blob: f5adf8e2d079f9b066eacd9e98d27083bce4e880 [file] [log] [blame]
{
"4.4": {
"4.4": {
"CVE-2016-2070": {
"cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction",
"cmt_id": "8b8a321ff72c785ed5e8b4cf6eda20b35d427390"
},
"CVE-2015-8963": {
"cmt_msg": "perf: Fix race in swevent hash",
"cmt_id": "12ca6ad2e3a896256f086497a7c7406a547ee373"
}
},
"4.4.1": {
"CVE-2016-0728": {
"cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()",
"cmt_id": "e4a46f02b1d0eaadea4e6b00e29922cd00d6de53"
},
"CVE-2016-2069": {
"cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization",
"cmt_id": "43a2ba8c1a003c82d9f411af8ebcf0fe1e4cbe3e"
},
"CVE-2016-2545": {
"cmt_msg": "ALSA: timer: Fix double unlink of active_list",
"cmt_id": "3c0e535fee2e67d06220e676cbf7b69099d741ce"
},
"CVE-2016-2544": {
"cmt_msg": "ALSA: seq: Fix race at timer setup and close",
"cmt_id": "0058ede73e1f441c003666f61671dfddfcbd5811"
},
"CVE-2016-2547": {
"cmt_msg": "ALSA: timer: Harden slave timer list handling",
"cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8"
},
"CVE-2016-2546": {
"cmt_msg": "ALSA: timer: Fix race among timer ioctls",
"cmt_id": "d87622a1662af5782c94b88a613c09de0bde5288"
},
"CVE-2016-2543": {
"cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl",
"cmt_id": "36d3fc15f50c22bbddfceb6c585f851130fb005f"
},
"CVE-2013-4312": {
"cmt_msg": "unix: properly account for FDs passed over unix sockets",
"cmt_id": "5e226f9689d90ad8ab21b4a969ae3058777f0aff"
},
"CVE-2016-2549": {
"cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()",
"cmt_id": "dafa57ee81748f6a6950c06f19a160d0a209795e"
},
"CVE-2016-2548": {
"cmt_msg": "ALSA: timer: Harden slave timer list handling",
"cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8"
}
},
"4.4.2": {
"CVE-2016-2782": {
"cmt_msg": "USB: visor: fix null-deref at probe",
"cmt_id": "ee4207bda5e15d0eecb834c4fc39c6069487279d"
},
"CVE-2016-2384": {
"cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice",
"cmt_id": "fbb430c51d7ac989b79bf1adb40cce7af581682a"
},
"CVE-2016-2085": {
"cmt_msg": "EVM: Use crypto_memneq() for digest comparisons",
"cmt_id": "8592536bcfcbc717a3bf7cec57d7c1b38f4eec1d"
},
"CVE-2016-0723": {
"cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)",
"cmt_id": "d343601a19410f71bf1765df5e2edda66fe5de5f"
},
"CVE-2017-13215": {
"cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting",
"cmt_id": "fec8beab63283003b546f83eebbbe32efb9acc53"
},
"CVE-2017-13167": {
"cmt_msg": "ALSA: timer: Fix race at concurrent reads",
"cmt_id": "925249d5172a31d7d430fdf364fc9229223c7942"
},
"CVE-2015-7566": {
"cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs",
"cmt_id": "2dc803d0740f0c493a7db8a1baf6514d5b95b6a3"
},
"CVE-2015-8970": {
"cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)",
"cmt_id": "b238717c0bb4606e2e36fc0de745306b0c900d83"
}
},
"4.4.3": {
"CVE-2016-0617": {
"cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()",
"cmt_id": "db33368ca32dd307cdcc191361de34f3937f513a"
},
"CVE-2016-1575": {
"cmt_msg": "ovl: setattr: check permissions before copy-up",
"cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014"
},
"CVE-2016-1576": {
"cmt_msg": "ovl: setattr: check permissions before copy-up",
"cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014"
}
},
"4.4.4": {
"CVE-2016-2383": {
"cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion",
"cmt_id": "a34f2f9f2034f7984f9529002c6fffe9cb63189d"
},
"CVE-2021-20265": {
"cmt_msg": "af_unix: fix struct pid memory leak",
"cmt_id": "39770be4d6ad29c5ab1f21edbbf01db067f13b52"
},
"CVE-2015-8812": {
"cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success",
