafe8eb9761950873c04c0147b40a85d29f" |
| }, |
| "CVE-2019-19528": { |
| "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", |
| "cmt_id": "f723d7ea08e2c69ac9ecd87828c650745270fb98" |
| } |
| }, |
| "4.4.198": { |
| "CVE-2019-17075": { |
| "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", |
| "cmt_id": "3cd0698561d3e9dcb7c969077932e072fbb4689e" |
| }, |
| "CVE-2019-17133": { |
| "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", |
| "cmt_id": "3ca40f2f6015580caf11a4fd23503ea7529ed861" |
| } |
| }, |
| "4.4.199": { |
| "CVE-2020-10773": { |
| "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", |
| "cmt_id": "1cdb53607683a4fa8625a3f3eb65e5d9f4572166" |
| }, |
| "CVE-2019-17666": { |
| "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", |
| "cmt_id": "3da8d0e777fa8a0934a288b115373cf12d7800f8" |
| }, |
| "CVE-2019-19532": { |
| "cmt_msg": "HID: Fix assumption that devices have inputs", |
| "cmt_id": "2be873faad369e0b6b70761506995fd2d4cb0257" |
| }, |
| "CVE-2019-15098": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "d7619be74f341630989c7edfd21a9ed8f51ab2d1" |
| } |
| }, |
| "4.4.200": { |
| "CVE-2019-18282": { |
| "cmt_msg": "net/flow_dissector: switch to siphash", |
| "cmt_id": "491cd03f3b44f58f346ec15e2fc958d0def7b5a7" |
| }, |
| "CVE-2019-19049": { |
| "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", |
| "cmt_id": "265c6b8ab54cf46ac4e3c768f2be1489dc13a494" |
| } |
| }, |
| "4.4.201": { |
| "CVE-2019-19534": { |
| "cmt_msg": "can: peak_usb: fix slab info leak", |
| "cmt_id": "1afef2b7a5d8d97cee332aee1c4d5a96597c223d" |
| }, |
| "CVE-2019-0155": { |
| "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", |
| "cmt_id": "e5e3c0154c19f2d8213e0af88b7a10d9de7fbafd" |
| }, |
| "CVE-2019-0154": { |
| "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", |
| "cmt_id": "1433b8d41b1aa346e100b839c19fc033871ac5a6" |
| }, |
| "CVE-2019-19052": { |
| "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", |
| "cmt_id": "7f18860337d74fdf79e7152bee7117d945ff6945" |
| } |
| }, |
| "4.4.202": { |
| "CVE-2019-11135": { |
| "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", |
| "cmt_id": "124635392ef394772850172bd5370e62cfe781b4" |
| } |
| }, |
| "4.4.203": { |
| "CVE-2019-19524": { |
| "cmt_msg": "Input: ff-memless - kill timer in destroy()", |
| "cmt_id": "af618124c69794bf215bf8cefb67890f95246ef8" |
| }, |
| "CVE-2019-15917": { |
| "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", |
| "cmt_id": "29d9c5714096a47ed8d2a1632e382c949b089563" |
| } |
| }, |
| "4.4.204": { |
| "CVE-2019-18660": { |
| "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", |
| "cmt_id": "3a79351beb549634c217570a5a8e500b8f466ad0" |
| }, |
| "CVE-2019-15291": { |
| "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", |
| "cmt_id": "89660684ceca03bcaf5d1637709a4875e98387c6" |
| }, |
| "CVE-2019-18683": { |
| "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", |
| "cmt_id": "7f8286d2b526a86d9bbdf20690b4245d0ea1fac3" |
| } |
| }, |
| "4.4.206": { |
| "CVE-2019-12614": { |
| "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", |
| "cmt_id": "27cb5fbc84ed4d97a4bbcab04fb186705bac303e" |
| } |
| }, |
| "4.4.207": { |
| "CVE-2019-19227": { |
| "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", |
| "cmt_id": "7ae3525ee708f867a2d2321c246b285136cdbed8" |
| }, |
| "CVE-2019-19062": { |
| "cmt_msg": "crypto: user - fix memory leak in crypto_report", |
| "cmt_id": "5020350fb0012816ee35f7b744ded18bb75ecc1e" |
| }, |
| "CVE-2019-19332": { |
| "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", |
| "cmt_id": "385bddaf5ee11acdf8d823ecc429c675b5416ac2" |
| } |
| }, |
| "4.4.208": { |
| "CVE-2019-19057": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", |
| "cmt_id": "4a6cf20ca09434486bfbfc742c960157c23c931d" |
| }, |
| "CVE-2019-19063": { |
| "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", |
| "cmt_id": "ca4fb6974bb645ebf3352f5bba7699db4b44b75f" |
| }, |
| "CVE-2019-20812": { |
| "cmt_msg": "af_packet: set defaule value for tmo", |
| "cmt_id": "b424ed744453c1b0ce0e67f2e64e7719725f65a3" |
| }, |
| "CVE-2019-19447": { |
| "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", |
| "cmt_id": "0a5a9d02428d4e8c181413a51f7bcf0d7080dbf3" |
| } |
| }, |
| "4.4.209": { |
| "CVE-2019-19965": { |
| "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", |
| "cmt_id": "8febe765539fbcc7d47e4e2ad44a0bcb2adbf02b" |
| } |
| }, |
| "4.4.210": { |
| "CVE-2019-14895": { |
| "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", |
| "cmt_id": "d1bd8bd7e5ebda57580372d2b8b69182f9d8d113" |
| }, |
| "CVE-2020-0305": { |
| "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", |
| "cmt_id": "3cce9309df73def742692ffddde05638b6eda6d9" |
| }, |
| "CVE-2019-19066": { |
| "cmt_msg": "scsi: bfa: release allocated memory in case of error", |
| "cmt_id": "8c67bbd0754f8b35f28d8b5626c16d5721e9a8f7" |
| }, |
| "CVE-2019-20636": { |
| "cmt_msg": "Input: add safety guards to input_set_keycode()", |
| "cmt_id": "68442780f2c223531de9d25104fd04e1bfdb583b" |
| }, |
| "CVE-2019-19068": { |
| "cmt_msg": "rtl8xxxu: prevent leaking urb", |
| "cmt_id": "57d09152eef9e1afca04b2f7bebccd07e0efa881" |
| }, |
| "CVE-2020-0431": { |
| "cmt_msg": "HID: hid-input: clear unmapped usages", |
| "cmt_id": "3be648c80db794a3bc1b22a1115071402a1f9803" |
| }, |
| "CVE-2019-14615": { |
| "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", |
| "cmt_id": "e2546a83a7e291f412978cf6a580e43698c308bc" |
| }, |
| "CVE-2019-19056": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", |
| "cmt_id": "c858dc3c047e2962994d28acaccd52272558c9ff" |
| } |
| }, |
| "4.4.211": { |
| "CVE-2019-17351": { |
| "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", |
| "cmt_id": "b39b4801d50956256711db83be28b9cff2620fda" |
| }, |
| "CVE-2019-20096": { |
| "cmt_msg": "dccp: Fix memleak in __feat_register_sp", |
| "cmt_id": "a5c290ebb46d33f8700aab2edb996c9a0478b3b8" |
| }, |
| "CVE-2019-15217": { |
| "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", |
| "cmt_id": "e6c986b15703eb2e0d59a3f79e99fd2aa6221b51" |
| }, |
| "CVE-2018-21008": { |
| "cmt_msg": "rsi: add fix for crash during assertions", |
| "cmt_id": "80427a7b1195e7946992baffeb112b2635245198" |
| }, |
| "CVE-2019-15220": { |
| "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", |
| "cmt_id": "e2c48c1e6ef5e806b68ca685216dda05e5267be2" |
| }, |
| "CVE-2019-15221": { |
| "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", |
| "cmt_id": "81b83ca3e45b83e632b8063cd27bdb072ecfc135" |
| }, |
| "CVE-2020-12652": { |
| "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", |
| "cmt_id": "952fc03b38b8dca3923f3c61e3273c8f8ed2bd86" |
| }, |
| "CVE-2019-5108": { |
| "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", |
| "cmt_id": "622c77a3addefa54d61205177635409de87a8a7c" |
| } |
| }, |
| "4.4.212": { |
| "CVE-2019-14896": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" |
| }, |
| "CVE-2019-14897": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" |
| }, |
| "CVE-2020-14416": { |
| "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", |
| "cmt_id": "6169e11e1f14dd272ec9c746050820e5cc2cf853" |
| } |
| }, |
| "4.4.213": { |
| "CVE-2020-0432": { |
| "cmt_msg": "staging: most: net: fix buffer overflow", |
| "cmt_id": "917c8fe39f4d42c3850b22d6a0bf3ffab1466d19" |
| } |
| }, |
| "4.4.214": { |
| "CVE-2020-12653": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", |
| "cmt_id": "4dd90d14f902074f18238dc104868debbd3cd250" |
| }, |
| "CVE-2020-12654": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", |
| "cmt_id": "91b836b01c788932d86a448d26561740d22e7c9b" |
| }, |
| "CVE-2020-0404": { |
| "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", |
| "cmt_id": "f941047b5e5abd73be6c058a67a06533728c3422" |
| } |
| }, |
| "4.4.215": { |
| "CVE-2020-9383": { |
| "cmt_msg": "floppy: check FDC index for errors before assigning it", |
| "cmt_id": "3dd989efdd97a42dc18e9bd653b16f0d84f45fc2" |
| }, |
| "CVE-2020-2732": { |
| "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", |
| "cmt_id": "27021607e18ee2946cbbc74c19031ad966b9c883" |
| }, |
| "CVE-2019-16233": { |
| "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", |
| "cmt_id": "d50a2a486d941417ca7abaebfe433a3af3c773fb" |
| }, |
| "CVE-2020-0009": { |
| "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", |
| "cmt_id": "a349db843c640ad1fbab6625a7a4e9d4dd45f26a" |
| } |
| }, |
| "4.4.216": { |
| "CVE-2020-8649": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" |
| }, |
| "CVE-2020-8648": { |
| "cmt_msg": "vt: selection, close sel_buffer race", |
| "cmt_id": "63f529ab35671d1c7433cb8283980289c8832bad" |
| }, |
| "CVE-2019-11487": { |
| "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", |
| "cmt_id": "c326585619b99cce3240403faa56f599e06893cb" |
| }, |
| "CVE-2020-8647": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" |
| }, |
| "CVE-2020-27068": { |
| "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", |
| "cmt_id": "bfb70b52540845bd1574de6f0e58fcc7907d8a07" |
| }, |
| "CVE-2020-0444": { |
| "cmt_msg": "audit: fix error handling in audit_data_to_entry()", |
| "cmt_id": "c99bc56eba9e90c28d8bb42712b9b262d99df630" |
| }, |
| "CVE-2019-16234": { |
| "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", |
| "cmt_id": "32b63f22e4c16aee095b2c116f0c7526b7fd3e66" |
| } |
| }, |
| "4.4.217": { |
| "CVE-2019-14901": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", |
| "cmt_id": "4ca9ed6965cc0b9ace3758355ff13d71b97bf008" |
| }, |
| "CVE-2020-29370": { |
| "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", |
| "cmt_id": "3698fe758684cf3600a0aa91a5af3eba27722cfd" |
| } |
| }, |
| "4.4.218": { |
| "CVE-2020-14381": { |
| "cmt_msg": "futex: Fix inode life-time issue", |
| "cmt_id": "24bbfe34bb44c036c3a0874bf74fc2387d5557bf" |
| }, |
| "CVE-2020-11668": { |
| "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", |
| "cmt_id": "89fb5aa765cf8e47ac168810dd76afe37312dff2" |
| }, |
| "CVE-2021-3715": { |
| "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", |
| "cmt_id": "7518af6464b47a0d775173570c3d25f699da2a5e" |
| }, |
| "CVE-2020-10942": { |
| "cmt_msg": "vhost: Check docket sk_family instead of call getname", |
| "cmt_id": "79152052fbb703ff5f66778b3e585c69b95d83d2" |
| }, |
| "CVE-2020-27066": { |
| "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", |
| "cmt_id": "0ac1dd7bb8f1b40f1bf494f6a27235a7a3b36350" |
| }, |
| "CVE-2020-11608": { |
| "cmt_msg": "media: ov519: add missing endpoint sanity checks", |
| "cmt_id": "3de5ed1a64b96f0a482e2a325bcea38d51a2a1fd" |
| }, |
| "CVE-2020-11609": { |
| "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", |
| "cmt_id": "eca73facbd01d15bd6f8c08c9c39d255a752e4b6" |
| } |
| }, |
| "4.4.219": { |
| "CVE-2020-11494": { |
| "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", |
| "cmt_id": "f7dd0134a169df7dd9b68b6c135fe10629e66599" |
| }, |
| "CVE-2020-0429": { |
| "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", |
| "cmt_id": "d845bf594d68d309a39ce8df72942e2b3fbbb176" |
| }, |
| "CVE-2020-11565": { |
| "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", |
| "cmt_id": "4489253d0625c4841620160b2461925b695c651c" |
| } |
| }, |
| "4.4.220": { |
| "CVE-2020-12826": { |
| "cmt_msg": "signal: Extend exec_id to 64bits", |
| "cmt_id": "6b9e27da8fc595e8abd4374c230d5b9404efac83" |
| } |
| }, |
| "4.4.221": { |
| "CVE-2019-19319": { |
| "cmt_msg": "ext4: protect journal inode's blocks using block_validity", |
| "cmt_id": "7eff961ca9f364be255d279346517ba0158ec8e3" |
| }, |
| "CVE-2020-12114": { |
| "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", |
| "cmt_id": "83354adbd7a967230bd23a547c5b695567ddba2c" |
| }, |
| "CVE-2020-12464": { |
| "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", |
| "cmt_id": "f613d830fae7cbf8799378338d4df977f8667d5c" |
| } |
| }, |
| "4.4.222": { |
| "CVE-2020-10751": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" |
| }, |
| "CVE-2020-0255": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" |
| } |
| }, |
| "4.4.224": { |
| "CVE-2020-10711": { |
| "cmt_msg": "netlabel: cope with NULL catmap", |
| "cmt_id": "b8ff52e4bdaabfee050ae4e8c721305a924a8633" |
| }, |
| "CVE-2020-0433": { |
| "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", |
| "cmt_id": "fa9355afd5b07707e15a5f75b854f04a9c14a798" |
| }, |
| "CVE-2020-1749": { |
| "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", |
| "cmt_id": "7c9d04e1c3ed58f60592329459d9ca7789442ff7" |
| }, |
| "CVE-2020-27786": { |
| "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", |
| "cmt_id": "718eede1eeb602531e09191d3107eb849bbe64eb" |
| }, |
| "CVE-2020-12769": { |
| "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", |
| "cmt_id": "3549e7aaa20947df2338305509c534c79c43e765" |
| }, |
| "CVE-2020-10690": { |
| "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", |
| "cmt_id": "6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57" |
| }, |
| "CVE-2020-13143": { |
| "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", |
| "cmt_id": "c18a8b0d7b8fdb299bcfab2feb9c0f410580794a" |
| }, |
| "CVE-2019-19768": { |
| "cmt_msg": "blktrace: Protect q->blk_trace with RCU", |
| "cmt_id": "3d5d64aea941a45efda1bd02c0ec8dd57e8ce4ca" |
| }, |
| "CVE-2020-12770": { |
| "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", |
| "cmt_id": "af9a86cc9f1acfc380e96a9beb59462f32a4b6c4" |
| } |
| }, |
| "4.4.225": { |
| "CVE-2018-9517": { |
| "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", |
| "cmt_id": "3ca51032627e9bfea7d609f008461efdfdba1a5c" |
| }, |
| "CVE-2021-0447": { |
| "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", |
| "cmt_id": "c2984681fe15cfb803a9132aaaf1140ab20a72c1" |
| }, |
| "CVE-2020-27067": { |
| "cmt_msg": "l2tp: fix l2tp_eth module loading", |
| "cmt_id": "c30b34ce7944ec7026d4803cd51da2521df992a3" |
| } |
| }, |
| "4.4.226": { |
| "CVE-2020-10732": { |
| "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", |
| "cmt_id": "2673a0cb646affc7ff66970cfc884d9e2223bc60" |
| } |
| }, |
| "4.4.227": { |
| "CVE-2020-13974": { |
| "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", |
| "cmt_id": "dad0bf9ce93fa40b667eccd3306783f4db4b932b" |
| }, |
| "CVE-2020-0543": { |
| "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", |
| "cmt_id": "4ebffa4b0a198d8671ee68742ba6d3f56164301f" |
| } |
| }, |
| "4.4.228": { |
| "CVE-2019-20810": { |
| "cmt_msg": "media: go7007: fix a miss of snd_card_free", |
| "cmt_id": "ce7fcdd544fbc07a2c327d18b0712754cf1557d2" |
| }, |
| "CVE-2020-10766": { |
| "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", |
| "cmt_id": "37368554eaf7815a3ef3c2cbbd242fc19d3cb32b" |
| }, |
| "CVE-2020-10767": { |
| "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", |
| "cmt_id": "317b9c418ea38089a6d5c42fcaa9a545334838c3" |
| }, |
| "CVE-2020-10768": { |
| "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", |
| "cmt_id": "7a5764e8990096fd08e8566b87df3c111bf5a736" |
| } |
| }, |
| "4.4.229": { |
| "CVE-2020-12771": { |
| "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", |
| "cmt_id": "9517bec2c1ff8f223f8f2d28c743731e8f216bbe" |
| }, |
| "CVE-2020-15436": { |
| "cmt_msg": "block: Fix use-after-free in blkdev_get()", |
| "cmt_id": "f9aa90e1b8aa2a133d4046223248ab61688445f5" |
| } |
| }, |
| "4.4.230": { |
| "CVE-2020-15393": { |
| "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", |
| "cmt_id": "831eebad70a25f55b5745453ac252d4afe997187" |
| } |
| }, |
| "4.4.232": { |
| "CVE-2020-15437": { |
| "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", |
| "cmt_id": "f5e7de4f4232154835f4c3d87e01350457340c16" |
| }, |
| "CVE-2018-10323": { |
| "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", |
| "cmt_id": "f88efa4d6cb1fcacb9591979bacc6c57ec9d7c53" |
| } |
| }, |
| "4.4.233": { |
| "CVE-2020-26088": { |
| "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", |
| "cmt_id": "de7c8ab8cb412d21ffdac94a99ef2f29f7802fd1" |
| }, |
| "CVE-2019-19054": { |
| "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", |
| "cmt_id": "84c9c409286617385e71d4d0d0c9dd940b574469" |
| }, |
| "CVE-2020-25212": { |
| "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", |
| "cmt_id": "db61fb8278925f54ccb0172471164aeb56ec6537" |
| }, |
| "CVE-2019-9445": { |
| "cmt_msg": "f2fs: check if file namelen exceeds max value", |
| "cmt_id": "559eff3dca325947bc3d88d17f4c454111884be5" |
| }, |
| "CVE-2018-13094": { |
| "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", |
| "cmt_id": "3d5eb8428488648c544e82e6b8b9fd391b107ed9" |
| }, |
| "CVE-2018-8043": { |
| "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", |
| "cmt_id": "52e4b929c3bd6fac2a8cf4c2609d71486bde072c" |
| }, |
| "CVE-2020-16166": { |
| "cmt_msg": "random32: update the net random state on interrupt and activity", |
| "cmt_id": "40713057d1d11fc86f0ed02383373281d87841a3" |
| }, |
| "CVE-2020-36386": { |
| "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", |
| "cmt_id": "491602ede684bb8554254f12f4b1bd242dd15c61" |
| }, |
| "CVE-2020-14331": { |
| "cmt_msg": "vgacon: Fix for missing check in scrollback handling", |
| "cmt_id": "cd44c411a441d994b234605f51f0d1ee5740e353" |
| }, |
| "CVE-2019-19448": { |
| "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", |
| "cmt_id": "b086fe8442d20dbd660812337f152ec868c64c0e" |
| }, |
| "CVE-2019-19074": { |
| "cmt_msg": "ath9k: release allocated buffer if timed out", |
| "cmt_id": "94e3650b2568ae7a06e10c282f588ddede5df1d6" |
| }, |
| "CVE-2019-19073": { |
| "cmt_msg": "ath9k_htc: release allocated buffer if timed out", |
| "cmt_id": "60fa3632210b1dc99296100227ae2d79ebbb4780" |
| } |
| }, |
| "4.4.234": { |
| "CVE-2020-14314": { |
| "cmt_msg": "ext4: fix potential negative array index in do_split()", |
| "cmt_id": "059b1480105478c5f68cf664301545b8cad6a7cf" |
| }, |
| "CVE-2020-29371": { |
| "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", |
| "cmt_id": "2935e0a3cec1ffa558eea90db6279cff83aa3592" |
| }, |
| "CVE-2020-0466": { |
| "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", |
| "cmt_id": "d85e2b06662e7f46d0f174ecc603fc1c3554d5cf" |
| } |
| }, |
| "4.4.236": { |
| "CVE-2020-25285": { |
| "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", |
| "cmt_id": "9c9757b4a2cd8039dddc01e8b589d9157f5d756a" |
| }, |
| "CVE-2020-0465": { |
| "cmt_msg": "HID: core: Sanitize event code and type when mapping input", |
| "cmt_id": "de801a7d3228aed8ea2bbfe36ccf3af7f9ef6f39" |
| }, |
| "CVE-2021-1048": { |
| "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", |
| "cmt_id": "6504c100804870911f074fd67f280756b6805958" |
| } |
| }, |
| "4.4.237": { |
| "CVE-2020-25284": { |
| "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", |
| "cmt_id": "e349a5786f4c23eb11d1e7385703ddbf94f3f061" |
| }, |
| "CVE-2020-14390": { |
| "cmt_msg": "fbcon: remove soft scrollback code", |
| "cmt_id": "1f08e80ec5751b8f565139cd7a921fbee46f8a22" |
| }, |
| "CVE-2020-28097": { |
| "cmt_msg": "vgacon: remove software scrollback support", |
| "cmt_id": "5f76b4c6ac297ce836abe17f495123f45bfc4fb3" |
| } |
| }, |
| "4.4.238": { |
| "CVE-2020-25643": { |
| "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", |
| "cmt_id": "a49ef91286776c3f095460112846cd85a063c29a" |
| }, |
| "CVE-2021-0605": { |
| "cmt_msg": "af_key: pfkey_dump needs parameter validation", |
| "cmt_id": "831587619afe78cd72651b34a0f6ccb2acf3c503" |
| } |
| }, |
| "4.4.239": { |
| "CVE-2020-25211": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" |
| }, |
| "CVE-2021-0448": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" |
| }, |
| "CVE-2021-39634": { |
| "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", |
| "cmt_id": "ea984dfe0e7978cd294eb6a640ac27fa1834ac8d" |
| }, |
| "CVE-2020-28915": { |
| "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", |
| "cmt_id": "0e3e69e0a8bc516e37ee3b496779b60e660b5ea5" |
| } |
| }, |
| "4.4.240": { |
| "CVE-2020-10135": { |
| "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", |
| "cmt_id": "554ab8c6e143606bb205c7d694656fac3d6e3cc2" |
| }, |
| "CVE-2020-12352": { |
| "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", |
| "cmt_id": "e7b465bda9b90bec5427775bcbbfc47fe7a6012b" |
| } |
| }, |
| "4.4.241": { |
| "CVE-2020-25705": { |
| "cmt_msg": "icmp: randomize the global rate limiter", |
| "cmt_id": "a9d0ba6aa7485aabed7b8f2ed5a3975684847e0b" |
| } |
| }, |
| "4.4.242": { |
| "CVE-2020-28974": { |
| "cmt_msg": "vt: Disable KD_FONT_OP_COPY", |
| "cmt_id": "81f26642406c16bf52015683511c814ecbe2abc3" |
| }, |
| "CVE-2020-25668": { |
| "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", |
| "cmt_id": "e847c4e2ccc80295338cc96136aec2877be82359" |
| }, |
| "CVE-2020-25656": { |
| "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", |
| "cmt_id": "f4cfdf9b1487d3512da27a1a542b4c33a4737bca" |
| }, |
| "CVE-2020-35508": { |
| "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", |
| "cmt_id": "33175e2d8fdf7b07be9691ee7747a3982dcf52cd" |
| } |
| }, |
| "4.4.243": { |
| "CVE-2020-8694": { |
| "cmt_msg": "powercap: restrict energy meter to root access", |
| "cmt_id": "ed3691aa7e4ad0a987da49b9165a22255b39e9b7" |
| } |
| }, |
| "4.4.244": { |
| "CVE-2020-14351": { |
| "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", |
| "cmt_id": "17b235e6cc9d701a2eece74a64f89062072b81b1" |
| }, |
| "CVE-2020-25645": { |
| "cmt_msg": "geneve: add transport ports in route lookup for geneve", |
| "cmt_id": "e98bcb65299870dfa98d2067d423da80555188c4" |
| }, |
| "CVE-2020-0427": { |
| "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", |
| "cmt_id": "03f69244302d7954f42f528ea2d45903ebbf59f3" |
| }, |
| "CVE-2020-27673": { |
| "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", |
| "cmt_id": "33f38ccfe479fdb53bf0409e9b74e993e30d4d1f" |
| }, |
| "CVE-2019-0148": { |
| "cmt_msg": "i40e: Wrong truncation from u16 to u8", |
| "cmt_id": "0f60ed1afff42f84dcba5a7950ee8712da8363d5" |
| }, |
| "CVE-2020-27675": { |
| "cmt_msg": "xen/events: avoid removing an event channel while handling it", |
| "cmt_id": "c0e77192829a1a02983d672ac144e6196098cad7" |
| } |
| }, |
| "4.4.245": { |
| "CVE-2018-13093": { |
| "cmt_msg": "xfs: validate cached inodes are free when allocated", |
| "cmt_id": "f17ef9beebc7c55c5a791aacdc5992880ea15d8c" |
| }, |
| "CVE-2020-25669": { |
| "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", |
| "cmt_id": "640ede0a21a0b9bd68e47ccbca87fd747e38ea0a" |
| }, |
| "CVE-2020-4788": { |
| "cmt_msg": "powerpc/64s: flush L1D on kernel entry", |
| "cmt_id": "4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6" |
| } |
| }, |
| "4.4.247": { |
| "CVE-2019-19813": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" |
| }, |
| "CVE-2019-19816": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" |
| } |
| }, |
| "4.4.248": { |
| "CVE-2020-29661": { |
| "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", |
| "cmt_id": "30f7752609a8030862f4c7faed5c845e2aa300be" |
| }, |
| "CVE-2020-29660": { |
| "cmt_msg": "tty: Fix ->session locking", |
| "cmt_id": "7b4a4b9403c52343d00901babc3987588bc0b085" |
| }, |
| "CVE-2020-35519": { |
| "cmt_msg": "net/x25: prevent a couple of overflows", |
| "cmt_id": "3cb72fe7ac64d5f647dbefd94ce7b54f6b92ede9" |
| } |
| }, |
| "4.4.249": { |
| "CVE-2020-27815": { |
| "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", |
| "cmt_id": "b01bec9ec3b196a8a33d0d68991c8a45c8c24551" |
| }, |
| "CVE-2020-29568": { |
| "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", |
| "cmt_id": "de66402f45c0cae9566b1568cc1b2df2b5ccbbf8" |
| } |
| }, |
| "4.4.250": { |
| "CVE-2020-36158": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", |
| "cmt_id": "878ba6234c5827722d79767d39450340e228ce86" |
| } |
| }, |
| "4.4.252": { |
| "CVE-2020-28374": { |
| "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", |
| "cmt_id": "87be50177ddb789330e6c5ddcc2f301cec0017dc" |
| } |
| }, |
| "4.4.253": { |
| "CVE-2021-3178": { |
| "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", |
| "cmt_id": "c89b2b56fc536d4fd41745bcbf394aa21162e277" |
| } |
| }, |
| "4.4.254": { |
| "CVE-2020-27825": { |
| "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", |
| "cmt_id": "a7c2dd4438056fb665a376860242463a30f2d2e8" |
| }, |
| "CVE-2021-39657": { |
| "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", |
| "cmt_id": "a4cdbf4805bfed8f39e6b25f113588064d9a6ac5" |
| } |
| }, |
| "4.4.258": { |
| "CVE-2021-26931": { |
| "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", |
| "cmt_id": "74e38b7a6972fd6983e6fbd929b65746ce975aed" |
| }, |
| "CVE-2021-26930": { |
| "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", |
| "cmt_id": "2e6cc64b7b56e5c2d2c01de8ff1b3986342c2b18" |
| }, |
| "CVE-2021-26932": { |
| "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", |
| "cmt_id": "15b6ca2cef13f06ef41d9ebc094ef7770fd98ab3" |
| } |
| }, |
| "4.4.259": { |
| "CVE-2021-0512": { |
| "cmt_msg": "HID: make arrays usage and value to be the same", |
| "cmt_id": "795a8c31cabf1a452b0b63bb3f8d9159b353e5ce" |
| }, |
| "CVE-2021-3612": { |
| "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", |
| "cmt_id": "ade5180681d778d36b569ad35cc175ab22196c5f" |
| } |
| }, |
| "4.4.260": { |
| "CVE-2021-30002": { |
| "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", |
| "cmt_id": "432b08869893ebd751e815465b822bb99cf710e7" |
| }, |
| "CVE-2021-27365": { |
| "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", |
| "cmt_id": "b8a757b57ba3e27d6399106a78350af513fb0bb5" |
| }, |
| "CVE-2021-27364": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" |
| }, |
| "CVE-2021-27363": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" |
| }, |
| "CVE-2021-28038": { |
| "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", |
| "cmt_id": "f2c9673ce689801ef3bee517013b0c9b94dd14fa" |
| } |
| }, |
| "4.4.262": { |
| "CVE-2019-19060": { |
| "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", |
| "cmt_id": "00552ca5cae5e86311df6cfd5911213c89ece4e2" |
| }, |
| "CVE-2019-19061": { |
| "cmt_msg": "iio: imu: adis16400: fix memory leak", |
| "cmt_id": "7671c44edfd0411c7411266f0c90dd21b535c3d4" |
| }, |
| "CVE-2021-28660": { |
| "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", |
| "cmt_id": "36f8d0af46daf6eb4c7c5edf6adbfa02e9c70f92" |
| }, |
| "CVE-2021-20261": { |
| "cmt_msg": "floppy: fix lock_fdc() signal handling", |
| "cmt_id": "b93c6b400ed51e526e724b430a115293fd147466" |
| }, |
| "CVE-2021-29265": { |
| "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", |
| "cmt_id": "9ee196f307ec006cac386a0d8b7935dd2ccd0083" |
| }, |
| "CVE-2019-16232": { |
| "cmt_msg": "libertas: fix a potential NULL pointer dereference", |
| "cmt_id": "3b431b60940fa2cda06d6b4906e11acd222d471a" |
| } |
| }, |
| "4.4.263": { |
| "CVE-2021-28964": { |
| "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", |
| "cmt_id": "2922e2e894781c36ce014935f05163287635609c" |
| }, |
| "CVE-2021-28972": { |
| "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", |
| "cmt_id": "4639466722c2ea832bc145c06cd5aa2012db9102" |
| } |
| }, |
| "4.4.264": { |
| "CVE-2021-28688": { |
| "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", |
| "cmt_id": "47b6b2742ee60334c40d75bfaab49028688f1510" |
| } |
| }, |
| "4.4.265": { |
| "CVE-2021-3483": { |
| "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", |
| "cmt_id": "63d8737a59ae58e5c2d5fd640c294e7b5bb1d394" |
| } |
| }, |
| "4.4.266": { |
| "CVE-2021-29154": { |
| "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", |
| "cmt_id": "ca97582a3fe79543de8e5905e829c5ad3661a1ef" |
| } |
| }, |
| "4.4.267": { |
| "CVE-2021-3659": { |
| "cmt_msg": "net: mac802154: Fix general protection fault", |
| "cmt_id": "cd19d85e6d4a361beb11431af3d22248190f5b48" |
| }, |
| "CVE-2021-0937": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" |
| }, |
| "CVE-2020-25672": { |
| "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", |
| "cmt_id": "7ed6c0c7db2099792768150c070efca71e85bdf3" |
| }, |
| "CVE-2020-25673": { |
| "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", |
| "cmt_id": "7f6c9e4314aa7d90b6261b8ae571d14c454ba964" |
| }, |
| "CVE-2020-25670": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", |
| "cmt_id": "a1cdd18c49d23ec38097ac2c5b0d761146fc0109" |
| }, |
| "CVE-2020-25671": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", |
| "cmt_id": "a524eabb5e309e49ee2d8422a771c5cedef003c4" |
| }, |
| "CVE-2021-22555": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" |
| } |
| }, |
| "4.4.269": { |
| "CVE-2021-33034": { |
| "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", |
| "cmt_id": "b27a218d166b7f07cd5616fb90e727b6ed662b1a" |
| }, |
| "CVE-2017-0605": { |
| "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", |
| "cmt_id": "150381302389fa01425396489a21dc7c53383a5b" |
| }, |
| "CVE-2021-31916": { |
| "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", |
| "cmt_id": "0c0f93fbd20276d65ae0581edfcdc93579aa1dc7" |
| }, |
| "CVE-2021-4157": { |
| "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", |
| "cmt_id": "0c5ccd5e2a2e291774618c24c459fa397fd1b7da" |
| } |
| }, |
| "4.4.270": { |
| "CVE-2020-26558": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" |
| }, |
| "CVE-2021-0129": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" |
| } |
| }, |
| "4.4.271": { |
| "CVE-2020-24587": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" |
| }, |
| "CVE-2020-24586": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" |
| }, |
| "CVE-2021-34981": { |
| "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", |
| "cmt_id": "61a811e8f5229264b822361f8b23d7638fd8c914" |
| }, |
| "CVE-2020-24588": { |
| "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", |
| "cmt_id": "daea7ff51861cec93ff7f561095d9048b673b51f" |
| }, |
| "CVE-2020-26139": { |
| "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", |
| "cmt_id": "e3d4030498c304d7c36bccc6acdedacf55402387" |
| }, |
| "CVE-2020-26147": { |
| "cmt_msg": "mac80211: assure all fragments are encrypted", |
| "cmt_id": "16cbc9756dd84e870867f003a200553931dd461b" |
| }, |
| "CVE-2021-29650": { |
| "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", |
| "cmt_id": "9bc6c1246941cf88cf06a27153d6a1108a240067" |
| }, |
| "CVE-2021-32399": { |
| "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", |
| "cmt_id": "a7dc1c981038bbd5f7379148d7fd8821d2a7b9ae" |
| } |
| }, |
| "4.4.272": { |
| "CVE-2021-3564": { |
| "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", |
| "cmt_id": "054b0b4f9bf86baac0774e1ea38f4b65497089e5" |
| }, |
| "CVE-2021-38208": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" |
| }, |
| "CVE-2021-3573": { |
| "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", |
| "cmt_id": "2260759b5300865dc209150e925aaeb9df758630" |
| }, |
| "CVE-2021-3587": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" |
| } |
| }, |
| "4.4.274": { |
| "CVE-2021-34693": { |
| "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", |
| "cmt_id": "f638caa211e7a121a5596986d29ebbdaf9156398" |
| }, |
| "CVE-2021-45486": { |
| "cmt_msg": "inet: use bigger hash table for IP ID generation", |
| "cmt_id": "8fb8c138b5d69128964e54e1b5ee49fc395f011c" |
| } |
| }, |
| "4.4.276": { |
| "CVE-2021-38160": { |
| "cmt_msg": "virtio_console: Assure used length from device is limited", |
| "cmt_id": "187f14fb88a9e62d55924748a274816fe6f34de6" |
| }, |
| "CVE-2021-3609": { |
| "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", |
| "cmt_id": "9c47fa9295ce58433cae4376240b738b126637d4" |
| }, |
| "CVE-2021-45485": { |
| "cmt_msg": "ipv6: use prandom_u32() for ID generation", |
| "cmt_id": "c43fa9ee9f1de295474a28903607f84209d7e611" |
| }, |
| "CVE-2022-0850": { |
| "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", |
| "cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9" |
| }, |
| "CVE-2021-33909": { |
| "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", |
| "cmt_id": "3533e50cbee8ff086bfa04176ac42a01ee3db37d" |
| } |
| }, |
| "4.4.277": { |
| "CVE-2021-38204": { |
| "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", |
| "cmt_id": "fc2a7c2280fa2be8ff9b5af702368fcd49a0acdb" |
| }, |
| "CVE-2021-3679": { |
| "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", |
| "cmt_id": "afa091792525dfa6c3c854069ec6b8a5ccc62c11" |
| }, |
| "CVE-2021-37576": { |
| "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", |
| "cmt_id": "1e90a673f6ee09c668fe01aa1b94924f972c9811" |
| } |
| }, |
| "4.4.278": { |
| "CVE-2021-0920": { |
| "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", |
| "cmt_id": "72247f34d90e25c1493436e45e193e8306082b19" |
| }, |
| "CVE-2021-21781": { |
| "cmt_msg": "ARM: ensure the signal page contains defined contents", |
| "cmt_id": "8db77dca7e1d1d1d6aa9334207ead57853832bb7" |
| } |
| }, |
| "4.4.281": { |
| "CVE-2021-38205": { |
| "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", |
| "cmt_id": "3d4ba14fc5ffbe5712055af09a5c0cbab93c0f44" |
| }, |
| "CVE-2021-3732": { |
| "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", |
| "cmt_id": "c6e8810d25295acb40a7b69ed3962ff181919571" |
| } |
| }, |
| "4.4.282": { |
| "CVE-2021-3653": { |
| "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", |
| "cmt_id": "53723b7be26ef31ad642ce5ffa8b42dec16db40e" |
| }, |
| "CVE-2021-42008": { |
| "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", |
| "cmt_id": "d66736076bd84742c18397785476e9a84d5b54ef" |
| } |
| }, |
| "4.4.283": { |
| "CVE-2021-3753": { |
| "cmt_msg": "vt_kdsetmode: extend console locking", |
| "cmt_id": "01da584f08cbb1e04f22796cc49b10d570cd5ec1" |
| } |
| }, |
| "4.4.284": { |
| "CVE-2021-40490": { |
| "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", |
| "cmt_id": "69d82df68fbc5e368820123200d7b88f6c058350" |
| }, |
| "CVE-2020-3702": { |
| "cmt_msg": "ath: Use safer key clearing with key cache entries", |
| "cmt_id": "4d6b4335838fd89419212e1e486c415ec36fb610" |
| } |
| }, |
| "4.4.285": { |
| "CVE-2021-20320": { |
| "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", |
| "cmt_id": "a738597a79e588bcf9817d4ec12740c99842db3b" |
| }, |
| "CVE-2021-3655": { |
| "cmt_msg": "sctp: validate from_addr_param return", |
| "cmt_id": "c299c5925ab774b64ca6aba87fb8c497f5663780" |
| } |
| }, |
| "4.4.288": { |
| "CVE-2021-4203": { |
| "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", |
| "cmt_id": "323f0968a81b082cf02ef15b447cd35e4328385e" |
| } |
| }, |
| "4.4.289": { |
| "CVE-2020-29374": { |
| "cmt_msg": "gup: document and work around \"COW can break either way\" issue", |
| "cmt_id": "58facc9c7ae307be5ecffc1697552550fedb55bd" |
| } |
| }, |
| "4.4.290": { |
| "CVE-2021-3896": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" |
| }, |
| "CVE-2021-20321": { |
| "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", |
| "cmt_id": "a4f281ffc1d128d7ea693cbc3a796e56e919fd7c" |
| }, |
| "CVE-2021-3760": { |
| "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", |
| "cmt_id": "1d5e0107bfdbef6cc140fb5d7a1a817a40948528" |
| }, |
| "CVE-2021-43389": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" |
| } |
| }, |
| "4.4.291": { |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "629d2823abf957bcbcba32154f1f6fd49bdb850c" |
| } |
| }, |
| "4.4.292": { |
| "CVE-2021-37159": { |
| "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", |
| "cmt_id": "cbefdf724282e6a948885f379dc92ab841c2fee0" |
| } |
| }, |
| "4.4.293": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "6dc051117ba0e1dac9324593ff2c1c520f67ad21" |
| }, |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "88aed7d67197d155260f09078835290adfa1debd" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "7a40f3e53f5de1d6876df8a9e8025b50616b8818" |
| }, |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "120ffcd83596fe94b6d6735d21349f118b60c936" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "f632f88fe209240f5cad853e33f74fda4d341004" |
| } |
| }, |
| "4.4.294": { |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "8a8ae093b52ba76b650b493848d67e7b526c8751" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "8afa4ef999191477506b396fae518338b8996fec" |
| } |
| }, |
| "4.4.295": { |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "d0ceebaae0e406263b83462701b5645e075c1467" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "93cd7100fe471c5f76fb942358de4ed70dbcaf35" |
| } |
| }, |
| "4.4.296": { |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "0928efb09178e01d3dc8e8849aa1c807436c3c37" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "81900aa7d7a130dec4c55b68875e30fb8c9effec" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "3e04b9e6aa7d77287e70a400be83060d2b7b2cfe" |
| } |
| }, |
| "4.4.297": { |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6" |
| } |
| }, |
| "4.4.299": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "172b3f506c24a61805b3910b9acfe7159d980b9b" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "56adcda55aa213e106224ff3d18ef4625e25f52b" |
| } |
| }, |
| "4.4.300": { |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "7d5e12e452771509d94db391a3b5e428325ed268" |
| } |
| }, |
| "4.4.301": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a" |
| } |
| }, |
| "4.4.302": { |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea" |
| } |
| }, |
| "outstanding": { |
| "CVE-2020-36322": { |
| "cmt_msg": "fuse: fix bad inode" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0929": { |
| "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" |
| }, |
| "CVE-2018-1128": { |
| "cmt_msg": "libceph: add authorizer challenge" |
| }, |
| "CVE-2018-1129": { |
| "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" |
| }, |
| "CVE-2018-20854": { |
| "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" |
| }, |
| "CVE-2018-20855": { |
| "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1419": { |
| "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" |
| }, |
| "CVE-2021-33098": { |
| "cmt_msg": "ixgbe: fix large MTU request from VF" |
| }, |
| "CVE-2017-5753": { |
| "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2019-19377": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" |
| }, |
| "CVE-2019-2181": { |
| "cmt_msg": "binder: check for overflow when alloc for security context" |
| }, |
| "CVE-2022-0644": { |
| "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0067": { |
| "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" |
| }, |
| "CVE-2019-19449": { |
| "cmt_msg": "f2fs: fix to do sanity check on segment/section count" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26541": { |
| "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-20317": { |
| "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" |
| }, |
| "CVE-2021-35477": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" |
| }, |
| "CVE-2019-15222": { |
| "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" |
| }, |
| "CVE-2019-15223": { |
| "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" |
| }, |
| "CVE-2017-18552": { |
| "cmt_msg": "RDS: validate the requested traces user input against max supported" |
| }, |
| "CVE-2019-19815": { |
| "cmt_msg": "f2fs: support swap file w/ DIO" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe" |
| }, |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." |
| }, |
| "CVE-2021-39648": { |
| "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" |
| }, |
| "CVE-2019-19241": { |
| "cmt_msg": "io_uring: async workers should inherit the user creds" |
| }, |
| "CVE-2019-9453": { |
| "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" |
| }, |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" |
| }, |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" |
| }, |
| "CVE-2017-1000405": { |
| "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12379": { |
| "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" |
| }, |
| "CVE-2019-12378": { |
| "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" |
| }, |
| "CVE-2021-0941": { |
| "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" |
| }, |
| "CVE-2020-16120": { |
| "cmt_msg": "ovl: switch to mounter creds in readdir" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2021-39713": { |
| "cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock" |
| }, |
| "CVE-2018-25020": { |
| "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" |
| }, |
| "CVE-2019-20908": { |
| "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" |
| }, |
| "CVE-2018-7754": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" |
| }, |
| "CVE-2018-3646": { |
| "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4037": { |
| "cmt_msg": "xfs: fix up non-directory creation in SGID directories" |
| }, |
| "CVE-2021-22543": { |
| "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" |
| }, |
| "CVE-2019-1999": { |
| "cmt_msg": "binder: fix race between munmap() and direct reclaim" |
| }, |
| "CVE-2021-3506": { |
| "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" |
| }, |
| "CVE-2020-0435": { |
| "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" |
| }, |
| "CVE-2019-3874": { |
| "cmt_msg": "sctp: implement memory accounting on tx path" |
| }, |
| "CVE-2020-26145": { |
| "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-7308": { |
| "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2021-29155": { |
| "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" |
| }, |
| "CVE-2017-9986": { |
| "cmt_msg": "sound: Retire OSS" |
| }, |
| "CVE-2021-39711": { |
| "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" |
| }, |
| "CVE-2021-34556": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection" |
| }, |
| "CVE-2021-39714": { |
| "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" |
| }, |
| "CVE-2017-18261": { |
| "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" |
| }, |
| "CVE-2018-13095": { |
| "cmt_msg": "xfs: More robust inode extent count validation" |
| }, |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf" |
| }, |
| "CVE-2018-13098": { |
| "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" |
| }, |
| "CVE-2021-38300": { |
| "cmt_msg": "bpf, mips: Validate conditional branch offsets" |
| }, |
| "CVE-2021-3669": { |
| "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" |
| }, |
| "CVE-2019-18885": { |
| "cmt_msg": "btrfs: merge btrfs_find_device and find_device" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" |
| }, |
| "CVE-2019-11091": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2015-8952": { |
| "cmt_msg": "ext2: convert to mbcache2" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-38198": { |
| "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" |
| }, |
| "CVE-2021-4149": { |
| "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3894": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk" |
| }, |
| "CVE-2022-0812": { |
| "cmt_msg": "xprtrdma: fix incorrect header size calculations" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19036": { |
| "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" |
| }, |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" |
| }, |
| "CVE-2018-12130": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2021-20292": { |
| "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." |
| }, |
| "CVE-2017-8065": { |
| "cmt_msg": "crypto: ccm - move cbcmac input off the stack" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1508": { |
| "cmt_msg": "io_uring: reexpand under-reexpanded iters" |
| }, |
| "CVE-2015-1350": { |
| "cmt_msg": "fs: Avoid premature clearing of capabilities" |
| }, |
| "CVE-2020-11669": { |
| "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" |
| }, |
| "CVE-2019-19922": { |
| "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" |
| }, |
| "CVE-2019-19927": { |
| "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" |
| }, |
| "CVE-2021-4023": { |
| "cmt_msg": "io-wq: fix cancellation on create-worker failure" |
| }, |
| "CVE-2019-16921": { |
| "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" |
| }, |
| "CVE-2021-4159": { |
| "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" |
| }, |
| "CVE-2017-8797": { |
| "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" |
| }, |
| "CVE-2017-5715": { |
| "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests" |
| }, |
| "CVE-2019-20806": { |
| "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4150": { |
| "cmt_msg": "block: fix incorrect references to disk objects" |
| }, |
| "CVE-2021-28951": { |
| "cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-14305": { |
| "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" |
| }, |
| "CVE-2018-3620": { |
| "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" |
| }, |
| "CVE-2020-27777": { |
| "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12615": { |
| "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" |
| }, |
| "CVE-2019-16230": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" |
| }, |
| "CVE-2019-16231": { |
| "cmt_msg": "fjes: Handle workqueue allocation failure" |
| }, |
| "CVE-2017-12168": { |
| "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" |
| }, |
| "CVE-2017-18174": { |
| "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" |
| }, |
| "CVE-2020-12362": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2020-12363": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2021-39636": { |
| "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" |
| }, |
| "CVE-2018-12127": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2018-12126": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2018-20509": { |
| "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" |
| }, |
| "CVE-2022-0480": { |
| "cmt_msg": "memcg: enable accounting for file lock caches" |
| }, |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" |
| }, |
| "CVE-2020-12888": { |
| "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20811": { |
| "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" |
| }, |
| "CVE-2020-26141": { |
| "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" |
| }, |
| "CVE-2019-2025": { |
| "cmt_msg": "binder: fix race that allows malicious free of live buffer" |
| }, |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" |
| }, |
| "CVE-2021-4218": { |
| "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2018-5995": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-7273": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2018-9465": { |
| "cmt_msg": "binder: fix proc->files use-after-free" |
| }, |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-5728": { |
| "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" |
| }, |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" |
| }, |
| "CVE-2022-1043": { |
| "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" |
| }, |
| "CVE-2017-5967": { |
| "cmt_msg": "time: Remove CONFIG_TIMER_STATS" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" |
| }, |
| "CVE-2019-2054": { |
| "cmt_msg": "arm/ptrace: run seccomp after ptrace" |
| }, |
| "CVE-2020-36385": { |
| "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" |
| }, |
| "CVE-2021-39633": { |
| "cmt_msg": "ip_gre: add validation for csum_start" |
| }, |
| "CVE-2019-12380": { |
| "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" |
| }, |
| "CVE-2019-12381": { |
| "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" |
| }, |
| "CVE-2019-12382": { |
| "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" |
| }, |
| "CVE-2020-12364": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" |
| }, |
| "CVE-2017-13166": { |
| "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" |
| }, |
| "CVE-2018-12207": { |
| "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" |
| }, |
| "CVE-2020-12656": { |
| "cmt_msg": "sunrpc: check that domain table is empty at module unload." |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" |
| }, |
| "CVE-2020-12655": { |
| "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36310": { |
| "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" |
| }, |
| "CVE-2020-36313": { |
| "cmt_msg": "KVM: Fix out of range accesses to memslots" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-10723": { |
| "cmt_msg": "mm, oom: remove sleep from under oom_lock" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0707": { |
| "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" |
| }, |
| "CVE-2019-11191": { |
| "cmt_msg": "x86: Deprecate a.out support" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length" |
| }, |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" |
| }, |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" |
| }, |
| "CVE-2019-19039": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-10322": { |
| "cmt_msg": "xfs: enhance dinode verifier" |
| }, |
| "CVE-2020-8832": { |
| "cmt_msg": "drm/i915: Record the default hw state after reset upon load" |
| }, |
| "CVE-2022-1280": { |
| "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" |
| }, |
| "CVE-2021-32078": { |
| "cmt_msg": "ARM: footbridge: remove personal server platform" |
| }, |
| "CVE-2019-10220": { |
| "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-5489": { |
| "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" |
| }, |
| "CVE-2019-2213": { |
| "cmt_msg": "binder: fix possible UAF when freeing buffer" |
| }, |
| "CVE-2017-18232": { |
| "cmt_msg": "scsi: libsas: direct call probe and destruct" |
| }, |
| "CVE-2017-16648": { |
| "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" |
| } |
| } |
| }, |
| "5.4": { |
| "5.4-rc1": { |
| "CVE-2019-15099": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "39d170b3cb62ba98567f5c4f40c27b5864b304e5" |
| } |
| }, |
| "5.4.1": { |
| "CVE-2019-18660": { |
| "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", |
| "cmt_id": "79f6bca3bc524d8b2e29bbc96ad541d13d6d9547" |
| }, |
| "CVE-2019-15291": { |
| "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", |
| "cmt_id": "acfcb05fbdb8ee3aad4359372c1b238a366b5355" |
| }, |
| "CVE-2019-18683": { |
| "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", |
| "cmt_id": "5aa7ad7e991e6cb0c3a1825dbe7f78c2a8116ccc" |
| } |
| }, |
| "5.4.2": { |
| "CVE-2019-19767": { |
| "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", |
| "cmt_id": "69412e8ac6206e36aa09a6e3f5503be020b64ba8" |
| }, |
| "CVE-2019-19241": { |
| "cmt_msg": "io_uring: async workers should inherit the user creds", |
| "cmt_id": "8387e3688aa9e06a12b58abbcfe2cbfd0cf0f589" |
| }, |
| "CVE-2019-19602": { |
| "cmt_msg": "x86/fpu: Don't cache access to fpu_fpregs_owner_ctx", |
| "cmt_id": "4c1bb6bbc541a1961ac3605a5507236961983185" |
| } |
| }, |
| "5.4.3": { |
| "CVE-2019-19062": { |
| "cmt_msg": "crypto: user - fix memory leak in crypto_report", |
| "cmt_id": "b022e155ccbcfadeaf5543d5b4d99c3c6d260ced" |
| }, |
| "CVE-2019-19050": { |
| "cmt_msg": "crypto: user - fix memory leak in crypto_reportstat", |
| "cmt_id": "d8d63ea238cc34dd3874969b13d44a158cd0fdd0" |
| }, |
| "CVE-2019-19338": { |
| "cmt_msg": "KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIES", |
| "cmt_id": "52c8b0c6e11e139f0e27ea41a7444bfbf17aa2e1" |
| }, |
| "CVE-2019-19071": { |
| "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", |
| "cmt_id": "9f513166a8e773081f86b198371f6a80b4bd52ec" |
| }, |
| "CVE-2019-19252": { |
| "cmt_msg": "vcs: prevent write access to vcsu devices", |
| "cmt_id": "0b0923bb6d2808bc6f3b03028fec685144227ba8" |
| }, |
| "CVE-2019-19332": { |
| "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", |
| "cmt_id": "8ad39a3b44c1b452e51c0fc996d65911e2545b84" |
| } |
| }, |
| "5.4.4": { |
| "CVE-2020-0041": { |
| "cmt_msg": "binder: fix incorrect calculation for num_valid", |
| "cmt_id": "34d8a89fe156b082823f438f8240e8d57291c9f2" |
| }, |
| "CVE-2019-19447": { |
| "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", |
| "cmt_id": "a44a5939a4097c98481a5b873b7bd9f387e56f59" |
| } |
| }, |
| "5.4.5": { |
| "CVE-2020-1749": { |
| "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", |
| "cmt_id": "48d58ae9e87aaa11814364ddb52b3461f9abac57" |
| } |
| }, |
| "5.4.7": { |
| "CVE-2019-18786": { |
| "cmt_msg": "media: rcar_drif: fix a memory disclosure", |
| "cmt_id": "96d7c3cb33c591070d067b048129a4ddd9fb9346" |
| }, |
| "CVE-2019-19057": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", |
| "cmt_id": "01b987532b79828ca67efb63eeec2bf07f3099df" |
| }, |
| "CVE-2019-19063": { |
| "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", |
| "cmt_id": "39a974f8970268e7a02933e5cd6fab3e2dd8228e" |
| }, |
| "CVE-2020-0427": { |
| "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", |
| "cmt_id": "f739a699db7d5a5cf39ca3ce2c84e4fe4a8f4c5d" |
| }, |
| "CVE-2019-19947": { |
| "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices", |
| "cmt_id": "9562cdb0af47c4040c4e7e842b87a43f86845c7a" |
| }, |
| "CVE-2019-20812": { |
| "cmt_msg": "af_packet: set defaule value for tmo", |
| "cmt_id": "772f76457932305e63e2b796228158b842830022" |
| }, |
| "CVE-2019-19037": { |
| "cmt_msg": "ext4: fix ext4_empty_dir() for directories with holes", |
| "cmt_id": "6cc4ccdd0b975f5f4c334fac71fee47e564472bf" |
| }, |
| "CVE-2019-16230": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", |
| "cmt_id": "fbeec1d0e552662539a1b72e2530a7006bd677fa" |
| }, |
| "CVE-2019-16232": { |
| "cmt_msg": "libertas: fix a potential NULL pointer dereference", |
| "cmt_id": "6ab523073f222e2e3a4545cbe436ef94a33bffff" |
| }, |
| "CVE-2019-16229": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", |
| "cmt_id": "fbeec1d0e552662539a1b72e2530a7006bd677fa" |
| }, |
| "CVE-2019-19070": { |
| "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe", |
| "cmt_id": "d7bb7d20a8bac687c16838f2b7b5629d595512d1" |
| } |
| }, |
| "5.4.8": { |
| "CVE-2020-10690": { |
| "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", |
| "cmt_id": "bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad" |
| } |
| }, |
| "5.4.9": { |
| "CVE-2019-18809": { |
| "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", |
| "cmt_id": "3dba6e50d09ee8c05d5ba68bd69624ac1ea0c814" |
| }, |
| "CVE-2019-19965": { |
| "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", |
| "cmt_id": "55c89290c7948e62ceac9eb3ffe6dd1555aa38d6" |
| } |
| }, |
| "5.4.11": { |
| "CVE-2019-14901": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", |
| "cmt_id": "389c0f743f9629392d119a11da780054456e9c49" |
| } |
| }, |
| "5.4.12": { |
| "CVE-2019-14895": { |
| "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", |
| "cmt_id": "cbd6a85021a38ce3071fc50f2e11b709b0add8c7" |
| }, |
| "CVE-2019-19053": { |
| "cmt_msg": "rpmsg: char: release allocated memory", |
| "cmt_id": "5bbe72cf486c3b983f739b3e1d98b61c8a205795" |
| }, |
| "CVE-2019-19066": { |
| "cmt_msg": "scsi: bfa: release allocated memory in case of error", |
| "cmt_id": "448fe0b67c68d36cb45c09444c6b8298130d4c5e" |
| }, |
| "CVE-2019-20636": { |
| "cmt_msg": "Input: add safety guards to input_set_keycode()", |
| "cmt_id": "39f711b69799c49e0e385494b9b8c0787f51293f" |
| }, |
| "CVE-2019-19068": { |
| "cmt_msg": "rtl8xxxu: prevent leaking urb", |
| "cmt_id": "e380d974731502d24e0353df36a883fe232c866b" |
| }, |
| "CVE-2020-0305": { |
| "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", |
| "cmt_id": "341464390512ed50d5e96cf8f5340dcfbebd837a" |
| }, |
| "CVE-2020-0431": { |
| "cmt_msg": "HID: hid-input: clear unmapped usages", |
| "cmt_id": "4091fbf6cc143c8ccd8275eaa642b2f2afe7c4ab" |
| }, |
| "CVE-2019-14615": { |
| "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", |
| "cmt_id": "53b9bd37af59d1def99b20707536105857eb9bd0" |
| }, |
| "CVE-2019-19056": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", |
| "cmt_id": "3fe1ced40e189e31c21f6723fbe4bdf8d2731922" |
| }, |
| "CVE-2019-19078": { |
| "cmt_msg": "ath10k: fix memory leak", |
| "cmt_id": "ad1e0d1976b9061bf2aca99249b0187c9bbd3334" |
| } |
| }, |
| "5.4.13": { |
| "CVE-2019-19064": { |
| "cmt_msg": "spi: lpspi: fix memory leak in fsl_lpspi_probe", |
| "cmt_id": "bf3b4bc7bb03a2b0e67078d42a1d43ce05a14b7b" |
| } |
| }, |
| "5.4.14": { |
| "CVE-2020-12652": { |
| "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", |
| "cmt_id": "b307a5e97483d72c4a18cc8755d362d88b50c6d1" |
| }, |
| "CVE-2021-3635": { |
| "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption", |
| "cmt_id": "8f4dc50b5c12e159ac846fdc00702c547fdf2e95" |
| }, |
| "CVE-2019-19043": { |
| "cmt_msg": "i40e: prevent memory leak in i40e_setup_macvlans", |
| "cmt_id": "97e81f01f03c25a03ca1699111323e3984c3779c" |
| } |
| }, |
| "5.4.15": { |
| "CVE-2019-19046": { |
| "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register", |
| "cmt_id": "57d748f43f0742f58b5cf01b2d7b9a0d2e113e3d" |
| } |
| }, |
| "5.4.16": { |
| "CVE-2019-14896": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "40b1747b03684f03827b6323a17e4aa67af1e307" |
| }, |
| "CVE-2019-14897": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "40b1747b03684f03827b6323a17e4aa67af1e307" |
| }, |
| "CVE-2020-14416": { |
| "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", |
| "cmt_id": "34545cad8e0476aa6843f132e1177fe1517b2814" |
| }, |
| "CVE-2020-8428": { |
| "cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", |
| "cmt_id": "454759886d0b463213fad0f1c733469e2c501ab9" |
| } |
| }, |
| "5.4.17": { |
| "CVE-2020-0432": { |
| "cmt_msg": "staging: most: net: fix buffer overflow", |
| "cmt_id": "b5e5d81230ec6a24b3ce452fc41d8260292c686a" |
| }, |
| "CVE-2020-12769": { |
| "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", |
| "cmt_id": "7db4e6c728cbb4caf6708b0181bc11763d1e89a7" |
| } |
| }, |
| "5.4.19": { |
| "CVE-2020-0404": { |
| "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", |
| "cmt_id": "6fcbff54ded118b29ca05f56aea85825d24a5645" |
| }, |
| "CVE-2019-3016": { |
| "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", |
| "cmt_id": "68460ceba319a46ea14b36129bfd0a152e0f00c3" |
| } |
| }, |
| "5.4.20": { |
| "CVE-2020-12653": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", |
| "cmt_id": "3c822e1f31186767d6b7261c3c066f01907ecfca" |
| }, |
| "CVE-2020-12654": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", |
| "cmt_id": "c5b071e3f44d1125694ad4dcf1234fb9a78d0be6" |
| } |
| }, |
| "5.4.21": { |
| "CVE-2022-1419": { |
| "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", |
| "cmt_id": "3ea7f138cec139be98f8bb9fc1a6b432003f834e" |
| }, |
| "CVE-2020-8992": { |
| "cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode", |
| "cmt_id": "94f0fe04da78adc214b51523499031664f9db408" |
| } |
| }, |
| "5.4.23": { |
| "CVE-2020-9383": { |
| "cmt_msg": "floppy: check FDC index for errors before assigning it", |
| "cmt_id": "1eb78bc92c847f9e1c01a01b2773fc2fe7b134cf" |
| }, |
| "CVE-2020-2732": { |
| "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", |
| "cmt_id": "24dfae91a23a55c9f4cbe8fd778ed229ee9cced1" |
| }, |
| "CVE-2020-0110": { |
| "cmt_msg": "sched/psi: Fix OOB write when writing 0 bytes to PSI files", |
| "cmt_id": "e61c236dcf3416211008774b6c2bfa01753a82c1" |
| }, |
| "CVE-2020-0009": { |
| "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", |
| "cmt_id": "41a53f5b68ec36bcd100816554c31e3cff7b6c6e" |
| }, |
| "CVE-2020-9391": { |
| "cmt_msg": "mm: Avoid creating virtual address aliases in brk()/mmap()/mremap()", |
| "cmt_id": "95236ae76bf8c5a71bcbb90a0c46a564613831d7" |
| } |
| }, |
| "5.4.24": { |
| "CVE-2020-27068": { |
| "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", |
| "cmt_id": "f0593f5b1b64d3e08c67ee756c4253080e52afb2" |
| }, |
| "CVE-2019-19768": { |
| "cmt_msg": "blktrace: Protect q->blk_trace with RCU", |
| "cmt_id": "6f9cff84dde800b4d9eab071810fbe284686601e" |
| }, |
| "CVE-2020-10942": { |
| "cmt_msg": "vhost: Check docket sk_family instead of call getname", |
| "cmt_id": "f09fbb1175cffdbbb36b28e2ff7db96dcc90de08" |
| }, |
| "CVE-2020-0444": { |
| "cmt_msg": "audit: fix error handling in audit_data_to_entry()", |
| "cmt_id": "37f4c2775267c6fea23172f4d0461eb42c8497a6" |
| } |
| }, |
| "5.4.25": { |
| "CVE-2020-8647": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "5d230547476eea90b57ed9fda4bfe5307779abbb" |
| }, |
| "CVE-2020-8649": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "5d230547476eea90b57ed9fda4bfe5307779abbb" |
| }, |
| "CVE-2020-8648": { |
| "cmt_msg": "vt: selection, close sel_buffer race", |
| "cmt_id": "4387bfa605206b57451e6f77af1287960981ffa2" |
| } |
| }, |
| "5.4.26": { |
| "CVE-2020-12465": { |
| "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", |
| "cmt_id": "02013734629bf57070525a3515509780092a63ab" |
| } |
| }, |
| "5.4.27": { |
| "CVE-2020-29370": { |
| "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", |
| "cmt_id": "ae119b7e12472517bc35c1c003d5abf26653674a" |
| } |
| }, |
| "5.4.28": { |
| "CVE-2019-19769": { |
| "cmt_msg": "locks: fix a potential use-after-free problem when wakeup a waiter", |
| "cmt_id": "384e15fc4226551a45b54226dc57bca7e23db9d8" |
| }, |
| "CVE-2020-14381": { |
| "cmt_msg": "futex: Fix inode life-time issue", |
| "cmt_id": "553d46b07dc4813e1d8e6a3b3d6eb8603b4dda74" |
| } |
| }, |
| "5.4.29": { |
| "CVE-2021-3715": { |
| "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", |
| "cmt_id": "ff28c6195814bdbd4038b08d39e40f8d65d2025e" |
| }, |
| "CVE-2020-11608": { |
| "cmt_msg": "media: ov519: add missing endpoint sanity checks", |
| "cmt_id": "e4af1cf37b901839320e40515d9a60a1c8b51f3a" |
| }, |
| "CVE-2020-11609": { |
| "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", |
| "cmt_id": "4490085a9e2d2cde69e865e3691223ea9e94513b" |
| }, |
| "CVE-2020-11668": { |
| "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", |
| "cmt_id": "e7cd85f398cd1ffe3ce707ce7e2ec0e4a5010475" |
| }, |
| "CVE-2020-27066": { |
| "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", |
| "cmt_id": "21af83e17ffae4955bbd8154a1e975826b8188a1" |
| } |
| }, |
| "5.4.31": { |
| "CVE-2020-11565": { |
| "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", |
| "cmt_id": "c3f87e03f90ff2901525cc99c0e3bfb6fcbfd184" |
| } |
| }, |
| "5.4.32": { |
| "CVE-2020-11494": { |
| "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", |
| "cmt_id": "fdb6a094ba41e985d9fb14ae2bfc180e3e983720" |
| } |
| }, |
| "5.4.33": { |
| "CVE-2019-19039": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", |
| "cmt_id": "941dabde6c1a56908696d6642229521a125dd77e" |
| }, |
| "CVE-2020-12826": { |
| "cmt_msg": "signal: Extend exec_id to 64bits", |
| "cmt_id": "5f2d04139aa5ed04eab54b84e8a25bab87a2449c" |
| }, |
| "CVE-2020-12657": { |
| "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", |
| "cmt_id": "b37de1b1e882fa3741d252333e5745eea444483b" |
| }, |
| "CVE-2019-19377": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", |
| "cmt_id": "941dabde6c1a56908696d6642229521a125dd77e" |
| } |
| }, |
| "5.4.35": { |
| "CVE-2020-12659": { |
| "cmt_msg": "xsk: Add missing check on user supplied headroom size", |
| "cmt_id": "25c9cdef57488578da21d99eb614b97ffcf6e59f" |
| } |
| }, |
| "5.4.36": { |
| "CVE-2020-0067": { |
| "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", |
| "cmt_id": "5811f24abd27a8a0791c6909c6ff803659060c84" |
| }, |
| "CVE-2020-12464": { |
| "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", |
| "cmt_id": "b48193a7c303272d357b27dd7d72cbf89f7b2d35" |
| }, |
| "CVE-2020-11884": { |
| "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses", |
| "cmt_id": "44d9eb0ebe8fd04f46b18d10a18b2c543b379a0c" |
| } |
| }, |
| "5.4.39": { |
| "CVE-2020-10751": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "eeef0d9fd40df3c033dca68bca8249e5951660ac" |
| }, |
| "CVE-2020-0255": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "eeef0d9fd40df3c033dca68bca8249e5951660ac" |
| } |
| }, |
| "5.4.42": { |
| "CVE-2020-13143": { |
| "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", |
| "cmt_id": "6bb054f006c3df224cc382f1ebd81b7276dcfb1c" |
| }, |
| "CVE-2020-10711": { |
| "cmt_msg": "netlabel: cope with NULL catmap", |
| "cmt_id": "debcbc56fdfc2847804d3d00d43f68f3074c5987" |
| }, |
| "CVE-2020-12770": { |
| "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", |
| "cmt_id": "2d6d0ce4de03832c8deedeb16c7af52868d7e99e" |
| }, |
| "CVE-2020-27786": { |
| "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", |
| "cmt_id": "3fa58fc9f8c4d2b3557bca4363653464546e497e" |
| } |
| }, |
| "5.4.43": { |
| "CVE-2020-12768": { |
| "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()", |
| "cmt_id": "ac46cea606d59be18a6afd4560c48bcca836c44c" |
| }, |
| "CVE-2019-18814": { |
| "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init", |
| "cmt_id": "97d817b9ef13e2d52a86ea032b0df6a922e0e9df" |
| } |
| }, |
| "5.4.44": { |
| "CVE-2020-10732": { |
| "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", |
| "cmt_id": "a02c130efbbce91af1e9dd99a5a381dd43494e15" |
| } |
| }, |
| "5.4.45": { |
| "CVE-2020-10757": { |
| "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", |
| "cmt_id": "df4988aa1c9618d9c612639e96002cd4e772def2" |
| }, |
| "CVE-2019-19462": { |
| "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", |
| "cmt_id": "1c44e6e09dc81dcc891a6ada446f86add73baa38" |
| } |
| }, |
| "5.4.46": { |
| "CVE-2020-13974": { |
| "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", |
| "cmt_id": "9619c2f746f7991486d556789e8675f1d1a0a67d" |
| }, |
| "CVE-2020-0543": { |
| "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", |
| "cmt_id": "dab0161b8a0bc6a86319412e39b221670ca758ca" |
| } |
| }, |
| "5.4.47": { |
| "CVE-2021-0342": { |
| "cmt_msg": "tun: correct header offsets in napi frags mode", |
| "cmt_id": "747d5bcb97eba1ecef0ceaa6b6234ba1aca87f60" |
| }, |
| "CVE-2020-10766": { |
| "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", |
| "cmt_id": "9d1dcba6dd48cf7c5801d8aee12852ca41110896" |
| }, |
| "CVE-2020-10767": { |
| "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", |
| "cmt_id": "6d60d5462a91eb46fb88b016508edfa8ee0bc7c8" |
| }, |
| "CVE-2020-10768": { |
| "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", |
| "cmt_id": "e1545848ad5510e82eb75717c1f5757b984014cb" |
| }, |
| "CVE-2020-29374": { |
| "cmt_msg": "gup: document and work around \"COW can break either way\" issue", |
| "cmt_id": "1027dc04f557328eb7b7b7eea48698377a959157" |
| } |
| }, |
| "5.4.48": { |
| "CVE-2020-29368": { |
| "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", |
| "cmt_id": "a88d8aaf9b8b5e0af163a235a3baa9fdcb7d430a" |
| }, |
| "CVE-2019-20810": { |
| "cmt_msg": "media: go7007: fix a miss of snd_card_free", |
| "cmt_id": "6e688a315acf9c2b9b6e8c3e3b7a0c2720f72cba" |
| } |
| }, |
| "5.4.49": { |
| "CVE-2020-12771": { |
| "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", |
| "cmt_id": "f651e94899ed08b1766bda30f410d33fdd3970ff" |
| }, |
| "CVE-2020-15436": { |
| "cmt_msg": "block: Fix use-after-free in blkdev_get()", |
| "cmt_id": "b3dc33946a742256ad9d2ccac848c9e3c2aaafef" |
| } |
| }, |
| "5.4.50": { |
| "CVE-2020-15780": { |
| "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down", |
| "cmt_id": "824d0b6225f3fa2992704478a8df520537cfcb56" |
| }, |
| "CVE-2020-12655": { |
| "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", |
| "cmt_id": "ffd40b7962d463daa531a8110e5b708bcb5c6da7" |
| } |
| }, |
| "5.4.51": { |
| "CVE-2020-24394": { |
| "cmt_msg": "nfsd: apply umask on fs without ACL support", |
| "cmt_id": "fe05e114d0fde7f644ac9ab5edfce3fa65650875" |
| }, |
| "CVE-2020-15393": { |
| "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", |
| "cmt_id": "3dca0a299ff43204a69c9a7a00ce2b3e7ab3088c" |
| } |
| }, |
| "5.4.53": { |
| "CVE-2020-14356": { |
| "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", |
| "cmt_id": "94886c86e833dbc8995202b6c6aaff592b7abd24" |
| }, |
| "CVE-2022-0812": { |
| "cmt_msg": "xprtrdma: fix incorrect header size calculations", |
| "cmt_id": "c8a4452da9f4b09c28d904f70247b097d4c14932" |
| }, |
| "CVE-2020-10781": { |
| "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", |
| "cmt_id": "72648019cd52488716891c2cbb096ad1023ab83e" |
| } |
| }, |
| "5.4.54": { |
| "CVE-2020-29369": { |
| "cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()", |
| "cmt_id": "549bfc14270681cd776c6d9b78fe544cbd21673a" |
| }, |
| "CVE-2020-15437": { |
| "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", |
| "cmt_id": "af811869db0698b587aa5418eab05c9f7e0bea3c" |
| } |
| }, |
| "5.4.56": { |
| "CVE-2019-18808": { |
| "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", |
| "cmt_id": "ecfa7fa198fc66731ded5dabefccc8e9e2f3b311" |
| }, |
| "CVE-2020-24490": { |
| "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", |
| "cmt_id": "9acd96f14a49f59401478eefe158aec489e0161f" |
| }, |
| "CVE-2020-12656": { |
| "cmt_msg": "sunrpc: check that domain table is empty at module unload.", |
| "cmt_id": "98cef10fbcca40e70f9f389a4bea42384376376b" |
| }, |
| "CVE-2019-19054": { |
| "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", |
| "cmt_id": "84da97713b9112c9529a941b230219b759e6f206" |
| } |
| }, |
| "5.4.57": { |
| "CVE-2020-16166": { |
| "cmt_msg": "random32: update the net random state on interrupt and activity", |
| "cmt_id": "c15a77bdda2c4f8acaa3e436128630a81f904ae7" |
| } |
| }, |
| "5.4.58": { |
| "CVE-2020-36386": { |
| "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", |
| "cmt_id": "c26eaaf547b785ae98fa08607b599c7df0da51bc" |
| }, |
| "CVE-2020-14331": { |
| "cmt_msg": "vgacon: Fix for missing check in scrollback handling", |
| "cmt_id": "8c3215a0426c404f4b7b02a1e0fdb0f7f4f1e6d3" |
| } |
| }, |
| "5.4.59": { |
| "CVE-2020-26088": { |
| "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", |
| "cmt_id": "0b305f259ca9b85c48f9cb3159d034b7328ed225" |
| }, |
| "CVE-2021-20292": { |
| "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", |
| "cmt_id": "c6d2ddf1a30d524106265ad2c48b907cd7a083d4" |
| }, |
| "CVE-2019-19770": { |
| "cmt_msg": "blktrace: fix debugfs use after free", |
| "cmt_id": "6a291f9c21e4acf3429aacfa2e019d9965806c51" |
| } |
| }, |
| "5.4.60": { |
| "CVE-2019-19448": { |
| "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", |
| "cmt_id": "7bbf647dbb5a28e754633512065146763a35ff77" |
| }, |
| "CVE-2020-25212": { |
| "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", |
| "cmt_id": "75cf7f895f563e14c82c1aeea0362dc155b5baf3" |
| } |
| }, |
| "5.4.61": { |
| "CVE-2020-14314": { |
| "cmt_msg": "ext4: fix potential negative array index in do_split()", |
| "cmt_id": "ea54176e5821936d109bb45dc2c19bd53559e735" |
| }, |
| "CVE-2020-29371": { |
| "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", |
| "cmt_id": "19a77c937a1914bdd655366e79a2a1b7d675f554" |
| }, |
| "CVE-2020-0466": { |
| "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", |
| "cmt_id": "42694912aaf1d7fa426bd02b0b313f05601b6488" |
| } |
| }, |
| "5.4.62": { |
| "CVE-2021-3428": { |
| "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount", |
| "cmt_id": "8e63c86f658005a9d8bc672642e587a787c53a72" |
| } |
| }, |
| "5.4.63": { |
| "CVE-2020-0465": { |
| "cmt_msg": "HID: core: Sanitize event code and type when mapping input", |
| "cmt_id": "4bae1afed43212ee3ec64f2bdc9e39e800974e7e" |
| } |
| }, |
| "5.4.64": { |
| "CVE-2020-25641": { |
| "cmt_msg": "block: allow for_each_bvec to support zero len bvec", |
| "cmt_id": "84c041c12442d233c9b3c593cbe9eb8a77875578" |
| }, |
| "CVE-2021-1048": { |
| "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", |
| "cmt_id": "88405cf0f2bd771670b76c42b169527ff86048da" |
| }, |
| "CVE-2020-14386": { |
| "cmt_msg": "net/packet: fix overflow in tpacket_rcv", |
| "cmt_id": "bc846b58fe5cecaa2632d566355e607954779d45" |
| }, |
| "CVE-2020-25285": { |
| "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", |
| "cmt_id": "af7786b20c717ff13d9148161dad4b8e286bfd39" |
| }, |
| "CVE-2020-14385": { |
| "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", |
| "cmt_id": "da7a1676d6c19971758976a84e87f5b1009409e7" |
| }, |
| "CVE-2020-12888": { |
| "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", |
| "cmt_id": "8f747b0149c5a0c72626a87eb0dd2a5ec91f1a7d" |
| } |
| }, |
| "5.4.66": { |
| "CVE-2020-25284": { |
| "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", |
| "cmt_id": "ea3d3bf85669195247ad6a522f4e4209695edca2" |
| }, |
| "CVE-2020-14390": { |
| "cmt_msg": "fbcon: remove soft scrollback code", |
| "cmt_id": "cf5a7ded53652c3d63d7243944c6a8ec1f0ef392" |
| }, |
| "CVE-2020-28097": { |
| "cmt_msg": "vgacon: remove software scrollback support", |
| "cmt_id": "087b6cb17df5834d395ab72da3f937380470ba15" |
| }, |
| "CVE-2020-36312": { |
| "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", |
| "cmt_id": "41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d" |
| } |
| }, |
| "5.4.68": { |
| "CVE-2020-25645": { |
| "cmt_msg": "geneve: add transport ports in route lookup for geneve", |
| "cmt_id": "745c24fd1d79b588a951d3c5beca43575907f881" |
| }, |
| "CVE-2020-25643": { |
| "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", |
| "cmt_id": "c3de9daa662617132744731f1b4eb7b5cd1270a8" |
| }, |
| "CVE-2021-0605": { |
| "cmt_msg": "af_key: pfkey_dump needs parameter validation", |
| "cmt_id": "a769bff2333a8212cff4fd8bbe986979bf41c528" |
| } |
| }, |
| "5.4.70": { |
| "CVE-2020-25211": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "253052b636e98083b1ecc3e9b0cf6f151e1cb8c6" |
| }, |
| "CVE-2021-0448": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "253052b636e98083b1ecc3e9b0cf6f151e1cb8c6" |
| }, |
| "CVE-2021-39634": { |
| "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", |
| "cmt_id": "8993da3d4d3a7ae721e9dafa140ba64c0e632a50" |
| } |
| }, |
| "5.4.71": { |
| "CVE-2020-28915": { |
| "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", |
| "cmt_id": "1b2fcd82c0ca23f6fa01298c0d7b59eb4efbaf48" |
| } |
| }, |
| "5.4.72": { |
| "CVE-2020-10135": { |
| "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", |
| "cmt_id": "ed6c361e3229a2aa64b04617baa7f452bed28bcc" |
| }, |
| "CVE-2020-12352": { |
| "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", |
| "cmt_id": "0d9e9b6e1a26bb248c0afee754d5a577abd4376b" |
| }, |
| "CVE-2020-12351": { |
| "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", |
| "cmt_id": "66a14350de9a4e3db7dedb524518b1394a5f7162" |
| } |
| }, |
| "5.4.73": { |
| "CVE-2020-0423": { |
| "cmt_msg": "binder: fix UAF when releasing todo list", |
| "cmt_id": "401d4d79a8ed5ac1c78031a00f8ac414e6605a38" |
| }, |
| "CVE-2020-25705": { |
| "cmt_msg": "icmp: randomize the global rate limiter", |
| "cmt_id": "8df0ffe2f32c09b4627cbce5cd5faf8e98a6a71e" |
| } |
| }, |
| "5.4.75": { |
| "CVE-2020-27777": { |
| "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", |
| "cmt_id": "240baebeda09e1e010fff58acc9183992f41f638" |
| }, |
| "CVE-2020-27673": { |
| "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", |
| "cmt_id": "4bea575a10691a99b03d5e9055f3079040b59868" |
| }, |
| "CVE-2020-25668": { |
| "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", |
| "cmt_id": "c2313d7818b979f8b3751f052a8db34a7ed26780" |
| }, |
| "CVE-2020-25656": { |
| "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", |
| "cmt_id": "87d398f348b8a2d5246d3670a93fb63d4fd9f62a" |
| }, |
| "CVE-2020-27675": { |
| "cmt_msg": "xen/events: avoid removing an event channel while handling it", |
| "cmt_id": "a01379671d67d34f254cc81f42cf854aa628f3a3" |
| } |
| }, |
| "5.4.76": { |
| "CVE-2020-28974": { |
| "cmt_msg": "vt: Disable KD_FONT_OP_COPY", |
| "cmt_id": "642181fe3567419d84d2457b58f262c37467f525" |
| }, |
| "CVE-2020-35508": { |
| "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", |
| "cmt_id": "beeb658cfd3544ceca894375c36b6572e4ae7a5f" |
| }, |
| "CVE-2020-25704": { |
| "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", |
| "cmt_id": "b7f7474b392194530d1ec07203c8668e81b7fdb9" |
| } |
| }, |
| "5.4.77": { |
| "CVE-2020-8694": { |
| "cmt_msg": "powercap: restrict energy meter to root access", |
| "cmt_id": "19f6d91bdad42200aac557a683c17b1f65ee6c94" |
| } |
| }, |
| "5.4.78": { |
| "CVE-2020-14351": { |
| "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", |
| "cmt_id": "c5cf5c7b585c7f48195892e44b76237010c0747a" |
| } |
| }, |
| "5.4.79": { |
| "CVE-2020-4788": { |
| "cmt_msg": "powerpc/64s: flush L1D on kernel entry", |
| "cmt_id": "b65458b6be8032c5179d4f562038575d7b3a6be3" |
| }, |
| "CVE-2020-25669": { |
| "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", |
| "cmt_id": "df33054114475477b5e7810aa0efb26916220474" |
| } |
| }, |
| "5.4.80": { |
| "CVE-2020-28941": { |
| "cmt_msg": "speakup: Do not let the line discipline be used several times", |
| "cmt_id": "3b78db264675e47ad3cf9c1e809e85d02fe1de90" |
| } |
| }, |
| "5.4.82": { |
| "CVE-2020-35519": { |
| "cmt_msg": "net/x25: prevent a couple of overflows", |
| "cmt_id": "8bfe5b73b185d931b77c965002f84ad986aa94f1" |
| } |
| }, |
| "5.4.83": { |
| "CVE-2020-29661": { |
| "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", |
| "cmt_id": "c536ecd4856084604701b95bd7e3fb15f05634bf" |
| }, |
| "CVE-2020-29660": { |
| "cmt_msg": "tty: Fix ->session locking", |
| "cmt_id": "35ee9ac513280f46eeb1196bac82ed5320380412" |
| }, |
| "CVE-2020-27830": { |
| "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", |
| "cmt_id": "b0d4fa10bfcc3051e9426b6286fb2d80bad04d74" |
| }, |
| "CVE-2020-28588": { |
| "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms", |
| "cmt_id": "867fbf2bb739bc7ba02cca09093f2d35ed7eadc5" |
| } |
| }, |
| "5.4.84": { |
| "CVE-2021-0938": { |
| "cmt_msg": "compiler.h: fix barrier_data() on clang", |
| "cmt_id": "c2c5dc84ac51da90cadcb12554c69bdd5ac7aeeb" |
| } |
| }, |
| "5.4.86": { |
| "CVE-2020-27815": { |
| "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", |
| "cmt_id": "cbeb61258186978c26f9ee738c86fe4812cc27af" |
| }, |
| "CVE-2020-29568": { |
| "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", |
| "cmt_id": "eac0c12e329d489ff36e85fed5ce2a8606e3124d" |
| }, |
| "CVE-2020-29569": { |
| "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", |
| "cmt_id": "8f3f6de44f7cc93a4723e63ea4381332826a6790" |
| } |
| }, |
| "5.4.88": { |
| "CVE-2020-36322": { |
| "cmt_msg": "fuse: fix bad inode", |
| "cmt_id": "732251cabeb3bfd917d453a42274d769d6883fc4" |
| }, |
| "CVE-2020-36158": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", |
| "cmt_id": "0a49aaf4df2936bca119ee38fe5a570a7024efdc" |
| } |
| }, |
| "5.4.89": { |
| "CVE-2021-0707": { |
| "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode", |
| "cmt_id": "ef8133b1b47ed67873c291e9248fafd428d1767d" |
| }, |
| "CVE-2020-28374": { |
| "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", |
| "cmt_id": "485e21729b1e1235e6075318225c09e76b376e81" |
| }, |
| "CVE-2021-39648": { |
| "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", |
| "cmt_id": "bcffe2de9dde74174805d5f56a990353e33b8072" |
| } |
| }, |
| "5.4.92": { |
| "CVE-2021-3178": { |
| "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", |
| "cmt_id": "4aef760c28e8bd1860a27fd78067b4ea77124987" |
| } |
| }, |
| "5.4.93": { |
| "CVE-2021-39657": { |
| "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", |
| "cmt_id": "97853a7eae80a695a18ce432524eaa7432199a41" |
| } |
| }, |
| "5.4.94": { |
| "CVE-2020-27825": { |
| "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", |
| "cmt_id": "b899d5b2a42a963d6ca7e33d51a35b2eb25f6d10" |
| }, |
| "CVE-2021-3347": { |
| "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", |
| "cmt_id": "0dae88a92596db9405fd4a341c1915cf7d8fbad4" |
| } |
| }, |
| "5.4.95": { |
| "CVE-2021-3348": { |
| "cmt_msg": "nbd: freeze the queue while we're adding connections", |
| "cmt_id": "587c6b75d7fdd366ad7dc615471006ce73c03a51" |
| } |
| }, |
| "5.4.98": { |
| "CVE-2021-3600": { |
| "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", |
| "cmt_id": "78e2f71b89b22222583f74803d14f3d90cdf9d12" |
| } |
| }, |
| "5.4.99": { |
| "CVE-2021-21781": { |
| "cmt_msg": "ARM: ensure the signal page contains defined contents", |
| "cmt_id": "f49bff85b6dbb60a410c7f7dc53b52ee1dc22470" |
| } |
| }, |
| "5.4.100": { |
| "CVE-2021-26931": { |
| "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", |
| "cmt_id": "7109f61d25ff4dc2041f4be71042219869112e4c" |
| }, |
| "CVE-2021-26930": { |
| "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", |
| "cmt_id": "524a77aa5d69e726369b38813333f20c6511b66c" |
| }, |
| "CVE-2021-26932": { |
| "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", |
| "cmt_id": "104eef95231497cdb4e4de24a1ddef7c831a8b44" |
| } |
| }, |
| "5.4.101": { |
| "CVE-2021-0512": { |
| "cmt_msg": "HID: make arrays usage and value to be the same", |
| "cmt_id": "fce3654c648d8f92882d0dae117c20231b8b224f" |
| }, |
| "CVE-2021-3444": { |
| "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", |
| "cmt_id": "185c2266c1df80bec001c987d64cae2d9cd13816" |
| } |
| }, |
| "5.4.102": { |
| "CVE-2020-25639": { |
| "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails", |
| "cmt_id": "0faef25462f886a77e0b397cca31d51163215332" |
| }, |
| "CVE-2021-3612": { |
| "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", |
| "cmt_id": "80168ba86034fc938970500b40c88b3914fede96" |
| } |
| }, |
| "5.4.103": { |
| "CVE-2021-30002": { |
| "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", |
| "cmt_id": "027ddd67f68583a178a9bd65220611e9f978f014" |
| }, |
| "CVE-2021-27365": { |
| "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", |
| "cmt_id": "567a234a231db16a99067db3d31d351d9e770a82" |
| }, |
| "CVE-2021-27364": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "ca3afdd0377379f5031f376aec4b0c1b0285b556" |
| }, |
| "CVE-2021-27363": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "ca3afdd0377379f5031f376aec4b0c1b0285b556" |
| }, |
| "CVE-2021-28038": { |
| "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", |
| "cmt_id": "474773c42ffd89f7606b54443990ccf5086a4734" |
| } |
| }, |
| "5.4.106": { |
| "CVE-2021-28375": { |
| "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages", |
| "cmt_id": "e4b52c7cbaaf4d11288d331b654b0fac450e4971" |
| }, |
| "CVE-2021-33033": { |
| "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", |
| "cmt_id": "b4800e7a1c9f80a1a0e417ab36a1da4959f8b399" |
| }, |
| "CVE-2021-29265": { |
| "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", |
| "cmt_id": "8698133003cfb67e0f04dd044c954198e421b152" |
| }, |
| "CVE-2021-39656": { |
| "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file", |
| "cmt_id": "73aa6f93e1e980f392b3da4fee830b0e0a4a40ff" |
| }, |
| "CVE-2021-28660": { |
| "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", |
| "cmt_id": "da5abe369b03447b3df1e5816b9560cbae503993" |
| } |
| }, |
| "5.4.108": { |
| "CVE-2021-28964": { |
| "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", |
| "cmt_id": "5b3b99525c4f18e543f6ef17ef97c29f5694e8b4" |
| }, |
| "CVE-2021-28972": { |
| "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", |
| "cmt_id": "51a2b19b554c8c75ee2d253b87240309cd81f1fc" |
| }, |
| "CVE-2021-28971": { |
| "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", |
| "cmt_id": "da326ba3b84aae8ac0513aa4725a49843f2f871e" |
| } |
| }, |
| "5.4.109": { |
| "CVE-2021-28688": { |
| "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", |
| "cmt_id": "057dd3e6986b260f0bec68bd1f2cd23a5d9dbda3" |
| }, |
| "CVE-2021-31916": { |
| "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", |
| "cmt_id": "e6587d142d0214eb466f9978e25f0575c19b1ea0" |
| }, |
| "CVE-2021-29264": { |
| "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", |
| "cmt_id": "ec7ce1e337ec2b5641dcc639396e04a28454f21a" |
| }, |
| "CVE-2021-29647": { |
| "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", |
| "cmt_id": "ae23957bd1fb3184a9935bd99c5ad2351a59d7c8" |
| }, |
| "CVE-2021-29650": { |
| "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", |
| "cmt_id": "19a5fb4ceada903e692de96b8aa8494179abbf0b" |
| } |
| }, |
| "5.4.110": { |
| "CVE-2021-0941": { |
| "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", |
| "cmt_id": "42c83e3bca434d9f63c58f9cbf2881e635679fee" |
| }, |
| "CVE-2021-3483": { |
| "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", |
| "cmt_id": "5ecfad1efbc31ab913f16ed60f0efff301aebfca" |
| } |
| }, |
| "5.4.111": { |
| "CVE-2021-29154": { |
| "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", |
| "cmt_id": "a0b3927a07be0c4cedd69970e082a8c23c92eb72" |
| } |
| }, |
| "5.4.112": { |
| "CVE-2021-3659": { |
| "cmt_msg": "net: mac802154: Fix general protection fault", |
| "cmt_id": "38ea2b3ed00fb4632a706f2c796d6aa4a884f573" |
| }, |
| "CVE-2020-25672": { |
| "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", |
| "cmt_id": "404daa4d62a364623b48349eb73a18579edf51ac" |
| }, |
| "CVE-2020-25673": { |
| "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", |
| "cmt_id": "aa0cff2e075152d474b0b01233ac0adfcfc0c0db" |
| }, |
| "CVE-2020-25670": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", |
| "cmt_id": "c89903c9eff219a4695e63715cf922748d743f65" |
| }, |
| "CVE-2020-25671": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", |
| "cmt_id": "41bc58ba0945d69578f60c6f06729d8e2dc327dc" |
| } |
| }, |
| "5.4.113": { |
| "CVE-2021-0937": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "cc59b872f2e1995b8cc819b9445c1198bfe83b2d" |
| }, |
| "CVE-2021-22555": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "cc59b872f2e1995b8cc819b9445c1198bfe83b2d" |
| } |
| }, |
| "5.4.114": { |
| "CVE-2021-23133": { |
| "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", |
| "cmt_id": "6180d2274b17fc0473fb0764d3417c0bddb99b2e" |
| } |
| }, |
| "5.4.117": { |
| "CVE-2021-31829": { |
| "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", |
| "cmt_id": "53e0db429b37a32b8fc706d0d90eb4583ad13848" |
| } |
| }, |
| "5.4.118": { |
| "CVE-2021-3506": { |
| "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", |
| "cmt_id": "27a130638406815eba083c632ee083f0c5e688c2" |
| } |
| }, |
| "5.4.119": { |
| "CVE-2021-33034": { |
| "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", |
| "cmt_id": "3a826ffa80d5c73ad7338fd98ace9c5b53844968" |
| }, |
| "CVE-2021-45486": { |
| "cmt_msg": "inet: use bigger hash table for IP ID generation", |
| "cmt_id": "fee81285bd09ec2080ce2cbb5063aad0e58eb272" |
| }, |
| "CVE-2021-32399": { |
| "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", |
| "cmt_id": "eeec325c9944b4427f482018d00b737220c31fd9" |
| } |
| }, |
| "5.4.120": { |
| "CVE-2021-4157": { |
| "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", |
| "cmt_id": "89862bd77e9cf511628eb7a97fe7f8d246192eec" |
| } |
| }, |
| "5.4.122": { |
| "CVE-2020-26558": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" |
| }, |
| "CVE-2021-0129": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" |
| } |
| }, |
| "5.4.124": { |
| "CVE-2021-33098": { |
| "cmt_msg": "ixgbe: fix large MTU request from VF", |
| "cmt_id": "cf20c704a26eb763daf6bfb10369a4f11fef2d9a" |
| }, |
| "CVE-2020-24587": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59" |
| }, |
| "CVE-2020-24586": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59" |
| }, |
| "CVE-2021-34981": { |
| "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", |
| "cmt_id": "fe201316ac36c48fc3cb2891dfdc8ab68058734d" |
| }, |
| "CVE-2020-24588": { |
| "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", |
| "cmt_id": "fa00d4928eafe4fe8d854028f73f7af8fdbc9c3c" |
| }, |
| "CVE-2020-26139": { |
| "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", |
| "cmt_id": "88664d5e5dc9eedddbea9cc8ebb3d57d933f9f8a" |
| }, |
| "CVE-2020-26145": { |
| "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe", |
| "cmt_id": "96d4d82652fa013d8b452871305a0c1e5f805d9e" |
| }, |
| "CVE-2020-26147": { |
| "cmt_msg": "mac80211: assure all fragments are encrypted", |
| "cmt_id": "b90cf214e2bbb3f0a25d19937807238f646d1d72" |
| }, |
| "CVE-2020-26141": { |
| "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe", |
| "cmt_id": "aee0121afee53cde39e49086317af5d029911857" |
| } |
| }, |
| "5.4.125": { |
| "CVE-2021-3564": { |
| "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", |
| "cmt_id": "8d3d0ac73a4a1d31e3d4f7c068312aba78470166" |
| }, |
| "CVE-2021-38208": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" |
| }, |
| "CVE-2021-3573": { |
| "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", |
| "cmt_id": "b6f97555c71f78288682bc967121572f10715c89" |
| }, |
| "CVE-2021-3587": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" |
| } |
| }, |
| "5.4.128": { |
| "CVE-2021-34693": { |
| "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", |
| "cmt_id": "c297559a2a2a6b6f0de61ed333a978a118b0e660" |
| }, |
| "CVE-2021-3743": { |
| "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", |
| "cmt_id": "26b8d10703a9be45d6097946b2b4011f7dd2c56f" |
| } |
| }, |
| "5.4.129": { |
| "CVE-2020-26541": { |
| "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries", |
| "cmt_id": "e20b90e4f81bb04e2b180824caae585928e24ba9" |
| }, |
| "CVE-2021-35039": { |
| "cmt_msg": "module: limit enabling module.sig_enforce", |
| "cmt_id": "e2dc07ca4e0148d75963e14d2b78afc12426a487" |
| }, |
| "CVE-2021-22543": { |
| "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", |
| "cmt_id": "bb85717e3797123ae7724751af21d0c9d605d61e" |
| } |
| }, |
| "5.4.131": { |
| "CVE-2020-36311": { |
| "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy", |
| "cmt_id": "abbd42939db646f7210e1473e9cb17c6bc6f184c" |
| } |
| }, |
| "5.4.132": { |
| "CVE-2021-3609": { |
| "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", |
| "cmt_id": "70a9116b9e5ccd5332d3a60b359fb5902d268fd0" |
| }, |
| "CVE-2022-0850": { |
| "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", |
| "cmt_id": "ed628b2531196cc76d7c9b730abe4020cad26b0b" |
| } |
| }, |
| "5.4.133": { |
| "CVE-2021-3655": { |
| "cmt_msg": "sctp: validate from_addr_param return", |
| "cmt_id": "03a5e454614dc095a70d88c85ac45ba799c79971" |
| }, |
| "CVE-2021-45485": { |
| "cmt_msg": "ipv6: use prandom_u32() for ID generation", |
| "cmt_id": "ccde03a6a0fbdc3c0ba81930e629b8b14974cce4" |
| } |
| }, |
| "5.4.134": { |
| "CVE-2021-38160": { |
| "cmt_msg": "virtio_console: Assure used length from device is limited", |
| "cmt_id": "52bd1bce8624acb861fa96b7c8fc2e75422dc8f7" |
| }, |
| "CVE-2021-38199": { |
| "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", |
| "cmt_id": "81e03fe5bf8f5f66b8a62429fb4832b11ec6b272" |
| }, |
| "CVE-2021-4154": { |
| "cmt_msg": "cgroup: verify that source is a string", |
| "cmt_id": "c17363ccd620c1a57ede00d5c777f0b8624debe6" |
| }, |
| "CVE-2021-33909": { |
| "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", |
| "cmt_id": "c1dafbb26164f43f2bb70bee9e5c4e1cad228ca7" |
| } |
| }, |
| "5.4.136": { |
| "CVE-2021-38204": { |
| "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", |
| "cmt_id": "863d071dbcd54dacf47192a1365faec46b7a68ca" |
| }, |
| "CVE-2021-3679": { |
| "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", |
| "cmt_id": "f899f24d34d964593b16122a774c192a78e2ca56" |
| }, |
| "CVE-2021-37576": { |
| "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", |
| "cmt_id": "2b9ffddd70b449cdc42b943788dc82a6d7b0d175" |
| } |
| }, |
| "5.4.137": { |
| "CVE-2021-0920": { |
| "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", |
| "cmt_id": "85abe0d47fe65391ed41f78a66b5eff73987c086" |
| } |
| }, |
| "5.4.139": { |
| "CVE-2021-33624": { |
| "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", |
| "cmt_id": "283d742988f6b304f32110f39e189a00d4e52b92" |
| } |
| }, |
| "5.4.141": { |
| "CVE-2021-38198": { |
| "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", |
| "cmt_id": "d28adaabbbf4a6949d0f6f71daca6744979174e2" |
| }, |
| "CVE-2021-38205": { |
| "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", |
| "cmt_id": "38b8485b72cbe4521fd2e0b8770e3d78f9b89e60" |
| }, |
| "CVE-2021-3732": { |
| "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", |
| "cmt_id": "812f39ed5b0b7f34868736de3055c92c7c4cf459" |
| } |
| }, |
| "5.4.142": { |
| "CVE-2021-3653": { |
| "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", |
| "cmt_id": "7c1c96ffb658fbfe66c5ebed6bcb5909837bc267" |
| }, |
| "CVE-2021-3656": { |
| "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", |
| "cmt_id": "a17f2f2c89494c0974529579f3552ecbd1bc2d52" |
| } |
| }, |
| "5.4.143": { |
| "CVE-2021-42008": { |
| "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", |
| "cmt_id": "a73b9aa142691c2ae313980a8734997a78f74b22" |
| }, |
| "CVE-2020-3702": { |
| "cmt_msg": "ath: Use safer key clearing with key cache entries", |
| "cmt_id": "0c049ce432b37a51a0da005314ac32e5d9324ccf" |
| } |
| }, |
| "5.4.144": { |
| "CVE-2021-39633": { |
| "cmt_msg": "ip_gre: add validation for csum_start", |
| "cmt_id": "53b480e68c1c2c778b620cc7f45a2ba5dff518ca" |
| }, |
| "CVE-2021-3753": { |
| "cmt_msg": "vt_kdsetmode: extend console locking", |
| "cmt_id": "f4418015201bdca0cd4e28b363d88096206e4ad0" |
| }, |
| "CVE-2021-3739": { |
| "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id", |
| "cmt_id": "d7f7eca72ecc08f0bb6897fda2290293fca63068" |
| } |
| }, |
| "5.4.145": { |
| "CVE-2021-40490": { |
| "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", |
| "cmt_id": "9b3849ba667af99ee99a7853a021a7786851b9fd" |
| } |
| }, |
| "5.4.146": { |
| "CVE-2021-20322": { |
| "cmt_msg": "ipv6: make exception cache less predictible", |
| "cmt_id": "f73cbdd1b8e7ea32c66138426f826c8734b70c18" |
| }, |
| "CVE-2021-34556": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", |
| "cmt_id": "e80c3533c354ede56146ab0e4fbb8304d0c1209f" |
| }, |
| "CVE-2021-35477": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", |
| "cmt_id": "e80c3533c354ede56146ab0e4fbb8304d0c1209f" |
| } |
| }, |
| "5.4.148": { |
| "CVE-2021-42252": { |
| "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", |
| "cmt_id": "2712f29c44f18db826c7e093915a727b6f3a20e4" |
| }, |
| "CVE-2021-20320": { |
| "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", |
| "cmt_id": "a5fc48000b0ed5c389d426c341b43f580faa7904" |
| }, |
| "CVE-2020-16119": { |
| "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", |
| "cmt_id": "5ab04a4ffed02f66e8e6310ba8261a43d1572343" |
| } |
| }, |
| "5.4.151": { |
| "CVE-2021-3764": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "24f3d2609114f1e1f6b487b511ce5fa36f21e0ae" |
| }, |
| "CVE-2021-4203": { |
| "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", |
| "cmt_id": "0fcfaa8ed9d1dcbe377b202a1b3cdfd4e566114c" |
| }, |
| "CVE-2021-3744": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "24f3d2609114f1e1f6b487b511ce5fa36f21e0ae" |
| }, |
| "CVE-2021-37159": { |
| "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", |
| "cmt_id": "fe57d53dd91d7823f1ceef5ea8e9458a4aeb47fa" |
| } |
| }, |
| "5.4.153": { |
| "CVE-2021-20321": { |
| "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", |
| "cmt_id": "fab338f33c25c4816ca0b2d83a04a0097c2c4aaf" |
| }, |
| "CVE-2021-41864": { |
| "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", |
| "cmt_id": "b14f28126c51533bb329379f65de5b0dd689b13a" |
| }, |
| "CVE-2021-38300": { |
| "cmt_msg": "bpf, mips: Validate conditional branch offsets", |
| "cmt_id": "1a0fe45501a273ac52252448e43f975f0c18811e" |
| } |
| }, |
| "5.4.155": { |
| "CVE-2021-3894": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "d88774539539dcbf825a25e61234f110513f5963" |
| }, |
| "CVE-2021-4149": { |
| "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", |
| "cmt_id": "005a07c9acd6cf8a40555884f0650dfd4ec23fbe" |
| }, |
| "CVE-2022-0322": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "d88774539539dcbf825a25e61234f110513f5963" |
| } |
| }, |
| "5.4.156": { |
| "CVE-2021-3896": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54" |
| }, |
| "CVE-2021-43056": { |
| "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest", |
| "cmt_id": "d0148cfaf89ce2af0d76e39943e200365e7fc99a" |
| }, |
| "CVE-2022-0644": { |
| "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", |
| "cmt_id": "0f218ba4c8aac7041cd8b81a5a893b0d121e6316" |
| }, |
| "CVE-2021-3760": { |
| "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", |
| "cmt_id": "1f75f8883b4fe9fe1856d71f055120315e758188" |
| }, |
| "CVE-2021-43389": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54" |
| } |
| }, |
| "5.4.157": { |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "5953ee99bab134d74c805a00eaa20fed33f54255" |
| } |
| }, |
| "5.4.158": { |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", |
| "cmt_id": "2461f38384d50dd966e1db44fe165b1896f5df5a" |
| } |
| }, |
| "5.4.160": { |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "67bd269a84ce29dfc543c1683a2553b4169f9a55" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "10b808307d37d09b132fc086002bc1aa9910d315" |
| }, |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "28a1e470b000d45bcf6c05f18a01d07cdc0b3235" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "d416020f1a9cc5f903ae66649b2c56d9ad5256ab" |
| } |
| }, |
| "5.4.162": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "e418bb556ff801e11592851fd465415757a2ef68" |
| }, |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "201340ca4eb748c52062c5e938826ddfbe313088" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal", |
| "cmt_id": "1c4af56ffbfb2fc6bd222f5dc8cb210c5ffaab70" |
| } |
| }, |
| "5.4.164": { |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", |
| "cmt_id": "89d15a2e40d7edaaa16da2763b349dd7b056cc09" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "03d4462ba3bc8f830d9807e3c3fde54fad06e2e2" |
| } |
| }, |
| "5.4.165": { |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "e0c03d15cd03476dd698c1ae7fb32a16d3e87f5c" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "fd6de5a0cd42fc43810bd74ad129d98ab962ec6b" |
| } |
| }, |
| "5.4.168": { |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "0d99b3c6bd39a0a023e972d8f912fd47698bbbb8" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection", |
| "cmt_id": "8bfcd0385211044627f93d170991da1ae5937245" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "3e68d099f09c260a7dee28b99af02fe6977a9e66" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "4ed9f5c511ce95cb8db05ff82026ea901f45fd76" |
| }, |
| "CVE-2021-4135": { |
| "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", |
| "cmt_id": "699e794c12a3cd79045ff135bc87a53b97024e43" |
| } |
| }, |
| "5.4.169": { |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", |
| "cmt_id": "b0406b5ef4e2c4fb21d9e7d5c36a0453b4279e9b" |
| }, |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "a5c6a13e9056d87805ba3042c208fbd4164ad22b" |
| } |
| }, |
| "5.4.170": { |
| "CVE-2021-44733": { |
| "cmt_msg": "tee: handle lookup of shm with reference count 0", |
| "cmt_id": "940e68e57ab69248fabba5889e615305789db8a7" |
| } |
| }, |
| "5.4.171": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "2a6a811a45fde5acb805ead4d1e942be3875b302" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "102af6edfd3a372db6e229177762a91f552e5f5e" |
| } |
| }, |
| "5.4.173": { |
| "CVE-2022-0185": { |
| "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", |
| "cmt_id": "bd2aed0464ae3d6e83ce064cd91fc1a7fec48826" |
| } |
| }, |
| "5.4.174": { |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "ae56c5524a750fd8cf32565cb3902ce5baaeb4e6" |
| } |
| }, |
| "5.4.175": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "1b5553c79d52f17e735cd924ff2178a2409e6d0b" |
| }, |
| "CVE-2022-22942": { |
| "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "84b1259fe36ae0915f3d6ddcea6377779de48b82" |
| } |
| }, |
| "5.4.176": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "0dfacee40021dcc0a9aa991edd965addc04b9370" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "31136e5467f381cf18e2cfd467207dda7678c7a2" |
| }, |
| "CVE-2022-24959": { |
| "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", |
| "cmt_id": "7afc09c8915b0735203ebcb8d766d7db37b794c0" |
| } |
| }, |
| "5.4.177": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "0e8283cbe4996ae046cd680b3ed598a8f2b0d5d8" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", |
| "cmt_id": "b1d17e920dfcd4b56fa2edced5710c191f7e50b5" |
| } |
| }, |
| "5.4.179": { |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "d692e3406e052dbf9f6d9da0cba36cb763272529" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e" |
| } |
| }, |
| "5.4.180": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "c9e952871ae47af784b4aef0a77db02e557074d6" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18" |
| } |
| }, |
| "5.4.182": { |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", |
| "cmt_id": "49c011a44edd14adb555dbcbaf757f52b1f2f748" |
| }, |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "6b23eda989236fd75b4a9893cc816cd690c29dfc" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "b95d71abeb7d31d4d51cd836d80f99fd783fd6d5" |
| } |
| }, |
| "5.4.183": { |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "ba6fdd55b16677dcc1d7011270c140d2a37e5f35" |
| } |
| }, |
| "5.4.184": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "d193785a4bc91c2b9e004d16d0c9ea5bc0a2f34d" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "fdfc0baf829dfb306a1ec45900d2cfbee265ae60" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "b507879c1e2d2c55752f658439df71595f4adff2" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()", |
| "cmt_id": "be63ea883e56aacf9326e581b53dff9ac087ace1" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "95ff82383266a7720d596eb8b4499ed01746a730" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "0e35f3ab69bcb01fdbf5aadc78f1731778963b1c" |
| } |
| }, |
| "5.4.185": { |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "0a64aea5fe023cf1e4973676b11f49038b1f045b" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", |
| "cmt_id": "a9174077febfb1608ec3361622bf5f91e2668d7f" |
| } |
| }, |
| "5.4.188": { |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "0aef7184630b599493a0dcad4eec6d42b3e68e91" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "572f9a0d3f3feb8bd3422e88ad71882bc034b3ff" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "06f0ff82c70241a766a811ae1acf07d6e2734dcb" |
| }, |
| "CVE-2022-27666": { |
| "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", |
| "cmt_id": "fee4dfbda68ba10f3bbcf51c861d6aa32f08f9e4" |
| } |
| }, |
| "5.4.189": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "e27caad38b59b5b00b9c5228d04c13111229deec" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", |
| "cmt_id": "1553126eccf4fad17afaeaed08db9e5944aa2d55" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "ef388db2fe351230ff7194b37d507784bef659ec" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "28c8fd84bea13cbf238d7b19d392de2fcc31331c" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", |
| "cmt_id": "691a0fd625e06c138f7662286a87ffba48773f34" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "2dfe9422d528630e2ce0d454147230cce113f814" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f" |
| } |
| }, |
| "5.4.190": { |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", |
| "cmt_id": "9e1e088a57c23251f1cfe9601bbd90ade2ea73b9" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", |
| "cmt_id": "40cb8b3b19c087a4e20f6740701e53fefbe19a7b" |
| } |
| }, |
| "5.4.191": { |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "660784e7194ac2953aebe874c1f75f2441ba3d19" |
| } |
| }, |
| "outstanding": { |
| "CVE-2021-0929": { |
| "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2019-15794": { |
| "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" |
| }, |
| "CVE-2021-3759": { |
| "cmt_msg": "memcg: enable accounting of ipc resources" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19449": { |
| "cmt_msg": "f2fs: fix to do sanity check on segment/section count" |
| }, |
| "CVE-2020-24504": { |
| "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-29373": { |
| "cmt_msg": "io_uring: grab ->fs as part of async preparation" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe" |
| }, |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." |
| }, |
| "CVE-2021-26934": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3669": { |
| "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4037": { |
| "cmt_msg": "xfs: fix up non-directory creation in SGID directories" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" |
| }, |
| "CVE-2021-20177": { |
| "cmt_msg": "netfilter: add and use nf_hook_slow_list()" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4023": { |
| "cmt_msg": "io-wq: fix cancellation on create-worker failure" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1508": { |
| "cmt_msg": "io_uring: reexpand under-reexpanded iters" |
| }, |
| "CVE-2021-4159": { |
| "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4150": { |
| "cmt_msg": "block: fix incorrect references to disk objects" |
| }, |
| "CVE-2021-28951": { |
| "cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-29155": { |
| "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-12362": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2020-12363": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" |
| }, |
| "CVE-2020-12364": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2022-0480": { |
| "cmt_msg": "memcg: enable accounting for file lock caches" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1043": { |
| "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" |
| }, |
| "CVE-2021-4218": { |
| "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-29534": { |
| "cmt_msg": "io_uring: don't rely on weak ->files references" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-20239": { |
| "cmt_msg": "net: pass a sockptr_t into ->setsockopt" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" |
| }, |
| "CVE-2020-36385": { |
| "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" |
| }, |
| "CVE-2020-16120": { |
| "cmt_msg": "ovl: switch to mounter creds in readdir" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36310": { |
| "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" |
| }, |
| "CVE-2020-36313": { |
| "cmt_msg": "KVM: Fix out of range accesses to memslots" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1280": { |
| "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-32078": { |
| "cmt_msg": "ARM: footbridge: remove personal server platform" |
| }, |
| "CVE-2020-27835": { |
| "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" |
| } |
| } |
| }, |
| "4.14": { |
| "4.14": { |
| "CVE-2017-16647": { |
| "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", |
| "cmt_id": "baedf68a068ca29624f241426843635920f16e1d" |
| }, |
| "CVE-2017-16650": { |
| "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", |
| "cmt_id": "7fd078337201cf7468f53c3d9ef81ff78cb6df3b" |
| }, |
| "CVE-2017-16649": { |
| "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", |
| "cmt_id": "2cb80187ba065d7decad7c6614e35e07aec8a974" |
| } |
| }, |
| "4.14.1": { |
| "CVE-2017-16646": { |
| "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", |
| "cmt_id": "75d9dd294e2a41ddce75cc02d1675a9cf40873fc" |
| }, |
| "CVE-2017-16537": { |
| "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", |
| "cmt_id": "16edf1a6a8a52040841e3e875c76bad0aa28f85f" |
| } |
| }, |
| "4.14.2": { |
| "CVE-2017-18204": { |
| "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", |
| "cmt_id": "44ec0aecc73dc3959bdbb6fa733c69dc0bb633f4" |
| }, |
| "CVE-2017-16994": { |
| "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", |
| "cmt_id": "bbce81fc966f59421e5f54c4bd3d3a4670f45e33" |
| } |
| }, |
| "4.14.3": { |
| "CVE-2017-18203": { |
| "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", |
| "cmt_id": "3bfb87ecb4f7e19c53c31b7beca4ecd9bb906a67" |
| }, |
| "CVE-2017-16536": { |
| "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", |
| "cmt_id": "5a482b8a75500ec7516f3d11c7fb063e3f4abc45" |
| } |
| }, |
| "4.14.4": { |
| "CVE-2017-18208": { |
| "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", |
| "cmt_id": "8a0bb9ebaa8b8faee61f095757662fe5d7fd8da6" |
| }, |
| "CVE-2017-18202": { |
| "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", |
| "cmt_id": "786b924d39bad16ff99aacdb4076df027cc2f8b8" |
| } |
| }, |
| "4.14.6": { |
| "CVE-2017-17807": { |
| "cmt_msg": "KEYS: add missing permission check for request_key() destination", |
| "cmt_id": "69d5894ce0a67d37f900d2597fc0b2b8cef6c863" |
| }, |
| "CVE-2017-0861": { |
| "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", |
| "cmt_id": "0482dcd51004920b13b59995b7afb66df49937da" |
| }, |
| "CVE-2017-1000407": { |
| "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", |
| "cmt_id": "a52c2829cd60492fc75bafc323145cab1af915f5" |
| } |
| }, |
| "4.14.7": { |
| "CVE-2018-18559": { |
| "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", |
| "cmt_id": "589983eb9986ea9c851c8906a81781f317207313" |
| }, |
| "CVE-2018-7492": { |
| "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", |
| "cmt_id": "9d9a63d74b2b6ed7c30c7d1584d87c16ae8d5862" |
| }, |
| "CVE-2017-16648": { |
| "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct", |
| "cmt_id": "7bc8eb30f1e02b4dd6fd2869720c64d9bf39d765" |
| } |
| }, |
| "4.14.8": { |
| "CVE-2018-14619": { |
| "cmt_msg": "crypto: algif_aead - fix reference counting of null skcipher", |
| "cmt_id": "96c2dfaebe1a8eba95d43732a1413c777469128c" |
| }, |
| "CVE-2017-16913": { |
| "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", |
| "cmt_id": "1621db059603e781f61a9bf33cba639b42faf0bc" |
| }, |
| "CVE-2017-16912": { |
| "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", |
| "cmt_id": "7120d742ad8d0f1fe37e4b73827e166fc1e01eea" |
| }, |
| "CVE-2017-16911": { |
| "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", |
| "cmt_id": "b6a2ad646c13bb9d1231bce5599cb3176ff33ca4" |
| }, |
| "CVE-2017-16914": { |
| "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", |
| "cmt_id": "d78a5506cf0ea112124c1ffa5c0aae09b579d96d" |
| }, |
| "CVE-2017-17558": { |
| "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", |
| "cmt_id": "4c5ae6a301a5415d1334f6c655bebf91d475bd89" |
| }, |
| "CVE-2017-18344": { |
| "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", |
| "cmt_id": "3df23f7ce7255d1ef2a616071cac359a245fb6de" |
| }, |
| "CVE-2017-17806": { |
| "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", |
| "cmt_id": "902ae89f841de0c8d2857919296923f6332e174f" |
| }, |
| "CVE-2017-17805": { |
| "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", |
| "cmt_id": "c68b31521d5fb7216cb1113130399afe65437c6c" |
| } |
| }, |
| "4.14.9": { |
| "CVE-2017-17857": { |
| "cmt_msg": "bpf: fix missing error return in check_stack_boundary()", |
| "cmt_id": "2120fca0ecfb4552d27608d409ebd3403ce02ce4" |
| }, |
| "CVE-2017-17864": { |
| "cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", |
| "cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" |
| }, |
| "CVE-2017-17862": { |
| "cmt_msg": "bpf: fix branch pruning logic", |
| "cmt_id": "2b3ea8ceb2bb71e9e58527661261dba127137d9b" |
| }, |
| "CVE-2017-17863": { |
| "cmt_msg": "bpf: fix integer overflows", |
| "cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" |
| }, |
| "CVE-2017-17853": { |
| "cmt_msg": "bpf/verifier: fix bounds calculation on BPF_RSH", |
| "cmt_id": "4d54f7df5131d67f653f674003ec5f52c9818b53" |
| }, |
| "CVE-2017-17852": { |
| "cmt_msg": "bpf: fix 32-bit ALU op verification", |
| "cmt_id": "6c8e098d0324412d4ae9e06c7e611a96b87faf80" |
| }, |
| "CVE-2017-17855": { |
| "cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", |
| "cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" |
| }, |
| "CVE-2017-16996": { |
| "cmt_msg": "bpf: fix incorrect tracking of register size truncation", |
| "cmt_id": "bf5ee24e87e39548bf30d4e18e479e61a5a98336" |
| }, |
| "CVE-2017-16995": { |
| "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", |
| "cmt_id": "6e12ea4fb45ca86cdd7425276b6993455fee947a" |
| }, |
| "CVE-2017-17856": { |
| "cmt_msg": "bpf: force strict alignment checks for stack pointers", |
| "cmt_id": "c90268f7cbee0781331b96d1423d0f28a6183889" |
| }, |
| "CVE-2017-17854": { |
| "cmt_msg": "bpf: fix integer overflows", |
| "cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" |
| } |
| }, |
| "4.14.11": { |
| "CVE-2017-18595": { |
| "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", |
| "cmt_id": "21a9c7346ef696161dacbbd9f47dabb0f062c4c8" |
| }, |
| "CVE-2018-9465": { |
| "cmt_msg": "binder: fix proc->files use-after-free", |
| "cmt_id": "d87f1bc7d15b89bd3bcf31020eb7f3b3cd6f84b5" |
| }, |
| "CVE-2018-18386": { |
| "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", |
| "cmt_id": "aaa5a91ff744f91fb1d1c91853aa0c8f126be563" |
| }, |
| "CVE-2017-17449": { |
| "cmt_msg": "netlink: Add netns check on taps", |
| "cmt_id": "e3fb538e5715250d6a61a26925215229f2e9f52f" |
| }, |
| "CVE-2017-17712": { |
| "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", |
| "cmt_id": "3bc400bad0e003d40a0a2412411aed7cbae16f96" |
| }, |
| "CVE-2017-15129": { |
| "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", |
| "cmt_id": "dd9a2648b3e35c2369f580215d916baf7e23253a" |
| } |
| }, |
| "4.14.13": { |
| "CVE-2017-18075": { |
| "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", |
| "cmt_id": "7156c794b8ab462705e6ac80c5fa69565eb44c62" |
| } |
| }, |
| "4.14.14": { |
| "CVE-2017-13216": { |
| "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", |
| "cmt_id": "242e20a5b3cc2b99ace977546d3cffc6a2a35991" |
| }, |
| "CVE-2017-17741": { |
| "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", |
| "cmt_id": "653c41ac4729261cb356ee1aff0f3f4f342be1eb" |
| }, |
| "CVE-2018-5333": { |
| "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", |
| "cmt_id": "5edbe3c0249f54578636b71377861d579b1781cf" |
| }, |
| "CVE-2017-1000410": { |
| "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", |
| "cmt_id": "02462928e2234eea95dd1ce05ca1f2c02088dc13" |
| }, |
| "CVE-2018-5332": { |
| "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", |
| "cmt_id": "5d127d15ad2f9f33af788f1edf720ba29317f55b" |
| } |
| }, |
| "4.14.15": { |
| "CVE-2017-18551": { |
| "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", |
| "cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" |
| }, |
| "CVE-2018-6927": { |
| "cmt_msg": "futex: Prevent overflow by strengthen input validation", |
| "cmt_id": "17ae6ccfe5dd85605dc44534348b506f95d16a61" |
| }, |
| "CVE-2019-9454": { |
| "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", |
| "cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" |
| }, |
| "CVE-2018-1000004": { |
| "cmt_msg": "ALSA: seq: Make ioctls race-free", |
| "cmt_id": "c3162384aed4cfe3f1a1f40041f3ba8cd7704d88" |
| } |
| }, |
| "4.14.16": { |
| "CVE-2018-1000028": { |
| "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", |
| "cmt_id": "54e67ba7d20a5921cfe712cfe4bd773e75df10e0" |
| }, |
| "CVE-2017-17450": { |
| "cmt_msg": "netfilter: xt_osf: Add missing permission checks", |
| "cmt_id": "19848ca7b7dad5153860239c893c1eadd603217e" |
| }, |
| "CVE-2017-17448": { |
| "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", |
| "cmt_id": "671624872144abc37bc5e8f3b27987890f6e87f3" |
| } |
| }, |
| "4.14.17": { |
| "CVE-2019-2215": { |
| "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", |
| "cmt_id": "7a3cee43e935b9d526ad07f20bf005ba7e74d05b" |
| }, |
| "CVE-2018-5344": { |
| "cmt_msg": "loop: fix concurrent lo_open/lo_release", |
| "cmt_id": "d5e06a1867210049bbfe27864ee0a40cfd9b1e9b" |
| } |
| }, |
| "4.14.18": { |
| "CVE-2017-5754": { |
| "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", |
| "cmt_id": "343c91242d092852ab22411780f886317d7001aa" |
| } |
| }, |
| "4.14.20": { |
| "CVE-2017-13166": { |
| "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt", |
| "cmt_id": "ea96d8f676dd3caeb77e3dc509c880cc81d303a6" |
| }, |
| "CVE-2018-5750": { |
| "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", |
| "cmt_id": "f232bfdcdd768bb6ba5945f1f8f28faa94fc10b8" |
| }, |
| "CVE-2017-16538": { |
| "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", |
| "cmt_id": "fd31a38d268f50afe9c5cd3d4beafa020ad39e90" |
| }, |
| "CVE-2017-8824": { |
| "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", |
| "cmt_id": "e5e1e153ecd40c2b09c23d2b2c161a6c8ddbba07" |
| }, |
| "CVE-2017-16644": { |
| "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", |
| "cmt_id": "dd24d173b50af3aadb1ea2e04edaa8d68ca59b23" |
| } |
| }, |
| "4.14.21": { |
| "CVE-2018-7566": { |
| "cmt_msg": "ALSA: seq: Fix racy pool initializations", |
| "cmt_id": "7466294dad8963e29f051d8ab2f4d3f67d2f62a6" |
| } |
| }, |
| "4.14.22": { |
| "CVE-2018-20510": { |
| "cmt_msg": "binder: replace \"%p\" with \"%pK\"", |
| "cmt_id": "b46af094b82a47ca1cbba9092578f8f96af82798" |
| }, |
| "CVE-2020-0030": { |
| "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", |
| "cmt_id": "441b5d10e4602b25ad960d1ca1c6bb77e788c220" |
| } |
| }, |
| "4.14.25": { |
| "CVE-2018-5803": { |
| "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", |
| "cmt_id": "1fc74a57a8ae863c95afedef2510e7e42b194e56" |
| } |
| }, |
| "4.14.27": { |
| "CVE-2018-1068": { |
| "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", |
| "cmt_id": "eaa06bfba8eabd44ce952758046492eebc973bbe" |
| }, |
| "CVE-2018-7995": { |
| "cmt_msg": "x86/MCE: Serialize sysfs changes", |
| "cmt_id": "5c1c405d393648da95339c3e0f2dcfd7a1021388" |
| }, |
| "CVE-2018-1065": { |
| "cmt_msg": "netfilter: add back stackpointer size checks", |
| "cmt_id": "638c2e4eff89aae86593e80ac2be01eee195fccb" |
| } |
| }, |
| "4.14.28": { |
| "CVE-2019-9456": { |
| "cmt_msg": "usb: usbmon: Read text within supplied buffer size", |
| "cmt_id": "59b0613d3f40f0ba621bb9c7ddf06dea2948e0b7" |
| } |
| }, |
| "4.14.31": { |
| "CVE-2018-8822": { |
| "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", |
| "cmt_id": "2a2b9ef3092680bdf09751d55420910f81fd0c3c" |
| }, |
| "CVE-2018-7740": { |
| "cmt_msg": "hugetlbfs: check for pgoff value overflow", |
| "cmt_id": "1e8628443ede418464b0ab101b24fbb7030949b2" |
| }, |
| "CVE-2018-1087": { |
| "cmt_msg": "kvm/x86: fix icebp instruction handling", |
| "cmt_id": "06b2810150542cfe0e66407c77ea2de6790e35dc" |
| }, |
| "CVE-2018-8781": { |
| "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", |
| "cmt_id": "c8deec7181212f170191c7ffbb01a16367682f5b" |
| }, |
| "CVE-2018-8897": { |
| "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", |
| "cmt_id": "5a29ce2b9880a26e1ac95169dedabc988360c734" |
| } |
| }, |
| "4.14.32": { |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown", |
| "cmt_id": "dbbf2d1e4077bab0c65ece2765d3fc69cf7d610f" |
| }, |
| "CVE-2021-0935": { |
| "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure", |
| "cmt_id": "a8f02befc87d6f1a882c9b14a31bcfa1fbd3d430" |
| }, |
| "CVE-2018-1130": { |
| "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", |
| "cmt_id": "91d27e0c302501e148460db9981b5b04481781ce" |
| } |
| }, |
| "4.14.33": { |
| "CVE-2018-1000199": { |
| "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", |
| "cmt_id": "ca04476df8fd39c71818352db43090bd17dd1d58" |
| }, |
| "CVE-2017-17975": { |
| "cmt_msg": "media: usbtv: prevent double free in error case", |
| "cmt_id": "1f17d5033fe3c435556d8fb731f3a51ca073ce85" |
| } |
| }, |
| "4.14.34": { |
| "CVE-2018-7757": { |
| "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", |
| "cmt_id": "8644d14c3240b6875c9e0e72c346146c24a6d8c1" |
| } |
| }, |
| "4.14.35": { |
| "CVE-2020-35513": { |
| "cmt_msg": "nfsd: fix incorrect umasks", |
| "cmt_id": "9a0a509839f31dc17f2ea788dc362c93589e077a" |
| } |
| }, |
| "4.14.36": { |
| "CVE-2019-14763": { |
| "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()", |
| "cmt_id": "59d3a952e4f3d505f9444e86db069081323351c7" |
| }, |
| "CVE-2018-1094": { |
| "cmt_msg": "ext4: always initialize the crc32c checksum driver", |
| "cmt_id": "26dbb30c58ffb85bc015bd5e58831483d50f7d18" |
| }, |
| "CVE-2018-1095": { |
| "cmt_msg": "ext4: limit xattr size to INT_MAX", |
| "cmt_id": "a57eb14b740e6175aff8b8941bec628403992dfa" |
| }, |
| "CVE-2018-1108": { |
| "cmt_msg": "random: fix crng_ready() test", |
| "cmt_id": "6e513bc20ca63f594632eca4e1968791240b8f18" |
| }, |
| "CVE-2018-1092": { |
| "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", |
| "cmt_id": "8e0e94683f8449f4e83b4b563b80eb9c76b9e18f" |
| }, |
| "CVE-2018-20961": { |
| "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", |
| "cmt_id": "96dc465173a1f790e805246206aee3d18770f614" |
| } |
| }, |
| "4.14.37": { |
| "CVE-2018-8087": { |
| "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()", |
| "cmt_id": "afadc440a1cc08895f451b4a9db551a45f2a1a21" |
| }, |
| "CVE-2021-39636": { |
| "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace", |