"cmt_id": "64fb3e29bf47e5db029b81fc99ac40f6cd2620ac"
}
},
"4.4.6": {
"CVE-2016-2143": {
"cmt_msg": "s390/mm: four page table levels vs. fork",
"cmt_id": "5833fac3b88d39b39402309399e8b0aaa54e5f75"
},
"CVE-2016-3044": {
"cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit",
"cmt_id": "1c463a390a89beb929ed2750c79d6eb6d06c7cdd"
}
},
"4.4.7": {
"CVE-2016-3137": {
"cmt_msg": "USB: cypress_m8: add endpoint sanity check",
"cmt_id": "ca76906a7753052b00e491ba017393f9071b0406"
},
"CVE-2016-3157": {
"cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV",
"cmt_id": "0f63ab5873ed78838afa4b2f8bfd9d18f806cf40"
},
"CVE-2016-3689": {
"cmt_msg": "Input: ims-pcu - sanity check against missing interfaces",
"cmt_id": "af18c4ca4b1728e2149844656bbf1aa8d7382682"
},
"CVE-2016-9685": {
"cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths",
"cmt_id": "b34291f71d0fb3d09728fd43d6da350ff6a179d6"
},
"CVE-2016-3140": {
"cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports",
"cmt_id": "4f6ad5b0d28c84030693fe21b308c0b711fa66f6"
},
"CVE-2016-3136": {
"cmt_msg": "USB: mct_u232: add sanity checking in probe",
"cmt_id": "9deac9454b7a5643a09829f4731276cea6697b72"
},
"CVE-2016-2185": {
"cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor",
"cmt_id": "a1d0a23831ccde9dbd5279a5d45790a96f18ad32"
},
"CVE-2016-2184": {
"cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()",
"cmt_id": "57f6ad5f1580a5a06c573fb15ed6dcf701e037f6"
},
"CVE-2016-6327": {
"cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()",
"cmt_id": "84512e476ce92fbdb60d4687e3ea230dbf0655c8"
},
"CVE-2016-2186": {
"cmt_msg": "Input: powermate - fix oops with malicious USB descriptors",
"cmt_id": "fbd40d7beef0b17624bc1f838f4d44dfa4b0326b"
},
"CVE-2016-3138": {
"cmt_msg": "USB: cdc-acm: more sanity checking",
"cmt_id": "1ea680abf7640c777396909102bc22915107cb5b"
}
},
"4.4.8": {
"CVE-2016-7117": {
"cmt_msg": "net: Fix use after free in the recvmmsg exit path",
"cmt_id": "405f10a39443ae9ccacf51f18511dfc827e09108"
},
"CVE-2016-3156": {
"cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.",
"cmt_id": "54789759917f127cfadcca730f44ea67d557a9b0"
},
"CVE-2016-4805": {
"cmt_msg": "ppp: take reference on channels netns",
"cmt_id": "046ea8180ecaf5d8b5823e17714a09526ad7d321"
}
},
"4.4.9": {
"CVE-2016-4568": {
"cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing",
"cmt_id": "19a4e46b4513bab7d6b368175be2e24ad4665e5a"
},
"CVE-2016-7914": {
"cmt_msg": "assoc_array: don't call compare_object() on a node",
"cmt_id": "6905c7a4aa1ef675825bc2ab56fd965a573ffb74"
},
"CVE-2016-3955": {
"cmt_msg": "USB: usbip: fix potential out-of-bounds write",
"cmt_id": "4a1bb501e4b65908b102f0b371b0621ff18ad5c3"
},
"CVE-2016-7912": {
"cmt_msg": "usb: gadget: f_fs: Fix use-after-free",
"cmt_id": "e4c7ab76586146820b394e0176f286f5a2e70cb3"
},
"CVE-2016-4565": {
"cmt_msg": "IB/security: Restrict use of the write() interface",
"cmt_id": "c92003c18feb8159cbf64bc0afa7b048869fe3c6"
},
"CVE-2016-2187": {
"cmt_msg": "Input: gtco - fix crash on detecting device without endpoints",
"cmt_id": "197b6c5f0d976420c3eeacc7589ebc5869d2d70f"
},
"CVE-2015-8839": {
"cmt_msg": "ext4: fix races between page faults and hole punching",
"cmt_id": "0b680de452570274716c2c9990903acea525f0d0"
},
"CVE-2016-3961": {
"cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests",
"cmt_id": "27b3cc048a5275c53e26c15ffcab3fcf9a03cda0"
}
},
"4.4.10": {
"CVE-2016-7916": {
"cmt_msg": "proc: prevent accessing /proc/<PID>/environ until it's ready",
"cmt_id": "898149d10b855a0d0a5a9f8f05e4359970919eb9"
},
"CVE-2016-4581": {
"cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave",
"cmt_id": "b17580a3cb901c56e9b9a3dea4d12153f5fc879e"
}
},
"4.4.11": {
"CVE-2016-6198": {
"cmt_msg": "vfs: add vfs_select_inode() helper",
"cmt_id": "b0dac61d2454b392dbdb4ad565f9dc3dc76fce96"
},
"CVE-2016-4557": {
"cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()",
"cmt_id": "608d2c3c7a046c222cae2e857cf648a9f89e772b"
},
"CVE-2016-4580": {
"cmt_msg": "net: fix a kernel infoleak in x25 module",
"cmt_id": "83857201758ead21e19e36d9ab5b2f87be03dfe2"
},
"CVE-2016-4486": {
"cmt_msg": "net: fix infoleak in rtnetlink",
"cmt_id": "e0c0313681aaa0c4514c6794635aba82691d2154"
},
"CVE-2016-2117": {
"cmt_msg": "atl2: Disable unimplemented scatter/gather feature",
"cmt_id": "b5c9a73c501e8aed86dd578309813c7818ca248c"
},
"CVE-2016-4485": {
"cmt_msg": "net: fix infoleak in llc",
"cmt_id": "52f307b18b1f070f0442fc98515575616b21fa20"
},
"CVE-2016-4558": {
"cmt_msg": "bpf: fix refcnt overflow",
"cmt_id": "3899251bdb9c2b31fc73d4cc132f52d3710101de"
},
"CVE-2016-4913": {
"cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries",
"cmt_id": "007796c01f0b293c68585397211af2b390bf126d"
}
},
"4.4.12": {
"CVE-2016-3713": {
"cmt_msg": "KVM: MTRR: remove MSR 0x2f8",
"cmt_id": "1716643bc4725bb92a1f527f759a93e37a2bc1f0"
},
"CVE-2016-9754": {
"cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()",
"cmt_id": "f199023137853eb1d46e8b7ebc274b29ba99028c"
},
"CVE-2019-3901": {
"cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race",
"cmt_id": "c5174678e2e5bd691da58a116fbc123c6fbc7b2c"
}
},
"4.4.13": {
"CVE-2016-2847": {
"cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes",
"cmt_id": "fa6d0ba12a8eb6a2e9a1646c5816da307c1f93a7"
}
},
"4.4.14": {
"CVE-2016-4951": {
"cmt_msg": "tipc: check nl sock before parsing nested attributes",
"cmt_id": "23cdd8c3cbe9d790f23d7f9ae14e9b828f56f69c"
},
"CVE-2016-4997": {
"cmt_msg": "netfilter: x_tables: check for bogus target offset",
"cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a"
},
"CVE-2016-4998": {
"cmt_msg": "netfilter: x_tables: check for bogus target offset",
"cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a"
},
"CVE-2016-3134": {
"cmt_msg": "netfilter: x_tables: fix unconditional helper",
"cmt_id": "5ebdccd7685f1c0b451c516f99082642d8d49003"
},
"CVE-2016-9806": {
"cmt_msg": "netlink: Fix dump skb leak/double free",
"cmt_id": "49543942beb1b9ca95709d6cfa67708932aa4d11"
},
"CVE-2016-1583": {
"cmt_msg": "proc: prevent stacking filesystems on top",
"cmt_id": "9beb96b344c846779f67d1be1cdafc66562b94ec"
}
},
"4.4.16": {
"CVE-2016-4470": {
"cmt_msg": "KEYS: potential uninitialized variable",
"cmt_id": "398051f2f66ef4658c89388441d0c697d50c325c"
},
"CVE-2016-6197": {
"cmt_msg": "ovl: verify upper dentry before unlink and rename",
"cmt_id": "dbf72a4d4531e7e5fb28e76d902d66f05c1bfe12"
},
"CVE-2016-1237": {
"cmt_msg": "posix_acl: Add set_posix_acl",
"cmt_id": "c3fa141c1f288ac785c82ead9d06d1b5acd76d60"
},
"CVE-2016-4794": {
"cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction",
"cmt_id": "c26ae537f16f653c2541df9e338013653fc3fcc7"
},
"CVE-2016-5829": {
"cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands",
"cmt_id": "300851ff55f7777be2780207f1b60ad5e1fd1303"
},
"CVE-2016-5828": {
"cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls",
"cmt_id": "5a35d2f92f1011145315f86a481f4f3e3f853095"
}
},
"4.4.17": {
"CVE-2016-6156": {
"cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl",
"cmt_id": "69ca969a2626dc4b3bb83b953c053a01e3b9f7e6"
},
"CVE-2016-7911": {
"cmt_msg": "block: fix use-after-free in sys_ioprio_get()",
"cmt_id": "5161144c3a9d6ea775b293edbb8523deaeff4442"