| "cmt_id": "ad10785a706e63ff155fc97860cdcc5e3bc5992d" |
| } |
| }, |
| "4.14.38": { |
| "CVE-2018-10940": { |
| "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", |
| "cmt_id": "68c09d548bfc61aec99fa9a24e703c3d6fdba9b1" |
| } |
| }, |
| "4.14.39": { |
| "CVE-2018-9415": { |
| "cmt_msg": "ARM: amba: Fix race condition with driver_override", |
| "cmt_id": "23abff7b984ff46b78b9964f9cdba42036b4149a" |
| }, |
| "CVE-2018-9385": { |
| "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", |
| "cmt_id": "f671ee8de31a3c2702250e64e5f18ebceb21f1e6" |
| }, |
| "CVE-2018-1093": { |
| "cmt_msg": "ext4: add validity checks for bitmap block numbers", |
| "cmt_id": "b39430ea068797bb45b72429db3743064280b1be" |
| } |
| }, |
| "4.14.41": { |
| "CVE-2018-1000200": { |
| "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3", |
| "cmt_id": "2270dfcc4b12d49c6d74394d245858ae882a8b79" |
| }, |
| "CVE-2018-11508": { |
| "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field", |
| "cmt_id": "ef7c4825fe5fe9ed251bda8d4c04d47fe33c3afb" |
| } |
| }, |
| "4.14.42": { |
| "CVE-2018-1120": { |
| "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", |
| "cmt_id": "5c9a9508de30d4d27a270047c7ab5f2817b1366d" |
| } |
| }, |
| "4.14.43": { |
| "CVE-2018-5814": { |
| "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", |
| "cmt_id": "ec0c93951ecb3ab9463c9a0d0a79c69e4bcb2b2a" |
| }, |
| "CVE-2018-3639": { |
| "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", |
| "cmt_id": "8410540f5aaf06ab01197443371be89822971e58" |
| } |
| }, |
| "4.14.44": { |
| "CVE-2018-10021": { |
| "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", |
| "cmt_id": "58442874542fb41fd53de4ab34be180ad43779c9" |
| }, |
| "CVE-2018-1000204": { |
| "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", |
| "cmt_id": "d827bea2d18c07ba514f7d48cde49f90da9a1384" |
| } |
| }, |
| "4.14.45": { |
| "CVE-2018-11506": { |
| "cmt_msg": "sr: pass down correctly sized SCSI sense buffer", |
| "cmt_id": "2a039b93679fb2e974bedf5b0d76da81731474ba" |
| }, |
| "CVE-2018-9518": { |
| "cmt_msg": "NFC: llcp: Limit size of SDP URI", |
| "cmt_id": "54881db3251a48f9a27ac8b7223a9b421757d395" |
| }, |
| "CVE-2017-13695": { |
| "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", |
| "cmt_id": "1d1646c408f62148fd2bbc399927bdc5381cb3ba" |
| }, |
| "CVE-2018-6412": { |
| "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", |
| "cmt_id": "ccf92117d49d77f3d88ad81d63ea5c0d02a94e3f" |
| } |
| }, |
| "4.14.49": { |
| "CVE-2019-18675": { |
| "cmt_msg": "mmap: introduce sane default mmap limits", |
| "cmt_id": "16d7ceb04b554207aa68dd27c1bc11f8933813fd" |
| } |
| }, |
| "4.14.50": { |
| "CVE-2018-10853": { |
| "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", |
| "cmt_id": "53e4b19fcd0ce08933e0f7a7fe11654f6eac1f19" |
| }, |
| "CVE-2018-12904": { |
| "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", |
| "cmt_id": "b1bd9caf5e98d8111361f53367fece3444b0a7c2" |
| } |
| }, |
| "4.14.52": { |
| "CVE-2018-10840": { |
| "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", |
| "cmt_id": "21542545990c5aba4b919ac0f8c8ae6a408b49d4" |
| }, |
| "CVE-2018-1118": { |
| "cmt_msg": "vhost: fix info leak due to uninitialized memory", |
| "cmt_id": "7446344baafba2f23da58ac837b86770ec977b90" |
| }, |
| "CVE-2018-11412": { |
| "cmt_msg": "ext4: do not allow external inodes for inline data", |
| "cmt_id": "e81d371dac30019816a1c5a3a2c4c44bb3c68558" |
| }, |
| "CVE-2018-12232": { |
| "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", |
| "cmt_id": "91717ffc9057f38a0203a40ef36ae2e482fd7cbe" |
| } |
| }, |
| "4.14.53": { |
| "CVE-2018-13406": { |
| "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", |
| "cmt_id": "9aa818d42bf5f5477f66dbc941b4daddfcae290d" |
| } |
| }, |
| "4.14.55": { |
| "CVE-2018-9516": { |
| "cmt_msg": "HID: debug: check length before copy_to_user()", |
| "cmt_id": "50b4d984f55e7e8d75f75da6803505ca3c122cef" |
| }, |
| "CVE-2018-10879": { |
| "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", |
| "cmt_id": "ac93c718365ac6ea9d7631641c8dec867d623491" |
| }, |
| "CVE-2018-10881": { |
| "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", |
| "cmt_id": "deb465ec750b80776cc4ac5b92b72c0a71fd4f0b" |
| }, |
| "CVE-2018-10878": { |
| "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", |
| "cmt_id": "ac48bb9bc0a32f5a4432be1645b57607f8c46aa7" |
| }, |
| "CVE-2018-10877": { |
| "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", |
| "cmt_id": "d69a9df614fc68741efcb0fcc020f05caa99d668" |
| }, |
| "CVE-2018-10876": { |
| "cmt_msg": "ext4: only look at the bg_flags field if it is valid", |
| "cmt_id": "44a4bc970bfae625d0ec9ecdfefc88c9d93dfe6c" |
| }, |
| "CVE-2018-10880": { |
| "cmt_msg": "ext4: never move the system.data xattr out of the inode body", |
| "cmt_id": "8a9ef17c0dc93def47e17b227ada95c682592a1d" |
| }, |
| "CVE-2017-13168": { |
| "cmt_msg": "scsi: sg: mitigate read/write abuse", |
| "cmt_id": "6e51bfa950864343cfe210a75268e826a2b4b2e8" |
| }, |
| "CVE-2018-10882": { |
| "cmt_msg": "ext4: add more inode number paranoia checks", |
| "cmt_id": "c24aab6d86640ccf321b87be6096319f55b16274" |
| }, |
| "CVE-2018-10883": { |
| "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", |
| "cmt_id": "0321e68838d7ba2528b367b879b2fcf9d96a2099" |
| } |
| }, |
| "4.14.56": { |
| "CVE-2018-13405": { |
| "cmt_msg": "Fix up non-directory creation in SGID directories", |
| "cmt_id": "298243a5fb640f018e2fae22c0c895f1b27f0963" |
| }, |
| "CVE-2018-16276": { |
| "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", |
| "cmt_id": "90f2a76ccd37cce2530df49335bcea6cd0e23797" |
| } |
| }, |
| "4.14.57": { |
| "CVE-2017-18216": { |
| "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", |
| "cmt_id": "c59a8f13f36b51f2100111121b39c6d15eca124d" |
| }, |
| "CVE-2017-18224": { |
| "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", |
| "cmt_id": "1ccab2bf726e1cd9292deecf4d72d732527035d6" |
| } |
| }, |
| "4.14.58": { |
| "CVE-2018-10902": { |
| "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", |
| "cmt_id": "5d251646ab1588077b26e89dcaa116aba105d097" |
| } |
| }, |
| "4.14.59": { |
| "CVE-2018-5390": { |
| "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", |
| "cmt_id": "f3a5ba6310e11df370f6888ed716d1486896d983" |
| } |
| }, |
| "4.14.60": { |
| "CVE-2018-14734": { |
| "cmt_msg": "infiniband: fix a possible use-after-free bug", |
| "cmt_id": "e27dad1eb1ac7bedb5a033ac2e068543742c807b" |
| } |
| }, |
| "4.14.62": { |
| "CVE-2018-13093": { |
| "cmt_msg": "xfs: validate cached inodes are free when allocated", |
| "cmt_id": "6f021e4ef39ace7f58c415856aef9308c70e89b9" |
| }, |
| "CVE-2018-13094": { |
| "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", |
| "cmt_id": "59f35b983e8aeb98188c6ef93f8eabc594f8f953" |
| }, |
| "CVE-2018-12233": { |
| "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", |
| "cmt_id": "7d29fb53439c8c91874550cc078eda6db8feafe7" |
| } |
| }, |
| "4.14.63": { |
| "CVE-2018-3646": { |
| "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", |
| "cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" |
| }, |
| "CVE-2018-15572": { |
| "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", |
| "cmt_id": "f374b5593e44c01265156b4c4070b618097f401b" |
| }, |
| "CVE-2018-3620": { |
| "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", |
| "cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" |
| } |
| }, |
| "4.14.64": { |
| "CVE-2018-9363": { |
| "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", |
| "cmt_id": "6e2c702e797c25b49dac3a9f663c449f30cf8efc" |
| } |
| }, |
| "4.14.67": { |
| "CVE-2018-3693": { |
| "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", |
| "cmt_id": "4bc32484df6a3bdc173301adff0c2fdc66667a40" |
| } |
| }, |
| "4.14.68": { |
| "CVE-2018-16658": { |
| "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", |
| "cmt_id": "73b2e7073b51de0b03ebd15c97dd3ad0c3470810" |
| } |
| }, |
| "4.14.69": { |
| "CVE-2018-20856": { |
| "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", |
| "cmt_id": "0affbaece6d0b7c75c5166732d0481ae9a28be60" |
| }, |
| "CVE-2019-12881": { |
| "cmt_msg": "drm/i915/userptr: reject zero user_size", |
| "cmt_id": "7188f7416438a34412a6702f548f81be9e2cf56c" |
| } |
| }, |
| "4.14.70": { |
| "CVE-2018-6554": { |
| "cmt_msg": "staging: irda: remove the irda network stack and drivers", |
| "cmt_id": "77be9452d0e5768bab9a041a62116cbeb9dc3174" |
| }, |
| "CVE-2018-6555": { |
| "cmt_msg": "staging: irda: remove the irda network stack and drivers", |
| "cmt_id": "e37957305de356b4f8719a3a4c7bc1453a2f0ca3" |
| }, |
| "CVE-2018-14617": { |
| "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", |
| "cmt_id": "68e787c3c80059c776d1d7afb20f5eb9f20237a5" |
| }, |
| "CVE-2018-14609": { |
| "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", |
| "cmt_id": "0cdbc3faf960de16ebe8a427feb3b0544ad983cc" |
| } |
| }, |
| "4.14.71": { |
| "CVE-2018-5391": { |
| "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", |
| "cmt_id": "1c44969111cc68f361638b6e54f5a176609aa05a" |
| }, |
| "CVE-2018-13099": { |
| "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", |
| "cmt_id": "7fb2b50ee59689578d5a712633d1e6755fc98933" |
| }, |
| "CVE-2018-17182": { |
| "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", |
| "cmt_id": "06274364edb4407b386a996a7ff46c3ca3459b70" |
| } |
| }, |
| "4.14.73": { |
| "CVE-2018-20511": { |
| "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", |
| "cmt_id": "9951e17efd05b8ad49bbc0db2e6b483f95d94d86" |
| }, |
| "CVE-2018-14633": { |
| "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", |
| "cmt_id": "755e45f3155cc51e37dc1cce9ccde10b84df7d93" |
| } |
| }, |
| "4.14.74": { |
| "CVE-2019-9458": { |
| "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", |
| "cmt_id": "d61ba3417e4fb71963441aa0c2e9c26f4568215b" |
| }, |
| "CVE-2018-18021": { |
| "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", |
| "cmt_id": "38d070f9090af15b5bdb26fc0e084b22f34eabd9" |
| }, |
| "CVE-2018-7755": { |
| "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", |
| "cmt_id": "04bc4dd86d0f2b166640c8ea5b7a030d92a3d993" |
| }, |
| "CVE-2018-13053": { |
| "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", |
| "cmt_id": "a4dbaf7c2de0d622e0fe29840dd2bf4a281277a5" |
| }, |
| "CVE-2018-12896": { |
| "cmt_msg": "posix-timers: Sanitize overrun handling", |
| "cmt_id": "3e3f075f72bd2dfcd5211bd1ff3919bc118ad4cd" |
| } |
| }, |
| "4.14.75": { |
| "CVE-2018-17972": { |
| "cmt_msg": "proc: restrict kernel stack dumps to root", |
| "cmt_id": "f8566a92ab75d442a823453414c6158b0b3c5ce7" |
| } |
| }, |
| "4.14.76": { |
| "CVE-2018-15471": { |
| "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", |
| "cmt_id": "309a1c5cfc598c162dfc951fac040554164056e4" |
| } |
| }, |
| "4.14.78": { |
| "CVE-2018-18281": { |
| "cmt_msg": "mremap: properly flush TLB before releasing the page", |
| "cmt_id": "541500abfe9eb30a89ff0a6eb42a21521996d68d" |
| } |
| }, |
| "4.14.82": { |
| "CVE-2018-19854": { |
| "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", |
| "cmt_id": "fdc427442b374e84077d4214733764efb1a38a0e" |
| }, |
| "CVE-2018-16871": { |
| "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", |
| "cmt_id": "6d1c38aa47d432f425c5829261eaa8e624274a4f" |
| }, |
| "CVE-2018-18710": { |
| "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", |
| "cmt_id": "a8c254d8e96032d5bb235cb2e777203d9acda09d" |
| } |
| }, |
| "4.14.86": { |
| "CVE-2018-13100": { |
| "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", |
| "cmt_id": "f3d6361a96a455c8ba12226a04efa67a0ada4966" |
| }, |
| "CVE-2018-5703": { |
| "cmt_msg": "tls: Use correct sk->sk_prot for IPV6", |
| "cmt_id": "2a0f5919e1e6a1c0423d895ab75eb15f94a67c69" |
| }, |
| "CVE-2018-13096": { |
| "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", |
| "cmt_id": "b8321ccd045710ee04fd5322c34cadd13a5e58af" |
| }, |
| "CVE-2018-13097": { |
| "cmt_msg": "f2fs: fix to do sanity check with user_block_count", |
| "cmt_id": "f9cf5462b51d98026275cc51437fc531e808b64a" |
| }, |
| "CVE-2018-14615": { |
| "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", |
| "cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" |
| }, |
| "CVE-2018-14614": { |
| "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", |
| "cmt_id": "30130700acfad8a705c109325379f5bbe21b3ccc" |
| }, |
| "CVE-2018-13098": { |
| "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature", |
| "cmt_id": "0081c90ebacebb3a82d0d24bf0f42273ce2d902e" |
| }, |
| "CVE-2018-5848": { |
| "cmt_msg": "wil6210: missing length check in wmi_set_ie", |
| "cmt_id": "107b02c81a8761f1f7efc1e8b54d435324ccd13e" |
| }, |
| "CVE-2018-14611": { |
| "cmt_msg": "btrfs: validate type when reading a chunk", |
| "cmt_id": "f7eef132ccc95c9af50b647c5da0511d2b8492f8" |
| }, |
| "CVE-2018-14610": { |
| "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", |
| "cmt_id": "34407a175a59b668a1a2bbf0d0e495d87a7777d8" |
| }, |
| "CVE-2018-14613": { |
| "cmt_msg": "btrfs: tree-checker: Verify block_group_item", |
| "cmt_id": "9f268b5cf2d6a716779dfe11f4bc02d6461db693" |
| }, |
| "CVE-2018-14612": { |
| "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", |
| "cmt_id": "c0dfb99847851fb830d1e8ea7d5e0571f50c325a" |
| }, |
| "CVE-2018-1128": { |
| "cmt_msg": "libceph: add authorizer challenge", |
| "cmt_id": "3fd73c8a71f299e30359a63add1f33e3fd834831" |
| }, |
| "CVE-2018-1129": { |
| "cmt_msg": "libceph: implement CEPHX_V2 calculation mode", |
| "cmt_id": "b16d0c5d32468a0624505a7b6b211e20488295e9" |
| }, |
| "CVE-2019-2024": { |
| "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", |
| "cmt_id": "30cdc0c3bac950bebd3ba59f5ff980cdd3710e0f" |
| }, |
| "CVE-2018-18690": { |
| "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", |
| "cmt_id": "cb7ccb9924bb3596f211badf0d2becf131a979cd" |
| }, |
| "CVE-2018-19407": { |
| "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", |
| "cmt_id": "83f00ab9a7c03e9f1410727d985b7fe9473002e1" |
| }, |
| "CVE-2020-0435": { |
| "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", |
| "cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" |
| }, |
| "CVE-2019-2025": { |
| "cmt_msg": "binder: fix race that allows malicious free of live buffer", |
| "cmt_id": "fd6cc33d0775b0d902906d88dd05cc1a2a059f8d" |
| } |
| }, |
| "4.14.87": { |
| "CVE-2018-16862": { |
| "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", |
| "cmt_id": "60720df8bf43e8ca2ce1a17936904a52129c8471" |
| }, |
| "CVE-2018-18397": { |
| "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", |
| "cmt_id": "82c5a8c0debac552750a00b4fc7551c89c7b34b8" |
| } |
| }, |
| "4.14.88": { |
| "CVE-2018-20169": { |
| "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", |
| "cmt_id": "7b6e85da8d94948201abb8d576d485892a6a878f" |
| }, |
| "CVE-2018-5953": { |
| "cmt_msg": "printk: hash addresses printed with %p", |
| "cmt_id": "f2a4f7622d052eb987e8693633468c239c13575a" |
| }, |
| "CVE-2018-14616": { |
| "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", |
| "cmt_id": "38fce19d4d7bc8acfa183ee2918758d279a69c9a" |
| }, |
| "CVE-2018-14625": { |
| "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", |
| "cmt_id": "f15c072d6576c5e2b693c22e39ccc9103c952078" |
| }, |
| "CVE-2018-19824": { |
| "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", |
| "cmt_id": "19f74e45746253cafb8cb1e773041e7cadbac622" |
| } |
| }, |
| "4.14.91": { |
| "CVE-2018-16882": { |
| "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", |
| "cmt_id": "cc70f14956fa0ea84ee1a3a5b79347730c6c2d08" |
| }, |
| "CVE-2018-19985": { |
| "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", |
| "cmt_id": "49be8dc589aee04c64d61e362c5029ab20fd6fd7" |
| } |
| }, |
| "4.14.93": { |
| "CVE-2019-15927": { |
| "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", |
| "cmt_id": "1117b7a380f4b4f575d90a318a43d2e168c01fbd" |
| }, |
| "CVE-2018-20784": { |
| "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", |
| "cmt_id": "c6a9a1ccafc49fe95d8de54eef154ad5c3b94077" |
| }, |
| "CVE-2019-6133": { |
| "cmt_msg": "fork: record start_time late", |
| "cmt_id": "3f2e4e1d9a6cffa95d31b7a491243d5e92a82507" |
| } |
| }, |
| "4.14.94": { |
| "CVE-2018-16884": { |
| "cmt_msg": "sunrpc: use-after-free in svc_process_common()", |
| "cmt_id": "65dba32522065b79a16393efc75f8006c2c3dbb8" |
| } |
| }, |
| "4.14.95": { |
| "CVE-2019-3701": { |
| "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", |
| "cmt_id": "39ff087b5c6be2ff0b08e617d334e5bf72a08b44" |
| }, |
| "CVE-2020-10769": { |
| "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", |
| "cmt_id": "b9119fd2749c1459416ebb559cf7c1d379786cff" |
| } |
| }, |
| "4.14.96": { |
| "CVE-2019-11085": { |
| "cmt_msg": "drm/i915/gvt: Fix mmap range check", |
| "cmt_id": "e89ec9b92f9b75b44e1ff9f52dab48bd01834ed6" |
| } |
| }, |
| "4.14.99": { |
| "CVE-2019-7222": { |
| "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", |
| "cmt_id": "ef1b3d4893cec543305d30e8160df8c096135950" |
| }, |
| "CVE-2019-6974": { |
| "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", |
| "cmt_id": "8c1b11bc3555b5d1207b0e179cbdd8b945e71e69" |
| }, |
| "CVE-2019-7221": { |
| "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", |
| "cmt_id": "1c965b1b5ecc2c9e1d59b2514cedb6f7483a0241" |
| } |
| }, |
| "4.14.102": { |
| "CVE-2018-1000026": { |
| "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", |
| "cmt_id": "60cd31866de4386d940e55073491c3ee17ca593e" |
| } |
| }, |
| "4.14.103": { |
| "CVE-2019-8912": { |
| "cmt_msg": "net: crypto set sk to NULL when af_alg_release.", |
| "cmt_id": "6e4c01ee785c2192fcc4be234cedde3706309a7e" |
| } |
| }, |
| "4.14.105": { |
| "CVE-2019-9213": { |
| "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", |
| "cmt_id": "f5817069248630b3b7b17ebfcdee0b679c52be33" |
| } |
| }, |
| "4.14.106": { |
| "CVE-2019-16994": { |
| "cmt_msg": "net: sit: fix memory leak in sit_init_net()", |
| "cmt_id": "46a5caa79ff73c9403ab37475ef47ed4c027e712" |
| }, |
| "CVE-2019-12818": { |
| "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", |
| "cmt_id": "b275f8e6a0096cac11cf697c4e3ad226070264f5" |
| }, |
| "CVE-2019-8980": { |
| "cmt_msg": "exec: Fix mem leak in kernel_read_file", |
| "cmt_id": "069fb92ea221c72bd75f4863b3540420082f32ba" |
| }, |
| "CVE-2019-15916": { |
| "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", |
| "cmt_id": "306bbaeb077068141d472b922ae1adf7ab81fd72" |
| }, |
| "CVE-2019-2101": { |
| "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", |
| "cmt_id": "aa4ba765e0903926de64b359e8653bfd29a3c353" |
| } |
| }, |
| "4.14.107": { |
| "CVE-2019-16995": { |
| "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", |
| "cmt_id": "1aa1e0a3f6dde5c37bb5d6a9121847b95b255c1f" |
| }, |
| "CVE-2019-12819": { |
| "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", |
| "cmt_id": "07c2216c3783daca34ea0d86affb9dfc5346f183" |
| } |
| }, |
| "4.14.108": { |
| "CVE-2019-10124": { |
| "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", |
| "cmt_id": "c02fd076842636fb7506d4ca8a2bb3f91faf1af3" |
| }, |
| "CVE-2019-9455": { |
| "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", |
| "cmt_id": "8d6df5097c0005320ab6f3cd8dda2ef31db6c6d1" |
| }, |
| "CVE-2019-16413": { |
| "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", |
| "cmt_id": "be0b155c2b2f8c39adaa1641f3f6a4be47277993" |
| } |
| }, |
| "4.14.109": { |
| "CVE-2019-15917": { |
| "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", |
| "cmt_id": "a1dbb34da6f2edf321df5023cb2accd92579269b" |
| } |
| }, |
| "4.14.110": { |
| "CVE-2019-20811": { |
| "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", |
| "cmt_id": "e331c9066901dfe40bea4647521b86e9fb9901bb" |
| }, |
| "CVE-2019-20054": { |
| "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", |
| "cmt_id": "0d9ef3f5b07e4b6fe6105a45603de1e133e4df49" |
| }, |
| "CVE-2019-3460": { |
| "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", |
| "cmt_id": "82868814a87236b17ac588fbb779c87616e99345" |
| }, |
| "CVE-2019-15921": { |
| "cmt_msg": "genetlink: Fix a memory leak on error path", |
| "cmt_id": "111fdc6e948b36115e29cf3b1981058d033ffd54" |
| }, |
| "CVE-2019-3459": { |
| "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", |
| "cmt_id": "2b59d36f22622c92c0b06aee7571f0a86a217188" |
| } |
| }, |
| "4.14.111": { |
| "CVE-2019-11810": { |
| "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", |
| "cmt_id": "90fca247abf6adc1ee6eef9b3de199448c8a4ad6" |
| } |
| }, |
| "4.14.112": { |
| "CVE-2019-11486": { |
| "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", |
| "cmt_id": "429977fd9f7153607230a6040ee12510a525e930" |
| }, |
| "CVE-2019-11815": { |
| "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", |
| "cmt_id": "c8a88799e632045399af886a1b1a5205e5d49897" |
| }, |
| "CVE-2019-10639": { |
| "cmt_msg": "netns: provide pure entropy for net_hash_mix()", |
| "cmt_id": "adbb8bdd392db14dc80ad1ac29f8f1d37ab57a62" |
| } |
| }, |
| "4.14.113": { |
| "CVE-2019-15292": { |
| "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", |
| "cmt_id": "0ba1fa56351e6e9c2f8db4ffc823cb7057e4ea82" |
| }, |
| "CVE-2019-7308": { |
| "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", |
| "cmt_id": "6588a490bfe1b879f11b5e74724ef53a33b68641" |
| } |
| }, |
| "4.14.114": { |
| "CVE-2018-5995": { |
| "cmt_msg": "printk: hash addresses printed with %p", |
| "cmt_id": "47ad82a34560ea70e85d2eb56be0ada03dc4fd35" |
| }, |
| "CVE-2019-11599": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" |
| }, |
| "CVE-2019-3892": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" |
| }, |
| "CVE-2019-15214": { |
| "cmt_msg": "ALSA: core: Fix card races between register and disconnect", |
| "cmt_id": "d11a33e9ba584bb6f5cc74df9d74b26156ba9bb2" |
| } |
| }, |
| "4.14.115": { |
| "CVE-2019-3882": { |
| "cmt_msg": "vfio/type1: Limit DMA mappings per container", |
| "cmt_id": "73a95f1a41c0bb586b8c62622ebf25aca1582af3" |
| }, |
| "CVE-2019-15924": { |
| "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", |
| "cmt_id": "2617f9af19ce93c509ebf3fd3ce26048b8f85216" |
| } |
| }, |
| "4.14.116": { |
| "CVE-2019-11487": { |
| "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", |
| "cmt_id": "c88a0aa7ace7eb10dca42be59f21e2cbd263575e" |
| } |
| }, |
| "4.14.117": { |
| "CVE-2019-15216": { |
| "cmt_msg": "USB: yurex: Fix protection fault after device removal", |
| "cmt_id": "5696fa3f42168ee33256c0b0b72ca963d224327f" |
| } |
| }, |
| "4.14.118": { |
| "CVE-2018-20836": { |
| "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", |
| "cmt_id": "3739f98aea7113a21d11b1a604525049e422e29e" |
| }, |
| "CVE-2019-11884": { |
| "cmt_msg": "Bluetooth: hidp: fix buffer overflow", |
| "cmt_id": "2c33156b2d2f5efe820d8efdd610fb168c9acf72" |
| } |
| }, |
| "4.14.119": { |
| "CVE-2019-11091": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" |
| }, |
| "CVE-2018-12130": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" |
| }, |
| "CVE-2018-12127": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" |
| }, |
| "CVE-2018-12126": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" |
| } |
| }, |
| "4.14.120": { |
| "CVE-2019-10142": { |
| "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", |
| "cmt_id": "1a3a561df5e176a4422270e3d2cca1cd835b292e" |
| } |
| }, |
| "4.14.121": { |
| "CVE-2019-11833": { |
| "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", |
| "cmt_id": "d7d9e4823b658eb795f4a379d121d3f0539c1117" |
| } |
| }, |
| "4.14.122": { |
| "CVE-2019-15666": { |
| "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", |
| "cmt_id": "1a2bb5125acb5be09ac8dcbf0f1e47ec28468fdc" |
| } |
| }, |
| "4.14.123": { |
| "CVE-2019-20095": { |
| "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", |
| "cmt_id": "ccebaeca5089c49f2b331e91334b2d2e7a40e53c" |
| }, |
| "CVE-2019-19543": { |
| "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", |
| "cmt_id": "f1c9f1f3665635d86e4d507312f4d114d0d738e3" |
| }, |
| "CVE-2019-9466": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" |
| }, |
| "CVE-2019-9500": { |
| "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", |
| "cmt_id": "f9ba91b5d1bfb6124640e00dca6562f69b71ca19" |
| }, |
| "CVE-2019-9503": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" |
| }, |
| "CVE-2019-19966": { |
| "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", |
| "cmt_id": "b7eaea002ad0a3d2563df9d18e2ca3c6bd81abd3" |
| } |
| }, |
| "4.14.124": { |
| "CVE-2020-10720": { |
| "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", |
| "cmt_id": "385ee66eaf88e1f04be973f623b81e4bf0ec0c6f" |
| }, |
| "CVE-2019-15219": { |
| "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", |
| "cmt_id": "47ffaae93ea154ae149315389a30780fa3189caf" |
| }, |
| "CVE-2019-15218": { |
| "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", |
| "cmt_id": "5a7adcda3de26a44fc0fa3f68199358b1527daf4" |
| }, |
| "CVE-2019-15212": { |
| "cmt_msg": "USB: rio500: refuse more than one device at a time", |
| "cmt_id": "f18227d08e6b50717e1560a86fbebda0ca911507" |
| }, |
| "CVE-2019-1999": { |
| "cmt_msg": "binder: fix race between munmap() and direct reclaim", |
| "cmt_id": "c2a035d7822ac8d2870cd6dbaadc1ab407713b83" |
| }, |
| "CVE-2019-10638": { |
| "cmt_msg": "inet: switch IP ID generator to siphash", |
| "cmt_id": "e10789acbe6a76b304f45cbc8bb77a926ae4f201" |
| } |
| }, |
| "4.14.127": { |
| "CVE-2019-11479": { |
| "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", |
| "cmt_id": "cd6f35b8421ff20365ff711c0ac7647fd70e9af7" |
| }, |
| "CVE-2019-11478": { |
| "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", |
| "cmt_id": "9daf226ff92679d09aeca1b5c1240e3607153336" |
| }, |
| "CVE-2019-11477": { |
| "cmt_msg": "tcp: limit payload size of sacked skbs", |
| "cmt_id": "d632920554c5aec81d8a79c23dac07efcbabbd54" |
| } |
| }, |
| "4.14.128": { |
| "CVE-2019-15090": { |
| "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", |
| "cmt_id": "af1630c6dc4fd96c09fef088f9c400c35e259e72" |
| } |
| }, |
| "4.14.129": { |
| "CVE-2019-15807": { |
| "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", |
| "cmt_id": "5992a6926eb037cb8ed30521c74e2bef082a8946" |
| } |
| }, |
| "4.14.130": { |
| "CVE-2019-12615": { |
| "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", |
| "cmt_id": "b1013624a8adb9caa83b4c9f487778c7b51467a0" |
| }, |
| "CVE-2019-0136": { |
| "cmt_msg": "mac80211: drop robust management frames from unknown TA", |
| "cmt_id": "7a680d6e5441400b768d6e6cfe5524726ebd6b7f" |
| } |
| }, |
| "4.14.133": { |
| "CVE-2019-13272": { |
| "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", |
| "cmt_id": "bf71ef9655d25e8b275ec6ed649b6bd719231ddc" |
| }, |
| "CVE-2019-15221": { |
| "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", |
| "cmt_id": "37eaa74451c1003a6bec548c957890c264559463" |
| }, |
| "CVE-2019-9506": { |
| "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", |
| "cmt_id": "05206de4e9ae033afd32f685c4a005cbc1dceb39" |
| }, |
| "CVE-2019-3900": { |
| "cmt_msg": "vhost_net: fix possible infinite loop", |
| "cmt_id": "ae446749492d8bd23f1d0b81adba16e5739dc740" |
| } |
| }, |
| "4.14.134": { |
| "CVE-2019-10126": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", |
| "cmt_id": "b1459fb34061337efbf0d47a3ba6208f2f59829d" |
| }, |
| "CVE-2019-3846": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", |
| "cmt_id": "d50f6b58d7ad30ad8e96c0bbc3e5ecfe9b91ba77" |
| }, |
| "CVE-2019-15220": { |
| "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", |
| "cmt_id": "c760ecb74f84f729ae31b9fbc6b772923cdc78df" |
| } |
| }, |
| "4.14.135": { |
| "CVE-2019-17351": { |
| "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", |
| "cmt_id": "ba110e6dc391f70195c161bcc3de2c58ba705045" |
| }, |
| "CVE-2019-12382": { |
| "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", |
| "cmt_id": "df56de8931b924c1d850b80e1b22b62449758e90" |
| }, |
| "CVE-2019-13631": { |
| "cmt_msg": "Input: gtco - bounds check collection indent level", |
| "cmt_id": "81bf168d855cc1d97a7c9cde6787ff42485556c8" |
| }, |
| "CVE-2019-15925": { |
| "cmt_msg": "net: hns3: add some error checking in hclge_tm module", |
| "cmt_id": "18f05a6fc4cfb78ff1de275d9ebf88c3ed5522a2" |
| }, |
| "CVE-2019-15926": { |
| "cmt_msg": "ath6kl: add some bounds checking", |
| "cmt_id": "193a754afbe979a43893c88373a625ed384123ab" |
| }, |
| "CVE-2019-14284": { |
| "cmt_msg": "floppy: fix div-by-zero in setup_format_params", |
| "cmt_id": "a904a690ea0317fcd88c5b9dfef40ef0f98d9530" |
| }, |
| "CVE-2019-14283": { |
| "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", |
| "cmt_id": "80637a906eded08e04ed8a6fbbdd2b8112eaa387" |
| }, |
| "CVE-2019-13648": { |
| "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", |
| "cmt_id": "26bee6ef0d72193d58a085610fe49169d23baa83" |
| } |
| }, |
| "4.14.136": { |
| "CVE-2019-15211": { |
| "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", |
| "cmt_id": "c4c213d9aadc85a2808b04d3676970ea5f90340e" |
| }, |
| "CVE-2019-10207": { |
| "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", |
| "cmt_id": "69f9c2bc3f754ad1d610b30b940681d678c8e684" |
| }, |
| "CVE-2019-20934": { |
| "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", |
| "cmt_id": "d0919216e468d5613cc8c53d4d0676026960fe39" |
| }, |
| "CVE-2019-15215": { |
| "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", |
| "cmt_id": "3566a98e59b5cb19829d21bfe18cd396812ce15e" |
| }, |
| "CVE-2019-2213": { |
| "cmt_msg": "binder: fix possible UAF when freeing buffer", |
| "cmt_id": "a4a3c070b8760f71c8311399fa9bfe67c8629bca" |
| } |
| }, |
| "4.14.137": { |
| "CVE-2019-1125": { |
| "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", |
| "cmt_id": "83e6e48e70a133a5ea6167bf152ce2b274008b3d" |
| } |
| }, |
| "4.14.139": { |
| "CVE-2019-19536": { |
| "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", |
| "cmt_id": "dc741536d5d04065217a8402c52ad49df4cf134c" |
| }, |
| "CVE-2019-19535": { |
| "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", |
| "cmt_id": "15312ff709e6a5598a33edb3d31882951233d765" |
| }, |
| "CVE-2019-19531": { |
| "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", |
| "cmt_id": "f0d684599b4f2525a6a7fe0cde8dff6800d16a22" |
| } |
| }, |
| "4.14.140": { |
| "CVE-2019-19537": { |
| "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", |
| "cmt_id": "282a771475c2016ef77871f4438d9aaf9c8aa2b7" |
| }, |
| "CVE-2019-19527": { |
| "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", |
| "cmt_id": "d65ca54d05c209571cf2b3913277f75ab477e214" |
| }, |
| "CVE-2019-19530": { |
| "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", |
| "cmt_id": "e630f38040b5d2ecc56920742f7bafd57834cd2a" |
| } |
| }, |
| "4.14.141": { |
| "CVE-2019-15538": { |
| "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", |
| "cmt_id": "044d098441df8fabffba3b084a70beba0e77f8d4" |
| } |
| }, |
| "4.14.142": { |
| "CVE-2019-15118": { |
| "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", |
| "cmt_id": "6e1a602dfd51709538fc371d053708934909e3ba" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown", |
| "cmt_id": "3a647417696217c5861a81ccfe5d2e6791d696ac" |
| }, |
| "CVE-2019-15117": { |
| "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", |
| "cmt_id": "96b0e80b6d5fb88c4f5b1e9d5224f2aa56395926" |
| } |
| }, |
| "4.14.144": { |
| "CVE-2019-14835": { |
| "cmt_msg": "vhost: make sure log_num < in_num", |
| "cmt_id": "7e9480b480a57fb4ef2e4d2c2cddbb1a31d56b33" |
| }, |
| "CVE-2019-15030": { |
| "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", |
| "cmt_id": "32b803e81ce17eec816f09d5388ef0a1cc9e4c2f" |
| } |
| }, |
| "4.14.146": { |
| "CVE-2019-14816": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" |
| }, |
| "CVE-2019-14814": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" |
| }, |
| "CVE-2019-14815": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" |
| }, |
| "CVE-2019-15505": { |
| "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", |
| "cmt_id": "120d5674a14f5d641970bc4287a752e60415b17c" |
| }, |
| "CVE-2019-14821": { |
| "cmt_msg": "KVM: coalesced_mmio: add bounds checking", |
| "cmt_id": "bf81752d808cd31e18d9a8db6d92b73497aa48d2" |
| } |
| }, |
| "4.14.147": { |
| "CVE-2019-17056": { |
| "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "b6a2d6c11272b3cf5d2d902bb9aaf7558560a5eb" |
| }, |
| "CVE-2019-17053": { |
| "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "70f80cb205649c7350617ca79515b98419e90475" |
| }, |
| "CVE-2019-17052": { |
| "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "6567debe7f9c0423e18a758060cc63ee69e2e7d0" |
| }, |
| "CVE-2019-19533": { |
| "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", |
| "cmt_id": "580ee4a521ddc18aad5c750cc84bf43171599b29" |
| }, |
| "CVE-2019-17055": { |
| "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "371af137855d633d7c6226f659bbb6dcceb21322" |
| }, |
| "CVE-2019-17054": { |
| "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "272f46fe19daa1a18c0243cc8ac150e291ea51fd" |
| } |
| }, |
| "4.14.148": { |
| "CVE-2019-18806": { |
| "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", |
| "cmt_id": "dca8aabd7198e1aa7210ff2de081befba79d0d41" |
| } |
| }, |
| "4.14.149": { |
| "CVE-2019-19525": { |
| "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", |
| "cmt_id": "481376cc2ccb32113a2492ed1f8de32b5c777b00" |
| }, |
| "CVE-2019-16746": { |
| "cmt_msg": "nl80211: validate beacon head", |
| "cmt_id": "01ec813e457954d8eeaf768d57d625752d245bc9" |
| } |
| }, |
| "4.14.150": { |
| "CVE-2018-20976": { |
| "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", |
| "cmt_id": "6921174cd2fb5f2d0608770fe23056ab128b6d97" |
| }, |
| "CVE-2019-19523": { |
| "cmt_msg": "USB: adutux: fix use-after-free on disconnect", |
| "cmt_id": "b074263b69bc7683d5ac595cb135b4b5dfd04813" |
| }, |
| "CVE-2019-19528": { |
| "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", |
| "cmt_id": "10b0e388a18353d224ccf17cc46a57f1070abb2b" |
| } |
| }, |
| "4.14.151": { |
| "CVE-2019-19075": { |
| "cmt_msg": "ieee802154: ca8210: prevent memory leak", |
| "cmt_id": "0cafebaf5719dc84361e39f3f3874721ec95d1af" |
| }, |
| "CVE-2019-17075": { |
| "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", |
| "cmt_id": "1db19d6805d9dc5c79f8a19dddde324dbf0a33f9" |
| }, |
| "CVE-2019-17133": { |
| "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", |
| "cmt_id": "63eb9c2849bc377c6bbf491f752c6cc6b9b75bca" |
| } |
| }, |
| "4.14.152": { |
| "CVE-2019-19065": { |
| "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", |
| "cmt_id": "8f7b8f1d14d714181b35e69f4cb73f02ea8f0156" |
| }, |
| "CVE-2019-17666": { |
| "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", |
| "cmt_id": "1b940dd55d42133791d7ba4841adfcf436fab98e" |
| }, |
| "CVE-2019-15099": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" |
| }, |
| "CVE-2019-15098": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" |
| }, |
| "CVE-2020-10773": { |
| "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", |
| "cmt_id": "119e9aef452a6b6976d20dac8f35aa2dc3e01348" |
| }, |
| "CVE-2019-19526": { |
| "cmt_msg": "NFC: pn533: fix use-after-free and memleaks", |
| "cmt_id": "2a571bd399084762a67519f35ef586407fbd3cb2" |
| }, |
| "CVE-2019-19532": { |
| "cmt_msg": "HID: Fix assumption that devices have inputs", |
| "cmt_id": "e13a3d84494ca7b560551a9927231e7ecf27d96a" |
| } |
| }, |
| "4.14.153": { |
| "CVE-2019-18282": { |
| "cmt_msg": "net/flow_dissector: switch to siphash", |
| "cmt_id": "a9de6f42e945cdb24b59c7ab7ebad1eba6cb5875" |
| }, |
| "CVE-2019-19049": { |
| "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", |
| "cmt_id": "9f4ca715dae36ff5b737d56165df1b7964a2cb3e" |
| } |
| }, |
| "4.14.154": { |
| "CVE-2019-19045": { |
| "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", |
| "cmt_id": "d905f0cea5e0f29b8aced5a38b1ce243051887de" |
| }, |
| "CVE-2019-19052": { |
| "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", |
| "cmt_id": "3f5e99731cd55f9be6468e9af7985a838ce7255b" |
| }, |
| "CVE-2018-12207": { |
| "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", |
| "cmt_id": "82e77746f07db70367f66ef272256037d6415353" |
| }, |
| "CVE-2019-0155": { |
| "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", |
| "cmt_id": "82e0caec38b8eb2ec4fa90b614ba02fc297faeb7" |
| }, |
| "CVE-2019-0154": { |
| "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", |
| "cmt_id": "d302d64a90b0b390ead3f70832aac2662e34323b" |
| }, |
| "CVE-2019-19922": { |
| "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", |
| "cmt_id": "3dec71e388f95382d83ebb5589f0016eac4a6d2b" |
| }, |
| "CVE-2019-19529": { |
| "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", |
| "cmt_id": "72e535208bc328e0617a8adb242bf8d89cdfd7d4" |
| }, |
| "CVE-2019-11135": { |
| "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", |
| "cmt_id": "74bccd0ec712fdff716cec80ba1553d41bc887b8" |
| }, |
| "CVE-2019-16231": { |
| "cmt_msg": "fjes: Handle workqueue allocation failure", |
| "cmt_id": "81370ee55d9250e0744e09493186cb0e071dbcb2" |
| }, |
| "CVE-2019-19534": { |
| "cmt_msg": "can: peak_usb: fix slab info leak", |
| "cmt_id": "89a23a5d03956b44eac1a778806449577d690c6c" |
| } |
| }, |
| "4.14.155": { |
| "CVE-2019-19524": { |
| "cmt_msg": "Input: ff-memless - kill timer in destroy()", |
| "cmt_id": "5edab14154213a4b6bcc527f60adb6124034a0be" |
| } |
| }, |
| "4.14.157": { |
| "CVE-2019-18660": { |
| "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", |
| "cmt_id": "bc06abfb2bc7e5856f997ebc57c361caa08cd961" |
| }, |
| "CVE-2019-15291": { |
| "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", |
| "cmt_id": "9a611c200ee2777bb3551ee1d979bf923b93653a" |
| }, |
| "CVE-2019-18683": { |
| "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", |
| "cmt_id": "4a2c9b037a08b8496f04a76987332ca6f19bd794" |
| } |
| }, |
| "4.14.158": { |
| "CVE-2019-12614": { |
| "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", |
| "cmt_id": "0583dc6fceb6b70cbd7e39802da41d8269fe82ac" |
| }, |
| "CVE-2019-19767": { |
| "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", |
| "cmt_id": "eb3257cba634f9a520467f6c8c56f4abfa347484" |
| } |
| }, |
| "4.14.159": { |
| "CVE-2019-19227": { |
| "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", |
| "cmt_id": "39de8cc3678f5cd1f4e0ae274c20acabbd85a8b1" |
| }, |
| "CVE-2019-19062": { |
| "cmt_msg": "crypto: user - fix memory leak in crypto_report", |
| "cmt_id": "41b3b8e0775465c33083ce1998df7f15c039c9bf" |
| }, |
| "CVE-2019-19332": { |
| "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", |
| "cmt_id": "f70609f898d63973388b36adf3650489311b13b9" |
| }, |
| "CVE-2019-19071": { |
| "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", |
| "cmt_id": "0d8b2921af273b9545e16ad21375fabcb647c56e" |
| }, |
| "CVE-2019-19447": { |
| "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", |
| "cmt_id": "d5a2955049171e48feba628e60f15206689bba94" |
| } |
| }, |
| "4.14.161": { |
| "CVE-2019-18786": { |
| "cmt_msg": "media: rcar_drif: fix a memory disclosure", |
| "cmt_id": "3feec89682118fad5139e745c3453a4cf8580ef0" |
| }, |
| "CVE-2019-19057": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", |
| "cmt_id": "1cdafe368ec4ad7e878eddc30ea0d11a0f57b222" |
| }, |
| "CVE-2019-19063": { |
| "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", |
| "cmt_id": "9c84ba30947a9d8ac2c67abaafc17087ead04426" |
| }, |
| "CVE-2020-0427": { |
| "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", |
| "cmt_id": "679c4f27b8958b65bb51d1c3dfdbf3befe4a33a3" |
| }, |
| "CVE-2019-20812": { |
| "cmt_msg": "af_packet: set defaule value for tmo", |
| "cmt_id": "665c9af8987880414e141e623bf7e6481d1c1696" |
| }, |
| "CVE-2019-16232": { |
| "cmt_msg": "libertas: fix a potential NULL pointer dereference", |
| "cmt_id": "b88d9f8b8ba5722ab4aef7d01c2a5a66b5414b83" |
| } |
| }, |
| "4.14.162": { |
| "CVE-2020-10690": { |
| "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", |
| "cmt_id": "2dece4d6d13fe179ee3a5991811712725a56e2f7" |
| } |
| }, |
| "4.14.163": { |
| "CVE-2019-18809": { |
| "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", |
| "cmt_id": "2d7c27957cac081eeacea7c38d8c9c59049883dc" |
| }, |
| "CVE-2019-19965": { |
| "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", |
| "cmt_id": "82df1d3fa11bc7b25789efa4232bf0c188c8bc72" |
| } |
| }, |
| "4.14.164": { |
| "CVE-2019-14901": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", |
| "cmt_id": "ec3bb975c6013aa2f5e8a96a0bee2c8d39618e89" |
| }, |
| "CVE-2020-0430": { |
| "cmt_msg": "bpf: reject passing modified ctx to helper functions", |
| "cmt_id": "7fed98f4a1e6eb77a5d66ecfdf9345e21df6ac82" |
| } |
| }, |
| "4.14.165": { |
| "CVE-2019-14895": { |
| "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", |
| "cmt_id": "c2544fb30080aecc3fff99f2e97999ce8e625f45" |
| }, |
| "CVE-2020-0305": { |
| "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", |
| "cmt_id": "c807f43500e14ed24599106745bb6005665f74d6" |
| }, |
| "CVE-2019-19066": { |
| "cmt_msg": "scsi: bfa: release allocated memory in case of error", |
| "cmt_id": "f4e8c78fad1294c785de5e92562862dbef1e9c1e" |
| }, |
| "CVE-2019-20636": { |
| "cmt_msg": "Input: add safety guards to input_set_keycode()", |
| "cmt_id": "af62c38b0f86539504dc5c0e5dcfc7613b1150a5" |
| }, |
| "CVE-2019-19068": { |
| "cmt_msg": "rtl8xxxu: prevent leaking urb", |
| "cmt_id": "32079b0c59f4620fdf7a5576af7502b0d05fcb01" |
| }, |
| "CVE-2020-0431": { |
| "cmt_msg": "HID: hid-input: clear unmapped usages", |
| "cmt_id": "cb0a3edf8d00740303e5b42e9c0e72d924fc23d2" |
| }, |
| "CVE-2019-14615": { |
| "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", |
| "cmt_id": "39465647eda707db7c7561006da3a8450ca634b9" |
| }, |
| "CVE-2019-19056": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", |
| "cmt_id": "6ddbe82681d911534f460e6afd297fcf7f388049" |
| }, |
| "CVE-2019-19078": { |
| "cmt_msg": "ath10k: fix memory leak", |
| "cmt_id": "4af2276845448609264360e95973246f222a7d86" |
| } |
| }, |
| "4.14.166": { |
| "CVE-2019-20096": { |
| "cmt_msg": "dccp: Fix memleak in __feat_register_sp", |
| "cmt_id": "d0c15c1e8f9223552818fe5340b0427483b34f22" |
| }, |
| "CVE-2019-15217": { |
| "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", |
| "cmt_id": "ffe76c896fbc91af8859aaea15b75b0b887960f3" |
| }, |
| "CVE-2019-19058": { |
| "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", |
| "cmt_id": "db1fb5a39747a680a4cc182c8bb4648b845a841f" |
| }, |
| "CVE-2018-21008": { |
| "cmt_msg": "rsi: add fix for crash during assertions", |
| "cmt_id": "ba8bbddaa188235df007411fdead5832f9e0cb59" |
| }, |
| "CVE-2019-2182": { |
| "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", |
| "cmt_id": "68a066f6ff13e7029d54da9d322ad686694c7039" |
| }, |
| "CVE-2019-15918": { |
| "cmt_msg": "cifs: Fix lease buffer length error", |
| "cmt_id": "1059b758b6fb0fb6949b8c0474d5db27ea269b01" |
| }, |
| "CVE-2019-5108": { |
| "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", |
| "cmt_id": "57e1b5f6b55acb655358bd62c7e2f14d8af90e0a" |
| } |
| }, |
| "4.14.167": { |
| "CVE-2020-12652": { |
| "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", |
| "cmt_id": "fedf64ea8f461ac51d9772998b277a30cbf8375e" |
| } |
| }, |
| "4.14.168": { |
| "CVE-2019-20806": { |
| "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", |
| "cmt_id": "f4c8d9e5ea524d7f53e54da2920a7d1250822ec5" |
| } |
| }, |
| "4.14.169": { |
| "CVE-2019-14896": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" |
| }, |
| "CVE-2019-14897": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" |
| }, |
| "CVE-2020-14416": { |
| "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", |
| "cmt_id": "c39c4e9116943faf30fb7fb9cc1e739c732b4443" |
| } |
| }, |
| "4.14.170": { |
| "CVE-2020-0432": { |
| "cmt_msg": "staging: most: net: fix buffer overflow", |
| "cmt_id": "6560fd66278fec045902010ff7b07878a13e501f" |
| }, |
| "CVE-2020-12769": { |
| "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", |
| "cmt_id": "b56f2a4a4327f609e30872e37eda6d73a6433ed2" |
| } |
| }, |
| "4.14.171": { |
| "CVE-2020-12653": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", |
| "cmt_id": "43e189049f32740c0d015f43a407658ac53d1743" |
| }, |
| "CVE-2020-12654": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", |
| "cmt_id": "49e9f1057ef968af57a62860697898cb35246936" |
| }, |
| "CVE-2020-0404": { |
| "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", |
| "cmt_id": "52f001bf9ba6d5fc628852dd6102a98f573e0b3b" |
| } |
| }, |
| "4.14.172": { |
| "CVE-2020-9383": { |
| "cmt_msg": "floppy: check FDC index for errors before assigning it", |
| "cmt_id": "e4c587650f64608fcd3506fa2cb47f81c0f88348" |
| }, |
| "CVE-2020-2732": { |
| "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", |
| "cmt_id": "ee1238c0285f40d8297e70f3aaa0d8a981ea0b53" |
| }, |
| "CVE-2019-16233": { |
| "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", |
| "cmt_id": "2011a54b6161cdeb42ec8d7843170977701f97b6" |
| }, |
| "CVE-2020-0009": { |
| "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", |
| "cmt_id": "60ba005bbf5751c2c58ca23ccfc9289ae06782b7" |
| } |
| }, |
| "4.14.173": { |
| "CVE-2020-8649": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" |
| }, |
| "CVE-2020-8648": { |
| "cmt_msg": "vt: selection, close sel_buffer race", |
| "cmt_id": "432ef54c0444e7cab85a291347bfc1f69ee6257a" |
| }, |
| "CVE-2020-8647": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" |
| }, |
| "CVE-2020-10942": { |
| "cmt_msg": "vhost: Check docket sk_family instead of call getname", |
| "cmt_id": "ff8e12b0cfe277a54edbab525f068b39c7ed0de3" |
| }, |
| "CVE-2020-27068": { |
| "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", |
| "cmt_id": "ffe09a48bd96094786c303f1cf29b32a29aa6dc8" |
| }, |
| "CVE-2020-0444": { |
| "cmt_msg": "audit: fix error handling in audit_data_to_entry()", |
| "cmt_id": "edde9fcd5f41b2e22e455250214de0c4b126b255" |
| }, |
| "CVE-2019-16234": { |
| "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", |
| "cmt_id": "864ef06aaef5b164669a5292eb822c454c46dd69" |
| } |
| }, |
| "4.14.174": { |
| "CVE-2020-29370": { |
| "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", |
| "cmt_id": "992a5c90af04da6e1e047f10c5ee5d6d8752a699" |
| } |
| }, |
| "4.14.175": { |
| "CVE-2020-14381": { |
| "cmt_msg": "futex: Fix inode life-time issue", |
| "cmt_id": "e52694b56eb6d4b1fe424bda6126b8ce13c246a8" |
| }, |
| "CVE-2020-11668": { |
| "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", |
| "cmt_id": "e251c592321cb82e5f31b06542b2f1f6e81cb2b8" |
| }, |
| "CVE-2021-3715": { |
| "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", |
| "cmt_id": "f0c92f59cf528bc1b872f2ca91b01e128a2af3e6" |
| }, |
| "CVE-2020-27066": { |
| "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", |
| "cmt_id": "dc0ea9b710102ef628a26663d892031a2c381549" |
| }, |
| "CVE-2020-11608": { |
| "cmt_msg": "media: ov519: add missing endpoint sanity checks", |
| "cmt_id": "ea7d13d02a76c76dd3a0ee7bda97bb4361473b62" |
| }, |
| "CVE-2020-11609": { |
| "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", |
| "cmt_id": "b4ac6fbe5b1a3cb83d84cb9f7ab8df71d104f535" |
| } |
| }, |
| "4.14.176": { |
| "CVE-2020-11494": { |
| "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", |
| "cmt_id": "d0a7c3373404bd931565f361802d320462fbe9f9" |
| }, |
| "CVE-2020-11565": { |
| "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", |
| "cmt_id": "c51609ac4c48d31a8881af669f1192d2ee405928" |
| }, |
| "CVE-2020-0433": { |
| "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", |
| "cmt_id": "574eb136ec7f315c3ef2ca68fa9b3e16c56baa24" |
| } |
| }, |
| "4.14.177": { |
| "CVE-2020-12826": { |
| "cmt_msg": "signal: Extend exec_id to 64bits", |
| "cmt_id": "28c63ef17d620f0e95458c56c5d839ea3de3e500" |
| }, |
| "CVE-2020-12657": { |
| "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", |
| "cmt_id": "f83b75ef20ac868046f90a7006b44bfea671a7c3" |
| }, |
| "CVE-2020-11669": { |
| "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", |
| "cmt_id": "66a93f57330d3e172bf2c3da29f0501634bfac7a" |
| } |
| }, |
| "4.14.178": { |
| "CVE-2019-19319": { |
| "cmt_msg": "ext4: protect journal inode's blocks using block_validity", |
| "cmt_id": "795762468125a6412c089651e74f780bee154118" |
| }, |
| "CVE-2020-12114": { |
| "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", |
| "cmt_id": "e21c8c03af20932c15d8b1d3bb9cbad9607a6eab" |
| }, |
| "CVE-2020-12464": { |
| "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", |
| "cmt_id": "b49aa64f1d2526de71ae0354d37026e5861ccb4b" |
| } |
| }, |
| "4.14.179": { |
| "CVE-2020-10751": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" |
| }, |
| "CVE-2020-0255": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" |
| } |
| }, |
| "4.14.181": { |
| "CVE-2019-9245": { |
| "cmt_msg": "f2fs: sanity check of xattr entry size", |
| "cmt_id": "ec236cd6a254da2192c35a65fa0011a0268d66b7" |
| }, |
| "CVE-2020-10711": { |
| "cmt_msg": "netlabel: cope with NULL catmap", |
| "cmt_id": "0f5ae0f5b2675e4e703b980221976a1c2d79dba9" |
| }, |
| "CVE-2020-13143": { |
| "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", |
| "cmt_id": "3d1e9fbbfb888ef59697766561e982524c0a6a03" |
| }, |
| "CVE-2020-1749": { |
| "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", |
| "cmt_id": "8ab8786f78c3fc930f9abf6d6d85e95567de4e1f" |
| }, |
| "CVE-2020-27786": { |
| "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", |
| "cmt_id": "8645ac3684a70e4e8a21c7c407c07a1a4316beec" |
| }, |
| "CVE-2019-9453": { |
| "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", |
| "cmt_id": "1d295b32df866ea09aa8cc94500ed6e96e2ea09e" |
| }, |
| "CVE-2020-0067": { |
| "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", |
| "cmt_id": "ae811cecbbb231f11a84acaf74baca1283b964c7" |
| }, |
| "CVE-2019-19768": { |
| "cmt_msg": "blktrace: Protect q->blk_trace with RCU", |
| "cmt_id": "7a35c8cbf2522e4f45d266dca95dacc71cf412ed" |
| }, |
| "CVE-2020-12770": { |
| "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", |
| "cmt_id": "3f743dd319951491d005ea51470e180f6df9125e" |
| } |
| }, |
| "4.14.182": { |
| "CVE-2021-0447": { |
| "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", |
| "cmt_id": "26f8819ddd10141ebe7bbce700fbab36bfa5f478" |
| } |
| }, |
| "4.14.183": { |
| "CVE-2020-10732": { |
| "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", |
| "cmt_id": "61ce1733b30fdcf45e31308bc7795b6dc7f2ffba" |
| } |
| }, |
| "4.14.184": { |
| "CVE-2020-13974": { |
| "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", |
| "cmt_id": "26079af52bf616bc492acc1fe41dce53fe199456" |
| }, |
| "CVE-2020-0543": { |
| "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", |
| "cmt_id": "9c98ba3f69b156c9fee72b71260d51f623a4a457" |
| }, |
| "CVE-2019-19462": { |
| "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", |
| "cmt_id": "7821131c16cb2d32a5014009b50d362317418556" |
| }, |
| "CVE-2020-10757": { |
| "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", |
| "cmt_id": "469ef673629d36d8ed5912b52f5d87ecc0309b3c" |
| } |
| }, |
| "4.14.185": { |
| "CVE-2019-20810": { |
| "cmt_msg": "media: go7007: fix a miss of snd_card_free", |
| "cmt_id": "033e86f47388583d460e1ea075fc4581d23c0fe1" |
| }, |
| "CVE-2018-20669": { |
| "cmt_msg": "make 'user_access_begin()' do 'access_ok()'", |
| "cmt_id": "b25df2918ba94ccc0ae44b4bb53f0f76a4bb0e96" |
| }, |
| "CVE-2020-29368": { |
| "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", |
| "cmt_id": "3b6c93db0a02b843694cf91f8bacd94f8e7259c8" |
| }, |
| "CVE-2020-10766": { |
| "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", |
| "cmt_id": "d808ea8d0b4deaf6be37a58d41550df48f117a3a" |
| }, |
| "CVE-2020-10767": { |
| "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", |
| "cmt_id": "b4eba1edf71e3ce882d79fd46d654770a7b277b0" |
| }, |
| "CVE-2020-10768": { |
| "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", |
| "cmt_id": "96f1500aedc9ee67ad9614917d7c6e97bc7dbaa1" |
| } |
| }, |
| "4.14.186": { |
| "CVE-2020-12771": { |
| "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", |
| "cmt_id": "80d90125a3e1c98aafb6b13e62bd680fe9a4cd5a" |
| }, |
| "CVE-2020-15436": { |
| "cmt_msg": "block: Fix use-after-free in blkdev_get()", |
| "cmt_id": "a43abf15844c9e5de016957b8e612f447b7fb077" |
| } |
| }, |
| "4.14.187": { |
| "CVE-2020-12655": { |
| "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", |
| "cmt_id": "115267e8d9fce8d5efe0949f1d2e5cee30441cf7" |
| } |
| }, |
| "4.14.188": { |
| "CVE-2020-24394": { |
| "cmt_msg": "nfsd: apply umask on fs without ACL support", |
| "cmt_id": "15fefb108c7af7ec8e19a88caed928d8b88120ff" |
| }, |
| "CVE-2020-15393": { |
| "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", |
| "cmt_id": "4336374bc2220bf3c439b70c31d9e8f6f9583ea8" |
| } |
| }, |
| "4.14.189": { |
| "CVE-2020-14356": { |
| "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", |
| "cmt_id": "82fd2138a5ffd7e0d4320cdb669e115ee976a26e" |
| }, |
| "CVE-2020-10781": { |
| "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", |
| "cmt_id": "5cd9ec70b9f6431fc3e60075c01bc00f08c5606b" |
| } |
| }, |
| "4.14.190": { |
| "CVE-2020-15437": { |
| "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", |
| "cmt_id": "c5760ab7aae09899412646e0cf842e23bea5b7a2" |
| } |
| }, |
| "4.14.191": { |
| "CVE-2018-10323": { |
| "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", |
| "cmt_id": "8a443ffcf7b572c071398644d35cf9cc55cfa2cb" |
| } |
| }, |
| "4.14.192": { |
| "CVE-2019-19061": { |
| "cmt_msg": "iio: imu: adis16400: fix memory leak", |
| "cmt_id": "8d75cc141d702ebc280dde2b32b50cfdea3a02b3" |
| }, |
| "CVE-2019-9445": { |
| "cmt_msg": "f2fs: check if file namelen exceeds max value", |
| "cmt_id": "6a27f426266ac0d29faa95bed8934afeef1f9d13" |
| }, |
| "CVE-2019-19054": { |
| "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", |
| "cmt_id": "12273ec840cc67b2ec469ee5f5214559357436bb" |
| }, |
| "CVE-2018-8043": { |
| "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", |
| "cmt_id": "9e06953ee2a406c4bf4ff08c700d3ce1254974d1" |
| }, |
| "CVE-2019-18808": { |
| "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", |
| "cmt_id": "a42f149865da48f25e5a49ca344dbcad61b66ae1" |
| }, |
| "CVE-2019-19074": { |
| "cmt_msg": "ath9k: release allocated buffer if timed out", |
| "cmt_id": "83c212df7794563a2f45a3be8fbc097e352b2c3a" |
| }, |
| "CVE-2019-19073": { |
| "cmt_msg": "ath9k_htc: release allocated buffer if timed out", |
| "cmt_id": "5502de13f91db625b063cb9d0793c7391f38452d" |
| }, |
| "CVE-2017-18232": { |
| "cmt_msg": "scsi: libsas: direct call probe and destruct", |
| "cmt_id": "3a156abd24346a3188eb7e88cf86386a409e0d02" |
| }, |
| "CVE-2019-3016": { |
| "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", |
| "cmt_id": "fd4a641bb5731c0ce5397698560a823602dbaac2" |
| } |
| }, |
| "4.14.193": { |
| "CVE-2020-16166": { |
| "cmt_msg": "random32: update the net random state on interrupt and activity", |
| "cmt_id": "583bcbc024f6bf8daa266f4f71b99e9d6e78c40b" |
| } |
| }, |
| "4.14.194": { |
| "CVE-2020-26088": { |
| "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", |
| "cmt_id": "980415fffec6952602edac586eb8c3a7d3f50b43" |
| }, |
| "CVE-2020-36386": { |
| "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", |
| "cmt_id": "d91299b8382b129156708708d69876e753b9ade6" |
| }, |
| "CVE-2019-19448": { |
| "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", |
| "cmt_id": "10742034076daea73acc17779e8f234060e03489" |
| }, |
| "CVE-2020-25212": { |
| "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", |
| "cmt_id": "e4ddf4e58946c7dfe8568a21ee3d27b03d96bc56" |
| }, |
| "CVE-2020-14331": { |
| "cmt_msg": "vgacon: Fix for missing check in scrollback handling", |
| "cmt_id": "041a5a238a1e31992b5f22ef4f9792729d3b46ca" |
| } |
| }, |
| "4.14.195": { |
| "CVE-2020-14314": { |
| "cmt_msg": "ext4: fix potential negative array index in do_split()", |
| "cmt_id": "fbbfd55a40d5d0806b59ee0403c75d5ac517533f" |
| }, |
| "CVE-2020-29371": { |
| "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", |
| "cmt_id": "89346bc395e7bc0a7d3c36c824782050b17d4fec" |
| }, |
| "CVE-2020-0466": { |
| "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", |
| "cmt_id": "6875d79ba740f47a480908cf9fa791715ea0e4f1" |
| } |
| }, |
| "4.14.197": { |
| "CVE-2020-25285": { |
| "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", |
| "cmt_id": "c4b219136040bc57e9704afee8f5c5a9430795a5" |
| }, |
| "CVE-2020-0465": { |
| "cmt_msg": "HID: core: Sanitize event code and type when mapping input", |
| "cmt_id": "a083dcdcfa2568747112edf865b3e848d70835e5" |
| }, |
| "CVE-2020-25641": { |
| "cmt_msg": "block: allow for_each_bvec to support zero len bvec", |
| "cmt_id": "b7aae706e84ac271f755a574d6a18fc9b42e8e8f" |
| }, |
| "CVE-2021-1048": { |
| "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", |
| "cmt_id": "c5c6e00f6cc5d3ed0d6464b14e33f2f5c8505888" |
| } |
| }, |
| "4.14.198": { |
| "CVE-2020-12888": { |
| "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", |
| "cmt_id": "1356c3e8539ac48b9362e60b1fa80ec06bb960ec" |
| } |
| }, |
| "4.14.199": { |
| "CVE-2020-25284": { |
| "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", |
| "cmt_id": "af4a88994936474294b2f484be01117dc7550e68" |
| }, |
| "CVE-2020-14390": { |
| "cmt_msg": "fbcon: remove soft scrollback code", |
| "cmt_id": "6e2e0735dadecc1c1657e458e8f88e0ca6a4ec04" |
| }, |
| "CVE-2020-28097": { |
| "cmt_msg": "vgacon: remove software scrollback support", |
| "cmt_id": "34c050b531a72639e61a3be24b608604753f885a" |
| } |
| }, |
| "4.14.200": { |
| "CVE-2020-25645": { |
| "cmt_msg": "geneve: add transport ports in route lookup for geneve", |
| "cmt_id": "494648fc5286830b149bc1c1a059a827a45df3c8" |
| }, |
| "CVE-2021-0605": { |
| "cmt_msg": "af_key: pfkey_dump needs parameter validation", |
| "cmt_id": "05570d97443f8e569a79cf6e140f5ed96e6ac172" |
| }, |
| "CVE-2020-25643": { |
| "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", |
| "cmt_id": "8f0addb36dd1c61fe0f1a458a48b1a5ddc96aa24" |
| }, |
| "CVE-2020-36312": { |
| "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", |
| "cmt_id": "40a023f681befd9b2862a3c16fb306a38b359ae5" |
| } |
| }, |
| "4.14.201": { |
| "CVE-2020-14386": { |
| "cmt_msg": "net/packet: fix overflow in tpacket_rcv", |
| "cmt_id": "5b08356f184a0314d87f9a889be2ed9fef087691" |
| }, |
| "CVE-2020-25211": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" |
| }, |
| "CVE-2021-0448": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" |
| }, |
| "CVE-2021-39634": { |
| "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", |
| "cmt_id": "23fb662b13e4f75688123e1d16aa7116f602db32" |
| }, |
| "CVE-2020-28915": { |
| "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", |
| "cmt_id": "30386c13a1bfb0d1ce59ea83b825aa73bd516bc5" |
| } |
| }, |
| "4.14.202": { |
| "CVE-2020-10135": { |
| "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", |
| "cmt_id": "7c9748f455b9206b279a4710210c902cb1f275e2" |
| }, |
| "CVE-2020-12352": { |
| "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", |
| "cmt_id": "d53b1e94d08c032754a9aabeb3df309209c00347" |
| }, |
| "CVE-2020-12351": { |
| "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", |
| "cmt_id": "2acf87436517894275a804210caa33b9a08cf93c" |
| } |
| }, |
| "4.14.203": { |
| "CVE-2020-0423": { |
| "cmt_msg": "binder: fix UAF when releasing todo list", |
| "cmt_id": "d4c49b6733c3125c3cc71617399d22f5b8ff962f" |
| }, |
| "CVE-2020-25705": { |
| "cmt_msg": "icmp: randomize the global rate limiter", |
| "cmt_id": "e1b8b57623521b7f4974476a20bd6ff971fde6c4" |
| } |
| }, |
| "4.14.204": { |
| "CVE-2020-27777": { |
| "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", |
| "cmt_id": "818783bf8da5c20eb75a6bcf749eb97003ea9983" |
| }, |
| "CVE-2020-25668": { |
| "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", |
| "cmt_id": "0182d680ead968cea5673ed5dcac0e4505a75f29" |
| }, |
| "CVE-2020-25656": { |
| "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", |
| "cmt_id": "7f4c966f2ad5f580fd5b1e2dcb19ba1c06a9254f" |
| } |
| }, |
| "4.14.205": { |
| "CVE-2019-0148": { |
| "cmt_msg": "i40e: Wrong truncation from u16 to u8", |
| "cmt_id": "9900bf4d433be6a2ed8c158779137c7a4742ab67" |
| }, |
| "CVE-2020-35508": { |
| "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", |
| "cmt_id": "ee55b8c6bf4d59c7b82079b8a7d67597bb3a5539" |
| }, |
| "CVE-2020-28974": { |
| "cmt_msg": "vt: Disable KD_FONT_OP_COPY", |
| "cmt_id": "9421bad22e9fb7f513d81ef8fec513c8a4850c0d" |
| }, |
| "CVE-2019-0147": { |
| "cmt_msg": "i40e: add num_vectors checker in iwarp handler", |
| "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" |
| }, |
| "CVE-2019-19770": { |
| "cmt_msg": "blktrace: fix debugfs use after free", |
| "cmt_id": "8268f88785ca9476c68da06d1f93c3d0d9747d28" |
| }, |
| "CVE-2019-0145": { |
| "cmt_msg": "i40e: add num_vectors checker in iwarp handler", |
| "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" |
| } |
| }, |
| "4.14.206": { |
| "CVE-2020-8694": { |
| "cmt_msg": "powercap: restrict energy meter to root access", |
| "cmt_id": "bab6310b64994ee6ca679d86c90ca24111783516" |
| } |
| }, |
| "4.14.207": { |
| "CVE-2020-14351": { |
| "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", |
| "cmt_id": "30c8324e9e7ee57b58af2501cb7db5d9d4f7b69b" |
| }, |
| "CVE-2020-27673": { |
| "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", |
| "cmt_id": "025ea15db5665fa14d1c48e39aa788acaf30471b" |
| }, |
| "CVE-2020-27675": { |
| "cmt_msg": "xen/events: avoid removing an event channel while handling it", |
| "cmt_id": "b559da71974b5eb93311f7f475b2e4b16c0f9bb3" |
| }, |
| "CVE-2020-25704": { |
| "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", |
| "cmt_id": "65c4000ccf7cc58a455977c5ec928525954058ac" |
| } |
| }, |
| "4.14.208": { |
| "CVE-2020-4788": { |
| "cmt_msg": "powerpc/64s: flush L1D on kernel entry", |
| "cmt_id": "db01cad9efe3c3838a6b3a3f68affd295c4b92d6" |
| }, |
| "CVE-2020-25669": { |
| "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", |
| "cmt_id": "436aff975718106d8e168fde69a3786962ca356e" |
| } |
| }, |
| "4.14.209": { |
| "CVE-2020-28941": { |
| "cmt_msg": "speakup: Do not let the line discipline be used several times", |
| "cmt_id": "e712cefb3699ea978611edb3c2a5d3acd57d4004" |
| } |
| }, |
| "4.14.210": { |
| "CVE-2019-19813": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" |
| }, |
| "CVE-2019-19816": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" |
| } |
| }, |
| "4.14.211": { |
| "CVE-2020-35519": { |
| "cmt_msg": "net/x25: prevent a couple of overflows", |
| "cmt_id": "f1fbbcb61d840792ae38bc4007160fc80c14ee90" |
| } |
| }, |
| "4.14.212": { |
| "CVE-2020-29661": { |
| "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", |
| "cmt_id": "882e038d2cd276163a8fc7bbeffda59ae0924471" |
| }, |
| "CVE-2020-29660": { |
| "cmt_msg": "tty: Fix ->session locking", |
| "cmt_id": "8deb3d9018400fab0a7401a910d3341053f5ec82" |
| }, |
| "CVE-2020-27830": { |
| "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", |
| "cmt_id": "bccd77063e971a006164968873f4c2918b7188e6" |
| } |
| }, |
| "4.14.213": { |
| "CVE-2020-27815": { |
| "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", |
| "cmt_id": "4a0809752ef23cd4be99b0cd8f7586c8ed7bd433" |
| }, |
| "CVE-2020-29568": { |
| "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", |
| "cmt_id": "92d4ced9881361aefa2f7bc58dab19aa4d28ddf8" |
| }, |
| "CVE-2020-29569": { |
| "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", |
| "cmt_id": "62afce1adda51bd9d033dbec1dfe413891021bae" |
| } |
| }, |
| "4.14.214": { |
| "CVE-2020-36158": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", |
| "cmt_id": "d367530330f7f638eecdfc724ae276546f1b1e68" |
| } |
| }, |
| "4.14.215": { |
| "CVE-2020-28374": { |
| "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", |
| "cmt_id": "c842ead67ae3cac58e84e7880153e68cccd59773" |
| }, |
| "CVE-2021-39648": { |
| "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", |
| "cmt_id": "6766064c794afeacc29b21fc09ea4dbe3cae1af3" |
| } |
| }, |
| "4.14.217": { |
| "CVE-2021-3178": { |
| "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", |
| "cmt_id": "0f60f9d1e6182d9440614c13cdf6106e2d470f89" |
| } |
| }, |
| "4.14.218": { |
| "CVE-2020-27825": { |
| "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", |
| "cmt_id": "fdb2310d58812b15f6b460509b43ff0b87e59367" |
| }, |
| "CVE-2021-39657": { |
| "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", |
| "cmt_id": "30f2a89f9481f851bc68e51a1e7114392b052231" |
| } |
| }, |
| "4.14.219": { |
| "CVE-2021-3348": { |
| "cmt_msg": "nbd: freeze the queue while we're adding connections", |
| "cmt_id": "51359110d9d9b0231dc6a60716895104c73e7770" |
| } |
| }, |
| "4.14.222": { |
| "CVE-2021-26931": { |
| "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", |
| "cmt_id": "fd8ec8c708953323feb7c6177d894d39a23b08e4" |
| }, |
| "CVE-2021-26930": { |
| "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", |
| "cmt_id": "5571633988e02a1107720544a57ab4878c4446be" |
| }, |
| "CVE-2021-21781": { |
| "cmt_msg": "ARM: ensure the signal page contains defined contents", |
| "cmt_id": "b71cc506778eb283b752400e234784ee86b5891c" |
| }, |
| "CVE-2021-26932": { |
| "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", |
| "cmt_id": "da2e2a5c88abfe0974b4b8575c798fcafb552fc9" |
| } |
| }, |
| "4.14.223": { |
| "CVE-2021-0512": { |
| "cmt_msg": "HID: make arrays usage and value to be the same", |
| "cmt_id": "00022873fdc1a304fd89016d227e3781f413dfbd" |
| }, |
| "CVE-2021-3612": { |
| "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", |
| "cmt_id": "d4b7440883871cbcaf6c1cd95a76048a86b005c7" |
| } |
| }, |
| "4.14.224": { |
| "CVE-2021-30002": { |
| "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", |
| "cmt_id": "d4daa80676bfa53359ae31e601105cbdefaf2554" |
| }, |
| "CVE-2021-27365": { |
| "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", |
| "cmt_id": "1a588b51ff984aadc027078125064807c5c7bc3f" |
| }, |
| "CVE-2021-27364": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" |
| }, |
| "CVE-2021-27363": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" |
| }, |
| "CVE-2021-28038": { |
| "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", |
| "cmt_id": "893a88ea0ee11a1f5e2279cad3c0ed7736187288" |
| } |
| }, |
| "4.14.226": { |
| "CVE-2019-19060": { |
| "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", |
| "cmt_id": "593b7ff46bc064f2acac9ed6b7baa3189d2bcd90" |
| }, |
| "CVE-2021-33033": { |
| "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", |
| "cmt_id": "ab44f7317c16ddcf9ee12ba2aca60771266c2dc6" |
| }, |
| "CVE-2021-29265": { |
| "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", |
| "cmt_id": "04f879ba79b056041972122c1dc597b79d2464e5" |
| }, |
| "CVE-2021-28660": { |
| "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", |
| "cmt_id": "33cdc63f0e07abf637ba326b6016731be958088d" |
| } |
| }, |
| "4.14.227": { |
| "CVE-2021-28964": { |
| "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", |
| "cmt_id": "0fbf41006d8c850963049c35563e7775fe7c2164" |
| }, |
| "CVE-2021-28972": { |
| "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", |
| "cmt_id": "6d7724c9c507d5b526991dcdef861c6b28c45eb2" |
| }, |
| "CVE-2021-28971": { |
| "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", |
| "cmt_id": "403fdabcc1bcd0d31f9fcb9b9b2e831214ab2192" |
| } |
| }, |
| "4.14.228": { |
| "CVE-2021-28688": { |
| "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", |
| "cmt_id": "db108b67d81397cdbaf3f91aeca6e5eb5f71de1d" |
| }, |
| "CVE-2021-29647": { |
| "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", |
| "cmt_id": "749d2e33bfbacb3112cbfaafde75e507cb46c67d" |
| }, |
| "CVE-2021-31916": { |
| "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", |
| "cmt_id": "ba73e621ced58ff4ad1020a140ccb5843da1cb26" |
| } |
| }, |
| "4.14.229": { |
| "CVE-2021-0941": { |
| "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", |
| "cmt_id": "64cf6c3156a5cbd9c29f54370b801b336d2f7894" |
| }, |
| "CVE-2021-3483": { |
| "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", |
| "cmt_id": "8aa6e548a5ee59c91e9e5d67fd6de5cbaa5c458a" |
| } |
| }, |
| "4.14.230": { |
| "CVE-2021-29154": { |
| "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", |
| "cmt_id": "32f9a870ab6b1f72f100e9db55b8a022072f78a6" |
| } |
| }, |
| "4.14.231": { |
| "CVE-2021-3659": { |
| "cmt_msg": "net: mac802154: Fix general protection fault", |
| "cmt_id": "d103fd20f0539e2bd615ed6f6159537cb7e2c5ba" |
| }, |
| "CVE-2021-0937": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" |
| }, |
| "CVE-2020-25672": { |
| "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", |
| "cmt_id": "02b99cae71335f9f38d0a164ffe3a7a1328f44fc" |
| }, |
| "CVE-2020-25673": { |
| "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", |
| "cmt_id": "892e1f065c1b3c99a12a1a41683f9ddbc22abb3e" |
| }, |
| "CVE-2020-25670": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", |
| "cmt_id": "538a6ff11516d38a61e237d2d2dc04c30c845fbe" |
| }, |
| "CVE-2020-25671": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", |
| "cmt_id": "b1d5c07a3b597766bbf5bf61083cd65e72034144" |
| }, |
| "CVE-2021-22555": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" |
| } |
| }, |
| "4.14.232": { |
| "CVE-2020-29374": { |
| "cmt_msg": "gup: document and work around \"COW can break either way\" issue", |
| "cmt_id": "407faed92b4a4e2ad900d61ea3831dd597640f29" |
| }, |
| "CVE-2021-23133": { |
| "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", |
| "cmt_id": "54b63c76b9bb95fba20cd268086ee448f87208c6" |
| } |
| }, |
| "4.14.233": { |
| "CVE-2021-4157": { |
| "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", |
| "cmt_id": "40286f0852d2ecfa713438199557c706dc6a8db3" |
| }, |
| "CVE-2021-33034": { |
| "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", |
| "cmt_id": "21f6aee6682a1f7415e23f96ce94ff387d9cdb2e" |
| }, |
| "CVE-2021-32399": { |
| "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", |
| "cmt_id": "40acc1aa3e2a705a3c2ed171ed563ef04f7ba19e" |
| } |
| }, |
| "4.14.234": { |
| "CVE-2020-26558": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" |
| }, |
| "CVE-2021-0129": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" |
| } |
| }, |
| "4.14.235": { |
| "CVE-2021-33098": { |
| "cmt_msg": "ixgbe: fix large MTU request from VF", |
| "cmt_id": "5217f9cab7dd28e9c7626cd795e51da98ecb2af4" |
| }, |
| "CVE-2020-24587": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" |
| }, |
| "CVE-2020-24586": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" |
| }, |
| "CVE-2021-34981": { |
| "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", |
| "cmt_id": "6f6ac2a7959b1864886d07fcf3b9cec587dfe635" |
| }, |
| "CVE-2020-24588": { |
| "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", |
| "cmt_id": "a3558e1b75fefb2299659ee0070ee917927d9220" |
| }, |
| "CVE-2020-26139": { |
| "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", |
| "cmt_id": "557bb37533a365f9d8a0093ecce29417da4b9228" |
| }, |
| "CVE-2020-26147": { |
| "cmt_msg": "mac80211: assure all fragments are encrypted", |
| "cmt_id": "c39f180c7bd8379de238a4fd4a2f7515e03802f8" |
| }, |
| "CVE-2021-29650": { |
| "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", |
| "cmt_id": "f1fd7a174018f1107881150c6c2ce00e49a1e643" |
| } |
| }, |
| "4.14.236": { |
| "CVE-2021-3564": { |
| "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", |
| "cmt_id": "fa7d2874963312030d9618541b9bc2e549e19ac1" |
| }, |
| "CVE-2021-38208": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" |
| }, |
| "CVE-2021-3573": { |
| "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", |
| "cmt_id": "88481ea480756644b5221648216bb67866e51391" |
| }, |
| "CVE-2021-3587": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" |
| } |
| }, |
| "4.14.238": { |
| "CVE-2021-34693": { |
| "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", |
| "cmt_id": "4fa028860bb1656f370851c2c26de15fc67da300" |
| }, |
| "CVE-2021-45486": { |
| "cmt_msg": "inet: use bigger hash table for IP ID generation", |
| "cmt_id": "3ba51ed2c3ac36aa947d0b250d318de6ed7cf552" |
| } |
| }, |
| "4.14.240": { |
| "CVE-2021-45485": { |
| "cmt_msg": "ipv6: use prandom_u32() for ID generation", |
| "cmt_id": "4b55d7b3106a410cdab4ea60f5e55ca0668c6a09" |
| }, |
| "CVE-2021-3655": { |
| "cmt_msg": "sctp: validate from_addr_param return", |
| "cmt_id": "f01bfaea62d14938ff2fbeaf67f0afec2ec64ab9" |
| }, |
| "CVE-2021-3609": { |
| "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", |
| "cmt_id": "630f13442f1472abe5013ef98f76a3bbca64dd80" |
| }, |
| "CVE-2022-0850": { |
| "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", |
| "cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4" |
| }, |
| "CVE-2021-33909": { |
| "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", |
| "cmt_id": "3c07d1335d17ae0411101024de438dbc3734e992" |
| }, |
| "CVE-2021-38160": { |
| "cmt_msg": "virtio_console: Assure used length from device is limited", |
| "cmt_id": "56cf748562d3cbfd33d1ba2eb4a7603a5e20da88" |
| } |
| }, |
| "4.14.241": { |
| "CVE-2021-38204": { |
| "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", |
| "cmt_id": "edddc79c4391f8001095320d3ca423214b9aa4bf" |
| }, |
| "CVE-2021-3679": { |
| "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", |
| "cmt_id": "76598512d5d7fc407c319ca4448cf5348b65058a" |
| }, |
| "CVE-2021-37576": { |
| "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", |
| "cmt_id": "b67a821813c7b8160b54d83928281fec84a42d88" |
| } |
| }, |
| "4.14.242": { |
| "CVE-2021-0920": { |
| "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", |
| "cmt_id": "af3e2b87b36100c28feb71da52c57293c4540690" |
| } |
| }, |
| "4.14.243": { |
| "CVE-2021-22543": { |
| "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", |
| "cmt_id": "46d75ff2c1beebe90e7af8887256d8f0323679e4" |
| } |
| }, |
| "4.14.244": { |
| "CVE-2021-38205": { |
| "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", |
| "cmt_id": "1994eacac7af52da86e4b0cb6ae61621bef7393f" |
| }, |
| "CVE-2021-3732": { |
| "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", |
| "cmt_id": "517b875dfbf58f0c6c9e32dc90f5cf42d71a42ce" |
| } |
| }, |
| "4.14.245": { |
| "CVE-2021-42008": { |
| "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", |
| "cmt_id": "5e0e782874ad03ae6d47d3e55aff378da0b51104" |
| }, |
| "CVE-2021-3653": { |
| "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", |
| "cmt_id": "26af47bdc45e454877f15fa7658a167bb9799681" |
| }, |
| "CVE-2021-3656": { |
| "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", |
| "cmt_id": "6ed198381ed2496fbc82214108e56a441d3b0213" |
| }, |
| "CVE-2020-3702": { |
| "cmt_msg": "ath: Use safer key clearing with key cache entries", |
| "cmt_id": "2cbb22fd4b4fb4d0822d185bf5bd6d027107bfda" |
| } |
| }, |
| "4.14.246": { |
| "CVE-2021-38198": { |
| "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", |
| "cmt_id": "cea9e8ee3b8059bd2b36d68f1f428d165e5d13ce" |
| }, |
| "CVE-2021-39633": { |
| "cmt_msg": "ip_gre: add validation for csum_start", |
| "cmt_id": "99279223a37b46dc7716ec4e0ed4b3e03f1cfa4c" |
| }, |
| "CVE-2021-3753": { |
| "cmt_msg": "vt_kdsetmode: extend console locking", |
| "cmt_id": "3f488313d96fc6512a4a0fe3ed56cce92cbeec94" |
| } |
| }, |
| "4.14.247": { |
| "CVE-2021-42252": { |
| "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", |
| "cmt_id": "b1b55e4073d3da6119ecc41636a2994b67a2be37" |
| }, |
| "CVE-2021-40490": { |
| "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", |
| "cmt_id": "9569234645f102025aaf0fc83d3dcbf1b8cbf2dc" |
| } |
| }, |
| "4.14.248": { |
| "CVE-2021-20320": { |
| "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", |
| "cmt_id": "daf48f68fca9040b542282a5cd17397af316dd89" |
| } |
| }, |
| "4.14.249": { |
| "CVE-2021-3764": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" |
| }, |
| "CVE-2021-4203": { |
| "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", |
| "cmt_id": "9d76f723256d68eea16f0c563fc80b3c14258634" |
| }, |
| "CVE-2021-3744": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" |
| }, |
| "CVE-2021-37159": { |
| "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", |
| "cmt_id": "4c0db9c4b3701c29f47bac0721e2f7d2b15d8edb" |
| } |
| }, |
| "4.14.250": { |
| "CVE-2021-20317": { |
| "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", |
| "cmt_id": "0135fcb86a0bc9e4484f7e1228cadcc343c5edef" |
| } |
| }, |
| "4.14.251": { |
| "CVE-2021-20321": { |
| "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", |
| "cmt_id": "1caaa820915d802328bc72e4de0d5b1629eab5da" |
| }, |
| "CVE-2021-41864": { |
| "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", |
| "cmt_id": "f34bcd10c4832d491049905d25ea3f46a410c426" |
| }, |
| "CVE-2021-38300": { |
| "cmt_msg": "bpf, mips: Validate conditional branch offsets", |
| "cmt_id": "3401bca8827ba4918b3d582bd2c27708d4b133fe" |
| } |
| }, |
| "4.14.252": { |
| "CVE-2021-3894": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" |
| }, |
| "CVE-2022-0322": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" |
| } |
| }, |
| "4.14.253": { |
| "CVE-2021-3896": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" |
| }, |
| "CVE-2022-0644": { |
| "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", |
| "cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d" |
| }, |
| "CVE-2021-3760": { |
| "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", |
| "cmt_id": "a2efe3df65359add2164740a5777c26e64dd594b" |
| }, |
| "CVE-2021-43389": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" |
| } |
| }, |
| "4.14.254": { |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "82ad781d98040b4a5eea4eeb9a5acdd200a420c6" |
| } |
| }, |
| "4.14.255": { |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", |
| "cmt_id": "8d6c05da808f8351db844b69a9d6ce7f295214bb" |
| } |
| }, |
| "4.14.256": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "6e2944d8bbc58682691438b57620491b5a4b7cfb" |
| }, |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "cd76d797a690969186c0c100e8a301c4480e4e7f" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "1d0606dc3e27e6c281a2684cb8bdf47134051114" |
| }, |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "8989da231b3b989e48d885d61345fe290114b648" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "3eb50acbc96c9de3d8a056982938ece9bd1c2b91" |
| } |
| }, |
| "4.14.257": { |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "7bf1f5cb5150b1a53f6ccaadc0bc77f8f33206c8" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "98548c3a9882a1ea993a103be7c1b499f3b88202" |
| } |
| }, |
| "4.14.258": { |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "a36e1978c6cb6282fadd5d62d4b3e7808cf0597b" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "e7c8afee149134b438df153b09af7fd928a8bc24" |
| } |
| }, |
| "4.14.259": { |
| "CVE-2021-39711": { |
| "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb", |
| "cmt_id": "20fdf274472998123a8d173ba4cb6282ff6b63bd" |
| }, |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "9bebb2eedf679b3be4acaa20efda97f32c999d74" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection", |
| "cmt_id": "eae85b8c6e17d3e3888d9159205390e8dbcff6a8" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "68b78f976ca47d52c03c41eded207a312e46b934" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "4bf81386e3d6e5083c93d51eff70260bcec091bb" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "5ac3b68b79c9e964dd6f3cf80ff825518e502b79" |
| } |
| }, |
| "4.14.260": { |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", |
| "cmt_id": "88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5" |
| }, |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9" |
| } |
| }, |
| "4.14.261": { |
| "CVE-2021-44733": { |
| "cmt_msg": "tee: handle lookup of shm with reference count 0", |
| "cmt_id": "3d556a28bbfe34a80b014db49908b0f1bcb1ae80" |
| } |
| }, |
| "4.14.262": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "a025db5658d5c10019ffed0d59026da8172897b6" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "2af625c89bf4a41c8a0bc818d8cf30a291f216ca" |
| } |
| }, |
| "4.14.263": { |
| "CVE-2021-29264": { |
| "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", |
| "cmt_id": "93e83b226a16bcc800013c6e02c98eef7ba9868c" |
| }, |
| "CVE-2020-36322": { |
| "cmt_msg": "fuse: fix bad inode", |
| "cmt_id": "2cd45139c0f28ebfa7604866faee00c99231a62b" |
| }, |
| "CVE-2021-20292": { |
| "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", |
| "cmt_id": "4a2cec066dc8d099d30c649ae7ed26771029e0b5" |
| }, |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "8c9261b84c9b90d130d97fc7d13727706253af87" |
| }, |
| "CVE-2021-38199": { |
| "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", |
| "cmt_id": "d5e6dff8c92943a2719fa5415cc3d333e57d5d90" |
| } |
| }, |
| "4.14.264": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0" |
| }, |
| "CVE-2022-22942": { |
| "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516" |
| } |
| }, |
| "4.14.265": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8" |
| }, |
| "CVE-2018-25020": { |
| "cmt_msg": "bpf: fix truncated jump targets on heavy expansions", |
| "cmt_id": "6824208b59a4727b8a8653f83d8e685584d04606" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76" |
| } |
| }, |
| "4.14.266": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045" |
| }, |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e" |
| } |
| }, |
| "4.14.267": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731" |
| } |
| }, |
| "4.14.269": { |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26" |
| } |
| }, |
| "4.14.270": { |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2" |
| } |
| }, |
| "4.14.271": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()", |
| "cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296" |
| } |
| }, |
| "4.14.272": { |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5" |
| }, |
| "CVE-2021-4149": { |
| "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", |
| "cmt_id": "e0956dd95ddd6b02b7eb084d127b926a509ae8e7" |
| } |
| }, |
| "4.14.274": { |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9" |
| }, |
| "CVE-2022-27666": { |
| "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", |
| "cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d" |
| } |
| }, |
| "4.14.276": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", |
| "cmt_id": "a70bcf9ed08f3628a9324f054b0e041697b26853" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "858642789ada1b48630f322e59416ca9fca3e6b7" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", |
| "cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e" |
| } |
| }, |
| "4.14.277": { |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", |
| "cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", |
| "cmt_id": "331210983ba5ce82bf63b827bca0e1c833f293db" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614" |
| } |
| }, |
| "outstanding": { |
| "CVE-2021-0929": { |
| "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" |
| }, |
| "CVE-2018-20854": { |
| "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1419": { |
| "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" |
| }, |
| "CVE-2017-5753": { |
| "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2019-19377": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" |
| }, |
| "CVE-2019-2181": { |
| "cmt_msg": "binder: check for overflow when alloc for security context" |
| }, |
| "CVE-2021-3759": { |
| "cmt_msg": "memcg: enable accounting of ipc resources" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19449": { |
| "cmt_msg": "f2fs: fix to do sanity check on segment/section count" |
| }, |
| "CVE-2020-26541": { |
| "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" |
| }, |
| "CVE-2021-35477": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" |
| }, |
| "CVE-2019-15222": { |
| "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" |
| }, |
| "CVE-2019-15223": { |
| "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19815": { |
| "cmt_msg": "f2fs: support swap file w/ DIO" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe" |
| }, |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." |
| }, |
| "CVE-2019-19241": { |
| "cmt_msg": "io_uring: async workers should inherit the user creds" |
| }, |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" |
| }, |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" |
| }, |
| "CVE-2017-1000405": { |
| "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12379": { |
| "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" |
| }, |
| "CVE-2019-12378": { |
| "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2021-39713": { |
| "cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock" |
| }, |
| "CVE-2019-20908": { |
| "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" |
| }, |
| "CVE-2018-7754": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2018-20855": { |
| "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4037": { |
| "cmt_msg": "xfs: fix up non-directory creation in SGID directories" |
| }, |
| "CVE-2019-9444": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2021-3506": { |
| "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" |
| }, |
| "CVE-2019-19067": { |
| "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" |
| }, |
| "CVE-2019-3874": { |
| "cmt_msg": "sctp: implement memory accounting on tx path" |
| }, |
| "CVE-2020-26145": { |
| "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2017-9986": { |
| "cmt_msg": "sound: Retire OSS" |
| }, |
| "CVE-2021-34556": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" |
| }, |
| "CVE-2018-13095": { |
| "cmt_msg": "xfs: More robust inode extent count validation" |
| }, |
| "CVE-2021-3669": { |
| "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" |
| }, |
| "CVE-2019-18885": { |
| "cmt_msg": "btrfs: merge btrfs_find_device and find_device" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-7273": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2021-4023": { |
| "cmt_msg": "io-wq: fix cancellation on create-worker failure" |
| }, |
| "CVE-2019-18680": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0812": { |
| "cmt_msg": "xprtrdma: fix incorrect header size calculations" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19036": { |
| "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1508": { |
| "cmt_msg": "io_uring: reexpand under-reexpanded iters" |
| }, |
| "CVE-2019-19927": { |
| "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" |
| }, |
| "CVE-2019-16921": { |
| "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" |
| }, |
| "CVE-2021-4159": { |
| "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" |
| }, |
| "CVE-2017-5715": { |
| "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4150": { |
| "cmt_msg": "block: fix incorrect references to disk objects" |
| }, |
| "CVE-2021-28951": { |
| "cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-29155": { |
| "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16230": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" |
| }, |
| "CVE-2019-12455": { |
| "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-12362": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2020-12363": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" |
| }, |
| "CVE-2020-12364": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" |
| }, |
| "CVE-2022-0480": { |
| "cmt_msg": "memcg: enable accounting for file lock caches" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26141": { |
| "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" |
| }, |
| "CVE-2020-8834": { |
| "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" |
| }, |
| "CVE-2021-4218": { |
| "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15780": { |
| "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" |
| }, |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" |
| }, |
| "CVE-2022-1043": { |
| "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" |
| }, |
| "CVE-2020-36385": { |
| "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" |
| }, |
| "CVE-2019-12380": { |
| "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" |
| }, |
| "CVE-2019-12381": { |
| "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" |
| }, |
| "CVE-2020-7053": { |
| "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" |
| }, |
| "CVE-2020-12656": { |
| "cmt_msg": "sunrpc: check that domain table is empty at module unload." |
| }, |
| "CVE-2020-16120": { |
| "cmt_msg": "ovl: switch to mounter creds in readdir" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36310": { |
| "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" |
| }, |
| "CVE-2020-36313": { |
| "cmt_msg": "KVM: Fix out of range accesses to memslots" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-20449": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2016-10723": { |
| "cmt_msg": "mm, oom: remove sleep from under oom_lock" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0707": { |
| "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" |
| }, |
| "CVE-2019-11191": { |
| "cmt_msg": "x86: Deprecate a.out support" |
| }, |
| "CVE-2019-19039": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-10322": { |
| "cmt_msg": "xfs: enhance dinode verifier" |
| }, |
| "CVE-2020-8832": { |
| "cmt_msg": "drm/i915: Record the default hw state after reset upon load" |
| }, |
| "CVE-2022-1280": { |
| "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-32078": { |
| "cmt_msg": "ARM: footbridge: remove personal server platform" |
| }, |
| "CVE-2019-10220": { |
| "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" |
| }, |
| "CVE-2020-27835": { |
| "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" |
| }, |
| "CVE-2019-5489": { |
| "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" |
| } |
| } |
| }, |
| "4.19": { |
| "4.19": { |
| "CVE-2018-18281": { |
| "cmt_msg": "mremap: properly flush TLB before releasing the page", |
| "cmt_id": "eb66ae030829605d61fbef1909ce310e29f78821" |
| } |
| }, |
| "4.19-rc1": { |
| "CVE-2019-19083": { |
| "cmt_msg": "drm/amd/display: memory leak", |
| "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" |
| } |
| }, |
| "4.19.2": { |
| "CVE-2018-18955": { |
| "cmt_msg": "userns: also map extents in the reverse map to kernel IDs", |
| "cmt_id": "9a7a80fb02cc7515b273dbb4249374d6e6a35b70" |
| } |
| }, |
| "4.19.3": { |
| "CVE-2018-19854": { |
| "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", |
| "cmt_id": "a0f044f025e9a023e1e2b33c0731291059e2748d" |
| }, |
| "CVE-2018-16871": { |
| "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", |
| "cmt_id": "20965de7f47207394ffe03d70a4806f5e1cfcd7f" |
| }, |
| "CVE-2018-18710": { |
| "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", |
| "cmt_id": "c8099dbf492b565a4f75ae7b8c08b76ca18c4c3f" |
| } |
| }, |
| "4.19.7": { |
| "CVE-2018-19407": { |
| "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", |
| "cmt_id": "61c42d657c859ccc95e53afdac64f73a0053b8ea" |
| }, |
| "CVE-2018-19406": { |
| "cmt_msg": "KVM: LAPIC: Fix pv ipis use-before-initialization", |
| "cmt_id": "ffb01e73737b4d3e66734c901ee666ae8a23a857" |
| }, |
| "CVE-2019-2025": { |
| "cmt_msg": "binder: fix race that allows malicious free of live buffer", |
| "cmt_id": "553927d6aab993e1297d0c69274cd0c2df5440ca" |
| }, |
| "CVE-2018-16862": { |
| "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", |
| "cmt_id": "16a2d602244ff5327cecd210fdd50ad5ad443c9c" |
| } |
| }, |
| "4.19.8": { |
| "CVE-2018-18397": { |
| "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", |
| "cmt_id": "10f98c134b02d11923d45ce6688c2479435e8ec9" |
| } |
| }, |
| "4.19.9": { |
| "CVE-2018-20169": { |
| "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", |
| "cmt_id": "1b2e742bf7230ce04cda5b7348f922174bef2d7a" |
| }, |
| "CVE-2018-14625": { |
| "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", |
| "cmt_id": "f9cd25b1e5e575a5f18547bdc04ea40a23ad511a" |
| }, |
| "CVE-2018-19824": { |
| "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", |
| "cmt_id": "a7e719ace75e4451b7958cb73cbc12c627760007" |
| } |
| }, |
| "4.19.13": { |
| "CVE-2018-16882": { |
| "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", |
| "cmt_id": "1972ca04708330b0edd52956e644e3974065a613" |
| }, |
| "CVE-2018-19985": { |
| "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", |
| "cmt_id": "8f980122236c1fc8e11ffb57ec73315d01dc88e0" |
| } |
| }, |
| "4.19.14": { |
| "CVE-2019-9245": { |
| "cmt_msg": "f2fs: sanity check of xattr entry size", |
| "cmt_id": "5036fcd9b14516f62efae6ed0c42dfbb9798b643" |
| } |
| }, |
| "4.19.15": { |
| "CVE-2019-15927": { |
| "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", |
| "cmt_id": "8ee6f180d56fe760b275ab7f060c7b12fc05d7b7" |
| }, |
| "CVE-2018-20784": { |
| "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", |
| "cmt_id": "dc8408ea0b22ab181ee541f3786b4fd6161e0ce3" |
| }, |
| "CVE-2019-6133": { |
| "cmt_msg": "fork: record start_time late", |
| "cmt_id": "bc999b5099d70030a9cb1aff2c48b073f65e0f8f" |
| } |
| }, |
| "4.19.16": { |
| "CVE-2018-16884": { |
| "cmt_msg": "sunrpc: use-after-free in svc_process_common()", |
| "cmt_id": "44e7bab39f877c9c095bfaaee943b0807574a7f7" |
| } |
| }, |
| "4.19.17": { |
| "CVE-2019-3701": { |
| "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", |
| "cmt_id": "8db82a6f2b76d42ec2615f8def6e797e064e7822" |
| }, |
| "CVE-2020-10769": { |
| "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", |
| "cmt_id": "44c67402c3f738b7048de4464c02461bc8d0fd37" |
| }, |
| "CVE-2019-11085": { |
| "cmt_msg": "drm/i915/gvt: Fix mmap range check", |
| "cmt_id": "ac8b9e8e7ddd69f3efa91e8a99312de5729382c0" |
| } |
| }, |
| "4.19.18": { |
| "CVE-2019-9003": { |
| "cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda", |
| "cmt_id": "1c393ca118cfaf36c95270b9bed295bba109fafa" |
| } |
| }, |
| "4.19.19": { |
| "CVE-2019-7308": { |
| "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", |
| "cmt_id": "eed84f94ff8d97abcbc5706f6f9427520fd60a10" |
| } |
| }, |
| "4.19.20": { |
| "CVE-2018-16880": { |
| "cmt_msg": "vhost: fix OOB in get_rx_bufs()", |
| "cmt_id": "aafe74b726891386cd139d3432ec619ed5189b29" |
| } |
| }, |
| "4.19.21": { |
| "CVE-2019-3819": { |
| "cmt_msg": "HID: debug: fix the ring buffer implementation", |
| "cmt_id": "c70374ce418e7ae9276d3dc26aed0301e4da5e35" |
| }, |
| "CVE-2019-8956": { |
| "cmt_msg": "sctp: walk the list of asoc safely", |
| "cmt_id": "7c2361308e1727c3135ebb3b5c6906fb781bb261" |
| }, |
| "CVE-2019-7222": { |
| "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", |
| "cmt_id": "5a45d3720b5437515f8c094f1c3d61f6afe211c1" |
| }, |
| "CVE-2019-6974": { |
| "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", |
| "cmt_id": "24b027d2b1386da03aafb2aaac69d4fa67ee7d9c" |
| }, |
| "CVE-2019-7221": { |
| "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", |
| "cmt_id": "236fd677125f974aaf39f09074d226a884b4fe0e" |
| } |
| }, |
| "4.19.25": { |
| "CVE-2019-9162": { |
| "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs", |
| "cmt_id": "6a3f7237871c4d5c090ab9a6fce3ba6a1baf1f82" |
| }, |
| "CVE-2019-8912": { |
| "cmt_msg": "net: crypto set sk to NULL when af_alg_release.", |
| "cmt_id": "eb5e6869125f69dd28513f92992d97ec62bb9773" |
| } |
| }, |
| "4.19.27": { |
| "CVE-2019-9213": { |
| "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", |
| "cmt_id": "de04d2973a62e4efb3de45e93bd46acd6d510e0a" |
| } |
| }, |
| "4.19.28": { |
| "CVE-2019-16994": { |
| "cmt_msg": "net: sit: fix memory leak in sit_init_net()", |
| "cmt_id": "d0bedaac932f4c02c080a50d4a30b2a1fec5d682" |
| }, |
| "CVE-2019-12818": { |
| "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", |
| "cmt_id": "f132b3f5f1ad1cbe818474ab8d0b555ff39369d5" |
| }, |
| "CVE-2019-8980": { |
| "cmt_msg": "exec: Fix mem leak in kernel_read_file", |
| "cmt_id": "b60d90b2d3d14c426693a0a34041db11be66d29e" |
| }, |
| "CVE-2019-15916": { |
| "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", |
| "cmt_id": "7ce2a517fd8b7742e381d3b3551b9b03e667ad79" |
| } |
| }, |
| "4.19.29": { |
| "CVE-2019-2101": { |
| "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", |
| "cmt_id": "ac8befb6dd601fd35c1d64167750c6698bc27c80" |
| } |
| }, |
| "4.19.30": { |
| "CVE-2019-16995": { |
| "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", |
| "cmt_id": "996ee1aca7def6125e9d96f58151799d44082cfc" |
| }, |
| "CVE-2019-12819": { |
| "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", |
| "cmt_id": "96a3b14450afa83f4f3ffdeafaca19db8e05c2fd" |
| } |
| }, |
| "4.19.31": { |
| "CVE-2019-11811": { |
| "cmt_msg": "ipmi_si: fix use-after-free of resource->name", |
| "cmt_id": "a441fdaf8c3034436fb6045ee285e515628fc555" |
| }, |
| "CVE-2019-10124": { |
| "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", |
| "cmt_id": "234c0cc982211bb5539db632f31490bf0ad54827" |
| }, |
| "CVE-2019-9455": { |
| "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", |
| "cmt_id": "573d423a9bd76b396954ddf847ff24d97658453d" |
| }, |
| "CVE-2019-16413": { |
| "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", |
| "cmt_id": "e08ba890dc29250fafdfa7c9dba62ccfeec8ef7f" |
| } |
| }, |
| "4.19.32": { |
| "CVE-2019-15917": { |
| "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", |
| "cmt_id": "e365b94086f9dec02ddfcc193dcad72858c6d973" |
| } |
| }, |
| "4.19.33": { |
| "CVE-2019-20811": { |
| "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", |
| "cmt_id": "d9d215be3a3aa8b3638f2705826f52a7fb84cf24" |
| }, |
| "CVE-2019-20054": { |
| "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", |
| "cmt_id": "07d0d2bd957ad922cf571e7cabb6c34067142b93" |
| }, |
| "CVE-2019-3460": { |
| "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", |
| "cmt_id": "2318c0e4b87e590c9d8e88db185477cfac18abe2" |
| }, |
| "CVE-2019-15921": { |
| "cmt_msg": "genetlink: Fix a memory leak on error path", |
| "cmt_id": "9b8ef421b481d6e648438131d867986c649c297c" |
| }, |
| "CVE-2019-3459": { |
| "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", |
| "cmt_id": "15d6538a0d6e0f6de5116081a948cba7cc3e1d3d" |
| } |
| }, |
| "4.19.34": { |
| "CVE-2019-11810": { |
| "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", |
| "cmt_id": "8032fc9120c211cd40beef4c91c8206f4167e523" |
| } |
| }, |
| "4.19.35": { |
| "CVE-2019-11486": { |
| "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", |
| "cmt_id": "894dc8495898cf6075eadf99fd496374decd3986" |
| }, |
| "CVE-2019-11815": { |
| "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", |
| "cmt_id": "78b4bf26a8a76569fd6d0b47d98fb553c333b06f" |
| }, |
| "CVE-2019-3887": { |
| "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)", |
| "cmt_id": "119031be7b0a2ce4ff4cd5525bec6d42817ff53d" |
| }, |
| "CVE-2019-10639": { |
| "cmt_msg": "netns: provide pure entropy for net_hash_mix()", |
| "cmt_id": "a1c2f3229734a4bb8d5ac008c0a67e025aa11547" |
| } |
| }, |
| "4.19.36": { |
| "CVE-2019-15292": { |
| "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", |
| "cmt_id": "6c42507f426b40c63e8eb98ce6dd4afbc7efcdb5" |
| }, |
| "CVE-2019-9857": { |
| "cmt_msg": "inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()", |
| "cmt_id": "ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b" |
| } |
| }, |
| "4.19.37": { |
| "CVE-2019-3892": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" |
| }, |
| "CVE-2019-11599": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" |
| }, |
| "CVE-2019-15920": { |
| "cmt_msg": "cifs: Fix use-after-free in SMB2_read", |
| "cmt_id": "c69330a855ab4342d304f67f8c1e7d1fa2686bec" |
| }, |
| "CVE-2019-15919": { |
| "cmt_msg": "cifs: Fix use-after-free in SMB2_write", |
| "cmt_id": "8fb89b43b65fcd35f15d982712904b96fc64c68a" |
| }, |
| "CVE-2019-15214": { |
| "cmt_msg": "ALSA: core: Fix card races between register and disconnect", |
| "cmt_id": "b50e435df2d8b9a1d3e956e1c767dfc7e30a441b" |
| } |
| }, |
| "4.19.38": { |
| "CVE-2019-3882": { |
| "cmt_msg": "vfio/type1: Limit DMA mappings per container", |
| "cmt_id": "f7b467ad1be0478f0341afa8a9ac112732def088" |
| }, |
| "CVE-2019-15924": { |
| "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", |
| "cmt_id": "9b9b0df4e7882638e53c55e8f556aa78915418b9" |
| }, |
| "CVE-2019-10125": { |
| "cmt_msg": "aio: simplify - and fix - fget/fput for io_submit()", |
| "cmt_id": "d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd" |
| }, |
| "CVE-2019-18805": { |
| "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day", |
| "cmt_id": "250e51f856e1534e3e769add508f121966030462" |
| } |
| }, |
| "4.19.39": { |
| "CVE-2019-11487": { |
| "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", |
| "cmt_id": "0311ff82b70fa12e80d188635bff24029ec06ae1" |
| } |
| }, |
| "4.19.41": { |
| "CVE-2019-15216": { |
| "cmt_msg": "USB: yurex: Fix protection fault after device removal", |
| "cmt_id": "9f632afe4f3989d77fdbf8ac6a015d6beb03ccb9" |
| } |
| }, |
| "4.19.42": { |
| "CVE-2018-20836": { |
| "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", |
| "cmt_id": "0f18e433b97bf74bb62e0caa95c61e8631967fb9" |
| }, |
| "CVE-2019-11884": { |
| "cmt_msg": "Bluetooth: hidp: fix buffer overflow", |
| "cmt_id": "c6d1f9b4b2cb768e29f5d44af143f25ad89062b1" |
| } |
| }, |
| "4.19.43": { |
| "CVE-2019-11091": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" |
| }, |
| "CVE-2018-12130": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" |
| }, |
| "CVE-2018-12127": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" |
| }, |
| "CVE-2018-12126": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", |
| "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" |
| } |
| }, |
| "4.19.44": { |
| "CVE-2019-10142": { |
| "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", |
| "cmt_id": "e9ec5073c90d6de2ca5338bd67f7935b19d7c0c7" |
| } |
| }, |
| "4.19.45": { |
| "CVE-2019-11833": { |
| "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", |
| "cmt_id": "25d010f4e0ece1ddf0d8d57942c0b0f1568fe498" |
| } |
| }, |
| "4.19.46": { |
| "CVE-2019-25045": { |
| "cmt_msg": "xfrm: clean up xfrm protocol checks", |
| "cmt_id": "d410ef75886a4efb3c49b8bacd8e3c295235e744" |
| }, |
| "CVE-2019-15666": { |
| "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", |
| "cmt_id": "c9516503fe53c8960f180c1cc1cdf2341bed843d" |
| } |
| }, |
| "4.19.47": { |
| "CVE-2019-20095": { |
| "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", |
| "cmt_id": "a27ce4840f89acd1e23efe2b4dfc0d512aa5b38a" |
| }, |
| "CVE-2019-19543": { |
| "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", |
| "cmt_id": "aec118ecf579a6c70e505b39fc6eb6a2d878c89e" |
| }, |
| "CVE-2019-9466": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" |
| }, |
| "CVE-2019-9500": { |
| "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", |
| "cmt_id": "cc240e057c1d48665dde8036144114854bae058c" |
| }, |
| "CVE-2019-9503": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" |
| }, |
| "CVE-2019-19966": { |
| "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", |
| "cmt_id": "bdf3da72ae79f0cfb88c720dedabe16b0d67334b" |
| } |
| }, |
| "4.19.48": { |
| "CVE-2020-10720": { |
| "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", |
| "cmt_id": "39fd0dc4a5565a1df7d84b1c92d2050233b15b5a" |
| }, |
| "CVE-2019-10638": { |
| "cmt_msg": "inet: switch IP ID generator to siphash", |
| "cmt_id": "07480da0c8a1979e0973d6dd783b6aed966dccf6" |
| } |
| }, |
| "4.19.49": { |
| "CVE-2019-15212": { |
| "cmt_msg": "USB: rio500: refuse more than one device at a time", |
| "cmt_id": "d2d93077bac37c6895d8c58f564699a3a897c5db" |
| }, |
| "CVE-2019-15219": { |
| "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", |
| "cmt_id": "d27ea5e9eb4ac45e0e4cf8250a45aa06b0944787" |
| }, |
| "CVE-2019-15218": { |
| "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", |
| "cmt_id": "35b1044566528b26d48b31a52069f45851d49885" |
| }, |
| "CVE-2019-1999": { |
| "cmt_msg": "binder: fix race between munmap() and direct reclaim", |
| "cmt_id": "9d57cfd4e9d81400c1fe2b7cd4503f54830b46c2" |
| }, |
| "CVE-2019-15223": { |
| "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection", |
| "cmt_id": "eb2eeec920fb1b9b6faf8ea340f6295a2d03602b" |
| } |
| }, |
| "4.19.50": { |
| "CVE-2019-13233": { |
| "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry", |
| "cmt_id": "b598ddc7b9fc87b09bdadb63abf92b4ba46cd385" |
| } |
| }, |
| "4.19.52": { |
| "CVE-2019-11479": { |
| "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", |
| "cmt_id": "7f9f8a37e563c67b24ccd57da1d541a95538e8d9" |
| }, |
| "CVE-2019-11478": { |
| "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", |
| "cmt_id": "ec83921899a571ad70d582934ee9e3e07f478848" |
| }, |
| "CVE-2019-11477": { |
| "cmt_msg": "tcp: limit payload size of sacked skbs", |
| "cmt_id": "c09be31461ed140976c60a87364415454a2c3d42" |
| } |
| }, |
| "4.19.53": { |
| "CVE-2019-9453": { |
| "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", |
| "cmt_id": "ae3787d433f7b87ebf6b916e524c6e280e4e5804" |
| }, |
| "CVE-2019-15090": { |
| "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", |
| "cmt_id": "f3a7a1137ffc69e1f460eb9e1b5f4fd09d3c4ea9" |
| } |
| }, |
| "4.19.54": { |
| "CVE-2019-15807": { |
| "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", |
| "cmt_id": "114e8135ae0031556ead1bcb67249ecb84b804de" |
| }, |
| "CVE-2019-12984": { |
| "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler", |
| "cmt_id": "4bb4ba362cc1ed3acb181a6d0b68c6de22be78e2" |
| } |
| }, |
| "4.19.56": { |
| "CVE-2019-12817": { |
| "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork", |
| "cmt_id": "cd3e49394cb0f45c8dbf3c17c0818cd3d30b1332" |
| }, |
| "CVE-2019-12615": { |
| "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", |
| "cmt_id": "7b460a9bb13db3f442f153c2ab8a9ff8520c368c" |
| }, |
| "CVE-2019-0136": { |
| "cmt_msg": "mac80211: drop robust management frames from unknown TA", |
| "cmt_id": "0e879ef1cb5baddebe1f12a9a3940a87d8e61558" |
| } |
| }, |
| "4.19.58": { |
| "CVE-2019-13272": { |
| "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", |
| "cmt_id": "54435b7fff7bfb9515cc457b71c3734c1c3fff76" |
| }, |
| "CVE-2019-15221": { |
| "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", |
| "cmt_id": "7f52af5e9baa9c478edcecdd4058eeef2835b1c3" |
| }, |
| "CVE-2019-9506": { |
| "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", |
| "cmt_id": "5dd6139a0aa22112e46a6df5fd283046095822e0" |
| } |
| }, |
| "4.19.59": { |
| "CVE-2019-10126": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", |
| "cmt_id": "c7e427e28a3a2d1b89b8f9fa7c3f559774d91a7b" |
| }, |
| "CVE-2019-3846": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", |
| "cmt_id": "d4c0f752c1d2c6383cc7582c19b2ed7159d45937" |
| }, |
| "CVE-2019-15220": { |
| "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", |
| "cmt_id": "449a8d08a4bc45101fa26e6d233b98258d33620a" |
| } |
| }, |
| "4.19.61": { |
| "CVE-2019-17351": { |
| "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", |
| "cmt_id": "e73db096691e5f2720049502a3794a2a0c6d1b1f" |
| }, |
| "CVE-2019-13631": { |
| "cmt_msg": "Input: gtco - bounds check collection indent level", |
| "cmt_id": "d657077eda7b5572d86f2f618391bb016b5d9a64" |
| }, |
| "CVE-2019-15213": { |
| "cmt_msg": "media: dvb: usb: fix use after free in dvb_usb_device_exit", |
| "cmt_id": "94f2b518a7882f562537796b77e3ce6a6461236d" |
| }, |
| "CVE-2019-15925": { |
| "cmt_msg": "net: hns3: add some error checking in hclge_tm module", |
| "cmt_id": "26d86b29e806769adba91bd6fc1f077b94e9b64b" |
| }, |
| "CVE-2019-15926": { |
| "cmt_msg": "ath6kl: add some bounds checking", |
| "cmt_id": "83c911f4bd6846397017aa38c32dd18dc532f754" |
| }, |
| "CVE-2019-14284": { |
| "cmt_msg": "floppy: fix div-by-zero in setup_format_params", |
| "cmt_id": "6e34fd07484a0622a17b40e0ca89ed451260ef45" |
| }, |
| "CVE-2019-14283": { |
| "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", |
| "cmt_id": "ff54c44f103825a426e46d08b5d3d76e44791a87" |
| } |
| }, |
| "4.19.63": { |
| "CVE-2019-12382": { |
| "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", |
| "cmt_id": "2a18d76592e0d86c7fddcc6a7aa52509a2900f9d" |
| }, |
| "CVE-2019-13648": { |
| "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", |
| "cmt_id": "b993a66d8ddc1c26da0d9aa3471789cc170b28ee" |
| } |
| }, |
| "4.19.64": { |
| "CVE-2019-20934": { |
| "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", |
| "cmt_id": "48046e092ad557a01d7daf53205624944793b19d" |
| }, |
| "CVE-2019-15211": { |
| "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", |
| "cmt_id": "b3836af8560e27cd0d27940ff9c5a08b90b8d256" |
| }, |
| "CVE-2019-3900": { |
| "cmt_msg": "vhost_net: fix possible infinite loop", |
| "cmt_id": "3af3b843aee41ed22343b011a4cf3812a80d2f38" |
| }, |
| "CVE-2019-10207": { |
| "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", |
| "cmt_id": "56966212e23f82ced10831f7cca02f7339147428" |
| }, |
| "CVE-2019-15215": { |
| "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", |
| "cmt_id": "8b44cc225e6024174508164931cab9f01c79dca2" |
| }, |
| "CVE-2019-2213": { |
| "cmt_msg": "binder: fix possible UAF when freeing buffer", |
| "cmt_id": "22068d49d09d2b3890e19d7b2048a33340f992da" |
| } |
| }, |
| "4.19.65": { |
| "CVE-2019-1125": { |
| "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", |
| "cmt_id": "befb822c062b4c3d93380a58d5fd479395e8b267" |
| } |
| }, |
| "4.19.67": { |
| "CVE-2019-19536": { |
| "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", |
| "cmt_id": "cab569a44a524709d95bbd88700860ac45e5d5cf" |
| }, |
| "CVE-2019-19535": { |
| "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", |
| "cmt_id": "9ce1b3eb5489416338b2fb2b40f30f0d425700b4" |
| }, |
| "CVE-2019-19531": { |
| "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", |
| "cmt_id": "33f2240acfa8b4017ee5dd64601c8a5ec7f53b4e" |
| } |
| }, |
| "4.19.68": { |
| "CVE-2019-15118": { |
| "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", |
| "cmt_id": "46f9a1bc60a4c15a14a6504168cee1c2e0bf3ab4" |
| }, |
| "CVE-2019-19537": { |
| "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", |
| "cmt_id": "7f52d6d2a82df15d7ea01d69d0943d2abc201b43" |
| }, |
| "CVE-2019-19527": { |
| "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", |
| "cmt_id": "b545dc9debe69ca513b93f4a244451e9be14b0c5" |
| }, |
| "CVE-2019-19530": { |
| "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", |
| "cmt_id": "c02c0249ce5523a7a264136ed36f857b85555bac" |
| }, |
| "CVE-2019-15117": { |
| "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", |
| "cmt_id": "58b9f19ee438990f6406e61943d0bc7c875a0921" |
| } |
| }, |
| "4.19.69": { |
| "CVE-2019-15538": { |
| "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", |
| "cmt_id": "11f85d4d77afb8f1cb1989f1565b26df21280118" |
| } |
| }, |
| "4.19.70": { |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown", |
| "cmt_id": "b307f99dca5ab33edc1e04b9b479bcb0852ff85f" |
| } |
| }, |
| "4.19.73": { |
| "CVE-2019-15918": { |
| "cmt_msg": "cifs: Fix lease buffer length error", |
| "cmt_id": "4061e662c8e9f5fb796b05fd2ab58fed8cd16d59" |
| }, |
| "CVE-2019-19319": { |
| "cmt_msg": "ext4: protect journal inode's blocks using block_validity", |
| "cmt_id": "2fd4629de51974002f4e9cf1a35a1926dd6c9d99" |
| }, |
| "CVE-2019-14835": { |
| "cmt_msg": "vhost: make sure log_num < in_num", |
| "cmt_id": "ba03ee62aed0b0ee2eadfeb4a2fecc7d7eb47871" |
| }, |
| "CVE-2019-15031": { |
| "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts", |
| "cmt_id": "569775bd536416ed9049aa580d9f89a0b4307d60" |
| }, |
| "CVE-2019-15030": { |
| "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", |
| "cmt_id": "47a0f70d7d9ac3d6b1a96b312d07bc67af3834e9" |
| } |
| }, |
| "4.19.74": { |
| "CVE-2019-15504": { |
| "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()", |
| "cmt_id": "3622d621e9beca76d53cd3007eb7b1d6e724716b" |
| } |
| }, |
| "4.19.75": { |
| "CVE-2019-14816": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" |
| }, |
| "CVE-2019-14814": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" |
| }, |
| "CVE-2019-14815": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" |
| }, |
| "CVE-2019-15505": { |
| "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", |
| "cmt_id": "b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1" |
| }, |
| "CVE-2019-14821": { |
| "cmt_msg": "KVM: coalesced_mmio: add bounds checking", |
| "cmt_id": "232a6462f43fceeac82bd99ef092b38e3a7ee296" |
| } |
| }, |
| "4.19.77": { |
| "CVE-2019-19533": { |
| "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", |
| "cmt_id": "8630a4d13683095fbf14091d59a20e1ac71fdd6b" |
| }, |
| "CVE-2019-19080": { |
| "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs", |
| "cmt_id": "5b6c791f494d5e770dfd015390386f321b9a94da" |
| }, |
| "CVE-2019-19081": { |
| "cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs", |
| "cmt_id": "587df35cbf654a063372fb1b523a0b56a5f789ab" |
| }, |
| "CVE-2019-17053": { |
| "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "dd651ab7a11436f787aed0a987c85864b261ff19" |
| }, |
| "CVE-2019-17052": { |
| "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "6f0f18e532693ecc1e0c7938e0d63531ea62bc3e" |
| }, |
| "CVE-2019-17056": { |
| "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "33fe1f517e29566d842535038be227c71a4bd54d" |
| }, |
| "CVE-2019-17055": { |
| "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "50dddec689cb2105f6bccf4a2c6fe43dcc3295d7" |
| }, |
| "CVE-2019-17054": { |
| "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "6fbf866276089853727dd9b31f1d251e61dde367" |
| } |
| }, |
| "4.19.78": { |
| "CVE-2019-18806": { |
| "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", |
| "cmt_id": "9d0995cc268b4a431dbfb29db5cac36546732bc0" |
| } |
| }, |
| "4.19.79": { |
| "CVE-2019-19525": { |
| "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", |
| "cmt_id": "3f41e88f4bd44284c575ad3fb579581a16b39069" |
| }, |
| "CVE-2019-16746": { |
| "cmt_msg": "nl80211: validate beacon head", |
| "cmt_id": "1bd17a737c9e7e91483d9a603528b0e6d4c772f8" |
| } |
| }, |
| "4.19.80": { |
| "CVE-2019-19528": { |
| "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", |
| "cmt_id": "2fdcf7e19bdefc683da824264c0898af39bf8d50" |
| }, |
| "CVE-2019-19523": { |
| "cmt_msg": "USB: adutux: fix use-after-free on disconnect", |
| "cmt_id": "316f51d7759735a5295301ab22a7c6231b49c24f" |
| } |
| }, |
| "4.19.81": { |
| "CVE-2019-19075": { |
| "cmt_msg": "ieee802154: ca8210: prevent memory leak", |
| "cmt_id": "960019214539ce75398eaf38d31c77b86aadd739" |
| }, |
| "CVE-2019-17075": { |
| "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", |
| "cmt_id": "27414f90ff6e1d7f6657e4a820b04a7b2d760272" |
| }, |
| "CVE-2019-17133": { |
| "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", |
| "cmt_id": "73c066a9552a6d33ed7de002855337d1c966e8ce" |
| } |
| }, |
| "4.19.82": { |
| "CVE-2019-19060": { |
| "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", |
| "cmt_id": "4a4206a83fc69782d4ef36d8f5eb28836d8b6814" |
| }, |
| "CVE-2019-19065": { |
| "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", |
| "cmt_id": "962cff4f3f89acf54b6fb418e7ff386b720b0fd6" |
| }, |
| "CVE-2019-17666": { |
| "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", |
| "cmt_id": "64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33" |
| }, |
| "CVE-2019-15099": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "696da02259463ea634821e117088f82afe7bf851" |
| }, |
| "CVE-2019-15098": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "696da02259463ea634821e117088f82afe7bf851" |
| }, |
| "CVE-2019-19048": { |
| "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr", |
| "cmt_id": "c2ea451f22f180e9e46225f54b5ec50c50bb639f" |
| }, |
| "CVE-2020-10773": { |
| "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", |
| "cmt_id": "ced8cb0230d070274cd26bec818dd7c67514d586" |
| }, |
| "CVE-2019-19526": { |
| "cmt_msg": "NFC: pn533: fix use-after-free and memleaks", |
| "cmt_id": "24aaf7f4528f0df0f29667d3921f4a63aa7b806c" |
| }, |
| "CVE-2019-19532": { |
| "cmt_msg": "HID: Fix assumption that devices have inputs", |
| "cmt_id": "8a01c4b908cf0a5367d3309c1c0d4e9be655ce00" |
| } |
| }, |
| "4.19.83": { |
| "CVE-2019-18282": { |
| "cmt_msg": "net/flow_dissector: switch to siphash", |
| "cmt_id": "558d2bdad5f6a0dd65ed7ed4f74419e826a97759" |
| }, |
| "CVE-2019-16233": { |
| "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", |
| "cmt_id": "3ee6a8bdae81a09c1dc9c27d3a50e6b1b6a24676" |
| }, |
| "CVE-2019-19049": { |
| "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", |
| "cmt_id": "fcc3f7c810c3bc595ce179ea4d9e18f506fd0d03" |
| } |
| }, |
| "4.19.84": { |
| "CVE-2019-19045": { |
| "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", |
| "cmt_id": "42de3a902443b64c6e3cf9c61d9cd6f30b2c0d67" |
| }, |
| "CVE-2019-19052": { |
| "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", |
| "cmt_id": "9289226f69822de0b716c0fbfc31db0283f14e2b" |
| }, |
| "CVE-2019-18813": { |
| "cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe", |
| "cmt_id": "10eb9abd21bad2a9726f50557b38924cb8d81ccd" |
| }, |
| "CVE-2019-0155": { |
| "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", |
| "cmt_id": "b4b1abdc6b181cb78a072b95557ae392d423c3eb" |
| }, |
| "CVE-2019-0154": { |
| "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", |
| "cmt_id": "011b7173cbdbd1a5f1826656693ea51516f15dc1" |
| }, |
| "CVE-2019-19922": { |
| "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", |
| "cmt_id": "502bd151448c2c76a927b26783e5538875c534ff" |
| }, |
| "CVE-2019-19529": { |
| "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", |
| "cmt_id": "ce9b94da0e043b7b0ec1bd3d0e451d956acff9c1" |
| }, |
| "CVE-2018-12207": { |
| "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", |
| "cmt_id": "a991063ce57684a2259688886643cf1c430f8188" |
| }, |
| "CVE-2019-11135": { |
| "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", |
| "cmt_id": "4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6" |
| }, |
| "CVE-2019-16231": { |
| "cmt_msg": "fjes: Handle workqueue allocation failure", |
| "cmt_id": "f09b99c883e82fd5d28a529e11e66c2e887da636" |
| }, |
| "CVE-2019-19534": { |
| "cmt_msg": "can: peak_usb: fix slab info leak", |
| "cmt_id": "a7be2debb769092c7c07b9a866b055d8bee5afaf" |
| } |
| }, |
| "4.19.85": { |
| "CVE-2019-19524": { |
| "cmt_msg": "Input: ff-memless - kill timer in destroy()", |
| "cmt_id": "c02230815282a436366d3d0d6de6d2636dd71b74" |
| } |
| }, |
| "4.19.87": { |
| "CVE-2019-18660": { |
| "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", |
| "cmt_id": "0a60d4bddc0ba6a7e06d10efa59f7861837860b0" |
| }, |
| "CVE-2019-15291": { |
| "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", |
| "cmt_id": "8b42c263ec1a348bf098e6255407486c1bf17ece" |
| }, |
| "CVE-2019-18683": { |
| "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", |
| "cmt_id": "467052f6ea5a51524992e43f02b543550495c391" |
| } |
| }, |
| "4.19.88": { |
| "CVE-2019-12614": { |
| "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", |
| "cmt_id": "32a24a397aee35ca2bb0f835b8f3daabd88890fa" |
| }, |
| "CVE-2019-19767": { |
| "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", |
| "cmt_id": "e91cce02f3025da559468729ea0ad9dea242d3eb" |
| } |
| }, |
| "4.19.89": { |
| "CVE-2019-19062": { |
| "cmt_msg": "crypto: user - fix memory leak in crypto_report", |
| "cmt_id": "351a567ebf2482de4dd5e5bbd539f2175540b717" |
| }, |
| "CVE-2019-19227": { |
| "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", |
| "cmt_id": "0977763a13fd87a7aebe376dc96385758de3aa9e" |
| }, |
| "CVE-2019-19071": { |
| "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", |
| "cmt_id": "5da96cc31633a9076404621ebb89bbe78f2c8676" |
| }, |
| "CVE-2019-19079": { |
| "cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter", |
| "cmt_id": "754e3c0c31c96cf3a4a54ed2a8c63cca28109136" |
| }, |
| "CVE-2019-19252": { |
| "cmt_msg": "vcs: prevent write access to vcsu devices", |
| "cmt_id": "627f3b9e4dd812dac9d93e578af80de751e704a4" |
| }, |
| "CVE-2019-19332": { |
| "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", |
| "cmt_id": "5119ffd480b644d8bc9af741cc8ef435a7ec5ff7" |
| } |
| }, |
| "4.19.90": { |
| "CVE-2019-19447": { |
| "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", |
| "cmt_id": "8e7a865366105b978eef4108f49a12100eea4299" |
| } |
| }, |
| "4.19.92": { |
| "CVE-2019-18786": { |
| "cmt_msg": "media: rcar_drif: fix a memory disclosure", |
| "cmt_id": "debdd16cbd99ffc767227685e2738e5b495b7c54" |
| }, |
| "CVE-2019-19057": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", |
| "cmt_id": "1b3e52db38471d5ac896eb9be111565e3734d5b5" |
| }, |
| "CVE-2019-19063": { |
| "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", |
| "cmt_id": "3717a450f83945c481059a6921440e5e6fe3c856" |
| }, |
| "CVE-2020-0427": { |
| "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", |
| "cmt_id": "f88ac1330779c5bfdd79f7d7f7d4d3343c782f92" |
| }, |
| "CVE-2019-19947": { |
| "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices", |
| "cmt_id": "9ed59600c3524f12144b30cfc1d86734cfb3927b" |
| }, |
| "CVE-2019-20812": { |
| "cmt_msg": "af_packet: set defaule value for tmo", |
| "cmt_id": "e99af2cb552e3fe1ec6157fc15856a89a6388886" |
| }, |
| "CVE-2019-16230": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", |
| "cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" |
| }, |
| "CVE-2019-16232": { |
| "cmt_msg": "libertas: fix a potential NULL pointer dereference", |
| "cmt_id": "60bb6967b543be59f66f60526ca816e1b33ec480" |
| }, |
| "CVE-2019-16229": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", |
| "cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" |
| } |
| }, |
| "4.19.93": { |
| "CVE-2020-10690": { |
| "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", |
| "cmt_id": "0393b8720128d5b39db8523e5bfbfc689f18c37c" |
| } |
| }, |
| "4.19.94": { |
| "CVE-2019-18809": { |
| "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", |
| "cmt_id": "d933de8115f3263fd50cf3b1f1dac2faff02fd89" |
| }, |
| "CVE-2019-19965": { |
| "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", |
| "cmt_id": "8b9bf467061bc89ccf4a43be637e08d8a70fd76d" |
| } |
| }, |
| "4.19.95": { |
| "CVE-2019-14901": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", |
| "cmt_id": "21f08020dd8519baf209348c345131a8967e3cef" |
| } |
| }, |
| "4.19.96": { |
| "CVE-2019-14895": { |
| "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", |
| "cmt_id": "0aa8632c57930243bea6fa4ebcbff8fac089e664" |
| }, |
| "CVE-2020-0305": { |
| "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", |
| "cmt_id": "ec576895d61356a2cab096e1ca23bf7cc765e5b2" |
| }, |
| "CVE-2019-19066": { |
| "cmt_msg": "scsi: bfa: release allocated memory in case of error", |
| "cmt_id": "486f51201528126bec2c647fa9d4216fc4fda91b" |
| }, |
| "CVE-2019-20636": { |
| "cmt_msg": "Input: add safety guards to input_set_keycode()", |
| "cmt_id": "f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4" |
| }, |
| "CVE-2019-19068": { |
| "cmt_msg": "rtl8xxxu: prevent leaking urb", |
| "cmt_id": "0e27512c5d0bc2c3d33c1e7f73a8983015c82b83" |
| }, |
| "CVE-2020-0431": { |
| "cmt_msg": "HID: hid-input: clear unmapped usages", |
| "cmt_id": "64c8b76e69acdecab62b035e72b12775d6d35a3b" |
| }, |
| "CVE-2019-14615": { |
| "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", |
| "cmt_id": "dd4f3b3508f65fe37975db223365216316da3998" |
| }, |
| "CVE-2019-19056": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", |
| "cmt_id": "f2bde0e9989e243345316e3c96b352ab94037340" |
| }, |
| "CVE-2019-19078": { |
| "cmt_msg": "ath10k: fix memory leak", |
| "cmt_id": "aed1b68eadf22513ac1fbd389f591f91c8bdaaf5" |
| } |
| }, |
| "4.19.97": { |
| "CVE-2019-9445": { |
| "cmt_msg": "f2fs: check if file namelen exceeds max value", |
| "cmt_id": "4124927e36b7753efb6faf1a508e2bc6783343cf" |
| }, |
| "CVE-2019-20096": { |
| "cmt_msg": "dccp: Fix memleak in __feat_register_sp", |
| "cmt_id": "e58c590c772eb5dc5a3603c5aef4148f47ab2e20" |
| }, |
| "CVE-2019-15217": { |
| "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", |
| "cmt_id": "0648766cb7d336e5932278c316aef6aac35d60ab" |
| }, |
| "CVE-2019-19059": { |
| "cmt_msg": "iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init", |
| "cmt_id": "6e41dd9731e13b0bdf2f57f84b9d25d009bd9f87" |
| }, |
| "CVE-2019-19058": { |
| "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", |
| "cmt_id": "09044a4a142404799e519def0bbfcc98fa68c677" |
| }, |
| "CVE-2019-19927": { |
| "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages", |
| "cmt_id": "8c2cdfb2c81bb533b9e6a3874ee5399102c4c580" |
| }, |
| "CVE-2019-19077": { |
| "cmt_msg": "RDMA: Fix goto target to release the allocated memory", |
| "cmt_id": "d203ff6a3059b7fc3a9b48048eaf5641ed7fda2c" |
| }, |
| "CVE-2019-5108": { |
| "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", |
| "cmt_id": "8f483142b0bb278f67eabccbe3d6a0e8c45284ad" |
| } |
| }, |
| "4.19.98": { |
| "CVE-2020-12652": { |
| "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", |
| "cmt_id": "3dae5041c65545ac65d610375b4ac30b00f174a3" |
| }, |
| "CVE-2021-3635": { |
| "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption", |
| "cmt_id": "8260ce5aeee4d7c4a6305e469edeae1066de2800" |
| } |
| }, |
| "4.19.99": { |
| "CVE-2019-19046": { |
| "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register", |
| "cmt_id": "211eabc55d07fc3709e967b08b6f5bb77198dbd0" |
| }, |
| "CVE-2019-20806": { |
| "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", |
| "cmt_id": "30fd5b16c9081afebe74d4d614fe582ff84ef6b2" |
| } |
| }, |
| "4.19.100": { |
| "CVE-2019-14896": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" |
| }, |
| "CVE-2019-14897": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" |
| }, |
| "CVE-2020-14416": { |
| "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", |
| "cmt_id": "bd1448458c6a67782d4e82c181b5540b5727546b" |
| }, |
| "CVE-2020-8428": { |
| "cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", |
| "cmt_id": "752f72edea55f9b7c6fd019e71365def13a0f2b6" |
| } |
| }, |
| "4.19.101": { |
| "CVE-2020-0432": { |
| "cmt_msg": "staging: most: net: fix buffer overflow", |
| "cmt_id": "9dab6bbc9462c43001a88ee933a491a1502fa6f5" |
| }, |
| "CVE-2020-12769": { |
| "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", |
| "cmt_id": "6fb12237c51e73e65899f9b1df69cd3999b4d90a" |
| } |
| }, |
| "4.19.103": { |
| "CVE-2020-0404": { |
| "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", |
| "cmt_id": "3ceb3fcd6d1a6a65e7bf3873a63009d01ba4b05f" |
| }, |
| "CVE-2019-3016": { |
| "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", |
| "cmt_id": "25a7898937f4a9f32ca2d1e9b7f5f07176af8037" |
| } |
| }, |
| "4.19.104": { |
| "CVE-2020-12653": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", |
| "cmt_id": "48247f7e14911a4d18e9c774ba3a1d368f5d8a6f" |
| }, |
| "CVE-2020-12654": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", |
| "cmt_id": "fab5ca79960b7fbda4e9a79a4754c749fdea2bd0" |
| } |
| }, |
| "4.19.107": { |
| "CVE-2020-9383": { |
| "cmt_msg": "floppy: check FDC index for errors before assigning it", |
| "cmt_id": "c8fd87c53a1509162b910cec91c0c46753c58f9a" |
| }, |
| "CVE-2020-2732": { |
| "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", |
| "cmt_id": "ed9e97c35b454ceb1da4f65c318015a7ab298dae" |
| }, |
| "CVE-2020-0009": { |
| "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", |
| "cmt_id": "a4307700608e43dcf9b8abf1ee74f68227e9c61a" |
| } |
| }, |
| "4.19.108": { |
| "CVE-2020-27068": { |
| "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", |
| "cmt_id": "0fb31bd53a5e27394916758173eb748c5e0dbd47" |
| }, |
| "CVE-2020-0444": { |
| "cmt_msg": "audit: fix error handling in audit_data_to_entry()", |
| "cmt_id": "c24d457a824f641ca328a20dd28872cfd97a005a" |
| }, |
| "CVE-2019-16234": { |
| "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", |
| "cmt_id": "1d8780188c8d7f009a05d40fbb8a111eab89746d" |
| }, |
| "CVE-2020-10942": { |
| "cmt_msg": "vhost: Check docket sk_family instead of call getname", |
| "cmt_id": "ad598a48fe61c6c2407f08a807cb7a2ea83386b3" |
| } |
| }, |
| "4.19.109": { |
| "CVE-2020-8647": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" |
| }, |
| "CVE-2020-8649": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" |
| }, |
| "CVE-2020-8648": { |
| "cmt_msg": "vt: selection, close sel_buffer race", |
| "cmt_id": "31559b59040fc0e6ad363642112d4eb03ad4ebb7" |
| } |
| }, |
| "4.19.111": { |
| "CVE-2020-12465": { |
| "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", |
| "cmt_id": "319478cbd2be90995b011ca6adbd834121eb7acf" |
| } |
| }, |
| "4.19.112": { |
| "CVE-2020-29370": { |
| "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", |
| "cmt_id": "30f6cae722654caef2ab4bacb2e910bfd766866b" |
| } |
| }, |
| "4.19.113": { |
| "CVE-2020-14381": { |
| "cmt_msg": "futex: Fix inode life-time issue", |
| "cmt_id": "e6d506cd2243aa8f6e19fdb4dc61d85275c2c918" |
| } |
| }, |
| "4.19.114": { |
| "CVE-2021-3715": { |
| "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", |
| "cmt_id": "ea3d6652c240978736a91b9e85fde9fee9359be4" |
| }, |
| "CVE-2020-11608": { |
| "cmt_msg": "media: ov519: add missing endpoint sanity checks", |
| "cmt_id": "747a7431661ab3c22ad1e721558bdf9e3d53d4a6" |
| }, |
| "CVE-2020-11609": { |
| "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", |
| "cmt_id": "70764334b2bcb15c67dfbd912d9a9f7076f6d0df" |
| }, |
| "CVE-2020-11668": { |
| "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", |
| "cmt_id": "5d064d7f0327d9425c5f63fa96efc70a74032d8b" |
| }, |
| "CVE-2020-27066": { |
| "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", |
| "cmt_id": "7ad217a824f7fab1e8534a6dfa82899ae1900bcb" |
| } |
| }, |
| "4.19.115": { |
| "CVE-2020-11494": { |
| "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", |
| "cmt_id": "b774578329afb238ccd504477731129aa15e9ec2" |
| }, |
| "CVE-2020-11565": { |
| "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", |
| "cmt_id": "fa138035f104ae14651ee3217d81fc16cd3aba4d" |
| } |
| }, |
| "4.19.116": { |
| "CVE-2020-12826": { |
| "cmt_msg": "signal: Extend exec_id to 64bits", |
| "cmt_id": "a2a1be2de7e4d9a3a2c6cf8512d38eb24bbeb059" |
| }, |
| "CVE-2020-12657": { |
| "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", |
| "cmt_id": "d999063be0cf91bff8e0d6daaea21e1a4f70d336" |
| }, |
| "CVE-2020-11669": { |
| "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", |
| "cmt_id": "1855c5436fa50e8dc930b0a24c52157dceef9a54" |
| } |
| }, |
| "4.19.118": { |
| "CVE-2020-12659": { |
| "cmt_msg": "xsk: Add missing check on user supplied headroom size", |
| "cmt_id": "ad8fb61c184fe0f8d1e0b5b954d010fb9f94a6ee" |
| } |
| }, |
| "4.19.119": { |
| "CVE-2020-11884": { |
| "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses", |
| "cmt_id": "215d1f3928713d6eaec67244bcda72105b898000" |
| }, |
| "CVE-2020-1749": { |
| "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", |
| "cmt_id": "5dd6835278454a7c7a045462253625de7c16b13e" |
| }, |
| "CVE-2020-12464": { |
| "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", |
| "cmt_id": "45ea77b75a604da875186519fea94997175c38e3" |
| }, |
| "CVE-2020-0067": { |
| "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", |
| "cmt_id": "ed523cbd4a6594edf123dc03ec9d70ea4f793671" |
| }, |
| "CVE-2019-19768": { |
| "cmt_msg": "blktrace: Protect q->blk_trace with RCU", |
| "cmt_id": "473d7f5ed75b8c3750f0c6b442c8e23090d6da8f" |
| }, |
| "CVE-2020-12114": { |
| "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", |
| "cmt_id": "f511dc75d22e0c000fc70b54f670c2c17f5fba9a" |
| } |
| }, |
| "4.19.121": { |
| "CVE-2020-10751": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" |
| }, |
| "CVE-2020-0255": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" |
| } |
| }, |
| "4.19.124": { |
| "CVE-2020-13143": { |
| "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", |
| "cmt_id": "a105bb549252e3e8bd9db0bdd81cdd6a853e4238" |
| }, |
| "CVE-2020-10711": { |
| "cmt_msg": "netlabel: cope with NULL catmap", |
| "cmt_id": "caf6c20c6421ca687751d27b96c8021c655e56e6" |
| }, |
| "CVE-2020-12770": { |
| "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", |
| "cmt_id": "34fcb4291e234468f9bf9d4b851c9f522f3bbb13" |
| }, |
| "CVE-2020-27786": { |
| "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", |
| "cmt_id": "a507658fdb2ad8ca282b0eb42f2a40b805deb1e6" |
| } |
| }, |
| "4.19.125": { |
| "CVE-2020-12768": { |
| "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()", |
| "cmt_id": "008708152ebb229c29e065135599984fa9c4a51c" |
| }, |
| "CVE-2019-18814": { |
| "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init", |
| "cmt_id": "f1738ae012a106c6c8fa7d33ed47fb478d9d3c75" |
| } |
| }, |
| "4.19.126": { |
| "CVE-2020-10732": { |
| "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", |
| "cmt_id": "d16b0abe2687f7f0a2f6343a09797e8aac045c86" |
| } |
| }, |
| "4.19.127": { |
| "CVE-2020-10757": { |
| "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", |
| "cmt_id": "78385480fd6572a83e7541e37658d9a7de6dc9b1" |
| }, |
| "CVE-2019-19462": { |
| "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", |
| "cmt_id": "8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622" |
| } |
| }, |
| "4.19.128": { |
| "CVE-2020-13974": { |
| "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", |
| "cmt_id": "18059925dbb6a7b6be1c0166ecca29d6b7977c9a" |
| }, |
| "CVE-2020-0543": { |
| "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", |
| "cmt_id": "6682fe2fca22e45153e69f5b7ce7282bcba3565f" |
| } |
| }, |
| "4.19.129": { |
| "CVE-2019-20810": { |
| "cmt_msg": "media: go7007: fix a miss of snd_card_free", |
| "cmt_id": "95b58c96a28e6174661dcd5bc543618973fc43d3" |
| }, |
| "CVE-2018-20669": { |
| "cmt_msg": "make 'user_access_begin()' do 'access_ok()'", |
| "cmt_id": "216284c4a126b28469eb0bf4994c669e251f47ba" |
| }, |
| "CVE-2021-0342": { |
| "cmt_msg": "tun: correct header offsets in napi frags mode", |
| "cmt_id": "75e36c19ff10836e5d03f87cf17793cf83b59430" |
| }, |
| "CVE-2020-29368": { |
| "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", |
| "cmt_id": "453d8a481b127edfa7fb76af1bc7586b7a63bdd2" |
| }, |
| "CVE-2020-10766": { |
| "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", |
| "cmt_id": "5aaf72a0dcb82d5c98f3b7df149baf4c7cf63e19" |
| }, |
| "CVE-2020-10767": { |
| "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", |
| "cmt_id": "5d9d55cf4733c5ced8e1d19ea242a128ab9612d2" |
| }, |
| "CVE-2019-18885": { |
| "cmt_msg": "btrfs: merge btrfs_find_device and find_device", |
| "cmt_id": "8cb9b069fa631b613bbbd6f63887190e55cafa3c" |
| }, |
| "CVE-2019-19036": { |
| "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations", |
| "cmt_id": "227af79e6cb0ee3faeb8c70be4bc0aec0b09ea25" |
| }, |
| "CVE-2020-10768": { |
| "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", |
| "cmt_id": "52c419ba4c96880abd61b38e6e08e4ecd17350f3" |
| } |
| }, |
| "4.19.130": { |
| "CVE-2020-12771": { |
| "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", |
| "cmt_id": "2ee8f6e72269eb06649ebab3da6bbf59aed3eabe" |
| }, |
| "CVE-2020-15436": { |
| "cmt_msg": "block: Fix use-after-free in blkdev_get()", |
| "cmt_id": "49289b1fa5a67011c4010e4e9c801b9d565ce395" |
| } |
| }, |
| "4.19.131": { |
| "CVE-2020-12655": { |
| "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", |
| "cmt_id": "135eccd83909e75389a5754577b0336bbd0939ef" |
| } |
| }, |
| "4.19.132": { |
| "CVE-2020-24394": { |
| "cmt_msg": "nfsd: apply umask on fs without ACL support", |
| "cmt_id": "2b3faab744b04de198aee4ed8dd74fca7a2a8306" |
| }, |
| "CVE-2020-15393": { |
| "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", |
| "cmt_id": "7b0f1f89a0dd6e257367eddc840179e85195ca18" |
| } |
| }, |
| "4.19.134": { |
| "CVE-2020-14356": { |
| "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", |
| "cmt_id": "0505cc4c908f46a4d22c4994dbbe7bc489d0c52d" |
| }, |
| "CVE-2020-10781": { |
| "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", |
| "cmt_id": "81a91bf266dd7f2dd56fc3472b7bb54348ac62c7" |
| } |
| }, |
| "4.19.135": { |
| "CVE-2020-15437": { |
| "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", |
| "cmt_id": "c358255ff1dfa51ddbcbc8dfcc4eaa5719008daa" |
| } |
| }, |
| "4.19.137": { |
| "CVE-2019-19061": { |
| "cmt_msg": "iio: imu: adis16400: fix memory leak", |
| "cmt_id": "c57c213538156bff971aa352d9d7749196dfbfd8" |
| }, |
| "CVE-2019-19067": { |
| "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init", |
| "cmt_id": "e15f8a9b0046418295d09db24c1ec306c80d013b" |
| }, |
| "CVE-2020-24490": { |
| "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", |
| "cmt_id": "5df9e5613d1c51e16b1501a4c75e139fbbe0fb6c" |
| }, |
| "CVE-2019-19816": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" |
| }, |
| "CVE-2019-3874": { |
| "cmt_msg": "sctp: implement memory accounting on tx path", |
| "cmt_id": "9a84bb13816fe3b361a75e10ee9821ab68aa36f5" |
| }, |
| "CVE-2019-19082": { |
| "cmt_msg": "drm/amd/display: prevent memory leak", |
| "cmt_id": "60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e" |
| }, |
| "CVE-2019-18808": { |
| "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", |
| "cmt_id": "167edeeb034f65f57790ff70b1af84a501274d15" |
| }, |
| "CVE-2019-19813": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" |
| }, |
| "CVE-2019-19054": { |
| "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", |
| "cmt_id": "17271f33fd8811b364ae3c54671566434d46d3eb" |
| }, |
| "CVE-2019-19074": { |
| "cmt_msg": "ath9k: release allocated buffer if timed out", |
| "cmt_id": "e0cf3ebfcf93dbce123b8bef00f549712efe1135" |
| }, |
| "CVE-2019-19073": { |
| "cmt_msg": "ath9k_htc: release allocated buffer if timed out", |
| "cmt_id": "5b8464dc9a6e81a16481549c77d0d341041e425e" |
| }, |
| "CVE-2019-19072": { |
| "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory", |
| "cmt_id": "7deb2dcb8963812742ed08420cfa4e23bbeda074" |
| } |
| }, |
| "4.19.138": { |
| "CVE-2020-16166": { |
| "cmt_msg": "random32: update the net random state on interrupt and activity", |
| "cmt_id": "29204c846894d73108f87e78aea4757a8ec52c74" |
| } |
| }, |
| "4.19.139": { |
| "CVE-2020-36386": { |
| "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", |
| "cmt_id": "8c4a649c20fec015ebb326f36b47d4e39d9ff5b7" |
| }, |
| "CVE-2019-0148": { |
| "cmt_msg": "i40e: Wrong truncation from u16 to u8", |
| "cmt_id": "48a9be93ff2c5a09e308ef93560ea1f4ecbd22f6" |
| }, |
| "CVE-2019-0147": { |
| "cmt_msg": "i40e: add num_vectors checker in iwarp handler", |
| "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" |
| }, |
| "CVE-2020-14331": { |
| "cmt_msg": "vgacon: Fix for missing check in scrollback handling", |
| "cmt_id": "61219546f3036d2b4a1898be7a38da22e97a3b62" |
| }, |
| "CVE-2019-0145": { |
| "cmt_msg": "i40e: add num_vectors checker in iwarp handler", |
| "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" |
| } |
| }, |
| "4.19.140": { |
| "CVE-2020-26088": { |
| "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", |
| "cmt_id": "b200620cada4eaa63108be32e040ed557a1965fd" |
| }, |
| "CVE-2021-20292": { |
| "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", |
| "cmt_id": "10c8a526b2db1fcdf9e2d59d4885377b91939c55" |
| } |
| }, |
| "4.19.141": { |
| "CVE-2019-19448": { |
| "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", |
| "cmt_id": "627fa9d8071daad6aa84316c1fcb114a62db914f" |
| }, |
| "CVE-2020-25212": { |
| "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", |
| "cmt_id": "a906b868953a9c9bba44649a8fe760e818dd7224" |
| } |
| }, |
| "4.19.142": { |
| "CVE-2020-14314": { |
| "cmt_msg": "ext4: fix potential negative array index in do_split()", |
| "cmt_id": "b3ddf6ba5e28a57729fff1605ae08e21be5c92e3" |
| }, |
| "CVE-2020-29371": { |
| "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", |
| "cmt_id": "9660983738399465fd0e3b1977a61bbd29b2e5be" |
| }, |
| "CVE-2020-0466": { |
| "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", |
| "cmt_id": "dcb6e6efb3298e59d90ee05c6ed33de810314892" |
| } |
| }, |
| "4.19.144": { |
| "CVE-2020-0465": { |
| "cmt_msg": "HID: core: Sanitize event code and type when mapping input", |
| "cmt_id": "a47b8511d90528c77346597e2012100dfc28cd8c" |
| }, |
| "CVE-2020-25641": { |
| "cmt_msg": "block: allow for_each_bvec to support zero len bvec", |
| "cmt_id": "b48bcb664b657ae94b19c0728978c88e012f7a37" |
| }, |
| "CVE-2021-1048": { |
| "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", |
| "cmt_id": "37d933e8b41b83bb8278815e366aec5a542b7e31" |
| }, |
| "CVE-2020-25285": { |
| "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", |
| "cmt_id": "221ea9a3da9169dc3c9a364a5f938e215db6419e" |
| }, |
| "CVE-2020-14385": { |
| "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", |
| "cmt_id": "017265f1421529a473c25dc46a0cee98facbb1a3" |
| }, |
| "CVE-2020-12888": { |
| "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", |
| "cmt_id": "da7aea6eb5608695f590dcd72523536b709d0399" |
| } |
| }, |
| "4.19.146": { |
| "CVE-2020-25284": { |
| "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", |
| "cmt_id": "0070f9906d7190d4c69e338403db4abfec81fe7f" |
| }, |
| "CVE-2020-14390": { |
| "cmt_msg": "fbcon: remove soft scrollback code", |
| "cmt_id": "770adb5d2b8ebe94a92e4c9510f4f2517f4204eb" |
| }, |
| "CVE-2020-28097": { |
| "cmt_msg": "vgacon: remove software scrollback support", |
| "cmt_id": "f5fa64c8daf7b97280865c73903edc0a3eea819e" |
| } |
| }, |
| "4.19.148": { |
| "CVE-2020-25645": { |
| "cmt_msg": "geneve: add transport ports in route lookup for geneve", |
| "cmt_id": "c797110d97c48054d1491251fd713900ff51615c" |
| }, |
| "CVE-2021-0605": { |
| "cmt_msg": "af_key: pfkey_dump needs parameter validation", |
| "cmt_id": "b59a23d596807a5aa88d8dd5655a66c6843729b3" |
| }, |
| "CVE-2020-25643": { |
| "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", |
| "cmt_id": "45676c0bc28eff8f46455b28e2db80a77676488b" |
| }, |
| "CVE-2020-36312": { |
| "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", |
| "cmt_id": "19184bd06f488af62924ff1747614a8cb284ad63" |
| } |
| }, |
| "4.19.150": { |
| "CVE-2020-14386": { |
| "cmt_msg": "net/packet: fix overflow in tpacket_rcv", |
| "cmt_id": "1c3886dc302329f199cc04f8a56ba44d17a0df16" |
| }, |
| "CVE-2020-25211": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" |
| }, |
| "CVE-2021-0448": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" |
| }, |
| "CVE-2021-39634": { |
| "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", |
| "cmt_id": "3e3bbc4d23eeb90bf282e98c7dfeca7702df3169" |
| } |
| }, |
| "4.19.151": { |
| "CVE-2020-28915": { |
| "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", |
| "cmt_id": "43198a5b1c42e3d8aadc6524a73bb3aa3666cd43" |
| } |
| }, |
| "4.19.152": { |
| "CVE-2020-10135": { |
| "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", |
| "cmt_id": "0c75831bc108ec23c663d969181a4dd7e4b651bb" |
| }, |
| "CVE-2020-12352": { |
| "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", |
| "cmt_id": "128278f444ab3a0d38759c4935092d256edc77d0" |
| }, |
| "CVE-2020-12351": { |
| "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", |
| "cmt_id": "360f80e34292dbe91c23e893f90cd357aff8b68a" |
| } |
| }, |
| "4.19.153": { |
| "CVE-2020-0423": { |
| "cmt_msg": "binder: fix UAF when releasing todo list", |
| "cmt_id": "35cc2facc2a5ff52b9aa03f2dc81dcb000d97da3" |
| }, |
| "CVE-2020-25705": { |
| "cmt_msg": "icmp: randomize the global rate limiter", |
| "cmt_id": "d6c552505c0d1719dda42b4af2def0618bd7bf54" |
| } |
| }, |
| "4.19.155": { |
| "CVE-2020-27777": { |
| "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", |
| "cmt_id": "94e8f0bbc475228c93d28b2e0f7e37303db80ffe" |
| }, |
| "CVE-2020-27673": { |
| "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", |
| "cmt_id": "25f6b08895d579b461487291d6e48b3953a8bf65" |
| }, |
| "CVE-2020-25668": { |
| "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", |
| "cmt_id": "619e366268e0430687d07b24b48f7382fc088c9f" |
| }, |
| "CVE-2020-25656": { |
| "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", |
| "cmt_id": "7e3ba72e5b9376e12839ea347c49fc4108244b0c" |
| }, |
| "CVE-2020-27675": { |
| "cmt_msg": "xen/events: avoid removing an event channel while handling it", |
| "cmt_id": "61d359d51a1cce8a5913843c8c3601dc878cc519" |
| } |
| }, |
| "4.19.156": { |
| "CVE-2020-28974": { |
| "cmt_msg": "vt: Disable KD_FONT_OP_COPY", |
| "cmt_id": "6612b754ac0c85ca8b1181b5d3ea4461a8c1bbcb" |
| }, |
| "CVE-2020-35508": { |
| "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", |
| "cmt_id": "b177d2d915cea2d0a590f0034a20299dd1ee3ef2" |
| }, |
| "CVE-2020-25704": { |
| "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", |
| "cmt_id": "29a975bcc107d68e379a55048813ddf3e7b120b8" |
| }, |
| "CVE-2019-19377": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", |
| "cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" |
| }, |
| "CVE-2019-19770": { |
| "cmt_msg": "blktrace: fix debugfs use after free", |
| "cmt_id": "8a78b4c0d6292d32d76b4268b5a33ae089a5d791" |
| }, |
| "CVE-2019-19039": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", |
| "cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" |
| } |
| }, |
| "4.19.157": { |
| "CVE-2020-8694": { |
| "cmt_msg": "powercap: restrict energy meter to root access", |
| "cmt_id": "900281e167f45e0c0e5df6e59fa00334b5e38133" |
| } |
| }, |
| "4.19.158": { |
| "CVE-2020-14351": { |
| "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", |
| "cmt_id": "1cbfb60332f4e62224440f6d38a6b3114b2355f0" |
| } |
| }, |
| "4.19.159": { |
| "CVE-2020-4788": { |
| "cmt_msg": "powerpc/64s: flush L1D on kernel entry", |
| "cmt_id": "f69bb4e51f41973fb7594be1479fa689831efe1a" |
| }, |
| "CVE-2020-25669": { |
| "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", |
| "cmt_id": "8bf2e8fe8a8e2e05246215697bb55f8901faef44" |
| } |
| }, |
| "4.19.160": { |
| "CVE-2020-28941": { |
| "cmt_msg": "speakup: Do not let the line discipline be used several times", |
| "cmt_id": "3560603ef82f11277143a433170bca05bd9288a8" |
| } |
| }, |
| "4.19.162": { |
| "CVE-2020-35519": { |
| "cmt_msg": "net/x25: prevent a couple of overflows", |
| "cmt_id": "304c080fc33258e3b177b6f0736b97d54e6fea3b" |
| } |
| }, |
| "4.19.163": { |
| "CVE-2020-29661": { |
| "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", |
| "cmt_id": "13f10a78097df2f14d4e1fd390dbaa3e28502ca7" |
| }, |
| "CVE-2020-29660": { |
| "cmt_msg": "tty: Fix ->session locking", |
| "cmt_id": "361e822b7d8a9d06d88f7cea0fdb0fb6e41c4d45" |
| }, |
| "CVE-2020-27830": { |
| "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", |
| "cmt_id": "de867367f35237729e285ff6efa3fd4e4b0b9008" |
| } |
| }, |
| "4.19.164": { |
| "CVE-2021-0938": { |
| "cmt_msg": "compiler.h: fix barrier_data() on clang", |
| "cmt_id": "b207caff4176e3a6ba273243da2db2e595e4aad2" |
| }, |
| "CVE-2020-27815": { |
| "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", |
| "cmt_id": "c7e31b2fecfe0ebd5bd6a8274b2fbfb9c9401738" |
| }, |
| "CVE-2020-29568": { |
| "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", |
| "cmt_id": "9039eb22f99545fa80a5897496452cf9962e3289" |
| }, |
| "CVE-2020-29569": { |
| "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", |
| "cmt_id": "014ee1c7d184acb8986152014a570ba7c69d3616" |
| } |
| }, |
| "4.19.166": { |
| "CVE-2020-36158": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", |
| "cmt_id": "b35029a1f24fe511af750537e6565dcf68e5c862" |
| } |
| }, |
| "4.19.167": { |
| "CVE-2020-28374": { |
| "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", |
| "cmt_id": "fff1180d24e68d697f98642d71444316036a81ff" |
| }, |
| "CVE-2021-39648": { |
| "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", |
| "cmt_id": "83b74059fdf1c4fa6ed261725e6f301552ad23f7" |
| } |
| }, |
| "4.19.170": { |
| "CVE-2021-3178": { |
| "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", |
| "cmt_id": "a08c2e586ad047fcea3f75664cca0915c77934fe" |
| } |
| }, |
| "4.19.171": { |
| "CVE-2021-39657": { |
| "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", |
| "cmt_id": "b397fcae2207963747c6f947ef4d06575553eaef" |
| } |
| }, |
| "4.19.172": { |
| "CVE-2020-27825": { |
| "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", |
| "cmt_id": "acfa7ad7b7f6489e2bed20880ce090fdabdbb841" |
| }, |
| "CVE-2021-3347": { |
| "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", |
| "cmt_id": "72f38fffa4758b878f819f8a47761b3f03443f36" |
| } |
| }, |
| "4.19.173": { |
| "CVE-2021-3348": { |
| "cmt_msg": "nbd: freeze the queue while we're adding connections", |
| "cmt_id": "424838c0f727f1d11ce2ccaabba96f4346c03906" |
| } |
| }, |
| "4.19.177": { |
| "CVE-2021-26931": { |
| "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", |
| "cmt_id": "a01b49a9bf91a723f541139c063c1ff681ac536a" |
| }, |
| "CVE-2021-26930": { |
| "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", |
| "cmt_id": "98f16e171e2849dba76e2e0346e914452c030dc5" |
| }, |
| "CVE-2021-21781": { |
| "cmt_msg": "ARM: ensure the signal page contains defined contents", |
| "cmt_id": "80ef523d2cb719c3de66787e922a96b5099d2fbb" |
| }, |
| "CVE-2021-26932": { |
| "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", |
| "cmt_id": "dfed59ee4b41b0937163dfed36752d29e72d0712" |
| } |
| }, |
| "4.19.178": { |
| "CVE-2021-0512": { |
| "cmt_msg": "HID: make arrays usage and value to be the same", |
| "cmt_id": "ffca531f71d078c6caf752d64bc2a592f420f7c6" |
| }, |
| "CVE-2021-3612": { |
| "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", |
| "cmt_id": "88438fdeeffe11dcb05c2dd0ddd22cb6e3f024b4" |
| } |
| }, |
| "4.19.179": { |
| "CVE-2021-30002": { |
| "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", |
| "cmt_id": "ff2111a6fab31923685b6ca8ea466ea0576b8a0e" |
| }, |
| "CVE-2021-27365": { |
| "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", |
| "cmt_id": "b2957d7baff77b399c7408dc12bacc7f63765897" |
| }, |
| "CVE-2021-27364": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" |
| }, |
| "CVE-2021-27363": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" |
| }, |
| "CVE-2021-28038": { |
| "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", |
| "cmt_id": "1a999d25ef536a14f6a7c25778836857adfba3f8" |
| } |
| }, |
| "4.19.181": { |
| "CVE-2021-33033": { |
| "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", |
| "cmt_id": "a44af1c69737f9e64d5134c34eb9d5c4c2e04da1" |
| }, |
| "CVE-2021-29265": { |
| "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", |
| "cmt_id": "c6b0ca71d3cd561decd39c1c4132c2d10a496e1a" |
| }, |
| "CVE-2021-28660": { |
| "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", |
| "cmt_id": "eda4378094de16090d74eacea3d8c10f7719ed25" |
| } |
| }, |
| "4.19.183": { |
| "CVE-2021-28964": { |
| "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", |
| "cmt_id": "12dc6889bcff1bc2921a1587afca55ca4091b73e" |
| }, |
| "CVE-2021-28972": { |
| "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", |
| "cmt_id": "f27a00f0d5b0646a52633e98f5fc3ef719004dcd" |
| }, |
| "CVE-2021-28971": { |
| "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", |
| "cmt_id": "b35214c541365c7dd7c9d5f44a02b0633a1cc83f" |
| } |
| }, |
| "4.19.184": { |
| "CVE-2021-28688": { |
| "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", |
| "cmt_id": "16356ddb587867c2a5ab85407eeb75f2b8818207" |
| }, |
| "CVE-2021-31916": { |
| "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", |
| "cmt_id": "76aa61c55279fdaa8d428236ba8834edf313b372" |
| }, |
| "CVE-2021-29264": { |
| "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", |
| "cmt_id": "9943741c2792a7f1d091aad38f496ed6eb7681c4" |
| }, |
| "CVE-2021-29647": { |
| "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", |
| "cmt_id": "5f09be2a1a35cb8bd6c178d5f205b7265bd68646" |
| }, |
| "CVE-2021-29650": { |
| "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", |
| "cmt_id": "81bc258370c6eeb1f41d350325e8a2c8e20fafad" |
| } |
| }, |
| "4.19.185": { |
| "CVE-2021-0941": { |
| "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", |
| "cmt_id": "8c1a77ae15ce70a72f26f4bb83c50f769011220c" |
| }, |
| "CVE-2021-3483": { |
| "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", |
| "cmt_id": "89a2c28a3b67c7d918218f57e4bb7b591f7e5d0f" |
| } |
| }, |
| "4.19.186": { |
| "CVE-2021-29154": { |
| "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", |
| "cmt_id": "5f26f1f838aa960045c712e13dbab8ff451fed74" |
| } |
| }, |
| "4.19.187": { |
| "CVE-2021-3659": { |
| "cmt_msg": "net: mac802154: Fix general protection fault", |
| "cmt_id": "c166c0f5311dc9de687b8985574a5ee5166d367e" |
| }, |
| "CVE-2020-25672": { |
| "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", |
| "cmt_id": "301a4264d6ab56d2b9230066b060d7ceaa000d68" |
| }, |
| "CVE-2020-25673": { |
| "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", |
| "cmt_id": "eab391e0766ed88262160b14bb7131f331f6af1a" |
| }, |
| "CVE-2020-25670": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", |
| "cmt_id": "adbb1d218c5f56dbae052765da83c0f57fce2a31" |
| }, |
| "CVE-2020-25671": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", |
| "cmt_id": "c14b50185cd0d5ba6d7a5eb8acf9fbcc3663416d" |
| } |
| }, |
| "4.19.188": { |
| "CVE-2021-0937": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" |
| }, |
| "CVE-2021-22555": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" |
| } |
| }, |
| "4.19.189": { |
| "CVE-2020-29374": { |
| "cmt_msg": "gup: document and work around \"COW can break either way\" issue", |
| "cmt_id": "5e24029791e809d641e9ea46a1f99806484e53fc" |
| }, |
| "CVE-2021-23133": { |
| "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", |
| "cmt_id": "301084de76eb5bfedddda41ec33e2913e90c99e7" |
| } |
| }, |
| "4.19.191": { |
| "CVE-2021-4157": { |
| "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", |
| "cmt_id": "f27638a92f77d8107efbaf48a0d3bfa24da8cdad" |
| }, |
| "CVE-2021-33034": { |
| "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", |
| "cmt_id": "75e26178e26f910f7f26c79c2824b726eecf0dfb" |
| }, |
| "CVE-2021-32399": { |
| "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", |
| "cmt_id": "35113c4c9fa7c970ff456982e381dc9e9594154a" |
| }, |
| "CVE-2021-3506": { |
| "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", |
| "cmt_id": "bfa08a47cea2a9fab077c7135b9cfdf04e69c67a" |
| } |
| }, |
| "4.19.192": { |
| "CVE-2020-26558": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" |
| }, |
| "CVE-2021-0129": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" |
| } |
| }, |
| "4.19.193": { |
| "CVE-2021-33098": { |
| "cmt_msg": "ixgbe: fix large MTU request from VF", |
| "cmt_id": "938ffd6d2dd78fb83b9346c9b689e2a3a6fe7174" |
| }, |
| "CVE-2020-24587": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" |
| }, |
| "CVE-2020-24586": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" |
| }, |
| "CVE-2021-34981": { |
| "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", |
| "cmt_id": "f8be26b9950710fe50fb45358df5bd01ad18efb7" |
| }, |
| "CVE-2020-24588": { |
| "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", |
| "cmt_id": "8ea9e997642360ea097710cfa7b1cd750a73fe64" |
| }, |
| "CVE-2020-26139": { |
| "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", |
| "cmt_id": "24347f561816634ab780bf7e03deeb049898b3bc" |
| }, |
| "CVE-2020-26147": { |
| "cmt_msg": "mac80211: assure all fragments are encrypted", |
| "cmt_id": "3c919823e4cad7bdc2c92b0dd3b4dc463c9315bd" |
| } |
| }, |
| "4.19.194": { |
| "CVE-2021-3564": { |
| "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", |
| "cmt_id": "64700748e8a7af4883538c72ada57999d9a78e92" |
| }, |
| "CVE-2021-38208": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" |
| }, |
| "CVE-2021-3573": { |
| "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", |
| "cmt_id": "2b9e9c2ed0f1910b5201c5d37b355b60201df415" |
| }, |
| "CVE-2021-3587": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" |
| } |
| }, |
| "4.19.196": { |
| "CVE-2021-34693": { |
| "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", |
| "cmt_id": "8899857d7e450805e6410de5004126491f197146" |
| }, |
| "CVE-2021-45486": { |
| "cmt_msg": "inet: use bigger hash table for IP ID generation", |
| "cmt_id": "7f7e23df8509e072593200400a4b094cc44376d2" |
| }, |
| "CVE-2021-35039": { |
| "cmt_msg": "module: limit enabling module.sig_enforce", |
| "cmt_id": "ff660863628fb144badcb3395cde7821c82c13a6" |
| }, |
| "CVE-2021-3743": { |
| "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", |
| "cmt_id": "f8111c0d7ed42ede41a3d0d393b104de0730a8a6" |
| } |
| }, |
| "4.19.197": { |
| "CVE-2020-36311": { |
| "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy", |
| "cmt_id": "cadf5bbcefbd9717e51c61d6128b520583ffdf4f" |
| } |
| }, |
| "4.19.198": { |
| "CVE-2021-45485": { |
| "cmt_msg": "ipv6: use prandom_u32() for ID generation", |
| "cmt_id": "f0be58ec9931907e980cf21737e51d369808eb95" |
| }, |
| "CVE-2021-3655": { |
| "cmt_msg": "sctp: validate from_addr_param return", |
| "cmt_id": "c7a03ebace4f9cd40d9cd9dd5fb2af558025583c" |
| }, |
| "CVE-2021-38199": { |
| "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", |
| "cmt_id": "743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368" |
| }, |
| "CVE-2021-3609": { |
| "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", |
| "cmt_id": "eabe65197876e4a0906eab784f5766c4c76098c7" |
| }, |
| "CVE-2022-0850": { |
| "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", |
| "cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0" |
| }, |
| "CVE-2021-33909": { |
| "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", |
| "cmt_id": "6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d" |
| }, |
| "CVE-2021-38160": { |
| "cmt_msg": "virtio_console: Assure used length from device is limited", |
| "cmt_id": "b5fba782ccd3d12a14f884cd20f255fc9c0eec0c" |
| } |
| }, |
| "4.19.199": { |
| "CVE-2021-38204": { |
| "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", |
| "cmt_id": "51fc12f4d37622fa0c481604833f98f11b1cac4f" |
| }, |
| "CVE-2021-3679": { |
| "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", |
| "cmt_id": "6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a" |
| }, |
| "CVE-2021-37576": { |
| "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", |
| "cmt_id": "0493b10c06021796ba80cbe53c961defd5aca6e5" |
| }, |
| "CVE-2021-22543": { |
| "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", |
| "cmt_id": "117777467bc015f0dc5fc079eeba0fa80c965149" |
| } |
| }, |
| "4.19.200": { |
| "CVE-2021-0920": { |
| "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", |
| "cmt_id": "1dabafa9f61118b1377fde424d9a94bf8dbf2813" |
| } |
| }, |
| "4.19.204": { |
| "CVE-2021-38198": { |
| "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", |
| "cmt_id": "4c07e70141eebd3db64297515a427deea4822957" |
| }, |
| "CVE-2021-38205": { |
| "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", |
| "cmt_id": "9322401477a6d1f9de8f18e5d6eb43a68e0b113a" |
| }, |
| "CVE-2021-3732": { |
| "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", |
| "cmt_id": "963d85d630dabe75a3cfde44a006fec3304d07b8" |
| }, |
| "CVE-2021-33624": { |
| "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", |
| "cmt_id": "0abc8c9754c953f5cd0ac7488c668ca8d53ffc90" |
| } |
| }, |
| "4.19.205": { |
| "CVE-2021-42008": { |
| "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", |
| "cmt_id": "4e370cc081a78ee23528311ca58fd98a06768ec7" |
| }, |
| "CVE-2021-3653": { |
| "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", |
| "cmt_id": "42f4312c0e8a225b5f1e3ed029509ef514f2157a" |
| }, |
| "CVE-2021-3656": { |
| "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", |
| "cmt_id": "119d547cbf7c055ba8100309ad71910478092f24" |
| }, |
| "CVE-2020-3702": { |
| "cmt_msg": "ath: Use safer key clearing with key cache entries", |
| "cmt_id": "dd5815f023b89c9a28325d8a2a5f0779b57b7190" |
| } |
| }, |
| "4.19.206": { |
| "CVE-2021-3444": { |
| "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", |
| "cmt_id": "39f74b7c81cca139c05757d9c8f9d1e35fbbf56b" |
| }, |
| "CVE-2021-3600": { |
| "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", |
| "cmt_id": "8313432df224d926590731ec3ace3e1bd7bc4a1a" |
| }, |
| "CVE-2021-3753": { |
| "cmt_msg": "vt_kdsetmode: extend console locking", |
| "cmt_id": "0776c1a20babb4ad0b7ce7f2f4e0806a97663187" |
| }, |
| "CVE-2021-39633": { |
| "cmt_msg": "ip_gre: add validation for csum_start", |
| "cmt_id": "c33471daf2763c5aee2b7926202c74b75c365119" |
| } |
| }, |
| "4.19.207": { |
| "CVE-2021-42252": { |
| "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", |
| "cmt_id": "9c8891b638319ddba9cfa330247922cd960c95b0" |
| }, |
| "CVE-2021-34556": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", |
| "cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" |
| }, |
| "CVE-2021-35477": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", |
| "cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" |
| }, |
| "CVE-2020-16119": { |
| "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", |
| "cmt_id": "dfec82f3e5b8bd93ab65b7417a64886ec8c42f14" |
| }, |
| "CVE-2021-40490": { |
| "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", |
| "cmt_id": "c481607ba522e31e6ed01efefc19cc1d0e0a46fa" |
| } |
| }, |
| "4.19.208": { |
| "CVE-2021-20320": { |
| "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", |
| "cmt_id": "ddf58efd05b5d16d86ea4638675e8bd397320930" |
| } |
| }, |
| "4.19.209": { |
| "CVE-2021-3764": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" |
| }, |
| "CVE-2021-4203": { |
| "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", |
| "cmt_id": "0512a9aede6e4417c4fa6e0042a7ca8bc7e06b86" |
| }, |
| "CVE-2021-3744": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" |
| }, |
| "CVE-2021-37159": { |
| "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", |
| "cmt_id": "f6cf22a1ef49f8e131f99c3f5fd80ab6b23a2d21" |
| } |
| }, |
| "4.19.210": { |
| "CVE-2021-20317": { |
| "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", |
| "cmt_id": "b9a1ac8e7c03fd09992352c7fb1a61cbbb9ad52b" |
| } |
| }, |
| "4.19.211": { |
| "CVE-2021-20321": { |
| "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", |
| "cmt_id": "9d4969d8b5073d02059bae3f1b8d9a20cf023c55" |
| }, |
| "CVE-2021-41864": { |
| "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", |
| "cmt_id": "078cdd572408176a3900a6eb5a403db0da22f8e0" |
| }, |
| "CVE-2021-38300": { |
| "cmt_msg": "bpf, mips: Validate conditional branch offsets", |
| "cmt_id": "79f3a086dfc34887f9bbb0801768608b9470e942" |
| } |
| }, |
| "4.19.213": { |
| "CVE-2021-3894": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" |
| }, |
| "CVE-2022-0322": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" |
| } |
| }, |
| "4.19.214": { |
| "CVE-2021-3896": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" |
| }, |
| "CVE-2022-0644": { |
| "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", |
| "cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735" |
| }, |
| "CVE-2021-3760": { |
| "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", |
| "cmt_id": "1ac0d736c8ae9b59ab44e4e80ad73c8fba5c6132" |
| }, |
| "CVE-2021-43389": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" |
| } |
| }, |
| "4.19.215": { |
| "CVE-2021-20322": { |
| "cmt_msg": "ipv6: make exception cache less predictible", |
| "cmt_id": "c6d0d68d6da68159948cad3d808d61bb291a0283" |
| }, |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "1f52dfacca7bb315d89f5ece5660b0337809798e" |
| } |
| }, |
| "4.19.216": { |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", |
| "cmt_id": "53ec9dab4eb0a8140fc85760fb50effb526fe219" |
| } |
| }, |
| "4.19.218": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "62be2b1e7914b7340281f09412a7bbb62e6c8b67" |
| }, |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "72bb30165337b7bce77578ad151fbfab6c8e693c" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "e5222c87dc441dcc8a66e93cb3fd34dfff03d3ec" |
| }, |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "5d40061285b81a7e213dc9b37acc4a0545eedf32" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "c1c913f797f3d2441310182ad75b7bd855a327ff" |
| } |
| }, |
| "4.19.219": { |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "b0313bc7f5fbb6beee327af39d818ffdc921821a" |
| } |
| }, |
| "4.19.220": { |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", |
| "cmt_id": "0275fcd9b54f0364f66f2f3f6a0f3748648f3d35" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "8bf31f9d9395b71af3ed33166a057cd3ec0c59da" |
| } |
| }, |
| "4.19.221": { |
| "CVE-2021-39713": { |
| "cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock", |
| "cmt_id": "ae214e04b95ff64a4b0e9aab6742520bfde6ff0c" |
| }, |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "8dd7c46a59756bdc29cb9783338b899cd3fb4b83" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "13e45e7a262dd96e8161823314679543048709b9" |
| } |
| }, |
| "4.19.222": { |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "c9f17e92917fd5786be872626a3928979ecc4c39" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection", |
| "cmt_id": "1de7644eac41981817fb66b74e0f82ca4477dc9d" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "3559ca594f15fcd23ed10c0056d40d71e5dab8e5" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "269d7124bcfad2558d2329d0fe603ca20b20d3f4" |
| }, |
| "CVE-2021-4135": { |
| "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", |
| "cmt_id": "d861443c4dc88650eed113310d933bd593d37b23" |
| } |
| }, |
| "4.19.223": { |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", |
| "cmt_id": "f9dfa44be0fb5e8426183a70f69a246cf5827f49" |
| }, |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59" |
| } |
| }, |
| "4.19.224": { |
| "CVE-2021-44733": { |
| "cmt_msg": "tee: handle lookup of shm with reference count 0", |
| "cmt_id": "b4a661b4212b8fac8853ec3b68e4a909dccc88a1" |
| } |
| }, |
| "4.19.225": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "4dece2760af408ad91d6e43afc485d20386c2885" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "1c3564fca0e7b8c9e96245a2cb35e198b036ee9a" |
| } |
| }, |
| "4.19.226": { |
| "CVE-2020-36322": { |
| "cmt_msg": "fuse: fix bad inode", |
| "cmt_id": "1e1bb4933f1faafc68db8e0ecd5838a65dd1aae9" |
| }, |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "2f4b037bf6e8c663a593b8149263c5b6940c7afd" |
| } |
| }, |
| "4.19.227": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "b188780649081782e341e52223db47c49f172712" |
| }, |
| "CVE-2022-22942": { |
| "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d" |
| } |
| }, |
| "4.19.228": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "a23a59717f9f01a49394488f515550f9382fbada" |
| }, |
| "CVE-2022-24959": { |
| "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", |
| "cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7" |
| } |
| }, |
| "4.19.229": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3" |
| }, |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552" |
| } |
| }, |
| "4.19.230": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164" |
| } |
| }, |
| "4.19.232": { |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337" |
| } |
| }, |
| "4.19.233": { |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52" |
| } |
| }, |
| "4.19.234": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "17659846fe336366b1663194f5669d10f5947f53" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "17659846fe336366b1663194f5669d10f5947f53" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()", |
| "cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "8d521d960aef22781ff499e16899c30af899de8d" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5" |
| } |
| }, |
| "4.19.235": { |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c" |
| }, |
| "CVE-2021-4149": { |
| "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", |
| "cmt_id": "73d55fa1b9310573f623195a4f7ab3170bbaf248" |
| } |
| }, |
| "4.19.237": { |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "0043b74987acb44f1ade537aad901695511cfebe" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "d14193111c436fc5de33206c67c7afd45c730099" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b" |
| }, |
| "CVE-2022-27666": { |
| "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", |
| "cmt_id": "ce89087966651ad41e103770efc5ce2742046284" |
| } |
| }, |
| "4.19.238": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "79e2f40c210a47f283bca352745068207798fbb9" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", |
| "cmt_id": "0bd407959f7d6671ba0617e2dbda3e89d8a0419f" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "4c240c5a105557e4546d0836e694868f22fd09b0" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", |
| "cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9" |
| } |
| }, |
| "4.19.240": { |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", |
| "cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", |
| "cmt_id": "512f09df261b51b088f17d86dbdf300a3492523d" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe" |
| } |
| }, |
| "outstanding": { |
| "CVE-2021-0929": { |
| "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" |
| }, |
| "CVE-2018-20854": { |
| "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1419": { |
| "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2019-15794": { |
| "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" |
| }, |
| "CVE-2019-2181": { |
| "cmt_msg": "binder: check for overflow when alloc for security context" |
| }, |
| "CVE-2021-3759": { |
| "cmt_msg": "memcg: enable accounting of ipc resources" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19449": { |
| "cmt_msg": "f2fs: fix to do sanity check on segment/section count" |
| }, |
| "CVE-2020-24504": { |
| "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" |
| }, |
| "CVE-2020-26541": { |
| "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" |
| }, |
| "CVE-2019-15222": { |
| "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19815": { |
| "cmt_msg": "f2fs: support swap file w/ DIO" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe" |
| }, |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." |
| }, |
| "CVE-2019-19241": { |
| "cmt_msg": "io_uring: async workers should inherit the user creds" |
| }, |
| "CVE-2021-26934": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12379": { |
| "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" |
| }, |
| "CVE-2019-12378": { |
| "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2019-20908": { |
| "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4037": { |
| "cmt_msg": "xfs: fix up non-directory creation in SGID directories" |
| }, |
| "CVE-2020-26145": { |
| "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" |
| }, |
| "CVE-2021-20177": { |
| "cmt_msg": "netfilter: add and use nf_hook_slow_list()" |
| }, |
| "CVE-2021-3669": { |
| "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4023": { |
| "cmt_msg": "io-wq: fix cancellation on create-worker failure" |
| }, |
| "CVE-2019-19070": { |
| "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0812": { |
| "cmt_msg": "xprtrdma: fix incorrect header size calculations" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1508": { |
| "cmt_msg": "io_uring: reexpand under-reexpanded iters" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" |
| }, |
| "CVE-2021-4159": { |
| "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4150": { |
| "cmt_msg": "block: fix incorrect references to disk objects" |
| }, |
| "CVE-2021-28951": { |
| "cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-29155": { |
| "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12455": { |
| "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-12362": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2020-12363": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" |
| }, |
| "CVE-2020-12364": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" |
| }, |
| "CVE-2022-0480": { |
| "cmt_msg": "memcg: enable accounting for file lock caches" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26141": { |
| "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4218": { |
| "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15780": { |
| "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" |
| }, |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" |
| }, |
| "CVE-2022-1043": { |
| "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" |
| }, |
| "CVE-2020-36385": { |
| "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" |
| }, |
| "CVE-2019-12380": { |
| "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" |
| }, |
| "CVE-2019-12381": { |
| "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" |
| }, |
| "CVE-2020-7053": { |
| "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" |
| }, |
| "CVE-2020-12656": { |
| "cmt_msg": "sunrpc: check that domain table is empty at module unload." |
| }, |
| "CVE-2020-16120": { |
| "cmt_msg": "ovl: switch to mounter creds in readdir" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-0149": { |
| "cmt_msg": "i40e: Add bounds check for ch[] array" |
| }, |
| "CVE-2020-36310": { |
| "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" |
| }, |
| "CVE-2020-36313": { |
| "cmt_msg": "KVM: Fix out of range accesses to memslots" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0707": { |
| "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" |
| }, |
| "CVE-2019-11191": { |
| "cmt_msg": "x86: Deprecate a.out support" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1280": { |
| "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-18680": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-32078": { |
| "cmt_msg": "ARM: footbridge: remove personal server platform" |
| }, |
| "CVE-2019-10220": { |
| "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" |
| }, |
| "CVE-2020-27835": { |
| "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" |
| }, |
| "CVE-2019-5489": { |
| "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" |
| } |
| } |
| }, |
| "4.9": { |
| "4.9": { |
| "CVE-2016-9576": { |
| "cmt_msg": "Don't feed anything but regular iovec's to blk_rq_map_user_iov", |
| "cmt_id": "a0ac402cfcdc904f9772e1762b3fda112dcc56a0" |
| }, |
| "CVE-2016-10147": { |
| "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", |
| "cmt_id": "48a992727d82cb7db076fa15d372178743b1f4cd" |
| }, |
| "CVE-2016-8399": { |
| "cmt_msg": "net: ping: check minimum size on ICMP header length", |
| "cmt_id": "0eab121ef8750a5c8637d51534d5e9143fb0633f" |
| } |
| }, |
| "4.9.1": { |
| "CVE-2016-10154": { |
| "cmt_msg": "cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack", |
| "cmt_id": "7aa58e7ad53bd9536aa49a18ccd0778c728bf57d" |
| }, |
| "CVE-2015-8709": { |
| "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", |
| "cmt_id": "694a95fa6dae4991f16cda333d897ea063021fed" |
| } |
| }, |
| "4.9.2": { |
| "CVE-2016-9588": { |
| "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", |
| "cmt_id": "3f618a0b872fea38c7d1d1f79eda40f88c6466c2" |
| }, |
| "CVE-2016-10088": { |
| "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", |
| "cmt_id": "3f3a6bbe6f9f5e895d8945494173594ee51632da" |
| } |
| }, |
| "4.9.3": { |
| "CVE-2016-10741": { |
| "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", |
| "cmt_id": "3978c5bb004312fd267aed7279fe64b119e126b0" |
| } |
| }, |
| "4.9.4": { |
| "CVE-2017-7273": { |
| "cmt_msg": "HID: hid-cypress: validate length of report", |
| "cmt_id": "2c867216c555f5897b327daed6240bfb9e489c97" |
| } |
| }, |
| "4.9.5": { |
| "CVE-2016-9191": { |
| "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", |
| "cmt_id": "00cf64fbaa1e99d0420f2934f301c671ba298342" |
| }, |
| "CVE-2017-5549": { |
| "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", |
| "cmt_id": "58ede4beda662c4e1681fee4fae2174028a1a841" |
| }, |
| "CVE-2017-5546": { |
| "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries", |
| "cmt_id": "8315c22ea879082bba365d46dd2cc7881fbfb49a" |
| }, |
| "CVE-2017-5550": { |
| "cmt_msg": "fix a fencepost error in pipe_advance()", |
| "cmt_id": "d06367ac1730ded79aa78307126236bf83af95a3" |
| }, |
| "CVE-2017-2583": { |
| "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", |
| "cmt_id": "7718ffcf9a64830bbae148432f625346cde2f2d6" |
| }, |
| "CVE-2017-2584": { |
| "cmt_msg": "KVM: x86: Introduce segmented_write_std", |
| "cmt_id": "736e77c07fba8b49cead504b885a82ce52c0ff10" |
| } |
| }, |
| "4.9.6": { |
| "CVE-2017-5547": { |
| "cmt_msg": "HID: corsair: fix DMA buffers on stack", |
| "cmt_id": "63df1ccb937f67fbefa0a77415b3a4d10434a09b" |
| }, |
| "CVE-2017-5551": { |
| "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", |
| "cmt_id": "782b361c93062f083bbc9a78928498218f950399" |
| }, |
| "CVE-2017-5548": { |
| "cmt_msg": "ieee802154: atusb: do not use the stack for buffers to make them DMA able", |
| "cmt_id": "86249aef233e6e05ba84f6c9aab9e6b890fc6ba7" |
| }, |
| "CVE-2016-10764": { |
| "cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()", |
| "cmt_id": "e55e6c026b7c49c4dcc33f4ebc330e660ecf3963" |
| }, |
| "CVE-2016-10153": { |
| "cmt_msg": "libceph: introduce ceph_crypt() for in-place en/decryption", |
| "cmt_id": "ecf7ced8562811576cd02158d6ae8e44c1fb4671" |
| } |
| }, |
| "4.9.7": { |
| "CVE-2017-6001": { |
| "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", |
| "cmt_id": "922813f4d66fb317e8602d058d03a1619af1ffd0" |
| }, |
| "CVE-2017-5576": { |
| "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout.", |
| "cmt_id": "b9edac54cb85da589ca809bf8dcf86e5cd3f41c0" |
| }, |
| "CVE-2017-5577": { |
| "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing.", |
| "cmt_id": "cfba2a001d0e36905016bb4f87fc47245c944c36" |
| }, |
| "CVE-2016-8405": { |
| "cmt_msg": "fbdev: color map copying bounds checking", |
| "cmt_id": "544160b6ea18670196d1173c099f2cced5075132" |
| } |
| }, |
| "4.9.9": { |
| "CVE-2016-10208": { |
| "cmt_msg": "ext4: validate s_first_meta_bg at mount time", |
| "cmt_id": "13e6ef99d23b05807e7f8a72f45e3d8260b61570" |
| }, |
| "CVE-2017-8071": { |
| "cmt_msg": "HID: cp2112: fix sleep-while-atomic", |
| "cmt_id": "a18c4584a48931e8048508469bcdb53c6082221a" |
| }, |
| "CVE-2017-8072": { |
| "cmt_msg": "HID: cp2112: fix gpio-callback error handling", |
| "cmt_id": "7396685a1bca323b96fd79b836ae22b7569d7068" |
| } |
| }, |
| "4.9.10": { |
| "CVE-2017-2618": { |
| "cmt_msg": "selinux: fix off-by-one in setprocattr", |
| "cmt_id": "6cbaf7b94373743deb42fd410173aab81f8945fe" |
| }, |
| "CVE-2016-8636": { |
| "cmt_msg": "IB/rxe: Fix mem_check_range integer overflow", |
| "cmt_id": "b7dd5edc3dd9191f2cb1bd508279b0ff7274c5aa" |
| } |
| }, |
| "4.9.11": { |
| "CVE-2017-5897": { |
| "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", |
| "cmt_id": "ae1768bbbc469b75662c6714957fe5886cc960c4" |
| }, |
| "CVE-2017-8069": { |
| "cmt_msg": "rtl8150: Use heap buffers for all register access", |
| "cmt_id": "e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec" |
| }, |
| "CVE-2017-8068": { |
| "cmt_msg": "pegasus: Use heap buffers for all register access", |
| "cmt_id": "878b015bcc726560b13be2d906caf6923428f05d" |
| }, |
| "CVE-2017-5970": { |
| "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", |
| "cmt_id": "f5b54446630a973e1f27b68599366bbd0ac53066" |
| }, |
| "CVE-2017-5986": { |
| "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", |
| "cmt_id": "00eff2ebbd229758e90659907724c14dd5a18339" |
| }, |
| "CVE-2017-8070": { |
| "cmt_msg": "catc: Use heap buffer for memory size test", |
| "cmt_id": "970390fd5d53de0817b538350131edd2514a8321" |
| }, |
| "CVE-2017-6214": { |
| "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", |
| "cmt_id": "0f895f51a831d73ce24158534784aba5b2a72a9e" |
| } |
| }, |
| "4.9.13": { |
| "CVE-2017-6345": { |
| "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", |
| "cmt_id": "42b52783a59cc706c71cdc7096edce4a6f086fd3" |
| }, |
| "CVE-2017-6346": { |
| "cmt_msg": "packet: fix races in fanout_add()", |
| "cmt_id": "722737f27774b14be5a1d2d3b9281dcded7c48b2" |
| }, |
| "CVE-2017-6347": { |
| "cmt_msg": "ip: fix IP_CHECKSUM handling", |
| "cmt_id": "481aedf869fbf2d4503ca0005dbd68b78422955a" |
| }, |
| "CVE-2017-6348": { |
| "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", |
| "cmt_id": "c2219da51664451149350e47321aa0fcf72a8b8f" |
| }, |
| "CVE-2017-6074": { |
| "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", |
| "cmt_id": "171d92a9d915d238e05285ca67faf30f554d7df7" |
| } |
| }, |
| "4.9.14": { |
| "CVE-2017-8066": { |
| "cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers", |
| "cmt_id": "cec7abd27e878e3c83dc9af41ee87a2e9d483ac0" |
| }, |
| "CVE-2017-5669": { |
| "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", |
| "cmt_id": "270e84a1e6effd6c0c6e9b13b196b5fdaa392954" |
| } |
| }, |
| "4.9.15": { |
| "CVE-2017-2636": { |
| "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", |
| "cmt_id": "e5b9778761558ff3d239ed76925a1a7a734918ea" |
| } |
| }, |
| "4.9.16": { |
| "CVE-2017-8062": { |
| "cmt_msg": "dw2102: don't do DMA on stack", |
| "cmt_id": "06996254a605913cd7c1927d0e8a89b5138e110d" |
| }, |
| "CVE-2017-8924": { |
| "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", |
| "cmt_id": "d0ef6ecee85e17742d8bce1559872cb542d6ccac" |
| }, |
| "CVE-2016-2188": { |
| "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", |
| "cmt_id": "653418adaf1026a10e0c2e4e29b7319610117b33" |
| }, |
| "CVE-2017-6874": { |
| "cmt_msg": "ucount: Remove the atomicity from ucount->count", |
| "cmt_id": "ee6f7ee1e4cdb0098fee4593ddf11ca6028abef2" |
| }, |
| "CVE-2017-8925": { |
| "cmt_msg": "USB: serial: omninet: fix reference leaks at open", |
| "cmt_id": "6d6c5895f45431579c20f4183b25183f0e3afc92" |
| } |
| }, |
| "4.9.20": { |
| "CVE-2017-7184": { |
| "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", |
| "cmt_id": "64a5465799ee40e3d54d9da3037934cd4b7b502f" |
| }, |
| "CVE-2017-7374": { |
| "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", |
| "cmt_id": "2984e52c75c657db7901f6189f02e0251ca963c2" |
| } |
| }, |
| "4.9.21": { |
| "CVE-2017-7187": { |
| "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", |
| "cmt_id": "c2a869527865c35b605877f966cb5d514fdc5fbb" |
| } |
| }, |
| "4.9.22": { |
| "CVE-2017-7261": { |
| "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", |
| "cmt_id": "73ab72517b61ce4b27ceddec47dd5d6edafb556a" |
| }, |
| "CVE-2017-7616": { |
| "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", |
| "cmt_id": "cddab768d13469d1e254fb8c0e1629f93c8dfaca" |
| }, |
| "CVE-2017-7294": { |
| "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", |
| "cmt_id": "4ddd24d54fedff301e8f020d7b9f70116383af31" |
| } |
| }, |
| "4.9.23": { |
| "CVE-2017-7308": { |
| "cmt_msg": "net/packet: fix overflow in check for priv area size", |
| "cmt_id": "16fc98c2479f5477f2df220acd9cb53686e33f4c" |
| } |
| }, |
| "4.9.24": { |
| "CVE-2017-6353": { |
| "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", |
| "cmt_id": "35b9d61ea910c1ebd4652b32cc7d713f6689b4f4" |
| }, |
| "CVE-2017-8063": { |
| "cmt_msg": "cxusb: Use a dma capable buffer also for reading", |
| "cmt_id": "fb00319317c152bf3528df13a54c28bf8c5daa55" |
| }, |
| "CVE-2017-8061": { |
| "cmt_msg": "dvb-usb-firmware: don't do DMA on stack", |
| "cmt_id": "28d1e8b7ef81d254583f68627095f8a85e39597d" |
| }, |
| "CVE-2017-8067": { |
| "cmt_msg": "virtio-console: avoid DMA from stack", |
| "cmt_id": "86c6667f6a5f6bdb392d8ffbe58fbcbcf6db2704" |
| }, |
| "CVE-2017-8064": { |
| "cmt_msg": "dvb-usb-v2: avoid use-after-free", |
| "cmt_id": "1992564156b5dc4ac73418e5b95e1a43f12f3cb1" |
| }, |
| "CVE-2017-7618": { |
| "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", |
| "cmt_id": "c10479591869177ae7ac0570b54ace6fbdeb57c2" |
| }, |
| "CVE-2017-7889": { |
| "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", |
| "cmt_id": "2c0ad235ac77f2fc2eee593bf06822cad772e0e2" |
| }, |
| "CVE-2017-2596": { |
| "cmt_msg": "kvm: fix page struct leak in handle_vmon", |
| "cmt_id": "75465e71ec3139b958d06d48dfc85720aed69b6a" |
| } |
| }, |
| "4.9.25": { |
| "CVE-2017-7472": { |
| "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", |
| "cmt_id": "174a74dbca2ddc7269c265598399c000e5b9b870" |
| }, |
| "CVE-2016-9604": { |
| "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", |
| "cmt_id": "a5c6e0a76817a3751f58d761aaff7c0b0c4001ff" |
| } |
| }, |
| "4.9.26": { |
| "CVE-2017-7477": { |
| "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec", |
| "cmt_id": "07389a140f48a3d5d223881bb01cef9f389e2844" |
| }, |
| "CVE-2017-7645": { |
| "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", |
| "cmt_id": "fc6445df466f37291a70937642068bda78802a5b" |
| }, |
| "CVE-2017-2671": { |
| "cmt_msg": "ping: implement proper locking", |
| "cmt_id": "e88a8e0a23c23e09858a4f5caeb106da972e7934" |
| }, |
| "CVE-2017-7895": { |
| "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", |
| "cmt_id": "d7809b9e99bb75e83bdd13dc70ce27df61faf5de" |
| } |
| }, |
| "4.9.27": { |
| "CVE-2017-10661": { |
| "cmt_msg": "timerfd: Protect the might cancel mechanism proper", |
| "cmt_id": "00cca9768ebe1ac4ac16366662dd9087b6e5f4e7" |
| } |
| }, |
| "4.9.28": { |
| "CVE-2017-9150": { |
| "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", |
| "cmt_id": "ced0a31e667fbf618591f0a76a8213018407cde0" |
| }, |
| "CVE-2017-10662": { |
| "cmt_msg": "f2fs: sanity check segment count", |
| "cmt_id": "93862955cbf485215f0677229292d0f358af55fc" |
| } |
| }, |
| "4.9.30": { |
| "CVE-2017-18360": { |
| "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", |
| "cmt_id": "f9cd79e0ad1fa620ff34715d24ae1b671c97bc91" |
| }, |
| "CVE-2017-7487": { |
| "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", |
| "cmt_id": "820adccd0e3be9bdd2384ca8fc4712108cfdf28b" |
| }, |
| "CVE-2017-8797": { |
| "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify", |
| "cmt_id": "ea465551af30146efea215da58786ff732da70fb" |
| }, |
| "CVE-2017-1000363": { |
| "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", |
| "cmt_id": "5d263d94a870a774a24acb2a2cc1e79ef39c2416" |
| } |
| }, |
| "4.9.31": { |
| "CVE-2017-9077": { |
| "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", |
| "cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" |
| }, |
| "CVE-2017-9076": { |
| "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", |
| "cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" |
| }, |
| "CVE-2017-9075": { |
| "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", |
| "cmt_id": "5e7d9f0b3f729a64b99e58047f7bb0ff36acb759" |
| }, |
| "CVE-2017-9074": { |
| "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", |
| "cmt_id": "a2c845e51a820549a6df5a1e8907ee754422119e" |
| }, |
| "CVE-2017-9211": { |
| "cmt_msg": "crypto: skcipher - Add missing API setkey checks", |
| "cmt_id": "4472887cbd1373d7781bea9d8935f2d4968dd580" |
| }, |
| "CVE-2017-18221": { |
| "cmt_msg": "mlock: fix mlock count can not decrease in race condition", |
| "cmt_id": "1163e785b1506a4f46dbdee89bbab161dd742186" |
| }, |
| "CVE-2017-8890": { |
| "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", |
| "cmt_id": "4eed44029507acc666ac7afe9c6a8ea0abf857b7" |
| }, |
| "CVE-2017-9242": { |
| "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", |
| "cmt_id": "304b41014acbdc5fa5126c86bac31dc41a245f9f" |
| } |
| }, |
| "4.9.32": { |
| "CVE-2017-9605": { |
| "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", |
| "cmt_id": "7860d0e5e2bf986d4bd06e7b029786747b5dc766" |
| }, |
| "CVE-2017-15274": { |
| "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", |
| "cmt_id": "1b253e023f8f75b109564a61d2050d818f75b4f3" |
| }, |
| "CVE-2017-7346": { |
| "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", |
| "cmt_id": "a76ff847013a7f6b1cd328381ca263ddcca12061" |
| }, |
| "CVE-2017-1000380": { |
| "cmt_msg": "ALSA: timer: Fix race between read and ioctl", |
| "cmt_id": "66e982d8f1a1f5e151377fe37612e9151e552dc9" |
| } |
| }, |
| "4.9.34": { |
| "CVE-2017-1000364": { |
| "cmt_msg": "mm: larger stack guard gap, between vmas", |
| "cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" |
| }, |
| "CVE-2017-1000379": { |
| "cmt_msg": "mm: larger stack guard gap, between vmas", |
| "cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" |
| } |
| }, |
| "4.9.35": { |
| "CVE-2017-10911": { |
| "cmt_msg": "xen-blkback: don't leak stack data via response ring", |
| "cmt_id": "4ae2cb91a6365a6472fad7f04785cc0420ea5ada" |
| }, |
| "CVE-2017-1000365": { |
| "cmt_msg": "fs/exec.c: account for argv/envp pointers", |
| "cmt_id": "3d6848e491df6abbf5fb5b1fabb7a5df2e2b8f4f" |
| }, |
| "CVE-2017-7482": { |
| "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", |
| "cmt_id": "f2060387421109ac389dd209355918b566fc6f84" |
| } |
| }, |
| "4.9.36": { |
| "CVE-2017-18017": { |
| "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", |
| "cmt_id": "ced7689be60ddcac4b1746212c547e8817c5ae5e" |
| } |
| }, |
| "4.9.37": { |
| "CVE-2017-12146": { |
| "cmt_msg": "driver core: platform: fix race condition with driver_override", |
| "cmt_id": "c4c592b2c137e4451b7fdf76700ae9c98db133f5" |
| }, |
| "CVE-2017-10810": { |
| "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", |
| "cmt_id": "366d9207d9e002bf1a6d9da13a7f8f85b8a40c0b" |
| } |
| }, |
| "4.9.38": { |
| "CVE-2017-11176": { |
| "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", |
| "cmt_id": "e6952841ade0f937750c7748a812cb403bd744b0" |
| } |
| }, |
| "4.9.39": { |
| "CVE-2019-9457": { |
| "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", |
| "cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" |
| }, |
| "CVE-2018-14634": { |
| "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", |
| "cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" |
| }, |
| "CVE-2017-11089": { |
| "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", |
| "cmt_id": "b68aa7dff96efc59fee40e25b8044017de21161a" |
| }, |
| "CVE-2017-7541": { |
| "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", |
| "cmt_id": "414848bba6ab91fe12ca8105b4652c4aa6f4b574" |
| }, |
| "CVE-2017-1000371": { |
| "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", |
| "cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" |
| }, |
| "CVE-2017-1000370": { |
| "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", |
| "cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" |
| } |
| }, |
| "4.9.40": { |
| "CVE-2017-11473": { |
| "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", |
| "cmt_id": "036d59f40ac94964a1bbc8959f78f34efac71fd5" |
| }, |
| "CVE-2017-18079": { |
| "cmt_msg": "Input: i8042 - fix crash at boot time", |
| "cmt_id": "5b50e0e74e2e5f084d18a03f6dedc67cfdb8db49" |
| } |
| }, |
| "4.9.41": { |
| "CVE-2017-7533": { |
| "cmt_msg": "dentry name snapshots", |
| "cmt_id": "ad25f11ed216d5ce3b5566b2f187b59fa3061b40" |
| }, |
| "CVE-2017-12762": { |
| "cmt_msg": "isdn/i4l: fix buffer overflow", |
| "cmt_id": "7b3a66739ff01fcd9b8007a18ddd29edd2cb74f7" |
| } |
| }, |
| "4.9.42": { |
| "CVE-2017-10663": { |
| "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", |
| "cmt_id": "0f442c5b2e4ac0b65027ed3374462f1c38675f7e" |
| }, |
| "CVE-2017-8831": { |
| "cmt_msg": "saa7164: fix double fetch PCIe access condition", |
| "cmt_id": "12d17d78e3f74b5022f61eee7d6de082e472a401" |
| }, |
| "CVE-2017-7542": { |
| "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", |
| "cmt_id": "4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad" |
| } |
| }, |
| "4.9.43": { |
| "CVE-2017-1000": { |
| "cmt_msg": "udp: consistently apply ufo or fragmentation", |
| "cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" |
| }, |
| "CVE-2017-1000112": { |
| "cmt_msg": "udp: consistently apply ufo or fragmentation", |
| "cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" |
| }, |
| "CVE-2017-1000111": { |
| "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", |
| "cmt_id": "e5841355061332f8b326e098949490345dba776b" |
| } |
| }, |
| "4.9.45": { |
| "CVE-2017-12134": { |
| "cmt_msg": "xen: fix bio vec merging", |
| "cmt_id": "6c7f3756d072050d612e5c5c04108f90f1985435" |
| }, |
| "CVE-2017-14140": { |
| "cmt_msg": "Sanitize 'move_pages()' permission checks", |
| "cmt_id": "61332dc598c3f223678b2d7192ccf3472c544799" |
| }, |
| "CVE-2018-10675": { |
| "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", |
| "cmt_id": "91105f2c621ef0b3c40d6725475b6896eb06f954" |
| } |
| }, |
| "4.9.46": { |
| "CVE-2017-17053": { |
| "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct", |
| "cmt_id": "3559de45c99a68c0b8c4956fc35367837df9161c" |
| }, |
| "CVE-2017-17052": { |
| "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free", |
| "cmt_id": "b65b6ac52e0f8694aa3a4402d5f766b2bb9e94ef" |
| } |
| }, |
| "4.9.48": { |
| "CVE-2017-11600": { |
| "cmt_msg": "xfrm: policy: check policy direction value", |
| "cmt_id": "12a70ccaa6868163487f9a5ad97e1a91a397b453" |
| } |
| }, |
| "4.9.50": { |
| "CVE-2017-14340": { |
| "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", |
| "cmt_id": "5b82e0e938af5d9dfb038e2483cb2a84e24584fd" |
| }, |
| "CVE-2017-1000251": { |
| "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", |
| "cmt_id": "6300c8bfafe032187f3cbaa43dbf7d306650c5ed" |
| }, |
| "CVE-2017-9985": { |
| "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", |
| "cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" |
| }, |
| "CVE-2017-9984": { |
| "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", |
| "cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" |
| } |
| }, |
| "4.9.51": { |
| "CVE-2017-14106": { |
| "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", |
| "cmt_id": "a10c510179b369f7d1e8cf77f43ee2db900c1ac9" |
| }, |
| "CVE-2017-14497": { |
| "cmt_msg": "packet: Don't write vnet header beyond end of buffer", |
| "cmt_id": "8c623e5d03692dc478277185a0b907d53aea1b43" |
| }, |
| "CVE-2017-7558": { |
| "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", |
| "cmt_id": "08d56d8a99bb82e134ba7704e4cfdabbcc16fc4f" |
| } |
| }, |
| "4.9.52": { |
| "CVE-2017-9059": { |
| "cmt_msg": "NFSv4: Fix callback server shutdown", |
| "cmt_id": "f609266b12d214437cf9d68245dc27f8d4f69836" |
| }, |
| "CVE-2017-14991": { |
| "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", |
| "cmt_id": "90cb12f6dc5ac45c51082721ec5bbe18850cf80f" |
| }, |
| "CVE-2017-14051": { |
| "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", |
| "cmt_id": "2a913aecc4f746ce15eb1bec98b134aff4190ae2" |
| }, |
| "CVE-2017-0627": { |
| "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", |
| "cmt_id": "38993f320506d7ead26695218ba1481f250469d5" |
| } |
| }, |
| "4.9.53": { |
| "CVE-2020-14353": { |
| "cmt_msg": "KEYS: prevent creating a different user's keyrings", |
| "cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" |
| }, |
| "CVE-2017-14156": { |
| "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", |
| "cmt_id": "64afde6f956dfcb719e329a9d2098b53e68d2755" |
| }, |
| "CVE-2017-12153": { |
| "cmt_msg": "nl80211: check for the required netlink attributes presence", |
| "cmt_id": "c820441a7a52e3626aede8df94069a50a9e4efdb" |
| }, |
| "CVE-2017-1000252": { |
| "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", |
| "cmt_id": "3d4213fac7d10e72859112c9100d8015ce442a3a" |
| }, |
| "CVE-2017-12154": { |
| "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", |
| "cmt_id": "86ef97b2dfd504fbc65f6b244a422db0c1b15797" |
| }, |
| "CVE-2017-18270": { |
| "cmt_msg": "KEYS: prevent creating a different user's keyrings", |
| "cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" |
| }, |
| "CVE-2017-14489": { |
| "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", |
| "cmt_id": "b42bf0f15cf70926f3a460e7517703fda6191ba7" |
| }, |
| "CVE-2017-12192": { |
| "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", |
| "cmt_id": "dda70d28c0ac191f128bfd3acfd800667ed86bdf" |
| }, |
| "CVE-2017-15537": { |
| "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", |
| "cmt_id": "5e9b07f30d21295b83f2024ffb5a349d3af6f749" |
| } |
| }, |
| "4.9.55": { |
| "CVE-2017-0786": { |
| "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", |
| "cmt_id": "4d3132d97aa753104ee35722352a895750a0fca5" |
| }, |
| "CVE-2017-16526": { |
| "cmt_msg": "uwb: properly check kthread_run return value", |
| "cmt_id": "8ff7adb930d4a62f43dfc76220a988a043c510ff" |
| }, |
| "CVE-2017-15649": { |
| "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", |
| "cmt_id": "0f22167d3321a028c0b6edc2d5b2ab0e37a2ac53" |
| }, |
| "CVE-2017-16531": { |
| "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", |
| "cmt_id": "a6d4ce2e8b653ff7facde0d0051663fa4cf57b78" |
| }, |
| "CVE-2017-16530": { |
| "cmt_msg": "USB: uas: fix bug in handling of alternate settings", |
| "cmt_id": "d77606e93d819ad4b8f57511ff61a629ced49750" |
| }, |
| "CVE-2017-16534": { |
| "cmt_msg": "USB: core: harden cdc_parse_cdc_header", |
| "cmt_id": "767f7a2cf33a135fe3f57010b51c3f6e92d7677d" |
| }, |
| "CVE-2017-16529": { |
| "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", |
| "cmt_id": "37b6d898388e78d92a13a8ab50c960d507c968d1" |
| }, |
| "CVE-2018-9568": { |
| "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", |
| "cmt_id": "cf2eaf16ab284e3c5b057dff4c68516cfeae62ba" |
| }, |
| "CVE-2017-1000255": { |
| "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks", |
| "cmt_id": "afebf5ef60da6d15e75398e41ea2817c7a2bb283" |
| }, |
| "CVE-2017-7518": { |
| "cmt_msg": "KVM: x86: fix singlestepping over syscall", |
| "cmt_id": "922e562b2613ae713d661c4fc0f92662f4fe6c41" |
| } |
| }, |
| "4.9.57": { |
| "CVE-2017-16527": { |
| "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", |
| "cmt_id": "e0c70289a1e334a60b54b54688f18e2ee38396a9" |
| }, |
| "CVE-2017-16525": { |
| "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", |
| "cmt_id": "063b57d556181c796294b1cdf4d649cebc12678a" |
| }, |
| "CVE-2017-16533": { |
| "cmt_msg": "HID: usbhid: fix out-of-bounds bug", |
| "cmt_id": "57265cddde308292af881ce634a5378dd4e25900" |
| }, |
| "CVE-2017-12188": { |
| "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT", |
| "cmt_id": "28955b03fac36829831e185e3ec2793f8eb18689" |
| }, |
| "CVE-2017-15265": { |
| "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", |
| "cmt_id": "35b84860667ff081eee56b62f3db2a28ca8a3823" |
| }, |
| "CVE-2017-12190": { |
| "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", |
| "cmt_id": "5444d8ab9a1406af9f1bc2f00c26838637542480" |
| } |
| }, |
| "4.9.59": { |
| "CVE-2017-15299": { |
| "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", |
| "cmt_id": "da0c7503c0b886784bf8bcb279c7d71c1e50c438" |
| }, |
| "CVE-2017-16535": { |
| "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", |
| "cmt_id": "9d13d3e05be29056eeab610d9ad26b04c9231a04" |
| }, |
| "CVE-2017-15951": { |
| "cmt_msg": "KEYS: Fix race between updating and finding a negative key", |
| "cmt_id": "63c8e452554962f88c0952212c8a4202469d4914" |
| } |
| }, |
| "4.9.60": { |
| "CVE-2017-16939": { |
| "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", |
| "cmt_id": "543aabb7d14b2414f40b632e37b0921bd0af3a96" |
| }, |
| "CVE-2017-16643": { |
| "cmt_msg": "Input: gtco - fix potential out-of-bound access", |
| "cmt_id": "52f65e35c2b85908fa66cfc265be4e3fd88744a3" |
| }, |
| "CVE-2017-12193": { |
| "cmt_msg": "assoc_array: Fix a buggy node-splitting case", |
| "cmt_id": "67bcc5e530d55e646b7324038c926c2bde735a7e" |
| }, |
| "CVE-2017-15306": { |
| "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM", |
| "cmt_id": "474cb9e0f02fdabadfc5ecc17b9afbb0ca6aa15a" |
| } |
| }, |
| "4.9.63": { |
| "CVE-2018-7191": { |
| "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", |
| "cmt_id": "3e2ab0ceef68ab995bc9f7c699e62b95c0edcdc4" |
| }, |
| "CVE-2017-13080": { |
| "cmt_msg": "mac80211: accept key reinstall without changing anything", |
| "cmt_id": "2586fa0007dc6b7745da14250be7e3aae706b128" |
| }, |
| "CVE-2017-16645": { |
| "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", |
| "cmt_id": "9d65d0ea55dcb813cea7df05602f233ad4843baf" |
| }, |
| "CVE-2017-16528": { |
| "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", |
| "cmt_id": "1862eca99e2732da2594e05406c9f78b4265bf5b" |
| }, |
| "CVE-2017-16532": { |
| "cmt_msg": "usb: usbtest: fix NULL pointer dereference", |
| "cmt_id": "8cf061d919e2102d0de0379bafea6cce1405d786" |
| } |
| }, |
| "4.9.64": { |
| "CVE-2017-16646": { |
| "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", |
| "cmt_id": "49c1e5f032382713933a86fa1077c438b430f6fc" |
| }, |
| "CVE-2017-16537": { |
| "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", |
| "cmt_id": "ca98a5c721703de77f7fb8bbafd0673e4a60a841" |
| } |
| }, |
| "4.9.65": { |
| "CVE-2017-18204": { |
| "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", |
| "cmt_id": "8af777385f7a3e693f5e79fb4655aebf881156e6" |
| }, |
| "CVE-2017-16647": { |
| "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", |
| "cmt_id": "58baa36d3728eea14884f74817d5749b32b0cdeb" |
| }, |
| "CVE-2017-16994": { |
| "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", |
| "cmt_id": "ceaec6e8cd98c8fd87701ddfb7468a13d989d79d" |
| }, |
| "CVE-2017-16650": { |
| "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", |
| "cmt_id": "02a0c0639ae07beab982bbad4527b40da96d33ff" |
| }, |
| "CVE-2017-16649": { |
| "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", |
| "cmt_id": "f376621861e3d8a713d6931f4363c4137912330b" |
| }, |
| "CVE-2017-15115": { |
| "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", |
| "cmt_id": "362d2ce0f851653d2eed87fdb8891ab4cfb0c2bf" |
| } |
| }, |
| "4.9.66": { |
| "CVE-2017-18203": { |
| "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", |
| "cmt_id": "1cd9686e0a3b5b5a09a2025c21cd4d92e8db0e1f" |
| }, |
| "CVE-2017-16536": { |
| "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", |
| "cmt_id": "38c043d26c97a04332df960200a389bc4141ff21" |
| } |
| }, |
| "4.9.67": { |
| "CVE-2017-18208": { |
| "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", |
| "cmt_id": "ba32d7dce43f14ef1a1cb0540959431526cf7fe0" |
| } |
| }, |
| "4.9.68": { |
| "CVE-2017-18202": { |
| "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", |
| "cmt_id": "ee23ae915fa74956503507c1e55cbb2102f349ec" |
| } |
| }, |
| "4.9.69": { |
| "CVE-2017-17807": { |
| "cmt_msg": "KEYS: add missing permission check for request_key() destination", |
| "cmt_id": "982707eb4ff84d4ae21618c02dd8926801b10a07" |
| }, |
| "CVE-2017-0861": { |
| "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", |
| "cmt_id": "45ddff3ce4e9a3d7e935d5b596686d9e176ed4a9" |
| }, |
| "CVE-2017-1000407": { |
| "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", |
| "cmt_id": "6ead44d4b5b8b1ecfcbd2302f15028dab7774da3" |
| } |
| }, |
| "4.9.70": { |
| "CVE-2018-7492": { |
| "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", |
| "cmt_id": "3259862dd73bfb9d9b7a647ea77cb20ba8b179a4" |
| }, |
| "CVE-2018-18559": { |
| "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", |
| "cmt_id": "5471afeef41388ec08e6cf610640aaf89805d6db" |
| } |
| }, |
| "4.9.71": { |
| "CVE-2017-16913": { |
| "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", |
| "cmt_id": "f3e957266ae56c200fb13a42309c50f84576c64a" |
| }, |
| "CVE-2017-16912": { |
| "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", |
| "cmt_id": "20e825cdf7a1627f92371d45a5322ccecdebcb3b" |
| }, |
| "CVE-2017-16914": { |
| "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", |
| "cmt_id": "14513e49c43cd3149a03ff9e1c223c3d5803ad09" |
| }, |
| "CVE-2017-17558": { |
| "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", |
| "cmt_id": "99542e468b76ae180675566692e0528c4c712661" |
| }, |
| "CVE-2017-17806": { |
| "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", |
| "cmt_id": "43259d07fceb8cc1f5ba7e8003ae19023e0620f5" |
| }, |
| "CVE-2017-17805": { |
| "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", |
| "cmt_id": "c32e053a11f231376f0899ef906fd43f8fc8dbd0" |
| } |
| }, |
| "4.9.72": { |
| "CVE-2017-17862": { |
| "cmt_msg": "bpf: fix branch pruning logic", |
| "cmt_id": "7b5b73ea87a06236fa124bdebed1390d362d3439" |
| }, |
| "CVE-2017-16995": { |
| "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", |
| "cmt_id": "3695b3b18519099224efbc5875569d2cb6da256d" |
| } |
| }, |
| "4.9.73": { |
| "CVE-2017-17863": { |
| "cmt_msg": "bpf: fix integer overflows", |
| "cmt_id": "37435f7e80ef9adc32a69013c18f135e3f434244" |
| } |
| }, |
| "4.9.74": { |
| "CVE-2017-17712": { |
| "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", |
| "cmt_id": "f75f910ffa90af17eeca18714847eaa0f16cb4ad" |
| }, |
| "CVE-2017-18595": { |
| "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", |
| "cmt_id": "5dc4cd2688e39b0286e9a4b815c9bf5e71b5a685" |
| }, |
| "CVE-2017-15129": { |
| "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", |
| "cmt_id": "03c93293a83a603fc5b87fc15321f392d3cf0043" |
| }, |
| "CVE-2018-18386": { |
| "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", |
| "cmt_id": "00fc57ae06c3519a5e32e39882549e4e1f6328fb" |
| }, |
| "CVE-2017-17449": { |
| "cmt_msg": "netlink: Add netns check on taps", |
| "cmt_id": "0b18782288a2f1c2a25e85d2553c15ea83bb5802" |
| } |
| }, |
| "4.9.76": { |
| "CVE-2017-18075": { |
| "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", |
| "cmt_id": "c195a4c0230d7a1dafb53cdbd5eed4dea4493504" |
| } |
| }, |
| "4.9.77": { |
| "CVE-2017-13216": { |
| "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", |
| "cmt_id": "c51d23dffc2e9ca05d611c86c440f9055541c62d" |
| }, |
| "CVE-2017-17741": { |
| "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", |
| "cmt_id": "c781e3be97a1cbeef8c853101e8f266db556b0a3" |
| }, |
| "CVE-2018-5333": { |
| "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", |
| "cmt_id": "ce31b6ac1111096ae9bb0b45f4ba564a909bb366" |
| }, |
| "CVE-2017-1000410": { |
| "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", |
| "cmt_id": "6aebc2670ebfdda0762a6b471fbf8ca18dcf44f2" |
| }, |
| "CVE-2018-5332": { |
| "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", |
| "cmt_id": "cebb382931c4fb341162eae80b696650260e4a2b" |
| } |
| }, |
| "4.9.78": { |
| "CVE-2018-6927": { |
| "cmt_msg": "futex: Prevent overflow by strengthen input validation", |
| "cmt_id": "d8a3170db0deca6bfee32ad77f492caba9f6791d" |
| }, |
| "CVE-2018-1000004": { |
| "cmt_msg": "ALSA: seq: Make ioctls race-free", |
| "cmt_id": "e4ff9f294629b65df3f7982cd4faf86b2856b9d7" |
| } |
| }, |
| "4.9.79": { |
| "CVE-2017-16911": { |
| "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", |
| "cmt_id": "ce601a07bc504b4748f8e7a34896684f79514e51" |
| }, |
| "CVE-2017-11472": { |
| "cmt_msg": "ACPICA: Namespace: fix operand cache leak", |
| "cmt_id": "2915f16bdce204621695e7a0dfcd5f73b120cccb" |
| }, |
| "CVE-2018-1000028": { |
| "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", |
| "cmt_id": "f12d0602633decf073796f3aaa59eec7ff2da9e2" |
| }, |
| "CVE-2017-17450": { |
| "cmt_msg": "netfilter: xt_osf: Add missing permission checks", |
| "cmt_id": "898eeca02a55e354c42a7aa5cdfebf16c3742f44" |
| }, |
| "CVE-2017-17448": { |
| "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", |
| "cmt_id": "2c3184ea80322347287bc7e57f782d77f478e73c" |
| } |
| }, |
| "4.9.80": { |
| "CVE-2018-5344": { |
| "cmt_msg": "loop: fix concurrent lo_open/lo_release", |
| "cmt_id": "56bc086358cac1a2949783646eabd57447b9d672" |
| } |
| }, |
| "4.9.81": { |
| "CVE-2017-5754": { |
| "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", |
| "cmt_id": "40532f65cccc5056b50cf1ab07a9a41445b24aa8" |
| }, |
| "CVE-2017-13305": { |
| "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", |
| "cmt_id": "9692602ab850eec484d8cc5a740803d34f00016c" |
| } |
| }, |
| "4.9.82": { |
| "CVE-2018-5873": { |
| "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", |
| "cmt_id": "daaa81c48402da28cc9e32ad55c48fb05e61b005" |
| }, |
| "CVE-2017-8824": { |
| "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", |
| "cmt_id": "7e2fb808d3c7c52f88ebc670949dbf1bae48f2a2" |
| }, |
| "CVE-2017-16538": { |
| "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", |
| "cmt_id": "1ff1353a03c6cde5334a94cb67f8632141b0589b" |
| }, |
| "CVE-2017-16644": { |
| "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", |
| "cmt_id": "198a7ddaf5d2c76130b28f19ed6d768860ea2b8e" |
| }, |
| "CVE-2017-18344": { |
| "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", |
| "cmt_id": "0b376535ad5493d2fcf70ab5f6539551aadb493e" |
| }, |
| "CVE-2018-5750": { |
| "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", |
| "cmt_id": "623c28ee02b36a9f45780be0ded6d13ad74e2d0e" |
| } |
| }, |
| "4.9.83": { |
| "CVE-2018-7566": { |
| "cmt_msg": "ALSA: seq: Fix racy pool initializations", |
| "cmt_id": "869182f45e38e4c62722b20a5c6f4bc48b2e60c3" |
| } |
| }, |
| "4.9.86": { |
| "CVE-2017-18193": { |
| "cmt_msg": "f2fs: fix a bug caused by NULL extent tree", |
| "cmt_id": "4a97b2d09d332c43612f489c99b97d691002b6d4" |
| } |
| }, |
| "4.9.87": { |
| "CVE-2018-5803": { |
| "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", |
| "cmt_id": "9b7d723439a444ea578462f50054641a09c45023" |
| } |
| }, |
| "4.9.88": { |
| "CVE-2018-1068": { |
| "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", |
| "cmt_id": "21ff147189ff0692d203282c1dced02f83dcf785" |
| }, |
| "CVE-2018-7995": { |
| "cmt_msg": "x86/MCE: Serialize sysfs changes", |
| "cmt_id": "2cc98fddf0f4a746071e098075a832fbec4bbfff" |
| }, |
| "CVE-2018-1065": { |
| "cmt_msg": "netfilter: add back stackpointer size checks", |
| "cmt_id": "f506da51bdf6602ec942f25d682a4de9b59760da" |
| }, |
| "CVE-2019-9456": { |
| "cmt_msg": "usb: usbmon: Read text within supplied buffer size", |
| "cmt_id": "63f3bac3bedcf415d789ff3ae8fb1361e4ab104e" |
| } |
| }, |
| "4.9.89": { |
| "CVE-2018-7480": { |
| "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", |
| "cmt_id": "7bd2d0c746f1fac2fb7f2ee972767cbc8be60962" |
| } |
| }, |
| "4.9.90": { |
| "CVE-2017-18222": { |
| "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", |
| "cmt_id": "b2a863dba3defce5f37af95007999ce9f48f8af6" |
| }, |
| "CVE-2018-1066": { |
| "cmt_msg": "CIFS: Enable encryption during session setup phase", |
| "cmt_id": "df09b6f7b54adba78693997096d0bcb1bd80537c" |
| } |
| }, |
| "4.9.91": { |
| "CVE-2018-8822": { |
| "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", |
| "cmt_id": "5e7124c4d6786488198b192f90491e5a5ba51230" |
| }, |
| "CVE-2018-8781": { |
| "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", |
| "cmt_id": "4ac9ab4f5f45d1ad0585c7bfa9ccff43b9984045" |
| }, |
| "CVE-2018-1087": { |
| "cmt_msg": "kvm/x86: fix icebp instruction handling", |
| "cmt_id": "587da2b6282302325bd4bcc28a7615e822184ff1" |
| }, |
| "CVE-2018-8897": { |
| "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", |
| "cmt_id": "3681c24a7d096b092cf05c8338adbb9019bb1536" |
| } |
| }, |
| "4.9.92": { |
| "CVE-2017-18218": { |
| "cmt_msg": "net: hns: Fix a skb used after free bug", |
| "cmt_id": "a8f4be0168d5bf0c8838ca08301ae5341208dfba" |
| }, |
| "CVE-2018-1130": { |
| "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", |
| "cmt_id": "1fdc00c1503f2164893454958cf62c3bf4eff8d6" |
| } |
| }, |
| "4.9.93": { |
| "CVE-2018-1000199": { |
| "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", |
| "cmt_id": "7614f7db9bee160c5e8d298919af3f28941fc703" |
| }, |
| "CVE-2017-17975": { |
| "cmt_msg": "media: usbtv: prevent double free in error case", |
| "cmt_id": "50cd7759a34104c3acb510e644355d4ae8010851" |
| } |
| }, |
| "4.9.94": { |
| "CVE-2018-7757": { |
| "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", |
| "cmt_id": "0ef71347d2e8db15ab0f8c7b79cf2c38d34d1870" |
| } |
| }, |
| "4.9.96": { |
| "CVE-2018-1108": { |
| "cmt_msg": "random: fix crng_ready() test", |
| "cmt_id": "4dfb3442bb7e1fb80515df4a199ca5a7a8edf900" |
| }, |
| "CVE-2018-20961": { |
| "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", |
| "cmt_id": "b3b0809ac25c3ffedc58e7f83bc01a03193e7834" |
| }, |
| "CVE-2018-1092": { |
| "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", |
| "cmt_id": "6b289a7c34d72212bcd5a8ab9b6a657f2f44f0ee" |
| } |
| }, |
| "4.9.97": { |
| "CVE-2018-10940": { |
| "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", |
| "cmt_id": "4bd744b86114a406efb563c8717e5bea7672d427" |
| } |
| }, |
| "4.9.98": { |
| "CVE-2018-9415": { |
| "cmt_msg": "ARM: amba: Fix race condition with driver_override", |
| "cmt_id": "272c99cf85a371401b78f3c56a18745bf07817a3" |
| }, |
| "CVE-2018-9385": { |
| "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", |
| "cmt_id": "8970c12ac9b917b27e42c0537ab7fce0357f0cf3" |
| }, |
| "CVE-2018-1093": { |
| "cmt_msg": "ext4: add validity checks for bitmap block numbers", |
| "cmt_id": "76964816c83d3e4e8a6a393777b30f22a6f9cd51" |
| } |
| }, |
| "4.9.99": { |
| "CVE-2017-18255": { |
| "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", |
| "cmt_id": "0f8a75e90963019cef486565f2b088bb570a7ddb" |
| } |
| }, |
| "4.9.100": { |
| "CVE-2017-18257": { |
| "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", |
| "cmt_id": "b8bf4b886b82585202ab4ee169718656661cb89e" |
| } |
| }, |
| "4.9.101": { |
| "CVE-2018-1120": { |
| "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", |
| "cmt_id": "6f1abf8628b750905606996fd5ff5ea22d149238" |
| }, |
| "CVE-2018-10087": { |
| "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", |
| "cmt_id": "04103c29b6cc1ffcf9efe167a07e882be68f8367" |
| } |
| }, |
| "4.9.102": { |
| "CVE-2018-5814": { |
| "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", |
| "cmt_id": "f2a6d5f19450086e5cbdac7168d3fc75af32becf" |
| }, |
| "CVE-2018-3639": { |
| "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", |
| "cmt_id": "741c026d1a0c594f7ad509f44488ef29582fed74" |
| } |
| }, |
| "4.9.103": { |
| "CVE-2018-10021": { |
| "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", |
| "cmt_id": "e420d98384760f55ffac9951b9b5cccbf2edd752" |
| }, |
| "CVE-2018-1000204": { |
| "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", |
| "cmt_id": "ad2518320bc440ed3db072e2444a1bb226a9cf7a" |
| } |
| }, |
| "4.9.104": { |
| "CVE-2018-10124": { |
| "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", |
| "cmt_id": "ec1975ac988686eba0f105f87ed0b587da43d384" |
| }, |
| "CVE-2018-9518": { |
| "cmt_msg": "NFC: llcp: Limit size of SDP URI", |
| "cmt_id": "69b28c18f7c8b3bbdc037f1cc029acc21723b997" |
| }, |
| "CVE-2017-13695": { |
| "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", |
| "cmt_id": "9c6d844357a30e5dfcbb015c0d07a8175464b9c6" |
| }, |
| "CVE-2018-6412": { |
| "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", |
| "cmt_id": "05b4268070b14dbd77ac6f5986b77a80a458fffa" |
| } |
| }, |
| "4.9.108": { |
| "CVE-2019-18675": { |
| "cmt_msg": "mmap: introduce sane default mmap limits", |
| "cmt_id": "7a40374c34e8c25062b0d7e2d2152ff8b7af1274" |
| } |
| }, |
| "4.9.110": { |
| "CVE-2018-1118": { |
| "cmt_msg": "vhost: fix info leak due to uninitialized memory", |
| "cmt_id": "9681c3bdb098f6c87a0422b6b63912c1b90ad197" |
| } |
| }, |
| "4.9.111": { |
| "CVE-2018-13406": { |
| "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", |
| "cmt_id": "7673ca3c93414faf90fa2a3c339f1f625415fecb" |
| } |
| }, |
| "4.9.112": { |
| "CVE-2018-10878": { |
| "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", |
| "cmt_id": "cdde876fce2501828af33d5e4faa36c8919fc96a" |
| }, |
| "CVE-2018-9516": { |
| "cmt_msg": "HID: debug: check length before copy_to_user()", |
| "cmt_id": "4a30c12542290f1def08b9ef0d677c024c500589" |
| }, |
| "CVE-2017-13168": { |
| "cmt_msg": "scsi: sg: mitigate read/write abuse", |
| "cmt_id": "b6db8af7e34edfa1bf1d7b0797da15c3811a2a98" |
| }, |
| "CVE-2018-10877": { |
| "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", |
| "cmt_id": "87dad44faabd45683fba94443471298f8809e8a8" |
| }, |
| "CVE-2018-10876": { |
| "cmt_msg": "ext4: only look at the bg_flags field if it is valid", |
| "cmt_id": "5ae57329580d6ceca97559ff030a5f0e91fa66fe" |
| }, |
| "CVE-2018-10879": { |
| "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", |
| "cmt_id": "9e4842f2aa6c4b4340669730c90cb6fbf630ee42" |
| }, |
| "CVE-2018-10881": { |
| "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", |
| "cmt_id": "a5e063d348bd2ef14fff96b129749409a8991ea5" |
| }, |
| "CVE-2018-10882": { |
| "cmt_msg": "ext4: add more inode number paranoia checks", |
| "cmt_id": "425dc465de3725210162da9b1e9062e86cc2de27" |
| }, |
| "CVE-2018-10883": { |
| "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", |
| "cmt_id": "8ef97ef67ce0f8fc3d32c7218e6b412e479ee2ab" |
| } |
| }, |
| "4.9.113": { |
| "CVE-2018-13405": { |
| "cmt_msg": "Fix up non-directory creation in SGID directories", |
| "cmt_id": "d2c7c52431819aa05d76fae77bb3f95dd0955da1" |
| }, |
| "CVE-2018-16276": { |
| "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", |
| "cmt_id": "0fdef3142f99430b94f5d394ca2b181d20d87e77" |
| } |
| }, |
| "4.9.114": { |
| "CVE-2017-18216": { |
| "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", |
| "cmt_id": "32a1733cf823011266dac0ea34c13555ff35dde5" |
| }, |
| "CVE-2017-18224": { |
| "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", |
| "cmt_id": "78a65505cdf7b7392c963d3715269516bc812ef2" |
| } |
| }, |
| "4.9.115": { |
| "CVE-2018-10902": { |
| "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", |
| "cmt_id": "c4f094deb3d69dcc8b4e3dc6c056c1e62a72c33e" |
| } |
| }, |
| "4.9.116": { |
| "CVE-2018-5390": { |
| "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", |
| "cmt_id": "2d08921c8da26bdce3d8848ef6f32068f594d7d4" |
| } |
| }, |
| "4.9.117": { |
| "CVE-2018-14734": { |
| "cmt_msg": "infiniband: fix a possible use-after-free bug", |
| "cmt_id": "73298a828c90398d582ec0e204b637e9bbee2dd5" |
| } |
| }, |
| "4.9.119": { |
| "CVE-2018-12233": { |
| "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", |
| "cmt_id": "240d46556d5961c7100febbee0e058185b3c8d4f" |
| } |
| }, |
| "4.9.120": { |
| "CVE-2018-3646": { |
| "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", |
| "cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" |
| }, |
| "CVE-2018-15572": { |
| "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", |
| "cmt_id": "6455f41db5206cf46b623be071a0aa308c183642" |
| }, |
| "CVE-2018-3620": { |
| "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", |
| "cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" |
| } |
| }, |
| "4.9.121": { |
| "CVE-2018-9363": { |
| "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", |
| "cmt_id": "7c7940ffbaefdbb189f78a48b4e64b6f268b1dbf" |
| } |
| }, |
| "4.9.124": { |
| "CVE-2018-3693": { |
| "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", |
| "cmt_id": "51ada11083605de581b3c29212b5641d18cc8fcb" |
| } |
| }, |
| "4.9.125": { |
| "CVE-2018-10938": { |
| "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", |
| "cmt_id": "e8e519f8ec33ce670abef2cfc0613ec26319841e" |
| }, |
| "CVE-2018-16658": { |
| "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", |
| "cmt_id": "b8c0e15469bab732065e64f7dffadab0b7103990" |
| } |
| }, |
| "4.9.126": { |
| "CVE-2019-12881": { |
| "cmt_msg": "drm/i915/userptr: reject zero user_size", |
| "cmt_id": "f916daa615e1c0d67fb3b7a65572fbc56c6aaea6" |
| } |
| }, |
| "4.9.127": { |
| "CVE-2018-6554": { |
| "cmt_msg": "staging: irda: remove the irda network stack and drivers", |
| "cmt_id": "ce54bf4aec595c479b462180d682783b3776fb80" |
| }, |
| "CVE-2018-6555": { |
| "cmt_msg": "staging: irda: remove the irda network stack and drivers", |
| "cmt_id": "18d94895f505d6eef2da8868e87a403cde1d9ef0" |
| }, |
| "CVE-2018-14617": { |
| "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", |
| "cmt_id": "1cedd72d0f688b9c169836649ac9ec07a3c601d6" |
| }, |
| "CVE-2018-14609": { |
| "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", |
| "cmt_id": "93d960de56cef4582088dfc0ba9494143351772f" |
| } |
| }, |
| "4.9.128": { |
| "CVE-2018-13099": { |
| "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", |
| "cmt_id": "7e0782ceebaaed70b0c4b775c27b81e8f8cf6ddb" |
| }, |
| "CVE-2018-17182": { |
| "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", |
| "cmt_id": "84580567f1f856d2c7a610273315852e345bc3ac" |
| } |
| }, |
| "4.9.130": { |
| "CVE-2018-20511": { |
| "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", |
| "cmt_id": "11f734283a987ac26365aefafdd012a3f37e05a3" |
| }, |
| "CVE-2018-14633": { |
| "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", |
| "cmt_id": "5eeb39743ba17bd36db8d86d0047181ee0b9ff71" |
| } |
| }, |
| "4.9.131": { |
| "CVE-2018-7755": { |
| "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", |
| "cmt_id": "3da4db1dfc217c6f330be87baf5759ef4a4b8d93" |
| }, |
| "CVE-2018-18021": { |
| "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", |
| "cmt_id": "bc769c0148cd9820c8db785a2a1298a6489125ae" |
| }, |
| "CVE-2018-10880": { |
| "cmt_msg": "ext4: never move the system.data xattr out of the inode body", |
| "cmt_id": "3a282476161c54df1a2ef1ba664c8a3514ef49f4" |
| }, |
| "CVE-2018-13053": { |
| "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", |
| "cmt_id": "747128e772dc2c413763050c52c55edcacf7f60c" |
| }, |
| "CVE-2019-9458": { |
| "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", |
| "cmt_id": "ec964c3c00457e7ce6b633a33d1c6b61e0091557" |
| } |
| }, |
| "4.9.132": { |
| "CVE-2018-17972": { |
| "cmt_msg": "proc: restrict kernel stack dumps to root", |
| "cmt_id": "3c5dc3f313cf1cb1645a0e832f51c1ba79aee934" |
| } |
| }, |
| "4.9.133": { |
| "CVE-2018-15471": { |
| "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", |
| "cmt_id": "2962761863cb161d419c94f3dde7443af0e63c31" |
| } |
| }, |
| "4.9.134": { |
| "CVE-2018-5391": { |
| "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", |
| "cmt_id": "82f36cbc74595f06900f478d4eaf7217a4f06e13" |
| } |
| }, |
| "4.9.135": { |
| "CVE-2018-18281": { |
| "cmt_msg": "mremap: properly flush TLB before releasing the page", |
| "cmt_id": "e34bd9a96704f7089ccad61b6e01ea985fa54dd6" |
| } |
| }, |
| "4.9.136": { |
| "CVE-2018-12896": { |
| "cmt_msg": "posix-timers: Sanitize overrun handling", |
| "cmt_id": "65cb24de03f1c8e00a4fedf416b80a4e8f8a6ef2" |
| } |
| }, |
| "4.9.138": { |
| "CVE-2018-16871": { |
| "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", |
| "cmt_id": "7291d95a97fc89044301b197c760555e894e82c7" |
| }, |
| "CVE-2018-18710": { |
| "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", |
| "cmt_id": "8dd745a8799ee01fc67b64fd33cdb44d04eb7e4c" |
| } |
| }, |
| "4.9.143": { |
| "CVE-2018-19407": { |
| "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", |
| "cmt_id": "3a468e8e5a6124523e2e94c33866c609cc914876" |
| }, |
| "CVE-2019-2024": { |
| "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", |
| "cmt_id": "6fc74d9f9b412b295f9ad01af7a7e62a662aa5bd" |
| } |
| }, |
| "4.9.144": { |
| "CVE-2018-9465": { |
| "cmt_msg": "binder: fix proc->files use-after-free", |
| "cmt_id": "c0d75dacffb9cf3c0e3812ba0c7607c063cd7e9d" |
| }, |
| "CVE-2018-13100": { |
| "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", |
| "cmt_id": "a3dccfacd3a574365ab6c5118f8a944a4ba691fa" |
| }, |
| "CVE-2018-5848": { |
| "cmt_msg": "wil6210: missing length check in wmi_set_ie", |
| "cmt_id": "35db4d1ed8a344899a87887fa7bf11be5b057bec" |
| }, |
| "CVE-2017-18249": { |
| "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", |
| "cmt_id": "cb9b1d4ec206702a4df1cb42ba8142f39acfdd91" |
| }, |
| "CVE-2018-13097": { |
| "cmt_msg": "f2fs: fix to do sanity check with user_block_count", |
| "cmt_id": "06e606acedaf8bb00c83c4cee43acdd264287a92" |
| }, |
| "CVE-2018-14611": { |
| "cmt_msg": "btrfs: validate type when reading a chunk", |
| "cmt_id": "3c77b07dc365a7ed2644ca0dd38e6e40a9652d57" |
| }, |
| "CVE-2018-14616": { |
| "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", |
| "cmt_id": "b10a6ac262f8c1c0c70a90e992137a5590325f0b" |
| }, |
| "CVE-2017-18241": { |
| "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", |
| "cmt_id": "3b19f961d260d1ae12b497e5eb77e5ecc1039fac" |
| }, |
| "CVE-2018-14610": { |
| "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", |
| "cmt_id": "7a72f918825ddece7a4ed79583836f6f1e06e478" |
| }, |
| "CVE-2018-14613": { |
| "cmt_msg": "btrfs: tree-checker: Verify block_group_item", |
| "cmt_id": "058e388e42c8dc5b6ce6248990c75a0459e20197" |
| }, |
| "CVE-2018-14612": { |
| "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", |
| "cmt_id": "6f33d3d8dca8683a4df94e9944296a1a1a2a6f10" |
| }, |
| "CVE-2018-1128": { |
| "cmt_msg": "libceph: add authorizer challenge", |
| "cmt_id": "06e925920d4de3da2114876bc607447e929604af" |
| }, |
| "CVE-2018-1129": { |
| "cmt_msg": "libceph: implement CEPHX_V2 calculation mode", |
| "cmt_id": "18a23fb2632030888fc56a7df73a80f57445718f" |
| }, |
| "CVE-2018-18690": { |
| "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", |
| "cmt_id": "4ec44e98ab08c704d0ff1a35a21a0682a5562a27" |
| }, |
| "CVE-2018-16862": { |
| "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", |
| "cmt_id": "60b3d44f05c148f6f7f5e5b2a8165d328c3f22a0" |
| }, |
| "CVE-2018-14614": { |
| "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", |
| "cmt_id": "91fe514bedf4c72ae8046fe4cfa98c5e201f6b84" |
| }, |
| "CVE-2018-13096": { |
| "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", |
| "cmt_id": "1c87980591a1dc8c5eafdcc5f9953fca4e518465" |
| } |
| }, |
| "4.9.145": { |
| "CVE-2018-20169": { |
| "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", |
| "cmt_id": "fe26b8d06e965239795bee0a71c9073bed931716" |
| }, |
| "CVE-2018-5953": { |
| "cmt_msg": "printk: hash addresses printed with %p", |
| "cmt_id": "adcc5726f1402e7ea39bebd08688efcc09ba4d26" |
| }, |
| "CVE-2018-14625": { |
| "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", |
| "cmt_id": "569fc4ffb5de8f12fe01759f0b85098b7b9bba8e" |
| }, |
| "CVE-2018-19824": { |
| "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", |
| "cmt_id": "73000a4cec933fd331224df79df731ea929bb85c" |
| } |
| }, |
| "4.9.148": { |
| "CVE-2018-19985": { |
| "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", |
| "cmt_id": "5501175cb1975239add62a521cfbedcf76b93d8d" |
| } |
| }, |
| "4.9.150": { |
| "CVE-2019-15927": { |
| "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", |
| "cmt_id": "beab6f305f4f271caa500170d7fed1d2bda6ea88" |
| }, |
| "CVE-2019-6133": { |
| "cmt_msg": "fork: record start_time late", |
| "cmt_id": "0ea6030b555803b9c565e0471c94648fe2a4bda7" |
| } |
| }, |
| "4.9.151": { |
| "CVE-2018-16884": { |
| "cmt_msg": "sunrpc: use-after-free in svc_process_common()", |
| "cmt_id": "37c791a031ece3afeb9c8b023397473a5349f171" |
| } |
| }, |
| "4.9.152": { |
| "CVE-2019-3701": { |
| "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", |
| "cmt_id": "d379b338387e3d5a9b5ebe5ab16656a9c65c988d" |
| }, |
| "CVE-2020-10769": { |
| "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", |
| "cmt_id": "6ddfcf0b4c6ce7cfeb5d9e36d991345f3fe6e600" |
| } |
| }, |
| "4.9.156": { |
| "CVE-2019-7222": { |
| "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", |
| "cmt_id": "f5c61e4f6b5a1cc66c61eb68334f725031948a7e" |
| }, |
| "CVE-2019-6974": { |
| "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", |
| "cmt_id": "0c42df1f9f82f73ebc6c0f54b1df295ffc5a7b4b" |
| }, |
| "CVE-2019-7221": { |
| "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", |
| "cmt_id": "a2c34d20660f24a40b46d0d341547b84f3fff3b0" |
| } |
| }, |
| "4.9.159": { |
| "CVE-2018-1000026": { |
| "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", |
| "cmt_id": "f3fe2c72a7b7361a306ca1b51387bb2f995216a2" |
| } |
| }, |
| "4.9.162": { |
| "CVE-2019-9213": { |
| "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", |
| "cmt_id": "331fc4df776be3e5a88a1a9f08ef2f7e063ef1a9" |
| } |
| }, |
| "4.9.163": { |
| "CVE-2019-2101": { |
| "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", |
| "cmt_id": "47d77d464e574d56eecb39677df7bc6663635a3f" |
| }, |
| "CVE-2019-12818": { |
| "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", |
| "cmt_id": "05d3d2d0b8574d0f61d12a64e2c6475a5c3d5ba6" |
| }, |
| "CVE-2019-8980": { |
| "cmt_msg": "exec: Fix mem leak in kernel_read_file", |
| "cmt_id": "dd6734e17903f16a47c78d0418f02e06df080c54" |
| }, |
| "CVE-2019-15916": { |
| "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", |
| "cmt_id": "d81778b842536c9437acb43138f3fc8520b1b12c" |
| } |
| }, |
| "4.9.164": { |
| "CVE-2019-16995": { |
| "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", |
| "cmt_id": "a582b20fd743237ce145b45aacf9f6c24962029a" |
| }, |
| "CVE-2019-12819": { |
| "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", |
| "cmt_id": "c4bec922def2285707cd3be3a80be46467ad8cde" |
| } |
| }, |
| "4.9.165": { |
| "CVE-2019-10124": { |
| "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", |
| "cmt_id": "78f42f1156fd661f708cadd9ad9c3f0ac039b411" |
| }, |
| "CVE-2019-9455": { |
| "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", |
| "cmt_id": "7f422aa63d5a0905232455a8953cd9bc02eab4da" |
| }, |
| "CVE-2019-16413": { |
| "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", |
| "cmt_id": "0a97dbd82f40bcb888110a7d6860bac4a5819502" |
| } |
| }, |
| "4.9.167": { |
| "CVE-2019-3459": { |
| "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", |
| "cmt_id": "99665dcf6ff803351b5e658f3a929cb498561e36" |
| }, |
| "CVE-2019-20054": { |
| "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", |
| "cmt_id": "28f0641fbaa06dccf49903bb074ac7b3aa3dde85" |
| }, |
| "CVE-2019-3460": { |
| "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", |
| "cmt_id": "def5c1fbee851e9c044ce9fa647238efc15458b4" |
| } |
| }, |
| "4.9.168": { |
| "CVE-2017-18551": { |
| "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", |
| "cmt_id": "2555029ac9d474d3dc1b66ff48b1c773e8446af5" |
| }, |
| "CVE-2019-11810": { |
| "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", |
| "cmt_id": "650c8ec81f458472eda16883acd5dbf37c5049dc" |
| }, |
| "CVE-2019-9454": { |
| "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", |
| "cmt_id": "2555029ac9d474d3dc1b66ff48b1c773e8446af5" |
| } |
| }, |
| "4.9.169": { |
| "CVE-2019-11486": { |
| "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", |
| "cmt_id": "942ddc0de8efb52c43250033c7c6091f15e191f5" |
| }, |
| "CVE-2019-11815": { |
| "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", |
| "cmt_id": "a1aa69beac4d88dfb892a95ee04fe6f932803952" |
| }, |
| "CVE-2019-10639": { |
| "cmt_msg": "netns: provide pure entropy for net_hash_mix()", |
| "cmt_id": "6996763856e1fb27ccae260e41fd73a3fff56678" |
| } |
| }, |
| "4.9.170": { |
| "CVE-2019-15292": { |
| "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", |
| "cmt_id": "057a0da1899f00a4ac9a4c4c452cf2cf652bdbf0" |
| } |
| }, |
| "4.9.171": { |
| "CVE-2018-5995": { |
| "cmt_msg": "printk: hash addresses printed with %p", |
| "cmt_id": "2c4ae3a694fabfc19b0fc6e65d530a7cdb542bda" |
| }, |
| "CVE-2019-15214": { |
| "cmt_msg": "ALSA: core: Fix card races between register and disconnect", |
| "cmt_id": "d944299e7a6fce01db3603bc55d51ef336c19cc4" |
| } |
| }, |
| "4.9.172": { |
| "CVE-2019-15924": { |
| "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", |
| "cmt_id": "0648cd7304cfba4fe4959f133e4bdf00f2909059" |
| } |
| }, |
| "4.9.173": { |
| "CVE-2019-3882": { |
| "cmt_msg": "vfio/type1: Limit DMA mappings per container", |
| "cmt_id": "4f97abd571ec3d56c50a2edfe0932059f4549afa" |
| } |
| }, |
| "4.9.174": { |
| "CVE-2019-15216": { |
| "cmt_msg": "USB: yurex: Fix protection fault after device removal", |
| "cmt_id": "965cc8406cf38d6e535b264f5906211c3e5e33b7" |
| } |
| }, |
| "4.9.175": { |
| "CVE-2018-20836": { |
| "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", |
| "cmt_id": "41b5d3eee4af6a4ea488a1735ed82e4e593eec0d" |
| }, |
| "CVE-2019-11884": { |
| "cmt_msg": "Bluetooth: hidp: fix buffer overflow", |
| "cmt_id": "0d134aebfd7222dc946437ea2941b94fa64be605" |
| } |
| }, |
| "4.9.177": { |
| "CVE-2019-10142": { |
| "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", |
| "cmt_id": "71e29a15b4babddba1a6faab6d98d2dcce1cd0ff" |
| } |
| }, |
| "4.9.178": { |
| "CVE-2019-11833": { |
| "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", |
| "cmt_id": "ab6d14e83db6e08c39a867a4cba378f7a774d273" |
| } |
| }, |
| "4.9.179": { |
| "CVE-2019-15666": { |
| "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", |
| "cmt_id": "7c96721f56b02fdf7b191aee0d39690ab4f40dc5" |
| } |
| }, |
| "4.9.180": { |
| "CVE-2019-19966": { |
| "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", |
| "cmt_id": "14734c3c582387e84c4c7c8c9469c274b41ff2b3" |
| }, |
| "CVE-2019-20095": { |
| "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", |
| "cmt_id": "5ff8545c6abda22e70728a69fcb4c8cc3ce87880" |
| } |
| }, |
| "4.9.181": { |
| "CVE-2020-10720": { |
| "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", |
| "cmt_id": "12855df4065b6e13878d7b8abc948aa719295bc1" |
| }, |
| "CVE-2018-20510": { |
| "cmt_msg": "binder: replace \"%p\" with \"%pK\"", |
| "cmt_id": "6f3433c47e8223c97746ad227d1e6f5531e0758a" |
| }, |
| "CVE-2019-15219": { |
| "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", |
| "cmt_id": "a45f178bcbf22d4c5c6e76dcc26e2b849cda6408" |
| }, |
| "CVE-2019-15218": { |
| "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", |
| "cmt_id": "6ecd1809002699377d2b3b95b170d636f8a60eb4" |
| }, |
| "CVE-2019-15212": { |
| "cmt_msg": "USB: rio500: refuse more than one device at a time", |
| "cmt_id": "6496f8ef3242b57f285e5c89134ad95dec17ab62" |
| }, |
| "CVE-2019-9466": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "433b957a9e2df0305c1273011aa6e6cc0f8f815d" |
| }, |
| "CVE-2019-9500": { |
| "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", |
| "cmt_id": "76e7e98e229ae8fa7f4b30a6fd2bb3cd2ad26a67" |
| }, |
| "CVE-2019-9503": { |
| "cmt_msg": "brcmfmac: add subtype check for event handling in data path", |
| "cmt_id": "433b957a9e2df0305c1273011aa6e6cc0f8f815d" |
| }, |
| "CVE-2019-11487": { |
| "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", |
| "cmt_id": "9557090582a33801349f0a0920a55d134a27e740" |
| } |
| }, |
| "4.9.182": { |
| "CVE-2019-11479": { |
| "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", |
| "cmt_id": "8e39cbc03dafa3731d22533f869bf326c0e6e6f8" |
| }, |
| "CVE-2019-11478": { |
| "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", |
| "cmt_id": "e358f4af19db46ca25cc9a8a78412b09ba98859d" |
| }, |
| "CVE-2019-11477": { |
| "cmt_msg": "tcp: limit payload size of sacked skbs", |
| "cmt_id": "cc1b58ccb78e0de51bcec1f2914d9296260668bd" |
| } |
| }, |
| "4.9.183": { |
| "CVE-2019-15807": { |
| "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", |
| "cmt_id": "1d28cf14a89c400fa55f6f9a9a4ca3bc34094b34" |
| } |
| }, |
| "4.9.185": { |
| "CVE-2019-13272": { |
| "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", |
| "cmt_id": "d8b99303da935228a33fa7656a964adfb33e271b" |
| }, |
| "CVE-2019-15221": { |
| "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", |
| "cmt_id": "8b449e9dc215e47641c4737a199b7767ffd032a9" |
| }, |
| "CVE-2019-0136": { |
| "cmt_msg": "mac80211: drop robust management frames from unknown TA", |
| "cmt_id": "9f0f5ff93ed0205a90f11103e9937f3c0417cd4b" |
| }, |
| "CVE-2019-9506": { |
| "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", |
| "cmt_id": "f470557724f2c94c25e4f6480a41612cf42aff26" |
| } |
| }, |
| "4.9.186": { |
| "CVE-2019-10126": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", |
| "cmt_id": "f70d411e2ecd1f8297e1fd7e91108ca220986784" |
| }, |
| "CVE-2019-3846": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", |
| "cmt_id": "58ec3690a908494f7a7c3e8a302eb491bef9d979" |
| }, |
| "CVE-2019-15220": { |
| "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", |
| "cmt_id": "feca0ce34518f69447d0d13cd431d0eef647a794" |
| } |
| }, |
| "4.9.187": { |
| "CVE-2019-17351": { |
| "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", |
| "cmt_id": "259b0fc2caddc21a6b561b595747a8091102f7ff" |
| }, |
| "CVE-2019-13631": { |
| "cmt_msg": "Input: gtco - bounds check collection indent level", |
| "cmt_id": "2628fa1a6d824ee1f3fe67a272a3d00ba33d23fa" |
| }, |
| "CVE-2019-20934": { |
| "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", |
| "cmt_id": "837ffc9723f04aeb5bf252ef926c16aea1f5a0ee" |
| }, |
| "CVE-2019-15211": { |
| "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", |
| "cmt_id": "4c0a7ec4b98f2e75ac974140291d3c8c6642145c" |
| }, |
| "CVE-2019-10207": { |
| "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", |
| "cmt_id": "58a01b0bd8ea5fddb51d4d854bb149a1a7312c12" |
| }, |
| "CVE-2019-15215": { |
| "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", |
| "cmt_id": "0b8a71a8bd2129ca9cc115195fd9630564765772" |
| }, |
| "CVE-2019-15926": { |
| "cmt_msg": "ath6kl: add some bounds checking", |
| "cmt_id": "8e8b0ba1dc67d1cba76ac9cada76ae3a9732d1e3" |
| }, |
| "CVE-2017-18509": { |
| "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", |
| "cmt_id": "1e531ad4316cb47c6c2b42f3257d1841a6e837e7" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown", |
| "cmt_id": "704533394e488a109fe46ab3693315376c3824d5" |
| }, |
| "CVE-2019-14284": { |
| "cmt_msg": "floppy: fix div-by-zero in setup_format_params", |
| "cmt_id": "604206cde7a6c1907f6f03d90c37505a45ef1b62" |
| }, |
| "CVE-2019-14283": { |
| "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", |
| "cmt_id": "1fdefbb5bc70ff20ea49083c6984aae86e3ecf93" |
| }, |
| "CVE-2019-13648": { |
| "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", |
| "cmt_id": "08ee34d86c9c6a9b93c0986d7fc6e272690e8d24" |
| } |
| }, |
| "4.9.188": { |
| "CVE-2019-11599": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "16903f1a5ba7707c051edfdfa457620bba45e2c9" |
| }, |
| "CVE-2019-3892": { |
| "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", |
| "cmt_id": "16903f1a5ba7707c051edfdfa457620bba45e2c9" |
| } |
| }, |
| "4.9.189": { |
| "CVE-2018-20856": { |
| "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", |
| "cmt_id": "c19199167c87841006350cc7c0a59881416e8748" |
| }, |
| "CVE-2019-1125": { |
| "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", |
| "cmt_id": "e90ec5e2b679fd882a0f59eb1bf155d96b34b29c" |
| } |
| }, |
| "4.9.190": { |
| "CVE-2019-3900": { |
| "cmt_msg": "vhost_net: fix possible infinite loop", |
| "cmt_id": "4b586288578a3a2aa4efb969feed86f2d760f082" |
| }, |
| "CVE-2019-10638": { |
| "cmt_msg": "inet: switch IP ID generator to siphash", |
| "cmt_id": "b97a2f3d58f439d11ececb2faa21dac775d63c5c" |
| }, |
| "CVE-2019-19536": { |
| "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", |
| "cmt_id": "0cad79bfb5aa596b9449fe66b0edf69a8344326c" |
| }, |
| "CVE-2019-19537": { |
| "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", |
| "cmt_id": "741b832658b98463d619fe4c320f8ab11b2ad4ee" |
| }, |
| "CVE-2019-19527": { |
| "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", |
| "cmt_id": "963a14fb9c43f0a6b38fbe3da0b894a147c71388" |
| }, |
| "CVE-2019-19535": { |
| "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", |
| "cmt_id": "127ab64c38e21c55adf8781ca92f7dc9d1a9903e" |
| }, |
| "CVE-2019-19530": { |
| "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", |
| "cmt_id": "fccd6134d5addf2be1407e3250efdc854b5c5d8a" |
| }, |
| "CVE-2019-19531": { |
| "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", |
| "cmt_id": "e253114f73134cf6f29b453176fb537441e12371" |
| } |
| }, |
| "4.9.191": { |
| "CVE-2019-15118": { |
| "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", |
| "cmt_id": "2bac3a35488148f066d355ebfe44a872aa9a7546" |
| }, |
| "CVE-2019-15538": { |
| "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", |
| "cmt_id": "4862942c590646fe46e33ce4a6d35da4d8ee188e" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown", |
| "cmt_id": "69f692bb7e684592aaba779299bc576626d414b4" |
| }, |
| "CVE-2019-15117": { |
| "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", |
| "cmt_id": "53856af73d8577a4017b9762d7406f47df192bed" |
| } |
| }, |
| "4.9.193": { |
| "CVE-2019-14835": { |
| "cmt_msg": "vhost: make sure log_num < in_num", |
| "cmt_id": "8d8276867b5ac539f1d6e166a028b51c8b1ceda8" |
| } |
| }, |
| "4.9.194": { |
| "CVE-2019-14816": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "21dfacaf201ed13af70a8bd3e66bcf18cdb63b35" |
| }, |
| "CVE-2019-14814": { |
| "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", |
| "cmt_id": "21dfacaf201ed13af70a8bd3e66bcf18cdb63b35" |
| }, |
| "CVE-2019-15505": { |
| "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", |
| "cmt_id": "994c6dcb4307759d440b8031e140d343b8611481" |
| }, |
| "CVE-2019-14821": { |
| "cmt_msg": "KVM: coalesced_mmio: add bounds checking", |
| "cmt_id": "52cb3fd60ec0a1c9b61cd28bae4e8c1d377e7b60" |
| } |
| }, |
| "4.9.195": { |
| "CVE-2019-17056": { |
| "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "45a9e9bc5d6742988df799dafbf26dca8e0dada3" |
| }, |
| "CVE-2019-17053": { |
| "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "ddca1f39c8980cb19db5ea6d51b8549288a7421b" |
| }, |
| "CVE-2019-17052": { |
| "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "73b8d26c842a5a3be34a321beab1f97939d9794b" |
| }, |
| "CVE-2019-19533": { |
| "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", |
| "cmt_id": "70d5b96a1ed385a0ef520a44a18fbf6d795f1b84" |
| }, |
| "CVE-2019-17055": { |
| "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "bb439ee217acbf7835af634f08875540c514632f" |
| }, |
| "CVE-2019-17054": { |
| "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", |
| "cmt_id": "08d2af9358c1937acf97417dba9a03a40149c4d2" |
| } |
| }, |
| "4.9.196": { |
| "CVE-2019-2215": { |
| "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", |
| "cmt_id": "a494a71146a1cf3f48bb94cf33981db1f027e6a0" |
| }, |
| "CVE-2020-0030": { |
| "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", |
| "cmt_id": "b6c6212514fe9f2387fc6677181028d4a9ae20c7" |
| }, |
| "CVE-2019-18806": { |
| "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", |
| "cmt_id": "3ae6d4c9473378d57bcad5a6e102c8ba42efd014" |
| } |
| }, |
| "4.9.197": { |
| "CVE-2019-19525": { |
| "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", |
| "cmt_id": "2f2f3ffa761793f2db2f3b0bc6476a069061cb9c" |
| }, |
| "CVE-2019-16746": { |
| "cmt_msg": "nl80211: validate beacon head", |
| "cmt_id": "a873afd7d888f7349bfabc9191afeb20eb1d3a45" |
| }, |
| "CVE-2018-20976": { |
| "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", |
| "cmt_id": "e6e3f36b1ac9c439d3bc0b2c2aaf1663ad705ac0" |
| }, |
| "CVE-2019-19523": { |
| "cmt_msg": "USB: adutux: fix use-after-free on disconnect", |
| "cmt_id": "aa1b499d5f706c67a0acbe184e0ec32e8c47489b" |
| }, |
| "CVE-2019-19528": { |
| "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", |
| "cmt_id": "323f425a7618fdb0b961dec2c58685fa32eafa1b" |
| } |
| }, |
| "4.9.198": { |
| "CVE-2019-17075": { |
| "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", |
| "cmt_id": "84f5b67df81a9f333afa81855f6fa3fdcd954463" |
| }, |
| "CVE-2019-17133": { |
| "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", |
| "cmt_id": "49d84740f8a7040354ef93bf5915a4b3e651e71b" |
| } |
| }, |
| "4.9.199": { |
| "CVE-2020-10773": { |
| "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", |
| "cmt_id": "8dc59b45792c801efa55e5463818bd08e5e16ded" |
| }, |
| "CVE-2019-17666": { |
| "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", |
| "cmt_id": "4a2fbab9e82fb662ad3419525742a1ddfc29a7b9" |
| }, |
| "CVE-2019-19532": { |
| "cmt_msg": "HID: Fix assumption that devices have inputs", |
| "cmt_id": "7b5e3ad5d582e252d971ee599a3f63f30b70ccb1" |
| }, |
| "CVE-2019-15098": { |
| "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", |
| "cmt_id": "3c7f02d13b8d72dbb1dd9b0fe858459d263b1fbd" |
| } |
| }, |
| "4.9.200": { |
| "CVE-2019-18282": { |
| "cmt_msg": "net/flow_dissector: switch to siphash", |
| "cmt_id": "1f94465d13ace2d4610c4eb2b362454ce2a9d87c" |
| }, |
| "CVE-2019-19049": { |
| "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", |
| "cmt_id": "0228cd262dda0916948b52a74b88fa1f8b3cc810" |
| } |
| }, |
| "4.9.201": { |
| "CVE-2019-16231": { |
| "cmt_msg": "fjes: Handle workqueue allocation failure", |
| "cmt_id": "76e62b04f78f6ae3f13dfbebf1f49b78e8cc938b" |
| }, |
| "CVE-2019-19534": { |
| "cmt_msg": "can: peak_usb: fix slab info leak", |
| "cmt_id": "da281558d20bfbf82823cab457ba7d343ba6b0a0" |
| }, |
| "CVE-2019-0155": { |
| "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", |
| "cmt_id": "64003d092ec9b9ecf03984513aee106c15b411e7" |
| }, |
| "CVE-2019-0154": { |
| "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", |
| "cmt_id": "ebd6ded190ed0920c16eb63f274b50ca050e46fb" |
| }, |
| "CVE-2019-19052": { |
| "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", |
| "cmt_id": "b46a2067f36d7c5f2f259c4ed476359e6e9d668f" |
| } |
| }, |
| "4.9.202": { |
| "CVE-2019-15917": { |
| "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", |
| "cmt_id": "3858f013de0ae5a19b8276944e12fd01b0cac979" |
| }, |
| "CVE-2019-11135": { |
| "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", |
| "cmt_id": "2fc508384968d5796e005bf85d2daf2f16510119" |
| } |
| }, |
| "4.9.203": { |
| "CVE-2019-19524": { |
| "cmt_msg": "Input: ff-memless - kill timer in destroy()", |
| "cmt_id": "1ce4561d12a08be9de2f2ef8ace700e55fc4835c" |
| } |
| }, |
| "4.9.204": { |
| "CVE-2019-18660": { |
| "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", |
| "cmt_id": "113408cdaec11a6e34d4edabb134a335dd4896b3" |
| }, |
| "CVE-2019-15291": { |
| "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", |
| "cmt_id": "2ab1da610f23d72ab53c3951876fa44ed85e1f99" |
| }, |
| "CVE-2019-18683": { |
| "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", |
| "cmt_id": "012a42dbc770d3e815cae536917245d74621c552" |
| } |
| }, |
| "4.9.206": { |
| "CVE-2019-12614": { |
| "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", |
| "cmt_id": "0fce5ef1591055ff8db33ba2c34346ef2a33155e" |
| } |
| }, |
| "4.9.207": { |
| "CVE-2019-19227": { |
| "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", |
| "cmt_id": "540b341012ba9b8e2963be3241cea229d4e4804d" |
| }, |
| "CVE-2019-19062": { |
| "cmt_msg": "crypto: user - fix memory leak in crypto_report", |
| "cmt_id": "f427e1fcf77416ed14a716416c0faf2f02a1e68b" |
| }, |
| "CVE-2019-19332": { |
| "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", |
| "cmt_id": "8b587e3f1424fae01f9c7e78d8d294bcb71f6f41" |
| } |
| }, |
| "4.9.208": { |
| "CVE-2019-16232": { |
| "cmt_msg": "libertas: fix a potential NULL pointer dereference", |
| "cmt_id": "6bd3745b7854f6d125d591795092d23cb5b6e803" |
| }, |
| "CVE-2019-19063": { |
| "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", |
| "cmt_id": "4a06822bba46026212c06076284b940c0864bae4" |
| }, |
| "CVE-2019-20812": { |
| "cmt_msg": "af_packet: set defaule value for tmo", |
| "cmt_id": "43c0e119316896fb895f0d059734e4ada480eb71" |
| }, |
| "CVE-2019-19057": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", |
| "cmt_id": "716156b896197824e55fc2f8244c8c43e0ed73e1" |
| }, |
| "CVE-2019-19447": { |
| "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", |
| "cmt_id": "e1513b36319dff169e409979867f39eb55a9af03" |
| } |
| }, |
| "4.9.209": { |
| "CVE-2019-18809": { |
| "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", |
| "cmt_id": "129139a26325d2274a226407d1e7b6f1eb40b456" |
| }, |
| "CVE-2019-19965": { |
| "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", |
| "cmt_id": "25d16ce23055c7aa6cdbf514565815fe8b6c3df7" |
| } |
| }, |
| "4.9.210": { |
| "CVE-2019-14895": { |
| "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", |
| "cmt_id": "efa99b6f3844bd20d46c8afd78f92a0161a4718e" |
| }, |
| "CVE-2020-0305": { |
| "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", |
| "cmt_id": "d2c9ee451ea8e8256fb1903a04ebaa26cb74d6f5" |
| }, |
| "CVE-2019-19066": { |
| "cmt_msg": "scsi: bfa: release allocated memory in case of error", |
| "cmt_id": "78cb846f4aea6e20fc942d7bb8930107d1c6e34f" |
| }, |
| "CVE-2019-20636": { |
| "cmt_msg": "Input: add safety guards to input_set_keycode()", |
| "cmt_id": "5f27f97dfed4aa29fb95b98bf5911763bd3ef038" |
| }, |
| "CVE-2019-19068": { |
| "cmt_msg": "rtl8xxxu: prevent leaking urb", |
| "cmt_id": "2c00bebd0b959fe8bec6d4a1a07010394b8008e4" |
| }, |
| "CVE-2020-0431": { |
| "cmt_msg": "HID: hid-input: clear unmapped usages", |
| "cmt_id": "661967b7623b88985bdd3aeb171feb83d753aea9" |
| }, |
| "CVE-2019-14615": { |
| "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", |
| "cmt_id": "571233331e1910206ec365ac61e5b51e77cce3b9" |
| }, |
| "CVE-2019-19056": { |
| "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", |
| "cmt_id": "9bba4330671eaf1d21ac6025f950e7cca92f7aca" |
| } |
| }, |
| "4.9.211": { |
| "CVE-2019-20096": { |
| "cmt_msg": "dccp: Fix memleak in __feat_register_sp", |
| "cmt_id": "33cab7a0a84d35908c75c4b46c88769be7902556" |
| }, |
| "CVE-2019-15217": { |
| "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", |
| "cmt_id": "6ba34f5de2a45050729836e3d48ed10ee53d0276" |
| }, |
| "CVE-2018-21008": { |
| "cmt_msg": "rsi: add fix for crash during assertions", |
| "cmt_id": "65b32fd4eabc5209019894627b1bda65611fd1cb" |
| }, |
| "CVE-2019-2182": { |
| "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", |
| "cmt_id": "4f45a0a170355546cc47ba7bbf3973fe187d05cf" |
| }, |
| "CVE-2020-12652": { |
| "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", |
| "cmt_id": "ddfa91a194d054fb765b919e593183794d6637d6" |
| }, |
| "CVE-2019-5108": { |
| "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", |
| "cmt_id": "ca60f42d7965af9f22392caa4074ab0f58c7e1fe" |
| } |
| }, |
| "4.9.212": { |
| "CVE-2019-14896": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "b5e6f199de3b7f16b641c4ec5ac92906af1a9232" |
| }, |
| "CVE-2019-14897": { |
| "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", |
| "cmt_id": "b5e6f199de3b7f16b641c4ec5ac92906af1a9232" |
| }, |
| "CVE-2019-20806": { |
| "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", |
| "cmt_id": "e4188ad85032f130b84702d39755840afec4b9b4" |
| }, |
| "CVE-2020-14416": { |
| "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", |
| "cmt_id": "0beba1d7e8e164694ae1743238f1bdf4de4f1f34" |
| } |
| }, |
| "4.9.213": { |
| "CVE-2020-0432": { |
| "cmt_msg": "staging: most: net: fix buffer overflow", |
| "cmt_id": "8b6487d85ca9f9bfa9d75917451969a1d097a815" |
| } |
| }, |
| "4.9.214": { |
| "CVE-2020-12653": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", |
| "cmt_id": "7a4d6a45f2fad3ddc07f98cf85790344ea72cd69" |
| }, |
| "CVE-2020-12654": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", |
| "cmt_id": "0a996849d8042833860fd7c9ff3dcd24e61fd416" |
| }, |
| "CVE-2020-0404": { |
| "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", |
| "cmt_id": "f873437547ac3d092c433cc0a996b946eb2803b6" |
| } |
| }, |
| "4.9.215": { |
| "CVE-2020-9383": { |
| "cmt_msg": "floppy: check FDC index for errors before assigning it", |
| "cmt_id": "5fbaa66c2a51c2260add842bd12cbc79715c5249" |
| }, |
| "CVE-2020-2732": { |
| "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", |
| "cmt_id": "86dc39e580d8e3ffa42c8157d3e28249fd9a12c5" |
| }, |
| "CVE-2019-16233": { |
| "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", |
| "cmt_id": "3a21c5b627a2f8e1ca274a155267f0c952c8de0c" |
| }, |
| "CVE-2020-0009": { |
| "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", |
| "cmt_id": "a7fc5dbd17127c7301b0aefc2bcf1f54169c7383" |
| } |
| }, |
| "4.9.216": { |
| "CVE-2020-8649": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" |
| }, |
| "CVE-2020-8648": { |
| "cmt_msg": "vt: selection, close sel_buffer race", |
| "cmt_id": "290a9381ccc16131c6ccc19940589141985db6b1" |
| }, |
| "CVE-2020-8647": { |
| "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", |
| "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" |
| }, |
| "CVE-2020-10942": { |
| "cmt_msg": "vhost: Check docket sk_family instead of call getname", |
| "cmt_id": "7f574e92e4474f1b33425c4ee9ba48cd4fbe7d75" |
| }, |
| "CVE-2020-27068": { |
| "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", |
| "cmt_id": "4d284a7a2ce3cbe918a9c1fac0679574a40fa7c8" |
| }, |
| "CVE-2020-0444": { |
| "cmt_msg": "audit: fix error handling in audit_data_to_entry()", |
| "cmt_id": "145bd64d35822a62c4570bc75c5285acb1820fb3" |
| }, |
| "CVE-2019-16234": { |
| "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", |
| "cmt_id": "35c4725efddd669307d7c047cb385becc9c08bf3" |
| } |
| }, |
| "4.9.217": { |
| "CVE-2019-14901": { |
| "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", |
| "cmt_id": "cb87b895f1468df7a163a6c665bf106a4d26f8c1" |
| }, |
| "CVE-2020-29370": { |
| "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", |
| "cmt_id": "ff58bb340c430da021875283f8bf251630c61183" |
| } |
| }, |
| "4.9.218": { |
| "CVE-2020-14381": { |
| "cmt_msg": "futex: Fix inode life-time issue", |
| "cmt_id": "fb099f3bb477a0ee2d0669a753f7ffcdf8884c2d" |
| }, |
| "CVE-2020-11668": { |
| "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", |
| "cmt_id": "8f08a2bb2199a4511bea29e9a130b449f8c1a581" |
| }, |
| "CVE-2021-3715": { |
| "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", |
| "cmt_id": "97a8e7afaee8fc4f08662cf8e4f495b87874aa91" |
| }, |
| "CVE-2020-27066": { |
| "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", |
| "cmt_id": "86e98ce7de083649e330d518e98a80b9e39b5d43" |
| }, |
| "CVE-2020-11608": { |
| "cmt_msg": "media: ov519: add missing endpoint sanity checks", |
| "cmt_id": "03e73c3ef017580482d8e4de2db2bac9505facca" |
| }, |
| "CVE-2020-11609": { |
| "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", |
| "cmt_id": "be6fdd999bcc66cbfde80efbdc16cfd8a3290e38" |
| } |
| }, |
| "4.9.219": { |
| "CVE-2020-11494": { |
| "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", |
| "cmt_id": "925c631e84d77a72188101258878ac58a646d540" |
| }, |
| "CVE-2020-0429": { |
| "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", |
| "cmt_id": "e8b9cf5574e8154a6db2505d028682e830c9f620" |
| }, |
| "CVE-2020-0433": { |
| "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", |
| "cmt_id": "f530afb974c2e82047bd6220303a2dbe30eff304" |
| }, |
| "CVE-2020-11565": { |
| "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", |
| "cmt_id": "c5544e72014cdb0a739f6971fb3dd4fb641b392c" |
| } |
| }, |
| "4.9.220": { |
| "CVE-2020-12826": { |
| "cmt_msg": "signal: Extend exec_id to 64bits", |
| "cmt_id": "110012a2c94ad4fa28234a1b39e54fd4114fbaf2" |
| } |
| }, |
| "4.9.221": { |
| "CVE-2019-19319": { |
| "cmt_msg": "ext4: protect journal inode's blocks using block_validity", |
| "cmt_id": "a9855260fe8d8680bf8c4f0d8303b696c861e99b" |
| }, |
| "CVE-2020-12114": { |
| "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", |
| "cmt_id": "91e997939dda1a866f23ddfb043dcd4a3ff57524" |
| }, |
| "CVE-2020-12464": { |
| "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", |
| "cmt_id": "ab20e851e49e75a9e653463853995076899a4e48" |
| } |
| }, |
| "4.9.222": { |
| "CVE-2020-10751": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "6affa87d168d91af6c8f303dc1fc7a7f59869818" |
| }, |
| "CVE-2020-0255": { |
| "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", |
| "cmt_id": "6affa87d168d91af6c8f303dc1fc7a7f59869818" |
| } |
| }, |
| "4.9.224": { |
| "CVE-2020-10711": { |
| "cmt_msg": "netlabel: cope with NULL catmap", |
| "cmt_id": "9232577ef3e10775eefe7f2689cbf851c8b13d80" |
| }, |
| "CVE-2020-1749": { |
| "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", |
| "cmt_id": "badbe56cb62faabe946fed8d7e8a25c009a95e3b" |
| }, |
| "CVE-2020-27786": { |
| "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", |
| "cmt_id": "c13f1463d84b86bedb664e509838bef37e6ea317" |
| }, |
| "CVE-2020-12769": { |
| "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", |
| "cmt_id": "15029156d7ac0ae4ec80f577bb25f68fe07c8af1" |
| }, |
| "CVE-2020-10690": { |
| "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", |
| "cmt_id": "89e8fc989feaac00bf1a7f9a766289422e2f5768" |
| }, |
| "CVE-2020-13143": { |
| "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", |
| "cmt_id": "2056c78ee8abacaf71c89c999483183203e8441d" |
| }, |
| "CVE-2019-19768": { |
| "cmt_msg": "blktrace: Protect q->blk_trace with RCU", |
| "cmt_id": "284dba674c063ac5cab9ffc1ea07f7b199aeb62f" |
| }, |
| "CVE-2020-12770": { |
| "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", |
| "cmt_id": "6950c2775e02e4be51b06901306ee641e8e5b3df" |
| } |
| }, |
| "4.9.225": { |
| "CVE-2018-9517": { |
| "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", |
| "cmt_id": "feaed88dccc4742805c41260040103fa8a7f0df2" |
| }, |
| "CVE-2021-0447": { |
| "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", |
| "cmt_id": "5803ecd7f6ac6f747582e775caa62ac9d0489261" |
| }, |
| "CVE-2020-27067": { |
| "cmt_msg": "l2tp: fix l2tp_eth module loading", |
| "cmt_id": "1ede832fb82fbda56c1bd7c57fb581dfab9c6e49" |
| } |
| }, |
| "4.9.226": { |
| "CVE-2020-10732": { |
| "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", |
| "cmt_id": "d228bc4b19e0b1c35f3eb404acbf1d607c01e64c" |
| } |
| }, |
| "4.9.227": { |
| "CVE-2020-13974": { |
| "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", |
| "cmt_id": "adf823fa2a53db5d119d90817778f263a3a47608" |
| }, |
| "CVE-2020-0543": { |
| "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", |
| "cmt_id": "15cf7ca9f59ff911cd5582969377bbf8c2ecab8a" |
| }, |
| "CVE-2019-19462": { |
| "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", |
| "cmt_id": "d1774b0459875e2bf3e93b86294296e5494fd0b7" |
| }, |
| "CVE-2020-10757": { |
| "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", |
| "cmt_id": "c915cffda0a4329ee454646138fe2b11c5ba3cd6" |
| } |
| }, |
| "4.9.228": { |
| "CVE-2020-29368": { |
| "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", |
| "cmt_id": "d93d7bd61072a03dde173d36ae5815488a585fc0" |
| }, |
| "CVE-2019-20810": { |
| "cmt_msg": "media: go7007: fix a miss of snd_card_free", |
| "cmt_id": "3e70f204f62f2198f3b88932c71e5ac29a5fbb10" |
| }, |
| "CVE-2020-10766": { |
| "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", |
| "cmt_id": "fc0abf5a64ea5d028af0cf5d37d5898afe6748c5" |
| }, |
| "CVE-2020-10767": { |
| "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", |
| "cmt_id": "38be87f5e7a7a7378d4ef4528c13bd1d666ab867" |
| }, |
| "CVE-2020-10768": { |
| "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", |
| "cmt_id": "db39004352a40107213a70dc8e549936a6468fa9" |
| } |
| }, |
| "4.9.229": { |
| "CVE-2020-12771": { |
| "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", |
| "cmt_id": "be676835b2250861d525b8e2a8e2bed8c1a9027d" |
| }, |
| "CVE-2020-15436": { |
| "cmt_msg": "block: Fix use-after-free in blkdev_get()", |
| "cmt_id": "a54b15af2b495ed97660a6276710ef36e06ac6c9" |
| }, |
| "CVE-2020-12655": { |
| "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", |
| "cmt_id": "2bda23ca5b8186f7906dd29efd1c773bb8b84098" |
| } |
| }, |
| "4.9.230": { |
| "CVE-2020-15393": { |
| "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", |
| "cmt_id": "4ea5c9091d62e9516819c7bcb7c09658bde85acc" |
| } |
| }, |
| "4.9.231": { |
| "CVE-2020-14356": { |
| "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", |
| "cmt_id": "51fbad61b1dc2a082c7f7dbc3b1299a1e40c061a" |
| } |
| }, |
| "4.9.232": { |
| "CVE-2020-15437": { |
| "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", |
| "cmt_id": "81e57039ebbc2c0867f2c04bb3cb205b4edd0141" |
| }, |
| "CVE-2018-10323": { |
| "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", |
| "cmt_id": "8e5f820e14e93ebfc7fcf2a099817eb9c7c3be04" |
| } |
| }, |
| "4.9.233": { |
| "CVE-2020-26088": { |
| "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", |
| "cmt_id": "1b0eab4e8622183ff26230a589b33f533dfbf7b4" |
| }, |
| "CVE-2019-19054": { |
| "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", |
| "cmt_id": "fa5ac0514ec1f66c2c04c6486a9f090d4ddfdac9" |
| }, |
| "CVE-2020-25212": { |
| "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", |
| "cmt_id": "8973046648c4f0392f50d915ea1bdb639e930519" |
| }, |
| "CVE-2019-9445": { |
| "cmt_msg": "f2fs: check if file namelen exceeds max value", |
| "cmt_id": "7745e3c67b80865bd0bc0812fda9f6292c8dc2fb" |
| }, |
| "CVE-2018-13094": { |
| "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", |
| "cmt_id": "beff051fa566f6ed93da74171b30fb049038b23d" |
| }, |
| "CVE-2018-13093": { |
| "cmt_msg": "xfs: validate cached inodes are free when allocated", |
| "cmt_id": "42c59d544af976f4736640ef25ff791e2188aed3" |
| }, |
| "CVE-2018-8043": { |
| "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", |
| "cmt_id": "a7efa804e0f4053b21356a0d40bd0942c77fe8d1" |
| }, |
| "CVE-2019-18808": { |
| "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", |
| "cmt_id": "65d77c8771d2246fafb8e57dd260c8fa7224a576" |
| }, |
| "CVE-2020-16166": { |
| "cmt_msg": "random32: update the net random state on interrupt and activity", |
| "cmt_id": "5aa78397e208b6871a8bdec7fa2bd6992b1f3e4b" |
| }, |
| "CVE-2020-36386": { |
| "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", |
| "cmt_id": "aea77913022bbd0194feb33720d9bca8b6b26f9a" |
| }, |
| "CVE-2020-14331": { |
| "cmt_msg": "vgacon: Fix for missing check in scrollback handling", |
| "cmt_id": "8c19b606e78a2b08e1ea69eebd5c290913c89612" |
| }, |
| "CVE-2019-19448": { |
| "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", |
| "cmt_id": "802dff14b904b37a985ab2,87db546d872f950f05" |
| }, |
| "CVE-2019-19074": { |
| "cmt_msg": "ath9k: release allocated buffer if timed out", |
| "cmt_id": "f0b65fee921fe7efda2889d1a3eea69137682402" |
| }, |
| "CVE-2019-19073": { |
| "cmt_msg": "ath9k_htc: release allocated buffer if timed out", |
| "cmt_id": "86c3e3e5937f7496d08eb7bc498ee3c10095d23c" |
| } |
| }, |
| "4.9.234": { |
| "CVE-2020-14314": { |
| "cmt_msg": "ext4: fix potential negative array index in do_split()", |
| "cmt_id": "539ae3e03875dacaa9c388aff141ccbb4ef4ecb5" |
| }, |
| "CVE-2020-29371": { |
| "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", |
| "cmt_id": "6d26d08216475e5a40e4f6ade397c181a19dc524" |
| }, |
| "CVE-2020-0466": { |
| "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", |
| "cmt_id": "b3ce6ca929dc677f7e443eb3012dfc7a433b1161" |
| } |
| }, |
| "4.9.236": { |
| "CVE-2020-25285": { |
| "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", |
| "cmt_id": "47b1be395352d54f888f4331fa291dc9199fff4c" |
| }, |
| "CVE-2020-12888": { |
| "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", |
| "cmt_id": "5f2c69e2ef24a79b6909a6dc6b249a17909965f8" |
| }, |
| "CVE-2020-0465": { |
| "cmt_msg": "HID: core: Sanitize event code and type when mapping input", |
| "cmt_id": "ac48d8300edd1aa4ce0fbef0ff5136d363f44cdf" |
| }, |
| "CVE-2020-25641": { |
| "cmt_msg": "block: allow for_each_bvec to support zero len bvec", |
| "cmt_id": "0c7cee63ec92b316f8b891b667177a080b670566" |
| }, |
| "CVE-2021-1048": { |
| "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", |
| "cmt_id": "8238ee93a30a5ff6fc75751e122a28e0d92f3e12" |
| } |
| }, |
| "4.9.237": { |
| "CVE-2020-25284": { |
| "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", |
| "cmt_id": "774519ed39da09471abe2c02a7f293c380759cc3" |
| }, |
| "CVE-2020-14390": { |
| "cmt_msg": "fbcon: remove soft scrollback code", |
| "cmt_id": "c7e41b00de99932f189d8af3a40caee31a385788" |
| }, |
| "CVE-2020-28097": { |
| "cmt_msg": "vgacon: remove software scrollback support", |
| "cmt_id": "7cabb35d2106d567af15ea1040c7737f34b29cd8" |
| } |
| }, |
| "4.9.238": { |
| "CVE-2020-25643": { |
| "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", |
| "cmt_id": "585e29541c29349420d5926026a74456e233a2b3" |
| }, |
| "CVE-2021-0605": { |
| "cmt_msg": "af_key: pfkey_dump needs parameter validation", |
| "cmt_id": "31c59173dc9553d6857129d2a8e102c4700b54c4" |
| } |
| }, |
| "4.9.239": { |
| "CVE-2020-14386": { |
| "cmt_msg": "net/packet: fix overflow in tpacket_rcv", |
| "cmt_id": "9a675ac9fe9794f0981db6e4b101503818f61622" |
| }, |
| "CVE-2020-25211": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "9c61977a713511c01abdf9b2a72693d21cb60556" |
| }, |
| "CVE-2021-0448": { |
| "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", |
| "cmt_id": "9c61977a713511c01abdf9b2a72693d21cb60556" |
| }, |
| "CVE-2021-39634": { |
| "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", |
| "cmt_id": "a16d314ccda2efa6173f2ae7d386f99c61d273a4" |
| }, |
| "CVE-2020-28915": { |
| "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", |
| "cmt_id": "6f1adb22fc0c567d65e8c56cc04d633d2fa1bfb4" |
| } |
| }, |
| "4.9.240": { |
| "CVE-2020-10135": { |
| "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", |
| "cmt_id": "b77912c3bfc6e384c0ec0c08840a37d1f79ee5de" |
| }, |
| "CVE-2020-12352": { |
| "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", |
| "cmt_id": "1a8da94d1c6ecc2a8db2a2477bef6945c0ba9c3e" |
| }, |
| "CVE-2020-12351": { |
| "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", |
| "cmt_id": "720369661674527c8aa999fae0e295eeea12174c" |
| } |
| }, |
| "4.9.241": { |
| "CVE-2020-25705": { |
| "cmt_msg": "icmp: randomize the global rate limiter", |
| "cmt_id": "df838165a187b7c699ec372a2a136f9873112776" |
| } |
| }, |
| "4.9.242": { |
| "CVE-2020-28974": { |
| "cmt_msg": "vt: Disable KD_FONT_OP_COPY", |
| "cmt_id": "5ca7f073e680ff2e56756a9b6bffcd55085d292c" |
| }, |
| "CVE-2020-25668": { |
| "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", |
| "cmt_id": "ea5dd52c3568e0f7232c20fd4adf551fcad07c60" |
| }, |
| "CVE-2020-25656": { |
| "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", |
| "cmt_id": "04a6e5aa75e7a9432df0443a17ab7c8dd005cc9b" |
| }, |
| "CVE-2020-35508": { |
| "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", |
| "cmt_id": "66be43d81870c55637c2f32d8088d7184e93262a" |
| } |
| }, |
| "4.9.243": { |
| "CVE-2020-8694": { |
| "cmt_msg": "powercap: restrict energy meter to root access", |
| "cmt_id": "04533793ac10b38103d3aefe1c4b5b1eaf009f35" |
| } |
| }, |
| "4.9.244": { |
| "CVE-2020-14351": { |
| "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", |
| "cmt_id": "5a097d643717160d859f5bd4a29e2088f48a5fd3" |
| }, |
| "CVE-2019-0148": { |
| "cmt_msg": "i40e: Wrong truncation from u16 to u8", |
| "cmt_id": "b7715c9bb71fa4b95fdb9b98a8814d8e18cb7402" |
| }, |
| "CVE-2020-25704": { |
| "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", |
| "cmt_id": "d59f7d676bfe2149662361fc3a1c0de9d011066d" |
| }, |
| "CVE-2020-0427": { |
| "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", |
| "cmt_id": "77440c3a37203e3f4667d06e37f76ef3968d2d8c" |
| }, |
| "CVE-2020-27673": { |
| "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", |
| "cmt_id": "d7b048485f6f71e55f32ce904ead727b187b3671" |
| }, |
| "CVE-2020-25645": { |
| "cmt_msg": "geneve: add transport ports in route lookup for geneve", |
| "cmt_id": "1200ebbd06c2f569421dcab4e10649f3e299867c" |
| }, |
| "CVE-2019-0147": { |
| "cmt_msg": "i40e: add num_vectors checker in iwarp handler", |
| "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" |
| }, |
| "CVE-2020-27675": { |
| "cmt_msg": "xen/events: avoid removing an event channel while handling it", |
| "cmt_id": "e4ccd4b1a6e586659005a231e793af325e575e53" |
| }, |
| "CVE-2019-0145": { |
| "cmt_msg": "i40e: add num_vectors checker in iwarp handler", |
| "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" |
| } |
| }, |
| "4.9.245": { |
| "CVE-2020-4788": { |
| "cmt_msg": "powerpc/64s: flush L1D on kernel entry", |
| "cmt_id": "fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f" |
| }, |
| "CVE-2020-25669": { |
| "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", |
| "cmt_id": "452e66f60880ac1fa1ca0a594fc1ebaee87fa35d" |
| } |
| }, |
| "4.9.247": { |
| "CVE-2019-19813": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "a93a374efd8e0c01abaec21fc808b1cb7fad0b49" |
| }, |
| "CVE-2019-19816": { |
| "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", |
| "cmt_id": "a93a374efd8e0c01abaec21fc808b1cb7fad0b49" |
| } |
| }, |
| "4.9.248": { |
| "CVE-2020-29661": { |
| "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", |
| "cmt_id": "742f3062298ac1ae1d28de31b1f946f93db1eba1" |
| }, |
| "CVE-2020-29660": { |
| "cmt_msg": "tty: Fix ->session locking", |
| "cmt_id": "ac28e357fe00902bbc21655eaee6b56c850f80af" |
| }, |
| "CVE-2020-35519": { |
| "cmt_msg": "net/x25: prevent a couple of overflows", |
| "cmt_id": "4596762761d5e0f843fc920babb4506e2d3c6c90" |
| } |
| }, |
| "4.9.249": { |
| "CVE-2020-27815": { |
| "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", |
| "cmt_id": "2c7c903caef18d45bac879557861656aa30b8933" |
| } |
| }, |
| "4.9.250": { |
| "CVE-2020-29568": { |
| "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", |
| "cmt_id": "7936eefdbec92aaa42281b82c07c6e0b843b7932" |
| }, |
| "CVE-2020-36158": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", |
| "cmt_id": "6ceb5b8e16dac9a041271bc3985ff155bdbb30b4" |
| } |
| }, |
| "4.9.251": { |
| "CVE-2021-39648": { |
| "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", |
| "cmt_id": "225330e682fa9aaa152287b49dea1ce50fbe0a92" |
| } |
| }, |
| "4.9.252": { |
| "CVE-2020-28374": { |
| "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", |
| "cmt_id": "966e6d0786e64f4065b76116d7e9411c01761d30" |
| } |
| }, |
| "4.9.253": { |
| "CVE-2021-3178": { |
| "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", |
| "cmt_id": "2174b2cf3960b9091c2516feeb9e345fe24f8906" |
| } |
| }, |
| "4.9.254": { |
| "CVE-2020-27825": { |
| "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", |
| "cmt_id": "04f51df12ddaa0e2a38223da00e0d3ed02d62a01" |
| }, |
| "CVE-2021-39657": { |
| "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", |
| "cmt_id": "7bbac19e604b2443c93f01c3259734d53f776dbf" |
| } |
| }, |
| "4.9.258": { |
| "CVE-2021-26931": { |
| "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", |
| "cmt_id": "746d5c20c9cbeac0ee9f24a51862eb551c7b8706" |
| }, |
| "CVE-2021-26930": { |
| "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", |
| "cmt_id": "4cec38115dfd5d5c123ece4f4a55165a5a2e8cc0" |
| }, |
| "CVE-2021-26932": { |
| "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", |
| "cmt_id": "34156171ae855364456933c1aea81ea0f2536853" |
| } |
| }, |
| "4.9.259": { |
| "CVE-2021-0512": { |
| "cmt_msg": "HID: make arrays usage and value to be the same", |
| "cmt_id": "b12d39309ecf08cdcab716a5063f9ec23cb9f001" |
| }, |
| "CVE-2021-3612": { |
| "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", |
| "cmt_id": "e0154ded9330c188863b09824c3b07ebafa6e5a4" |
| } |
| }, |
| "4.9.260": { |
| "CVE-2021-30002": { |
| "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", |
| "cmt_id": "80c22132c0f4bb91cef8c9001bde3057c07f005f" |
| }, |
| "CVE-2021-27365": { |
| "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", |
| "cmt_id": "9ce352a1fbfb9d16353ea30cf4b922a1a049fe69" |
| }, |
| "CVE-2021-27364": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "a483236b41db0228bd4643d7cc0a4c51d33edd93" |
| }, |
| "CVE-2021-27363": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "a483236b41db0228bd4643d7cc0a4c51d33edd93" |
| }, |
| "CVE-2021-28038": { |
| "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", |
| "cmt_id": "d1ae0cfd1fab27d170caf905e519198cb144d523" |
| } |
| }, |
| "4.9.262": { |
| "CVE-2019-19060": { |
| "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", |
| "cmt_id": "9c8c498ae28e116f26509d72d0db667eb5414dac" |
| }, |
| "CVE-2019-19061": { |
| "cmt_msg": "iio: imu: adis16400: fix memory leak", |
| "cmt_id": "10f675ec4eda0801791546980b35cc41589815aa" |
| }, |
| "CVE-2021-29265": { |
| "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", |
| "cmt_id": "bce53f0b8e90d2821ec5fa14689949a025e8b63d" |
| }, |
| "CVE-2021-28660": { |
| "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", |
| "cmt_id": "b318d268318be4c229fb4c0d4f6ff1d7251c88d7" |
| } |
| }, |
| "4.9.263": { |
| "CVE-2021-28964": { |
| "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", |
| "cmt_id": "ca403b79f4330bb5a8df3551e39610db6c06c46f" |
| }, |
| "CVE-2021-28972": { |
| "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", |
| "cmt_id": "ef8dc3d327cc799e3f6f1af41852f8f954f7115f" |
| }, |
| "CVE-2021-28971": { |
| "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", |
| "cmt_id": "6c2ab223a7286ecfa016f532b7231fb049fb2a02" |
| } |
| }, |
| "4.9.264": { |
| "CVE-2021-28688": { |
| "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", |
| "cmt_id": "3cb86952ce3c8b28a0c1f3ce82848618d8628015" |
| }, |
| "CVE-2021-29647": { |
| "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", |
| "cmt_id": "ab29b020bc29aecaa05e29063cddea83df393023" |
| } |
| }, |
| "4.9.265": { |
| "CVE-2021-0941": { |
| "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", |
| "cmt_id": "1636af9e8a8840f5696ad2c01130832411986af4" |
| }, |
| "CVE-2021-3483": { |
| "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", |
| "cmt_id": "cf4ab748a0ef6e70cad3878bf31f57ee33bf2d14" |
| } |
| }, |
| "4.9.266": { |
| "CVE-2021-29154": { |
| "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", |
| "cmt_id": "d4b234e44aa7108aeadc7b84b162c6f882597005" |
| } |
| }, |
| "4.9.267": { |
| "CVE-2021-3659": { |
| "cmt_msg": "net: mac802154: Fix general protection fault", |
| "cmt_id": "c3883480ce4ebe5b13dbfdc9f2c6503bc9e8ab69" |
| }, |
| "CVE-2021-0937": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "0c58c9f9c5c5326320bbe0429a0f45fc1b92024b" |
| }, |
| "CVE-2020-25672": { |
| "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", |
| "cmt_id": "83a09c10719661d8b51f1aa475ec52c13f3546d1" |
| }, |
| "CVE-2020-25673": { |
| "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", |
| "cmt_id": "79fc2e475789067b3bf3100a00f37fd9d75cbc8d" |
| }, |
| "CVE-2020-25670": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", |
| "cmt_id": "18013007b596771bf5f5e7feee9586fb0386ad14" |
| }, |
| "CVE-2020-25671": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", |
| "cmt_id": "013b8099064f2dc51e789e54a93edb65e2539792" |
| }, |
| "CVE-2021-22555": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "0c58c9f9c5c5326320bbe0429a0f45fc1b92024b" |
| } |
| }, |
| "4.9.269": { |
| "CVE-2021-33034": { |
| "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", |
| "cmt_id": "31f20a6e73663c8ac3c625aa6b24cbdc8541c674" |
| }, |
| "CVE-2017-0605": { |
| "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", |
| "cmt_id": "27b1e95a936e23a9328e1f318c199d3946352531" |
| }, |
| "CVE-2021-31916": { |
| "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", |
| "cmt_id": "c13f07341685149cfbc2014e8b4a85ff56d4ae0e" |
| }, |
| "CVE-2021-4157": { |
| "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", |
| "cmt_id": "c621f3654bba1096ec913d0942e27bd032bb6090" |
| }, |
| "CVE-2021-32399": { |
| "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", |
| "cmt_id": "34f1f8aecf16798c91154e0f6d56b4f804a39bd1" |
| } |
| }, |
| "4.9.270": { |
| "CVE-2020-26558": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" |
| }, |
| "CVE-2021-0129": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" |
| } |
| }, |
| "4.9.271": { |
| "CVE-2020-24587": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8" |
| }, |
| "CVE-2020-24586": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8" |
| }, |
| "CVE-2021-34981": { |
| "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", |
| "cmt_id": "77c559407276ed4a8854dafc4a5efc8608e51906" |
| }, |
| "CVE-2020-24588": { |
| "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", |
| "cmt_id": "81bcb7d7d5071511eb86cc3b7793607bac9d4060" |
| }, |
| "CVE-2020-26139": { |
| "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", |
| "cmt_id": "5551cb1c68d4ecdabf8b9ea33410f68532b895cc" |
| }, |
| "CVE-2020-26147": { |
| "cmt_msg": "mac80211: assure all fragments are encrypted", |
| "cmt_id": "29bc5b2bccf5f5601cabf9562454f213fb8dcd67" |
| }, |
| "CVE-2021-29650": { |
| "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", |
| "cmt_id": "e2a2d6c9accf3c3cdf44990c03498e86f27d5ea3" |
| } |
| }, |
| "4.9.272": { |
| "CVE-2021-3564": { |
| "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", |
| "cmt_id": "75aa7baab3e18a98f232f14dd9cc6965bcf9b31a" |
| }, |
| "CVE-2021-38208": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94" |
| }, |
| "CVE-2021-3573": { |
| "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", |
| "cmt_id": "3c62132da179fd30531958d51c68ba4915996556" |
| }, |
| "CVE-2021-3587": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94" |
| } |
| }, |
| "4.9.274": { |
| "CVE-2021-34693": { |
| "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", |
| "cmt_id": "d240a28396e08023987384ce80bc940bb38ac779" |
| }, |
| "CVE-2021-45486": { |
| "cmt_msg": "inet: use bigger hash table for IP ID generation", |
| "cmt_id": "0889f0a3bb2de535f48424491d8f9d5954a3cde8" |
| } |
| }, |
| "4.9.276": { |
| "CVE-2021-38160": { |
| "cmt_msg": "virtio_console: Assure used length from device is limited", |
| "cmt_id": "9e2b8368b2079437c6840f3303cb0b7bc9b896ee" |
| }, |
| "CVE-2021-3609": { |
| "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", |
| "cmt_id": "545914a9f926b8b6c9193cdee352c1fa70e6df18" |
| }, |
| "CVE-2021-45485": { |
| "cmt_msg": "ipv6: use prandom_u32() for ID generation", |
| "cmt_id": "3fc852e59c0a48094cc0f1b2e866604986bbcd31" |
| }, |
| "CVE-2022-0850": { |
| "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", |
| "cmt_id": "25dcc64fa0c9399653e1fd1a4bad6c1e8cb31f3f" |
| }, |
| "CVE-2021-33909": { |
| "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", |
| "cmt_id": "c5157b3e775dac31d51b11f993a06a84dc11fc8c" |
| } |
| }, |
| "4.9.277": { |
| "CVE-2021-38204": { |
| "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", |
| "cmt_id": "ae3209b9fb086661ec1de4d8f4f0b951b272bbcd" |
| }, |
| "CVE-2021-3679": { |
| "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", |
| "cmt_id": "7db12bae1a239d872d17e128fd5271da789bf99c" |
| }, |
| "CVE-2021-37576": { |
| "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", |
| "cmt_id": "8c46b4b2749c4b3b7e602403addc32ec2b48baed" |
| } |
| }, |
| "4.9.278": { |
| "CVE-2021-0920": { |
| "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", |
| "cmt_id": "a805a7bd94644207d762d9c287078fecfcf52b3e" |
| }, |
| "CVE-2021-21781": { |
| "cmt_msg": "ARM: ensure the signal page contains defined contents", |
| "cmt_id": "aa1b5f2fe4532e99986f1eee2c04bb7d314e3007" |
| } |
| }, |
| "4.9.280": { |
| "CVE-2021-38205": { |
| "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", |
| "cmt_id": "ffdc1e312e2074875147c1df90764a9bae56f11f" |
| }, |
| "CVE-2021-3732": { |
| "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", |
| "cmt_id": "e3eee87c846dc47f6d8eb6d85e7271f24122a279" |
| } |
| }, |
| "4.9.281": { |
| "CVE-2021-3653": { |
| "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", |
| "cmt_id": "29c4f674715ba8fe7a391473313e8c71f98799c4" |
| }, |
| "CVE-2021-42008": { |
| "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", |
| "cmt_id": "de9171c1d9a5c2c4c5ec5e64f420681f178152fa" |
| } |
| }, |
| "4.9.282": { |
| "CVE-2021-39633": { |
| "cmt_msg": "ip_gre: add validation for csum_start", |
| "cmt_id": "41d5dfa408130433cc5f037ad89bed854bf936f7" |
| }, |
| "CVE-2021-3753": { |
| "cmt_msg": "vt_kdsetmode: extend console locking", |
| "cmt_id": "755a2f40dda2d6b2e3b8624cb052e68947ee4d1f" |
| } |
| }, |
| "4.9.283": { |
| "CVE-2021-40490": { |
| "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", |
| "cmt_id": "7067b09fe587cbd47544a3047a40c64e4d636fff" |
| }, |
| "CVE-2020-3702": { |
| "cmt_msg": "ath: Use safer key clearing with key cache entries", |
| "cmt_id": "ea3f7df20fc8e0b82ec0e065b0b0d38e55fd7775" |
| } |
| }, |
| "4.9.284": { |
| "CVE-2021-20320": { |
| "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", |
| "cmt_id": "c22cf38428cb910f1996839c917e9238d2e44d4b" |
| }, |
| "CVE-2021-3655": { |
| "cmt_msg": "sctp: validate from_addr_param return", |
| "cmt_id": "92e7bca98452aa760713016a434aa7edfc09fb13" |
| } |
| }, |
| "4.9.286": { |
| "CVE-2021-4203": { |
| "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", |
| "cmt_id": "09818f629bafbe20e24bac919019853ea3ac5ca4" |
| } |
| }, |
| "4.9.287": { |
| "CVE-2021-41864": { |
| "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", |
| "cmt_id": "4fd6663eb01bc3c73143cd27fefd7b8351bc6aa6" |
| }, |
| "CVE-2020-29374": { |
| "cmt_msg": "gup: document and work around \"COW can break either way\" issue", |
| "cmt_id": "9bbd42e79720122334226afad9ddcac1c3e6d373" |
| }, |
| "CVE-2021-20321": { |
| "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", |
| "cmt_id": "286f94453fb34f7bd6b696861c89f9a13f498721" |
| } |
| }, |
| "4.9.288": { |
| "CVE-2021-3896": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "24219a977bfe3d658687e45615c70998acdbac5a" |
| }, |
| "CVE-2022-0644": { |
| "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", |
| "cmt_id": "52ed5a196b1146e0368e95edc23c38fa1b50825a" |
| }, |
| "CVE-2021-3760": { |
| "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", |
| "cmt_id": "8a44904ce83ebcb1281b04c8d37ad7f8ab537a3d" |
| }, |
| "CVE-2021-43389": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "24219a977bfe3d658687e45615c70998acdbac5a" |
| } |
| }, |
| "4.9.289": { |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "42ce7a69f8140783bab908dc29a93c0bcda315d5" |
| } |
| }, |
| "4.9.290": { |
| "CVE-2021-37159": { |
| "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", |
| "cmt_id": "88b912e02d75bacbb957d817db70e6a54ea3a21c" |
| } |
| }, |
| "4.9.291": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "4a59a3681158a182557c75bacd00d184f9b2a8f5" |
| }, |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "d19ea7da0eeb61be28ec05d8b8bddec3dde71610" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "f7dd331a896700728492e02c20a69e53221cd7a4" |
| }, |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "443fc43d2fdbf55be7aa86faae1f7655e761e683" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "9bbe312ebea40c9b586c2b07a0d0948ff418beca" |
| } |
| }, |
| "4.9.292": { |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "8e80bf5d001594b037de04fb4fe89f34cfbcb3ba" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "a043f5a600052dc93bc3d7a6a2c1592b6ee77482" |
| } |
| }, |
| "4.9.293": { |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "0e92a7e47a0411d5208990c83a3d200515e314e8" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "d2ca6859ea96c6d4c6ad3d6873a308a004882419" |
| } |
| }, |
| "4.9.294": { |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "b4226b387436315e7f57465c15335f4f4b5b075d" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection", |
| "cmt_id": "1f66dc775092e5a353e0155fc3aca5dabce77c63" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "728389c21176b2095fa58e858d5ef1d2f2aac429" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "99120c8230fdd5e8b72a6e4162db9e1c0a61954a" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "25898389795bd85d8e1520c0c75c3ad906c17da7" |
| } |
| }, |
| "4.9.295": { |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "83ba6ec97c74fb1a60f7779a26b6a94b28741d8a" |
| } |
| }, |
| "4.9.297": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "3bae29ecb2909c46309671090311230239f1bdd7" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "19e3d9a26f28f432ae89acec22ec47b2a72a502c" |
| } |
| }, |
| "4.9.298": { |
| "CVE-2020-36322": { |
| "cmt_msg": "fuse: fix bad inode", |
| "cmt_id": "3a2f8823aa565cc67bdd00c4cd5e1d8ad81e8436" |
| }, |
| "CVE-2021-20317": { |
| "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", |
| "cmt_id": "ef2e64035f074bfeef14c28347aaec0b486a9e9f" |
| }, |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "b233d7395cd104398dd83f130df5f0d57036c95e" |
| }, |
| "CVE-2021-29264": { |
| "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", |
| "cmt_id": "2cf34285e6eac396a180762c5504e2911df88c9a" |
| }, |
| "CVE-2021-33033": { |
| "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", |
| "cmt_id": "f49f0e65a95664b648e058aa923f651ec08dfeb7" |
| }, |
| "CVE-2021-20292": { |
| "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", |
| "cmt_id": "70f44dfbde027f444412cfb4ea9b485a4c1dec0e" |
| }, |
| "CVE-2021-22543": { |
| "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", |
| "cmt_id": "f4b2bfed80e8d0e91b431dd1c21bc3c2c4d5f07e" |
| } |
| }, |
| "4.9.299": { |
| "CVE-2021-38198": { |
| "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", |
| "cmt_id": "e262acbda232b6a2a9adb53f5d2b2065f7626625" |
| }, |
| "CVE-2021-38199": { |
| "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", |
| "cmt_id": "993892ed82350d0b4eb7d321d2bb225219bd1cfc" |
| }, |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "84f4ab5b47d955ad2bb30115d7841d3e8f0994f4" |
| }, |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", |
| "cmt_id": "1795af6435fa5f17ced2d34854fd4871e0780092" |
| } |
| }, |
| "4.9.300": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "8788981e120694a82a3672e062fe4ea99446634a" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "f24454e42b5a58267928b0de53b0dd9b43e4dd46" |
| } |
| }, |
| "4.9.301": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "7e33a0ad792f04bad920c7197bda8cc2ea08d304" |
| }, |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "175db196e45d6f0e6047eccd09c8ba55465eb131" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f" |
| } |
| }, |
| "4.9.302": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "ff0a90739925734c91c7e39befe3f4378e0c1369" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4" |
| } |
| }, |
| "4.9.304": { |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "958b6ab4d70bf991e8c90233504d4cb863aaef8a" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "89260e0e191e8a3a9872f72836bdf0641853c87f" |
| } |
| }, |
| "4.9.305": { |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "be1bb345f180482b0e57768d967ef020d7cba592" |
| } |
| }, |
| "4.9.306": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "97b835c6de03a24db79d374b02d532f0b562fd38" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "b24d4041cfb6dab83f9edf40573375bd1365e619" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "1112bb311ec13e7e6e7045ae4a0b7091bedc6b7a" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "8f80d12f6946a6fe7c64bfc204c062a57f83c7f8" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "c4497b057b14274e159434f0ed70439a21f3d2a9" |
| } |
| }, |
| "4.9.307": { |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "cad71f1094834eb69f7ceec8100d300c26b43053" |
| }, |
| "CVE-2021-4149": { |
| "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", |
| "cmt_id": "43bfa08ba62a1ca7a22365c7092e491e04327efb" |
| } |
| }, |
| "4.9.309": { |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "c1184fa07428fb81371d5863e09795f0d06d35cf" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "0a7aad979bfb43c4a78d33a5f356caf4ceb28bca" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "4d28522acd1c4415c85f6b33463713a268f68965" |
| } |
| }, |
| "4.9.311": { |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "45d1a63bacf2b6ab27f9b11b5a2431e19d34d01f" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "7b0e01a9b7f2aaeb6fa73b35864b1d7dc6e795c4" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "dffc859d1d9560da594e4282091781b8d2715f00" |
| }, |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "e9c4ee674586ff0b098d17638af719aa56c9c272" |
| } |
| }, |
| "outstanding": { |
| "CVE-2021-0929": { |
| "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" |
| }, |
| "CVE-2018-20854": { |
| "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" |
| }, |
| "CVE-2018-20855": { |
| "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1419": { |
| "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-33098": { |
| "cmt_msg": "ixgbe: fix large MTU request from VF" |
| }, |
| "CVE-2017-5753": { |
| "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2019-19377": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" |
| }, |
| "CVE-2019-2181": { |
| "cmt_msg": "binder: check for overflow when alloc for security context" |
| }, |
| "CVE-2021-3759": { |
| "cmt_msg": "memcg: enable accounting of ipc resources" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0067": { |
| "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" |
| }, |
| "CVE-2019-19449": { |
| "cmt_msg": "f2fs: fix to do sanity check on segment/section count" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26541": { |
| "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" |
| }, |
| "CVE-2021-35477": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" |
| }, |
| "CVE-2019-15222": { |
| "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" |
| }, |
| "CVE-2019-15223": { |
| "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" |
| }, |
| "CVE-2017-18552": { |
| "cmt_msg": "RDS: validate the requested traces user input against max supported" |
| }, |
| "CVE-2019-19815": { |
| "cmt_msg": "f2fs: support swap file w/ DIO" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe" |
| }, |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" |
| }, |
| "CVE-2019-19241": { |
| "cmt_msg": "io_uring: async workers should inherit the user creds" |
| }, |
| "CVE-2019-9453": { |
| "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" |
| }, |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" |
| }, |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" |
| }, |
| "CVE-2017-1000405": { |
| "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12379": { |
| "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" |
| }, |
| "CVE-2019-12378": { |
| "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" |
| }, |
| "CVE-2020-16120": { |
| "cmt_msg": "ovl: switch to mounter creds in readdir" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-8834": { |
| "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2021-39713": { |
| "cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock" |
| }, |
| "CVE-2018-25020": { |
| "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" |
| }, |
| "CVE-2019-20908": { |
| "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" |
| }, |
| "CVE-2018-7754": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4037": { |
| "cmt_msg": "xfs: fix up non-directory creation in SGID directories" |
| }, |
| "CVE-2019-1999": { |
| "cmt_msg": "binder: fix race between munmap() and direct reclaim" |
| }, |
| "CVE-2019-9444": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2021-3506": { |
| "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" |
| }, |
| "CVE-2019-19067": { |
| "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" |
| }, |
| "CVE-2020-0435": { |
| "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" |
| }, |
| "CVE-2019-3874": { |
| "cmt_msg": "sctp: implement memory accounting on tx path" |
| }, |
| "CVE-2020-26145": { |
| "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-7308": { |
| "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2021-29155": { |
| "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" |
| }, |
| "CVE-2017-9986": { |
| "cmt_msg": "sound: Retire OSS" |
| }, |
| "CVE-2021-39711": { |
| "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" |
| }, |
| "CVE-2021-34556": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" |
| }, |
| "CVE-2021-39714": { |
| "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" |
| }, |
| "CVE-2017-18261": { |
| "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" |
| }, |
| "CVE-2018-13095": { |
| "cmt_msg": "xfs: More robust inode extent count validation" |
| }, |
| "CVE-2018-13098": { |
| "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" |
| }, |
| "CVE-2021-38300": { |
| "cmt_msg": "bpf, mips: Validate conditional branch offsets" |
| }, |
| "CVE-2021-3669": { |
| "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" |
| }, |
| "CVE-2019-18885": { |
| "cmt_msg": "btrfs: merge btrfs_find_device and find_device" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15780": { |
| "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" |
| }, |
| "CVE-2019-11091": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2021-4023": { |
| "cmt_msg": "io-wq: fix cancellation on create-worker failure" |
| }, |
| "CVE-2019-18680": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0812": { |
| "cmt_msg": "xprtrdma: fix incorrect header size calculations" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19036": { |
| "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" |
| }, |
| "CVE-2018-12130": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2017-8065": { |
| "cmt_msg": "crypto: ccm - move cbcmac input off the stack" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1508": { |
| "cmt_msg": "io_uring: reexpand under-reexpanded iters" |
| }, |
| "CVE-2020-11669": { |
| "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" |
| }, |
| "CVE-2019-19922": { |
| "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" |
| }, |
| "CVE-2019-19927": { |
| "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" |
| }, |
| "CVE-2019-16921": { |
| "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" |
| }, |
| "CVE-2021-4159": { |
| "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" |
| }, |
| "CVE-2017-5715": { |
| "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4150": { |
| "cmt_msg": "block: fix incorrect references to disk objects" |
| }, |
| "CVE-2021-28951": { |
| "cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-14305": { |
| "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" |
| }, |
| "CVE-2020-27777": { |
| "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12615": { |
| "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" |
| }, |
| "CVE-2019-16230": { |
| "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" |
| }, |
| "CVE-2019-12455": { |
| "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" |
| }, |
| "CVE-2020-12362": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2020-12363": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2021-39636": { |
| "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" |
| }, |
| "CVE-2018-12127": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2018-12126": { |
| "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2018-20509": { |
| "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" |
| }, |
| "CVE-2022-0480": { |
| "cmt_msg": "memcg: enable accounting for file lock caches" |
| }, |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3894": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk" |
| }, |
| "CVE-2019-20811": { |
| "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" |
| }, |
| "CVE-2020-26141": { |
| "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" |
| }, |
| "CVE-2019-2025": { |
| "cmt_msg": "binder: fix race that allows malicious free of live buffer" |
| }, |
| "CVE-2021-4218": { |
| "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-7273": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" |
| }, |
| "CVE-2022-1043": { |
| "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" |
| }, |
| "CVE-2017-5967": { |
| "cmt_msg": "time: Remove CONFIG_TIMER_STATS" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" |
| }, |
| "CVE-2020-36385": { |
| "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" |
| }, |
| "CVE-2019-12380": { |
| "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" |
| }, |
| "CVE-2019-12381": { |
| "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" |
| }, |
| "CVE-2019-12382": { |
| "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" |
| }, |
| "CVE-2020-12364": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13166": { |
| "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" |
| }, |
| "CVE-2018-12207": { |
| "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" |
| }, |
| "CVE-2020-12656": { |
| "cmt_msg": "sunrpc: check that domain table is empty at module unload." |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36310": { |
| "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" |
| }, |
| "CVE-2020-36313": { |
| "cmt_msg": "KVM: Fix out of range accesses to memslots" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-20449": { |
| "cmt_msg": "printk: hash addresses printed with %p" |
| }, |
| "CVE-2016-10723": { |
| "cmt_msg": "mm, oom: remove sleep from under oom_lock" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0707": { |
| "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" |
| }, |
| "CVE-2019-11191": { |
| "cmt_msg": "x86: Deprecate a.out support" |
| }, |
| "CVE-2019-19039": { |
| "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-10322": { |
| "cmt_msg": "xfs: enhance dinode verifier" |
| }, |
| "CVE-2020-8832": { |
| "cmt_msg": "drm/i915: Record the default hw state after reset upon load" |
| }, |
| "CVE-2022-1280": { |
| "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-32078": { |
| "cmt_msg": "ARM: footbridge: remove personal server platform" |
| }, |
| "CVE-2019-10220": { |
| "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" |
| }, |
| "CVE-2020-27835": { |
| "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" |
| }, |
| "CVE-2019-5489": { |
| "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" |
| }, |
| "CVE-2017-16648": { |
| "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" |
| }, |
| "CVE-2017-18232": { |
| "cmt_msg": "scsi: libsas: direct call probe and destruct" |
| }, |
| "CVE-2019-2213": { |
| "cmt_msg": "binder: fix possible UAF when freeing buffer" |
| } |
| } |
| }, |
| "5.10": { |
| "5.10": { |
| "CVE-2021-3411": { |
| "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly", |
| "cmt_id": "0d07c0ec4381f630c801539c79ad8dcc627f6e4a" |
| } |
| }, |
| "5.10.4": { |
| "CVE-2020-35499": { |
| "cmt_msg": "Bluetooth: sco: Fix crash when using BT_SNDMTU/BT_RCVMTU option", |
| "cmt_id": "6013c99742160d3901c4d108733e29b83b25f452" |
| }, |
| "CVE-2020-27815": { |
| "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", |
| "cmt_id": "c2032bf94ba4fb15db0c277614338d377fe430d2" |
| }, |
| "CVE-2020-29568": { |
| "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", |
| "cmt_id": "b4898bdd2020bae5391b1667fc6c9e27310c59fe" |
| }, |
| "CVE-2020-29569": { |
| "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", |
| "cmt_id": "aadd67750f43132177138fcd56ebc60aeb06228a" |
| } |
| }, |
| "5.10.6": { |
| "CVE-2020-36322": { |
| "cmt_msg": "fuse: fix bad inode", |
| "cmt_id": "36cf9ae54b0ead0daab7701a994de3dcd9ef605d" |
| }, |
| "CVE-2020-36158": { |
| "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", |
| "cmt_id": "94cc73b27a2599e4c88b7b2d6fd190107c58e480" |
| } |
| }, |
| "5.10.7": { |
| "CVE-2021-0707": { |
| "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode", |
| "cmt_id": "a19dae4254c434a1ac8937a809fe08fd15ad3be5" |
| }, |
| "CVE-2020-28374": { |
| "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", |
| "cmt_id": "6f1e88527c1869de08632efa2cc796e0131850dc" |
| }, |
| "CVE-2021-39648": { |
| "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", |
| "cmt_id": "a4b202cba3ab1a7a8b1ca92603931fba5e2032c3" |
| } |
| }, |
| "5.10.10": { |
| "CVE-2021-3178": { |
| "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", |
| "cmt_id": "fdcaa4af5e70e2d984c9620a09e9dade067f2620" |
| }, |
| "CVE-2021-20268": { |
| "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling", |
| "cmt_id": "5f52a8a71b62418d62c736e5aa68aaba0a8da918" |
| } |
| }, |
| "5.10.11": { |
| "CVE-2021-39657": { |
| "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", |
| "cmt_id": "2536194bb3b099cc9a9037009b86e7ccfb81461c" |
| } |
| }, |
| "5.10.12": { |
| "CVE-2021-3347": { |
| "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", |
| "cmt_id": "ab5e9a320e444fda64e5912f0e0f4f02021569ea" |
| } |
| }, |
| "5.10.13": { |
| "CVE-2021-3348": { |
| "cmt_msg": "nbd: freeze the queue while we're adding connections", |
| "cmt_id": "41f6f4a3143506ea1499cda2f14a16a2f82118a8" |
| }, |
| "CVE-2021-26708": { |
| "cmt_msg": "vsock: fix the race conditions in multi-transport support", |
| "cmt_id": "55d900415b81680bcd5f93be51f26ebfc51ac6fb" |
| } |
| }, |
| "5.10.16": { |
| "CVE-2021-3600": { |
| "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", |
| "cmt_id": "1d16cc210fabd0a7ebf52d3025f81c2bde054a90" |
| } |
| }, |
| "5.10.17": { |
| "CVE-2021-21781": { |
| "cmt_msg": "ARM: ensure the signal page contains defined contents", |
| "cmt_id": "7913ec05fc02ccd7df83280451504b0a3e543097" |
| } |
| }, |
| "5.10.18": { |
| "CVE-2021-26931": { |
| "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", |
| "cmt_id": "8f8ebd6b1cb5cff96a11cd336027e745d48c2cab" |
| }, |
| "CVE-2021-26930": { |
| "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", |
| "cmt_id": "00805af45a21729e2901a37914992786a0d32c46" |
| }, |
| "CVE-2021-26932": { |
| "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", |
| "cmt_id": "740f4d9d0c34ea99279acf2fc99ae33c0142265a" |
| } |
| }, |
| "5.10.19": { |
| "CVE-2021-0512": { |
| "cmt_msg": "HID: make arrays usage and value to be the same", |
| "cmt_id": "77344e18cf84b37548292f2adfdb22f89079e0a6" |
| }, |
| "CVE-2021-3444": { |
| "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", |
| "cmt_id": "3320bae8c115863b6f17993c2b7970f7f419da57" |
| } |
| }, |
| "5.10.20": { |
| "CVE-2020-25639": { |
| "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails", |
| "cmt_id": "e3fcff9f45aa82dacad26e5828598340d2742f47" |
| }, |
| "CVE-2021-3612": { |
| "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", |
| "cmt_id": "deced3e2aea9195f018bcad0146619e880ee7c0e" |
| } |
| }, |
| "5.10.21": { |
| "CVE-2021-27363": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "c71edc5d2480774ec2fec62bb84064aed6d582bd" |
| }, |
| "CVE-2021-28038": { |
| "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", |
| "cmt_id": "545c837d6789afcb23da5494a22e459952fb823f" |
| }, |
| "CVE-2021-28039": { |
| "cmt_msg": "xen: fix p2m size in dom0 for disabled memory hotplug case", |
| "cmt_id": "9c62adb6e2fda38dc6045a853a6e50b2bbc75d2a" |
| }, |
| "CVE-2021-27365": { |
| "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", |
| "cmt_id": "76d92bf293c36a52ea5552919ac645ef2edee55d" |
| }, |
| "CVE-2021-27364": { |
| "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", |
| "cmt_id": "c71edc5d2480774ec2fec62bb84064aed6d582bd" |
| }, |
| "CVE-2021-30002": { |
| "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", |
| "cmt_id": "5400770e31e8b80efc25b4c1d619361255174d11" |
| } |
| }, |
| "5.10.24": { |
| "CVE-2021-28375": { |
| "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages", |
| "cmt_id": "52feb58f9b5b078b5a39ed8ba8ab3b4546e16ff2" |
| }, |
| "CVE-2021-33033": { |
| "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", |
| "cmt_id": "85178d76febd30a745b7d947dbd9751919d0fa5b" |
| }, |
| "CVE-2021-29265": { |
| "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", |
| "cmt_id": "ab5c3186686aa87c741381d10a948817f1deb9b2" |
| }, |
| "CVE-2021-39656": { |
| "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file", |
| "cmt_id": "109720342efd6ace3d2e8f34a25ea65036bb1d3b" |
| }, |
| "CVE-2021-28660": { |
| "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", |
| "cmt_id": "d972a516958dee489911d9f57ee7a177834ef248" |
| } |
| }, |
| "5.10.25": { |
| "CVE-2020-27171": { |
| "cmt_msg": "bpf: Fix off-by-one for area size in creating mask to left", |
| "cmt_id": "ac1b87a18c1ffbe3d093000b762121b5aae0a3f9" |
| }, |
| "CVE-2020-27170": { |
| "cmt_msg": "bpf: Prohibit alu ops for pointer types not defining ptr_limit", |
| "cmt_id": "c4d37eea1c641a9319baf34253cc373abb39d3e1" |
| } |
| }, |
| "5.10.26": { |
| "CVE-2021-28964": { |
| "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", |
| "cmt_id": "38ffe9eaeb7cce383525439f0948f9eb74632e1d" |
| }, |
| "CVE-2021-28972": { |
| "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", |
| "cmt_id": "be1f58e58f7644ab33f1413685c84173766408d3" |
| }, |
| "CVE-2021-28971": { |
| "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", |
| "cmt_id": "514ea597be8e4b6a787bc34da111c44944fbf5a5" |
| }, |
| "CVE-2021-28951": { |
| "cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit", |
| "cmt_id": "6cae8095490caae12875300243ec94b39b6a2a78" |
| }, |
| "CVE-2021-28952": { |
| "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access", |
| "cmt_id": "26b08c08a5f3008fe45822d8b163f1516178c42b" |
| }, |
| "CVE-2021-29266": { |
| "cmt_msg": "vhost-vdpa: fix use-after-free of v->config_ctx", |
| "cmt_id": "49ca3100fbaf864853c922c8f7a8fe7090a83860" |
| } |
| }, |
| "5.10.27": { |
| "CVE-2021-28688": { |
| "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", |
| "cmt_id": "3a1ca9bd4f5a647439e82e07b03d072781d9d180" |
| }, |
| "CVE-2021-31916": { |
| "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", |
| "cmt_id": "921aae17bb0f02181fa05cf5580ebc855fdbd74d" |
| }, |
| "CVE-2021-29264": { |
| "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", |
| "cmt_id": "b8bfda6e08b8a419097eea5a8e57671bc36f9939" |
| }, |
| "CVE-2021-29649": { |
| "cmt_msg": "bpf: Fix umd memory leak in copy_process()", |
| "cmt_id": "ccd5565feea346697c1d1e8e9cd042218b49c44b" |
| }, |
| "CVE-2021-29650": { |
| "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", |
| "cmt_id": "3fdebc2d8e7965f946a3d716ffdd482e66c1f46c" |
| }, |
| "CVE-2021-29646": { |
| "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()", |
| "cmt_id": "50f41f2e29ff1980f7edfca40bbf81a4336b9feb" |
| }, |
| "CVE-2021-29647": { |
| "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", |
| "cmt_id": "fce6fb90218935f7319265459484b3762c80d0a8" |
| } |
| }, |
| "5.10.28": { |
| "CVE-2021-0941": { |
| "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", |
| "cmt_id": "fd38d4e6757b6b99f60314f67f44a286f0ab7fc0" |
| }, |
| "CVE-2021-3483": { |
| "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", |
| "cmt_id": "c04adcc819d3bdd85a5dc2523687707b89724df7" |
| }, |
| "CVE-2021-29657": { |
| "cmt_msg": "KVM: SVM: load control fields from VMCB12 before checking them", |
| "cmt_id": "5f6625f5cd5c593fae05a6ce22b406166bc796b8" |
| } |
| }, |
| "5.10.29": { |
| "CVE-2021-29154": { |
| "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", |
| "cmt_id": "3edb8967d91ecbc4c5eee34a65d4124267327574" |
| } |
| }, |
| "5.10.30": { |
| "CVE-2021-3659": { |
| "cmt_msg": "net: mac802154: Fix general protection fault", |
| "cmt_id": "38731bbcd9f0bb8228baaed5feb4a1f76530e49c" |
| }, |
| "CVE-2020-25672": { |
| "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", |
| "cmt_id": "568ac94df580b1a65837dc299e8758635e7b1423" |
| }, |
| "CVE-2020-25673": { |
| "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", |
| "cmt_id": "a12a2fa9a129d3200065fde95f6eb0a98672a2c3" |
| }, |
| "CVE-2020-25670": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", |
| "cmt_id": "6fb003e5ae18d8cda4c8a1175d9dd8db12bec049" |
| }, |
| "CVE-2020-25671": { |
| "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", |
| "cmt_id": "99b596199e8402055c425ac6abd3b8c3fc047034" |
| } |
| }, |
| "5.10.31": { |
| "CVE-2021-0937": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "1f3b9000cb44318b0de40a0f495a5a708cd9be6e" |
| }, |
| "CVE-2021-22555": { |
| "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", |
| "cmt_id": "1f3b9000cb44318b0de40a0f495a5a708cd9be6e" |
| } |
| }, |
| "5.10.32": { |
| "CVE-2021-3501": { |
| "cmt_msg": "KVM: VMX: Don't use vcpu->run->internal.ndata as an array index", |
| "cmt_id": "7f64753835a78c7d2cc2932a5808ef3b7fd4c050" |
| }, |
| "CVE-2021-29155": { |
| "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic", |
| "cmt_id": "4f3ff11204eac0ee23acf64deecb3bad7b0db0c6" |
| }, |
| "CVE-2021-23133": { |
| "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", |
| "cmt_id": "5a627026be4a17e5b9db23558cd28e62b2cbc66e" |
| } |
| }, |
| "5.10.35": { |
| "CVE-2021-38209": { |
| "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns", |
| "cmt_id": "d3598eb3915cc0c0d8cab42f4a6258ff44c4033e" |
| }, |
| "CVE-2021-31829": { |
| "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", |
| "cmt_id": "2cfa537674cd1051a3b8111536d77d0558f33d5d" |
| } |
| }, |
| "5.10.36": { |
| "CVE-2021-3506": { |
| "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", |
| "cmt_id": "9aa4602237d535b83c579eb752e8fc1c3e7e7055" |
| }, |
| "CVE-2021-3543": { |
| "cmt_msg": "nitro_enclaves: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "ed9cfd60c7875b0597e672e89c0bad09a88307d2" |
| } |
| }, |
| "5.10.37": { |
| "CVE-2021-3490": { |
| "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations", |
| "cmt_id": "282bfc8848eaa195d5e994bb700f2c7afb7eb3e6" |
| }, |
| "CVE-2021-3491": { |
| "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers", |
| "cmt_id": "7e916d0124e5f40d7912f93a633f5dee2c3ad735" |
| }, |
| "CVE-2021-45486": { |
| "cmt_msg": "inet: use bigger hash table for IP ID generation", |
| "cmt_id": "a273c27d7255fc527023edeb528386d1b64bedf5" |
| }, |
| "CVE-2021-32399": { |
| "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", |
| "cmt_id": "2d84ef4e6569a818f912d93d5345c21542807ac7" |
| }, |
| "CVE-2021-3489": { |
| "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf", |
| "cmt_id": "1ca284f0867079a34f52a6f811747695828166c6" |
| }, |
| "CVE-2021-31440": { |
| "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds", |
| "cmt_id": "4394be0a1866fb78a4dfe0ea38e29c4ed107b890" |
| }, |
| "CVE-2021-33034": { |
| "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", |
| "cmt_id": "1d7bd87a2c8d264ca3e5c9ba6f3eafc23e994028" |
| } |
| }, |
| "5.10.38": { |
| "CVE-2021-4157": { |
| "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", |
| "cmt_id": "1fbea60ea658ab887fb899532d783732b04e53e6" |
| } |
| }, |
| "5.10.40": { |
| "CVE-2020-26558": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "d8d261c7cfb3a5dd921b4aeeb944718afc3f3961" |
| }, |
| "CVE-2021-0129": { |
| "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", |
| "cmt_id": "d8d261c7cfb3a5dd921b4aeeb944718afc3f3961" |
| } |
| }, |
| "5.10.42": { |
| "CVE-2021-33098": { |
| "cmt_msg": "ixgbe: fix large MTU request from VF", |
| "cmt_id": "3cfd11506ed032446358eedf7e31b4defd819d91" |
| }, |
| "CVE-2020-24587": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "42d98e02193d163c1523a8840a2effcc4c6eb111" |
| }, |
| "CVE-2020-24586": { |
| "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", |
| "cmt_id": "42d98e02193d163c1523a8840a2effcc4c6eb111" |
| }, |
| "CVE-2021-34981": { |
| "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", |
| "cmt_id": "1b364f8ede200e79e25df0df588fcedc322518fb" |
| }, |
| "CVE-2020-24588": { |
| "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", |
| "cmt_id": "c730d72aa6e85a71ee74530d601d4d894d791b43" |
| }, |
| "CVE-2020-26139": { |
| "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", |
| "cmt_id": "2b9b07b9a06fab16bda3d33da3be70fe33bd95cb" |
| }, |
| "CVE-2020-26145": { |
| "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe", |
| "cmt_id": "b1b3dcd653772f93b69be50263a0ca50d7c9e77f" |
| }, |
| "CVE-2020-26147": { |
| "cmt_msg": "mac80211: assure all fragments are encrypted", |
| "cmt_id": "f7829b014bb670a77f6f66d265b058534367d04b" |
| }, |
| "CVE-2020-26141": { |
| "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe", |
| "cmt_id": "6643b21aee1c3cac10da9dfb0fa17aacc431fa91" |
| } |
| }, |
| "5.10.43": { |
| "CVE-2021-3564": { |
| "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", |
| "cmt_id": "3795007c8dfc8bca176529bfeceb17c6f4ef7e44" |
| }, |
| "CVE-2021-28691": { |
| "cmt_msg": "xen-netback: take a reference to the RX task thread", |
| "cmt_id": "6b53db8c4c14b4e7256f058d202908b54a7b85b4" |
| }, |
| "CVE-2021-38208": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "48ee0db61c8299022ec88c79ad137f290196cac2" |
| }, |
| "CVE-2021-3573": { |
| "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", |
| "cmt_id": "74caf718cc7422a957aac381c73d798c0a999a65" |
| }, |
| "CVE-2021-3587": { |
| "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", |
| "cmt_id": "48ee0db61c8299022ec88c79ad137f290196cac2" |
| } |
| }, |
| "5.10.44": { |
| "CVE-2021-38198": { |
| "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", |
| "cmt_id": "6b6ff4d1f349cb35a7c7d2057819af1b14f80437" |
| } |
| }, |
| "5.10.46": { |
| "CVE-2021-34693": { |
| "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", |
| "cmt_id": "acb755be1f7adb204dcedc4d3b204ef098628623" |
| }, |
| "CVE-2021-38206": { |
| "cmt_msg": "mac80211: Fix NULL ptr deref for injected rate info", |
| "cmt_id": "f74df6e086083dc435f7500bdbc86b05277d17af" |
| }, |
| "CVE-2021-38207": { |
| "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite", |
| "cmt_id": "cfe403f209b11fad123a882100f0822a52a7630f" |
| }, |
| "CVE-2021-3743": { |
| "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", |
| "cmt_id": "960b08dd36de1e341e3eb43d1c547513e338f4f8" |
| }, |
| "CVE-2021-33624": { |
| "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", |
| "cmt_id": "e9d271731d21647f8f9e9a261582cf47b868589a" |
| } |
| }, |
| "5.10.47": { |
| "CVE-2020-26541": { |
| "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries", |
| "cmt_id": "45109066f686597116467a53eaf4330450702a96" |
| }, |
| "CVE-2021-35039": { |
| "cmt_msg": "module: limit enabling module.sig_enforce", |
| "cmt_id": "3051f230f19feb02dfe5b36794f8c883b576e184" |
| }, |
| "CVE-2021-22543": { |
| "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", |
| "cmt_id": "dd8ed6c9bc2224c1ace5292d01089d3feb7ebbc3" |
| } |
| }, |
| "5.10.50": { |
| "CVE-2021-3609": { |
| "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", |
| "cmt_id": "b52e0cf0bfc1ede495de36aec86f6013efa18f60" |
| }, |
| "CVE-2022-0850": { |
| "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", |
| "cmt_id": "ea5466f1a77720217a25a859b5a58b618aaba544" |
| } |
| }, |
| "5.10.51": { |
| "CVE-2021-3655": { |
| "cmt_msg": "sctp: validate from_addr_param return", |
| "cmt_id": "d4dbef7046e24669278eba4455e9e8053ead6ba0" |
| }, |
| "CVE-2021-45485": { |
| "cmt_msg": "ipv6: use prandom_u32() for ID generation", |
| "cmt_id": "8f939b79579715b195dc3ad36669707fce6853ee" |
| } |
| }, |
| "5.10.52": { |
| "CVE-2021-38160": { |
| "cmt_msg": "virtio_console: Assure used length from device is limited", |
| "cmt_id": "f6ec306b93dc600a0ab3bb2693568ef1cc5f7f7a" |
| }, |
| "CVE-2021-38199": { |
| "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", |
| "cmt_id": "ff4023d0194263a0827c954f623c314978cf7ddd" |
| }, |
| "CVE-2021-4154": { |
| "cmt_msg": "cgroup: verify that source is a string", |
| "cmt_id": "811763e3beb6c922d168e9f509ec593e9240842e" |
| }, |
| "CVE-2021-33909": { |
| "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", |
| "cmt_id": "174c34d9cda1b5818419b8f5a332ced10755e52f" |
| } |
| }, |
| "5.10.54": { |
| "CVE-2021-38204": { |
| "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", |
| "cmt_id": "7af54a4e221e5619a87714567e2258445dc35435" |
| }, |
| "CVE-2022-0286": { |
| "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()", |
| "cmt_id": "ba7bfcdff1ad4ea475395079add1cd7b79f81684" |
| }, |
| "CVE-2021-3679": { |
| "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", |
| "cmt_id": "757bdba8026be19b4f447487695cd0349a648d9e" |
| }, |
| "CVE-2021-37159": { |
| "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", |
| "cmt_id": "115e4f5b64ae8d9dd933167cafe2070aaac45849" |
| }, |
| "CVE-2021-37576": { |
| "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", |
| "cmt_id": "c1fbdf0f3c26004a2803282fdc1c35086908a99e" |
| } |
| }, |
| "5.10.55": { |
| "CVE-2021-0920": { |
| "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", |
| "cmt_id": "93c5951e0ce137e994237c19cd75a7caa1f80543" |
| } |
| }, |
| "5.10.56": { |
| "CVE-2021-34556": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", |
| "cmt_id": "bea9e2fd180892eba2574711b05b794f1d0e7b73" |
| }, |
| "CVE-2021-35477": { |
| "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", |
| "cmt_id": "bea9e2fd180892eba2574711b05b794f1d0e7b73" |
| } |
| }, |
| "5.10.59": { |
| "CVE-2021-38205": { |
| "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", |
| "cmt_id": "25cff25ec60690247db8138cd1af8b867df2c489" |
| }, |
| "CVE-2021-3732": { |
| "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", |
| "cmt_id": "6a002d48a66076524f67098132538bef17e8445e" |
| } |
| }, |
| "5.10.60": { |
| "CVE-2021-3653": { |
| "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", |
| "cmt_id": "c0883f693187c646c0972d73e525523f9486c2e3" |
| }, |
| "CVE-2021-3656": { |
| "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", |
| "cmt_id": "3dc5666baf2a135f250e4101d41d5959ac2c2e1f" |
| }, |
| "CVE-2021-38166": { |
| "cmt_msg": "bpf: Fix integer overflow involving bucket_size", |
| "cmt_id": "e95620c3bdff83bdb15484e6ea7cc47af36fbc6d" |
| } |
| }, |
| "5.10.61": { |
| "CVE-2022-1043": { |
| "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check", |
| "cmt_id": "695ab28a7fa107d0350ab19eba8ec89fac45a95d" |
| }, |
| "CVE-2021-42008": { |
| "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", |
| "cmt_id": "85e0518f181a0ff060f5543d2655fb841a83d653" |
| }, |
| "CVE-2020-3702": { |
| "cmt_msg": "ath: Use safer key clearing with key cache entries", |
| "cmt_id": "8f05076983ddeaae1165457b6aa4eca9fe0e5498" |
| } |
| }, |
| "5.10.62": { |
| "CVE-2021-39633": { |
| "cmt_msg": "ip_gre: add validation for csum_start", |
| "cmt_id": "fb45459d9ddb1edd4a8b087bafe875707753cb10" |
| }, |
| "CVE-2021-3753": { |
| "cmt_msg": "vt_kdsetmode: extend console locking", |
| "cmt_id": "60d69cb4e60de0067e5d8aecacd86dfe92a5384a" |
| }, |
| "CVE-2021-3739": { |
| "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id", |
| "cmt_id": "c43add24dffdbac269d5610465ced70cfc1bad9e" |
| }, |
| "CVE-2021-34866": { |
| "cmt_msg": "bpf: Fix ringbuf helper function compatibility", |
| "cmt_id": "9dd6f6d89693d8f09af53d2488afad22a8a44a57" |
| } |
| }, |
| "5.10.63": { |
| "CVE-2021-40490": { |
| "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", |
| "cmt_id": "09a379549620f122de3aa4e65df9329976e4cdf5" |
| } |
| }, |
| "5.10.64": { |
| "CVE-2021-46283": { |
| "cmt_msg": "netfilter: nf_tables: initialize set before expression setup", |
| "cmt_id": "36983fc2f87ea3b74a33bf460c9ee7329735b7b5" |
| } |
| }, |
| "5.10.65": { |
| "CVE-2021-20322": { |
| "cmt_msg": "ipv6: make exception cache less predictible", |
| "cmt_id": "8692f0bb29927d13a871b198adff1d336a8d2d00" |
| } |
| }, |
| "5.10.67": { |
| "CVE-2021-42252": { |
| "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", |
| "cmt_id": "3fdf2feb6cbe76c6867224ed8527b356e805352c" |
| } |
| }, |
| "5.10.68": { |
| "CVE-2021-41073": { |
| "cmt_msg": "io_uring: ensure symmetry in handling iter types in loop_rw_iter()", |
| "cmt_id": "ce8f81b76d3bef7b9fe6c8f84d029ab898b19469" |
| }, |
| "CVE-2021-20320": { |
| "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", |
| "cmt_id": "d92d3a9c2b6541f29f800fc2bd44620578b8f8a6" |
| }, |
| "CVE-2020-16119": { |
| "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", |
| "cmt_id": "6c3cb65d561e76fd0398026c023e587fec70e188" |
| } |
| }, |
| "5.10.71": { |
| "CVE-2021-3764": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "17ccc64e4fa5d3673528474bfeda814d95dc600a" |
| }, |
| "CVE-2021-4203": { |
| "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", |
| "cmt_id": "3db53827a0e9130d9e2cbe3c3b5bca601caa4c74" |
| }, |
| "CVE-2021-3744": { |
| "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", |
| "cmt_id": "17ccc64e4fa5d3673528474bfeda814d95dc600a" |
| }, |
| "CVE-2021-38300": { |
| "cmt_msg": "bpf, mips: Validate conditional branch offsets", |
| "cmt_id": "c61736a994fe68b0e5498e4e84e1c9108dc41075" |
| }, |
| "CVE-2021-4028": { |
| "cmt_msg": "RDMA/cma: Do not change route.addr.src_addr.ss_family", |
| "cmt_id": "0a16c9751e0f1de96f08643216cf1f19e8a5a787" |
| } |
| }, |
| "5.10.73": { |
| "CVE-2021-20321": { |
| "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", |
| "cmt_id": "9763ffd4da217adfcbdcd519e9f434dfa3952fc3" |
| }, |
| "CVE-2021-41864": { |
| "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", |
| "cmt_id": "064faa8e8a9b50f5010c5aa5740e06d477677a89" |
| } |
| }, |
| "5.10.75": { |
| "CVE-2021-3894": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "d84a69ac410f6228873d05d35120f6bdddab7fc3" |
| }, |
| "CVE-2021-4149": { |
| "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", |
| "cmt_id": "206868a5b6c14adc4098dd3210a2f7510d97a670" |
| }, |
| "CVE-2022-0322": { |
| "cmt_msg": "sctp: account stream padding length for reconf chunk", |
| "cmt_id": "d84a69ac410f6228873d05d35120f6bdddab7fc3" |
| } |
| }, |
| "5.10.76": { |
| "CVE-2021-3896": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "7f221ccbee4ec662e2292d490a43ce6c314c4594" |
| }, |
| "CVE-2021-43056": { |
| "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest", |
| "cmt_id": "197ec50b2df12dbfb17929eda643b16117b6f0ca" |
| }, |
| "CVE-2022-0644": { |
| "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", |
| "cmt_id": "b721500c979b71a9f02eb84ca384082722c62d4e" |
| }, |
| "CVE-2021-3760": { |
| "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", |
| "cmt_id": "77c0ef979e32b8bc22f36a013bab77cd37e31530" |
| }, |
| "CVE-2021-43389": { |
| "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", |
| "cmt_id": "7f221ccbee4ec662e2292d490a43ce6c314c4594" |
| } |
| }, |
| "5.10.77": { |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "ad111d4435d85fd3eeb2c09692030d89f8862401" |
| }, |
| "CVE-2021-43267": { |
| "cmt_msg": "tipc: fix size validations for the MSG_CRYPTO type", |
| "cmt_id": "0b1b3e086b0af2c2faa9938c4db956fe6ce5c965" |
| }, |
| "CVE-2021-42327": { |
| "cmt_msg": "drm/amdgpu: fix out of bounds write", |
| "cmt_id": "eb3b6805e3e9d98b2507201fd061a231988ce623" |
| } |
| }, |
| "5.10.78": { |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", |
| "cmt_id": "d7fc85f6104259541ec136199d3bf7c8a736613d" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files", |
| "cmt_id": "6d67b2a73b8e3a079c355bab3c1aef7d85a044b8" |
| } |
| }, |
| "5.10.80": { |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "c10465f6d6208db2e45a6dac1db312b9589b2583" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "ceeb0a8a8716a1c72af3fa4d4f98c3aced32b037" |
| }, |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "bd9cea41ac6e08f615030dea28b23e12b7a2674f" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "4dfba42604f08a505f1a1efc69ec5207ea6243de" |
| } |
| }, |
| "5.10.82": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "cb14b196d991c864ed2d1b6e79d68a7ce38e6538" |
| }, |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "40bc831ab5f630431010d1ff867390b07418a7ee" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal", |
| "cmt_id": "c81c90fbf5775ed1b907230eaaa766fa0e1b7cfa" |
| } |
| }, |
| "5.10.83": { |
| "CVE-2021-4001": { |
| "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking", |
| "cmt_id": "33fe044f6a9e8977686a6a09f0bf33e5cc75257e" |
| } |
| }, |
| "5.10.84": { |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", |
| "cmt_id": "2c514d25003ac89bb7716bb4402918ccb141f8f5" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "4baba6ba56eb91a735a027f783cc4b9276b48d5b" |
| } |
| }, |
| "5.10.85": { |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "8e04c8397bf98235b1aa41153717de7a05e652a2" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "7193ad3e50e596ac2192531c58ba83b9e6d2444b" |
| } |
| }, |
| "5.10.88": { |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "88f20cccbeec9a5e83621df5cc2453b5081454dc" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection", |
| "cmt_id": "525875c410df5d876b9615c44885ca7640aed6f2" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "8fa3a370cc2af858a9ba662ca4f2bd0917550563" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "d31b3379179d64724d3bbfa87bd4ada94e3237de" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "8ac3b6ee7c9ff2df7c99624bb1235e2e55623825" |
| }, |
| "CVE-2021-45402": { |
| "cmt_msg": "bpf: Fix signed bounds propagation after mov32", |
| "cmt_id": "e2aad0b5f2cbf71a31d00ce7bb4dee948adff5a9" |
| }, |
| "CVE-2021-22600": { |
| "cmt_msg": "net/packet: rx_owner_map depends on pg_vec", |
| "cmt_id": "7da349f07e457cad135df0920a3f670e423fb5e9" |
| }, |
| "CVE-2021-4135": { |
| "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", |
| "cmt_id": "1a34fb9e2bf3029f7c0882069d67ff69cbd645d8" |
| } |
| }, |
| "5.10.89": { |
| "CVE-2021-44733": { |
| "cmt_msg": "tee: handle lookup of shm with reference count 0", |
| "cmt_id": "c05d8f66ec3470e5212c4d08c46d6cb5738d600d" |
| }, |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", |
| "cmt_id": "fffb6581a23add416239dfcf7e7f3980c6b913da" |
| }, |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca" |
| } |
| }, |
| "5.10.91": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "4f260ea5537db35d2eeec9bca78a74713078a544" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "16d8568378f9ee2d1e69216d39961aa72710209f" |
| } |
| }, |
| "5.10.93": { |
| "CVE-2022-0185": { |
| "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", |
| "cmt_id": "eadde287a62e66b2f9e62d007c59a8f50d4b8413" |
| } |
| }, |
| "5.10.94": { |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "6036500fdf77caaca9333003f78d25a3d61c4e40" |
| } |
| }, |
| "5.10.95": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "6a6acf927895c38bdd9f3cd76b8dbfc25ac03e88" |
| }, |
| "CVE-2022-22942": { |
| "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "ae2b20f27732fe92055d9e7b350abc5cdf3e2414" |
| } |
| }, |
| "5.10.96": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "ce8c552b88ca25d775ecd0a0fbef4e0e03de9ed2" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "de7cc8bcca90a9d77c915ee1d922dbd670c47d84" |
| }, |
| "CVE-2022-24959": { |
| "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", |
| "cmt_id": "729e54636b3ebefb77796702a5b1f1ed5586895e" |
| } |
| }, |
| "5.10.97": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "1fc3444cda9a78c65b769e3fa93455e09ff7a0d3" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", |
| "cmt_id": "e7be56926397cf9d992be8913f74a76152f8f08d" |
| } |
| }, |
| "5.10.100": { |
| "CVE-2022-0516": { |
| "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", |
| "cmt_id": "b62267b8b06e9b8bb429ae8f962ee431e6535d60" |
| }, |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "3c7e5943553594f68bbc070683db6bb6f6e9e78e" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "be93028d306dac9f5b59ebebd9ec7abcfc69c156" |
| } |
| }, |
| "5.10.101": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "fb4ff0f96de37c44236598e8b53fe43b1df36bf3" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "22ec1004728548598f4f5b4a079a7873409eacfd" |
| } |
| }, |
| "5.10.102": { |
| "CVE-2022-0847": { |
| "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer", |
| "cmt_id": "b19ec7afa9297d862ed86443e0164643b97250ab" |
| } |
| }, |
| "5.10.103": { |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", |
| "cmt_id": "68f19845f580a1d3ac1ef40e95b0250804e046bb" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case", |
| "cmt_id": "8260f1800f83e667f26c80baa7f0b9d92ae271d7" |
| }, |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "bfa8ffbaaaaf9752f66bc7cabcef2de715e7621f" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "4f5f5411f0c14ac0b61d5e6a77d996dd3d5b5fd3" |
| } |
| }, |
| "5.10.104": { |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "c13159a588818a1d2cd6519f4d3b6f7e17a9ffbd" |
| } |
| }, |
| "5.10.105": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "3d81e85f30a8f712c3e4f2a507553d9063a20ed6" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "5f36ae75b847e7f87e4144602f418a624ca074b7" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "b7f1e73c4ddf2044530091e69114a5fc1a1229d0" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "3d81e85f30a8f712c3e4f2a507553d9063a20ed6" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "f6690dd9446a2a4bd9b024f00f71dd827a98317f" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "f38774bb6e231d647d40ceeb8ddf9082eabde667" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "f38774bb6e231d647d40ceeb8ddf9082eabde667" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()", |
| "cmt_id": "8357d75bfdb85ea63253cf369f405830c7b13d78" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "5c600371b8fd02cbbb0eb83a9f664e3f0b75c28e" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "206c8e271ba2630f1d809123945d9c428f93b0f0" |
| } |
| }, |
| "5.10.106": { |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "e2201ef32f933944ee02e59205adb566bafcdf91" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", |
| "cmt_id": "ab5595b45f732212b3b1974041b43a257153edb7" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check", |
| "cmt_id": "648895da69ced90ca770fd941c3d9479a9d72c16" |
| } |
| }, |
| "5.10.108": { |
| "CVE-2022-27666": { |
| "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", |
| "cmt_id": "9248694dac20eda06e22d8503364dc9d03df4e2f" |
| } |
| }, |
| "5.10.109": { |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "25c23fe40e6e1ef8e6d503c52b4f518b2e520ab7" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", |
| "cmt_id": "0f6947f5f5208f6ebd4d76a82a4757e2839a23f8" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "2c74374c2e88c7b7992bf808d9f9391f7452f9d9" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "571df3393f523b59cba87e2f3e80a3a624030f9c" |
| } |
| }, |
| "5.10.110": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "b417f9c50586588754b2b0453a1f99520cf7c0e8" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()", |
| "cmt_id": "edefc4b2a8e8310eee8e2b1714709ad5b2a93928" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", |
| "cmt_id": "e90518d10c7dd59d5ebbe25b0f0083a7dbffa42f" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "8d3f4ad43054619379ccc697cfcbdb2c266800d8" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "f67a1400788f550d201c71aeaf56706afe57f0da" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "0801a51d79389282c1271e623613b2e1886e071e" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "5318cdf4fd834856ce71238b064f35386f9ef528" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "5c94b6205e87411dbe9dc1ca088eb36b8837fb47" |
| } |
| }, |
| "5.10.111": { |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal", |
| "cmt_id": "2827328e646d0c2d3db1bfcad4b5f5016ce0d643" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", |
| "cmt_id": "4665722d36ad13c6abc6b2ef3fe5150c0a92d870" |
| } |
| }, |
| "5.10.112": { |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", |
| "cmt_id": "b20a5ab0f5fb175750c6bafd4cf12daccf00c738" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", |
| "cmt_id": "f934fa478dd17411bc6884153dc824ff9e7505d8" |
| } |
| }, |
| "outstanding": { |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2019-15794": { |
| "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" |
| }, |
| "CVE-2021-3759": { |
| "cmt_msg": "memcg: enable accounting of ipc resources" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24504": { |
| "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe" |
| }, |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." |
| }, |
| "CVE-2021-26934": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3669": { |
| "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4037": { |
| "cmt_msg": "xfs: fix up non-directory creation in SGID directories" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4023": { |
| "cmt_msg": "io-wq: fix cancellation on create-worker failure" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1508": { |
| "cmt_msg": "io_uring: reexpand under-reexpanded iters" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4150": { |
| "cmt_msg": "block: fix incorrect references to disk objects" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-12362": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2020-12363": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" |
| }, |
| "CVE-2020-12364": { |
| "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2022-0480": { |
| "cmt_msg": "memcg: enable accounting for file lock caches" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4204": { |
| "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-25220": { |
| "cmt_msg": "" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1280": { |
| "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-32078": { |
| "cmt_msg": "ARM: footbridge: remove personal server platform" |
| } |
| } |
| }, |
| "5.16": { |
| "5.16": { |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "983d8e60f50806f90534cc5373d0ce867e5aaf79" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()", |
| "cmt_id": "d6d86830705f173fca6087a3e67ceaf68db80523" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", |
| "cmt_id": "1756d7994ad85c2479af6ae5a9750b92324685af" |
| } |
| }, |
| "5.16.2": { |
| "CVE-2022-0185": { |
| "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", |
| "cmt_id": "8b1530a3772ae5b49c6d8d171fd3146bb947430f" |
| } |
| }, |
| "5.16.3": { |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", |
| "cmt_id": "258b26a34778cde43f228a392e242d3d0420624a" |
| }, |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "9d3989c5050f10ae9bbec9f32492b500420d04a1" |
| }, |
| "CVE-2022-0433": { |
| "cmt_msg": "bpf: Add missing map_get_next_key method to bloom filter map.", |
| "cmt_id": "f7a6dd58e0817b063252d7c5bec88e588df34b31" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", |
| "cmt_id": "d667b9f61df7bdfcb59dd1406fd2392c358f0008" |
| } |
| }, |
| "5.16.4": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "ec1b6497a2bc0293c064337e981ea1f6cbe57930" |
| }, |
| "CVE-2022-22942": { |
| "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "1d833b27fb708d6fdf5de9f6b3a8be4bd4321565" |
| } |
| }, |
| "5.16.5": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "f0583af88e7dd413229ea5e670a0db36fdf34ba2" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "620e8243cf5389e706c1c8f66ffacb3c84308a9e" |
| }, |
| "CVE-2022-24959": { |
| "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", |
| "cmt_id": "deb0f02d08276d87212c1f19d9d919b13dc4c033" |
| } |
| }, |
| "5.16.6": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "9c9dbb954e618e3d9110f13cc02c5db1fb73ea5d" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", |
| "cmt_id": "95e34f61b58a152656cbe8d6e19843cc343fb089" |
| } |
| }, |
| "5.16.9": { |
| "CVE-2022-0516": { |
| "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", |
| "cmt_id": "8c68c50109c22502b647f4e86ec74400c7a3f6e0" |
| }, |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "59ff7514f8c56f166aadca49bcecfa028e0ad50f" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "7f901d53f120d1921f84f7b9b118e87e94b403c5" |
| } |
| }, |
| "5.16.10": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "2724ebafda0a8df08a9cb91557d33226bee80f7b" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "8895017abfc76bbc223499b179919dd205047197" |
| } |
| }, |
| "5.16.11": { |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag", |
| "cmt_id": "e982070f8970bb62e69ed7c9cafff886ed200349" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL", |
| "cmt_id": "77459bc4d5e2c6f24db845780b4d9d60cf82d06a" |
| }, |
| "CVE-2022-0847": { |
| "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer", |
| "cmt_id": "eddef98207d678f21261c2bd07da55938680df4e" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe", |
| "cmt_id": "80dad7483e3940dc9d9d55f8b34d1f4ba85a505e" |
| } |
| }, |
| "5.16.12": { |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", |
| "cmt_id": "6bff27caef1ee07a8b190f34cf32c99d6cc37a33" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case", |
| "cmt_id": "fa498059c631e94e91dcb6d78070909d8de56d99" |
| }, |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "3221ef49ba18924e55a4d42a2ea4080cfea12c6c" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "639f72dce8667a3d601561e0e47d53ad999e7f8a" |
| } |
| }, |
| "5.16.13": { |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()", |
| "cmt_id": "5ed9983ce67341b405cf6fda826e29aed26a7371" |
| }, |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "9e5c16b2a9812cd250f0de0b77391c2d63adf2f2" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", |
| "cmt_id": "f8c61361a4f52c2a186269982587facc852dba62" |
| } |
| }, |
| "5.16.14": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "0ba1ab25bb5057869621b340dbd411cca3242467" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "3b72403eb1850f79deef77497763a6eb65654863" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "f5eb0f1dcde4b7c2b5ee920ae53bcecaaba03947" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "0ba1ab25bb5057869621b340dbd411cca3242467" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "741052b05bcdc295dd715a71549b28c926266800" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "56829c19c8171303faca18d6ab3511ecdf3e7e23" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "56829c19c8171303faca18d6ab3511ecdf3e7e23" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()", |
| "cmt_id": "d83dd50f3c23bc887e4c67d547e5a21a23fb8bb8" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "69e581afd2eafd51df6d4a24ab488cb8863c2dcd" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "34630641e955f23ae06db178822d99d0a9d89b20" |
| } |
| }, |
| "5.16.15": { |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check", |
| "cmt_id": "b36588ebbcef74583824c08352e75838d6fb4ff2" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "4356343fb70c899901bce33acedf4fede797d21f" |
| }, |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "1d83a95214bc516bd8778fa423cb8383d925f8c8" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"", |
| "cmt_id": "62b27d925655999350d0ea775a025919fd88d27f" |
| }, |
| "CVE-2022-27666": { |
| "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", |
| "cmt_id": "9afe83f62aac348db1facb28bfc106109a06e44d" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", |
| "cmt_id": "58a9bdff32fde29137731e574b17c42592875fd0" |
| } |
| }, |
| "5.16.18": { |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace.", |
| "cmt_id": "2c8ebdaa7c9755b85d90c07530210e83665bad9a" |
| }, |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "0646efbb6e100a3f93eba3b6a10a7f4c28dd1478" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", |
| "cmt_id": "0090c13cbbdffd7da079ac56f80373a9a1be0bf8" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "64f24c76dd0ce53d0fa3a0bfb9aeea507c769485" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "6f5bf395c60ed2643de51f2b1041cb0882e9d97f" |
| } |
| }, |
| "5.16.19": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "41f6be840f138c7d42312d7619a6b44c001d6b6e" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()", |
| "cmt_id": "0f0ce73e7dad17084222da19989049ebfb8be541" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", |
| "cmt_id": "9a611c57530050dc359a83177c2f97678b1f961e" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "16d974fa4ddda389bf58bb5e4fc8cad8910ba66d" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "f913412848defa326a155c47d026267624472190" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "3e006cf0fb809815d56e59c9de4486fbe253ccdf" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "4a279d7ee1c65411b4055ecd428b8aa2b1711c1f" |
| } |
| }, |
| "5.16.20": { |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()", |
| "cmt_id": "7a0921a23cae42e9fa5ce964f6907181b6dc80d8" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push", |
| "cmt_id": "a1f48251918d825785af9cab83996d4c12ef795a" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal", |
| "cmt_id": "d568c13d9d29d3151540a0d1b20c3a1ca801a662" |
| } |
| }, |
| "outstanding": { |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2022-24122": { |
| "cmt_msg": "ucount: Make get_ucount a safe get_user replacement" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4204": { |
| "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-25220": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4095": { |
| "cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-26934": { |
| "cmt_msg": "" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| } |
| } |
| }, |
| "5.17": { |
| "5.17": { |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "9a564bccb78a76740ea9d75a259942df8143d02c" |
| } |
| }, |
| "5.17.1": { |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace.", |
| "cmt_id": "afdc3f4b81f0ec9f97f0910476af4620a2481a6d" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", |
| "cmt_id": "1bbf82d9f961414d6c76a08f7f843ea068e0ab7b" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "dd03640529204ef4b8189fbdea08217d8d98271f" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "ef1a6fe3563cf47ce4fd555727ca80085cf18884" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race", |
| "cmt_id": "bff94c57bd130e3062afa94414c2294871314096" |
| } |
| }, |
| "5.17.2": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "3f71f499395545119383f10760b8b19703d2a7dd" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()", |
| "cmt_id": "49bef50e585d738e957060f669e872b4ad15eb87" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", |
| "cmt_id": "5051c04d70c6e035c2c923c04fbe015a4468b08d" |
| }, |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", |
| "cmt_id": "534156dd4ed768e30a43de0036f45dca7c54818f" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", |
| "cmt_id": "a45dba71849a963c427637b3330e2ccf098f42d1" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "42a4b0dfd365c4f77f96fd1f73a64b47ae443a38" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "29d6c06168faa23ce23db3321981c8fde576c95c" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "671529db75e6be777bb1c76aa07c2bdd2992be6d" |
| } |
| }, |
| "5.17.3": { |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()", |
| "cmt_id": "d21287d8a4589dd8513038f887ece980fbc399cf" |
| }, |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push", |
| "cmt_id": "e8d7f0dad29e634e26d4614cfbd081514c16e042" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal", |
| "cmt_id": "11cd7959400258beb1dc17c8680055966263f316" |
| } |
| }, |
| "outstanding": { |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-25220": { |
| "cmt_msg": "" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-26934": { |
| "cmt_msg": "" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| } |
| } |
| }, |
| "5.15": { |
| "5.15": { |
| "CVE-2021-3772": { |
| "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", |
| "cmt_id": "4f7019c7eb33967eb87766e0e4602b5576873680" |
| }, |
| "CVE-2021-43267": { |
| "cmt_msg": "tipc: fix size validations for the MSG_CRYPTO type", |
| "cmt_id": "fa40d9734a57bcbfa79a280189799f76c88f7bb0" |
| }, |
| "CVE-2021-4148": { |
| "cmt_msg": "mm: khugepaged: skip huge page collapse for special files", |
| "cmt_id": "a4aeaa06d45e90f9b279f0b09de84bd00006e733" |
| }, |
| "CVE-2021-42327": { |
| "cmt_msg": "drm/amdgpu: fix out of bounds write", |
| "cmt_id": "5afa7898ab7a0ec9c28556a91df714bf3c2f725e" |
| } |
| }, |
| "5.15.1": { |
| "CVE-2021-42739": { |
| "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", |
| "cmt_id": "cb667140875a3b1db92e4c50b4617a7cbf84659b" |
| } |
| }, |
| "5.15.2": { |
| "CVE-2021-39686": { |
| "cmt_msg": "binder: use euid from cred instead of using task", |
| "cmt_id": "ff1bd01f490ba60d82c765100d95d13cc00c1625" |
| } |
| }, |
| "5.15.3": { |
| "CVE-2021-3752": { |
| "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", |
| "cmt_id": "7e22e4db95b04f09adcce18c75d27cbca8f53b99" |
| }, |
| "CVE-2021-45868": { |
| "cmt_msg": "quota: check block number when reading the block in quota file", |
| "cmt_id": "332db0909293f3f4d853ee2ea695272c75082d87" |
| }, |
| "CVE-2021-3640": { |
| "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", |
| "cmt_id": "b990c219c4c9d4993ef65ea9db73d9497e70f697" |
| } |
| }, |
| "5.15.5": { |
| "CVE-2021-4202": { |
| "cmt_msg": "NFC: reorganize the functions in nci_request", |
| "cmt_id": "96a209038a99a379444ea3ef9ae823e685ba60e7" |
| }, |
| "CVE-2021-4001": { |
| "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking", |
| "cmt_id": "a5d1d3522232b4af1f5dee02d381e6fa86be8e2d" |
| }, |
| "CVE-2021-4002": { |
| "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", |
| "cmt_id": "556d59293a2a94863797a7a50890992aa5e8db16" |
| }, |
| "CVE-2020-27820": { |
| "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal", |
| "cmt_id": "0b1a35d63995497a9186113c60a16e7ae59642c1" |
| }, |
| "CVE-2021-4090": { |
| "cmt_msg": "NFSD: Fix exposure in nfsd4_decode_bitmap()", |
| "cmt_id": "10c22d9519f3f5939de61a1500aa3a926b778d3a" |
| } |
| }, |
| "5.15.7": { |
| "CVE-2021-43975": { |
| "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", |
| "cmt_id": "cec49b6dfdb0b9fefd0f17c32014223f73ee2605" |
| }, |
| "CVE-2021-4083": { |
| "cmt_msg": "fget: check that the fd still exists after getting a ref to it", |
| "cmt_id": "6fe4eadd54da3040cf6f6579ae157ae1395dc0f8" |
| } |
| }, |
| "5.15.8": { |
| "CVE-2021-39698": { |
| "cmt_msg": "wait: add wake_up_pollfree()", |
| "cmt_id": "1ebb6cd8c754bfe1a5f9539027980756bce7cb08" |
| }, |
| "CVE-2021-39685": { |
| "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", |
| "cmt_id": "36dfdf11af49d3c009c711fb16f5c6e7a274505d" |
| } |
| }, |
| "5.15.11": { |
| "CVE-2021-28715": { |
| "cmt_msg": "xen/netback: don't queue unlimited number of packages", |
| "cmt_id": "bd926d189210cd1d5b4e618e45898053be6b4b3b" |
| }, |
| "CVE-2021-28714": { |
| "cmt_msg": "xen/netback: fix rx queue stall detection", |
| "cmt_id": "88449dbe6203c3a91cf1c39ea3032ad61a297bd7" |
| }, |
| "CVE-2021-28713": { |
| "cmt_msg": "xen/console: harden hvc_xen against event channel storms", |
| "cmt_id": "153d1ea3272209fc970116f09051002d14422cde" |
| }, |
| "CVE-2021-28712": { |
| "cmt_msg": "xen/netfront: harden netfront against event channel storms", |
| "cmt_id": "a29c8b5226eda52e6d6ff151d9343558ea3ad451" |
| }, |
| "CVE-2021-28711": { |
| "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", |
| "cmt_id": "caf9b51829a50590b84daea924a0fd62d32bc952" |
| }, |
| "CVE-2021-45402": { |
| "cmt_msg": "bpf: Fix signed bounds propagation after mov32", |
| "cmt_id": "f77d7a35d4913e4ab27abb36016fbfc1e882a654" |
| }, |
| "CVE-2021-45480": { |
| "cmt_msg": "rds: memory leak in __rds_conn_create()", |
| "cmt_id": "68014890e4382ff9192e1357be39b7d0455665fa" |
| }, |
| "CVE-2022-0264": { |
| "cmt_msg": "bpf: Fix kernel address leakage in atomic fetch", |
| "cmt_id": "423628125a484538111c2c6d9bb1588eb086053b" |
| }, |
| "CVE-2021-22600": { |
| "cmt_msg": "net/packet: rx_owner_map depends on pg_vec", |
| "cmt_id": "feb116a0ecc5625d6532c616d9a10ef4ef81514b" |
| }, |
| "CVE-2021-4135": { |
| "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", |
| "cmt_id": "27358aa81a7d60e6bd36f0bb1db65cd084c2cad0" |
| } |
| }, |
| "5.15.12": { |
| "CVE-2021-44733": { |
| "cmt_msg": "tee: handle lookup of shm with reference count 0", |
| "cmt_id": "492eb7afe858d60408b2da09adc78540c4d16543" |
| }, |
| "CVE-2021-45469": { |
| "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", |
| "cmt_id": "a8a9d753edd7f71e6a2edaa580d8182530b68791" |
| }, |
| "CVE-2022-1195": { |
| "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", |
| "cmt_id": "03d00f7f1815ec00dab5035851b3de83afd054a8" |
| }, |
| "CVE-2021-45100": { |
| "cmt_msg": "ksmbd: disable SMB2_GLOBAL_CAP_ENCRYPTION for SMB 3.1.1", |
| "cmt_id": "a2c144d17623984fdafa4634ecf4ab64580d29bb" |
| } |
| }, |
| "5.15.14": { |
| "CVE-2021-45095": { |
| "cmt_msg": "phonet: refcount leak in pep_sock_accep", |
| "cmt_id": "9ca97a693aa8b86e8424f0047198ea3ab997d50f" |
| }, |
| "CVE-2021-4155": { |
| "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", |
| "cmt_id": "b0e72ba9e520b95346e68800afff0db65e766ca8" |
| }, |
| "CVE-2022-0382": { |
| "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()", |
| "cmt_id": "d57da5185defccf383be53f41604fd5f006aba8c" |
| }, |
| "CVE-2021-4197": { |
| "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", |
| "cmt_id": "c6ebc35298848accb5e50c37fdb2490cf4690c92" |
| } |
| }, |
| "5.15.16": { |
| "CVE-2022-0185": { |
| "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", |
| "cmt_id": "e192ccc17ecf3e78a1c6fb81badf9b50bd791115" |
| } |
| }, |
| "5.15.17": { |
| "CVE-2021-43976": { |
| "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", |
| "cmt_id": "b2762757f4e484f8a164546f93aca82568d87649" |
| }, |
| "CVE-2021-44879": { |
| "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", |
| "cmt_id": "0ddbdc0b7f0cec3815ac05a30b2c2f6457be3050" |
| } |
| }, |
| "5.15.18": { |
| "CVE-2022-0330": { |
| "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", |
| "cmt_id": "8a17a077e7e9ecce25c95dbdb27843d2d6c2f0f7" |
| }, |
| "CVE-2022-22942": { |
| "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", |
| "cmt_id": "6066977961fc6f437bc064f628cf9b0e4571c56c" |
| } |
| }, |
| "5.15.19": { |
| "CVE-2022-24448": { |
| "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", |
| "cmt_id": "4c36ca387af4a9b5d775e46a6cb9dc2d151bf057" |
| }, |
| "CVE-2022-0617": { |
| "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", |
| "cmt_id": "cbf96c58e28b1fece9630102781a93ff32c347f7" |
| }, |
| "CVE-2022-24959": { |
| "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", |
| "cmt_id": "0690c3943ed0fa76654e600eca38cde6a13c87ac" |
| } |
| }, |
| "5.15.20": { |
| "CVE-2022-0492": { |
| "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", |
| "cmt_id": "4b1c32bfaa02255a5df602b41587174004996477" |
| }, |
| "CVE-2022-1055": { |
| "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", |
| "cmt_id": "f36cacd6c933183c1a8827d5987cf2cfc0a44c76" |
| } |
| }, |
| "5.15.23": { |
| "CVE-2022-0516": { |
| "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", |
| "cmt_id": "14f880ea779e11a6c162f122c1199e3578e6e3f3" |
| }, |
| "CVE-2022-0435": { |
| "cmt_msg": "tipc: improve size validations for received domain records", |
| "cmt_id": "1f1788616157b0222b0c2153828b475d95e374a7" |
| }, |
| "CVE-2022-0487": { |
| "cmt_msg": "moxart: fix potential use-after-free on remove path", |
| "cmt_id": "af0e6c49438b1596e4be8a267d218a0c88a42323" |
| } |
| }, |
| "5.15.24": { |
| "CVE-2022-25375": { |
| "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", |
| "cmt_id": "2da3b0ab54fb7f4d7c5a82757246d0ee33a47197" |
| }, |
| "CVE-2022-25258": { |
| "cmt_msg": "USB: gadget: validate interface OS descriptor requests", |
| "cmt_id": "3e33e5c67cb9ebd2b791b9a9fb2b71daacebd8d4" |
| } |
| }, |
| "5.15.25": { |
| "CVE-2022-0847": { |
| "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer", |
| "cmt_id": "114e9f141822e6977633d322c1b03e89bd209932" |
| }, |
| "CVE-2022-27950": { |
| "cmt_msg": "HID: elo: fix memory leak in elo_probe", |
| "cmt_id": "de0d102d0c8c681fc9a3263d842fb35f7cf662f4" |
| } |
| }, |
| "5.15.26": { |
| "CVE-2022-25636": { |
| "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", |
| "cmt_id": "6c5d780469d6c3590729940e2be8a3bd66ea4814" |
| }, |
| "CVE-2022-29156": { |
| "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case", |
| "cmt_id": "bf2cfad0c6e4b0d1b34d26420fddaf18dc25e56d" |
| }, |
| "CVE-2022-27223": { |
| "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", |
| "cmt_id": "2c775ad1fd5e014b35e483da2aab8400933fb09d" |
| }, |
| "CVE-2022-26966": { |
| "cmt_msg": "sr9700: sanity check for packet length", |
| "cmt_id": "9f2d614779906f3d8ad4fb882c5b3e5ad6150bbe" |
| } |
| }, |
| "5.15.27": { |
| "CVE-2022-0742": { |
| "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()", |
| "cmt_id": "771aca9bc70709771f66c3e7c00ce87339aa1790" |
| }, |
| "CVE-2022-24958": { |
| "cmt_msg": "usb: gadget: don't release an existing dev->buf", |
| "cmt_id": "07de9a494b5ae41b9253411a8e9576d7fceedcc3" |
| }, |
| "CVE-2022-0494": { |
| "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", |
| "cmt_id": "a1ba98731518b811ff90009505c1aebf6e400bc2" |
| } |
| }, |
| "5.15.28": { |
| "CVE-2022-23038": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "1dd5b4b230f6d1345708c6204ccacdf83d53feaf" |
| }, |
| "CVE-2022-23039": { |
| "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", |
| "cmt_id": "f06e3edaeac1942c4ff42072e3d98ee8c762c5fa" |
| }, |
| "CVE-2022-23960": { |
| "cmt_msg": "ARM: report Spectre v2 status through sysfs", |
| "cmt_id": "f02cab2bed1a3493a230e54d83ff117bc59f480e" |
| }, |
| "CVE-2022-23036": { |
| "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", |
| "cmt_id": "1dd5b4b230f6d1345708c6204ccacdf83d53feaf" |
| }, |
| "CVE-2022-23037": { |
| "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", |
| "cmt_id": "5d5fa1d53a31c799b85112841c3c639c7baac1c4" |
| }, |
| "CVE-2022-0001": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "f150b6fccf7fa0e7e7275f0785798547db832c7b" |
| }, |
| "CVE-2022-0002": { |
| "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", |
| "cmt_id": "f150b6fccf7fa0e7e7275f0785798547db832c7b" |
| }, |
| "CVE-2022-23041": { |
| "cmt_msg": "xen/9p: use alloc/free_pages_exact()", |
| "cmt_id": "a019d26830e8a04933e38e4fcc507dcfbc6ccc72" |
| }, |
| "CVE-2022-23040": { |
| "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", |
| "cmt_id": "66cb2bbb522b0d5e4f6a11558ff7bfdf3f7d31f3" |
| }, |
| "CVE-2022-23042": { |
| "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", |
| "cmt_id": "dea18aef2021022a568f4d385a1386f51a9df6ff" |
| } |
| }, |
| "5.15.29": { |
| "CVE-2022-1199": { |
| "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", |
| "cmt_id": "46ad629e58ce3a88c924ff3c5a7e9129b0df5659" |
| }, |
| "CVE-2022-27666": { |
| "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", |
| "cmt_id": "4aaabbffc3b0658ce80eebdde9bafa20a3f932e0" |
| }, |
| "CVE-2022-1011": { |
| "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", |
| "cmt_id": "ca62747b38f59d4e75967ebf63c992de8852ca1b" |
| }, |
| "CVE-2022-0995": { |
| "cmt_msg": "watch_queue: Fix filter limit check", |
| "cmt_id": "1b09f28f70a5046acd64138075ae3f095238b045" |
| }, |
| "CVE-2022-0854": { |
| "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"", |
| "cmt_id": "2c1f97af38be151527380796d31d3c9adb054bf9" |
| } |
| }, |
| "5.15.32": { |
| "CVE-2022-1015": { |
| "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace.", |
| "cmt_id": "1bd57dea456149619f3b80d67eee012122325af8" |
| }, |
| "CVE-2022-26490": { |
| "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", |
| "cmt_id": "a34c47b1ab07153a047476de83581dc822287f39" |
| }, |
| "CVE-2022-1048": { |
| "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", |
| "cmt_id": "33061d0fba51d2bf70a2ef9645f703c33fe8e438" |
| }, |
| "CVE-2022-1016": { |
| "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", |
| "cmt_id": "fafb904156fbb8f1dd34970cd5223e00b47c33be" |
| }, |
| "CVE-2022-28356": { |
| "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", |
| "cmt_id": "e9072996108387ab19b497f5b557c93f98d96b0b" |
| } |
| }, |
| "5.15.33": { |
| "CVE-2022-28390": { |
| "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "459b19f42fd5e031e743dfa119f44aba0b62ff97" |
| }, |
| "CVE-2022-0168": { |
| "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()", |
| "cmt_id": "39a4bf7d1a23dd172526c2fb0db480c5d5c63bd6" |
| }, |
| "CVE-2022-1158": { |
| "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", |
| "cmt_id": "8771d9673e0bdb7148299f3c074667124bde6dff" |
| }, |
| "CVE-2022-1353": { |
| "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", |
| "cmt_id": "d06ee4572fd916fbb34d16dc81eb37d1dff83446" |
| }, |
| "CVE-2022-1198": { |
| "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", |
| "cmt_id": "3eb18f8a1d02a9462a0e4903efc674ca3d0406d1" |
| }, |
| "CVE-2022-28389": { |
| "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", |
| "cmt_id": "37f07ad24866c6c1423b37b131c9a42414bcf8a1" |
| }, |
| "CVE-2022-28388": { |
| "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", |
| "cmt_id": "f2ce5238904f539648aaf56c5ee49e5eaf44d8fc" |
| }, |
| "CVE-2022-1516": { |
| "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", |
| "cmt_id": "409570a619c1cda2e0fde6018a256b9e3d3ba0ee" |
| } |
| }, |
| "5.15.34": { |
| "CVE-2022-1263": { |
| "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push", |
| "cmt_id": "226b4327ef5c88572fc12187193f1b5073c10837" |
| }, |
| "CVE-2022-29582": { |
| "cmt_msg": "io_uring: fix race between timeout flush and removal", |
| "cmt_id": "ba7261af2b030ab2c06189be1fc77b273716839f" |
| } |
| }, |
| "5.15.35": { |
| "CVE-2022-1204": { |
| "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", |
| "cmt_id": "452ae92b99062d2f6a34324eaf705a3b7eac9f8b" |
| }, |
| "CVE-2022-1205": { |
| "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", |
| "cmt_id": "43c107021d9160f6a1610bafba6dadc0323ae548" |
| } |
| }, |
| "outstanding": { |
| "CVE-2018-17977": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0998": { |
| "cmt_msg": "vdpa: clean up get_config_size ret value handling" |
| }, |
| "CVE-2020-15802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26557": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-2544": { |
| "cmt_msg": "" |
| }, |
| "CVE-2010-5321": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12930": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12931": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-35501": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26556": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15902": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2022-24122": { |
| "cmt_msg": "ucount: Make get_ucount a safe get_user replacement" |
| }, |
| "CVE-2022-26878": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39801": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39800": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-39802": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-15239": { |
| "cmt_msg": "unknown" |
| }, |
| "CVE-2018-1121": { |
| "cmt_msg": "" |
| }, |
| "CVE-2007-3719": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19378": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0695": { |
| "cmt_msg": "" |
| }, |
| "CVE-2008-4609": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4204": { |
| "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" |
| }, |
| "CVE-2020-14304": { |
| "cmt_msg": "" |
| }, |
| "CVE-2005-3660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-0347": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-0500": { |
| "cmt_msg": "bpf: Introduce MEM_RDONLY flag" |
| }, |
| "CVE-2010-4563": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26140": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26143": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26142": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24503": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-24502": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-12456": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26560": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3892": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-20794": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3714": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12929": { |
| "cmt_msg": "" |
| }, |
| "CVE-2018-12928": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-11725": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26559": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-25220": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28796": { |
| "cmt_msg": "jbd2: fix use-after-free of transaction_t race" |
| }, |
| "CVE-2015-2877": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-33061": { |
| "cmt_msg": "ixgbe: add improvement for MDD response functionality" |
| }, |
| "CVE-2019-0146": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-16089": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-28893": { |
| "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" |
| }, |
| "CVE-2022-0400": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3864": { |
| "cmt_msg": "" |
| }, |
| "CVE-2019-19814": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-10708": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-1184": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-3847": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13693": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-0399": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-25265": { |
| "cmt_msg": "" |
| }, |
| "CVE-2011-4917": { |
| "cmt_msg": "" |
| }, |
| "CVE-2017-13694": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-26555": { |
| "cmt_msg": "" |
| }, |
| "CVE-2020-36516": { |
| "cmt_msg": "" |
| }, |
| "CVE-2022-23222": { |
| "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" |
| }, |
| "CVE-2012-4542": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-4095": { |
| "cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty" |
| }, |
| "CVE-2019-15290": { |
| "cmt_msg": "" |
| }, |
| "CVE-2016-8660": { |
| "cmt_msg": "" |
| }, |
| "CVE-2021-26934": { |
| "cmt_msg": "" |
| }, |
| "CVE-2013-7445": { |
| "cmt_msg": "" |
| } |
| } |
| } |
| } |