},
"CVE-2016-4569": {
"cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS",
"cmt_id": "90bed827ea910f82ab17ee154f501b5ae71617e6"
},
"CVE-2016-5400": {
"cmt_msg": "media: fix airspy usb probe error path",
"cmt_id": "d863bec646a590584eabcb40550bff0708c26b0d"
},
"CVE-2016-4578": {
"cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback",
"cmt_id": "3e6af33c73fb7ec7be8dedd01047162ef64a26a5"
}
},
"4.4.18": {
"CVE-2016-3672": {
"cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32",
"cmt_id": "979a61a02992e2029fcedcdf32c05050aa652c9c"
},
"CVE-2016-5696": {
"cmt_msg": "tcp: make challenge acks less predictable",
"cmt_id": "72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf"
},
"CVE-2016-3951": {
"cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind",
"cmt_id": "66e5d7b47c864f1821041f77752930ec3b8dfc22"
},
"CVE-2017-7495": {
"cmt_msg": "ext4: fix data exposure after a crash",
"cmt_id": "5a7f477c725e866729307ff87011f8dd812a3cdf"
},
"CVE-2016-7910": {
"cmt_msg": "block: fix use-after-free in seq file",
"cmt_id": "9a95c0cfc6f21b9ac66269d4782ea5a0f58cdf91"
},
"CVE-2016-3857": {
"cmt_msg": "arm: oabi compat: add missing access checks",
"cmt_id": "0107ea0e0928c8a077f0f912c809f2b86fa7496c"
}
},
"4.4.19": {
"CVE-2016-5412": {
"cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures",
"cmt_id": "e1a90eb8afa42b02f46897b881b9e19d3594159c"
},
"CVE-2016-4482": {
"cmt_msg": "USB: usbfs: fix potential infoleak in devio",
"cmt_id": "4077ef4797a8ff007a2de091c9befee4882c4790"
},
"CVE-2016-6136": {
"cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()",
"cmt_id": "53eaa3910ae67e497fb33188d515c14ed17a7a0e"
}
},
"4.4.20": {
"CVE-2016-6480": {
"cmt_msg": "aacraid: Check size values after double-fetch from user",
"cmt_id": "e4878ef66e5b8d01d6734b1952f9abb3eeea454c"
}
},
"4.4.21": {
"CVE-2016-10229": {
"cmt_msg": "udp: properly support MSG_PEEK with truncated buffers",
"cmt_id": "dfe2042d96065f044a794f684e9f7976a4ca6e24"
},
"CVE-2016-5244": {
"cmt_msg": "rds: fix an infoleak in rds_inc_info_copy",
"cmt_id": "ffd5ce2ad5fd140ddd492ab2064e29e86aaa64ea"
},
"CVE-2016-5243": {
"cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump",
"cmt_id": "5fb71611925f734f7fe03a45527e14b296fd5167"
},
"CVE-2016-7915": {
"cmt_msg": "HID: core: prevent out-of-bound readings",
"cmt_id": "5349cdd3b49cea2d57dc05bbf3f313979751fed3"
},
"CVE-2016-3135": {
"cmt_msg": "netfilter: x_tables: check for size overflow",
"cmt_id": "cfd6e7fe434a378127e4964fc0b7ccf32ae2baed"
},
"CVE-2016-0758": {
"cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing",
"cmt_id": "5afbd223e60a130f66bddf7598165ebe2b51f8db"
},
"CVE-2016-6130": {
"cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp",
"cmt_id": "2d29d6cec3bc5473efdad3b143404d9e32817c86"
}
},
"4.4.22": {
"CVE-2016-9178": {
"cmt_msg": "fix minor infoleak in get_user_ex()",
"cmt_id": "9d25c78ec01c402dc56272693c44ef9d72ecdd2e"
},
"CVE-2016-10318": {
"cmt_msg": "fscrypto: add authorization check for setting encryption policy",
"cmt_id": "8d693a2e67b5793ee58d106fded28902b7fd0f72"
}
},
"4.4.23": {
"CVE-2016-6828": {
"cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()",
"cmt_id": "0f55fa7541d7ff34a6690438bb00b78521b98b54"
}
},
"4.4.24": {
"CVE-2017-15102": {
"cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference",
"cmt_id": "62dd9cf78b280c8cd08162f8c4a490fb76deeb23"
},
"CVE-2016-10044": {
"cmt_msg": "aio: mark AIO pseudo-fs noexec",
"cmt_id": "0d9529e1b881ae80b40270b55dcbf7468be0099c"
}
},
"4.4.26": {
"CVE-2016-5195": {
"cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()",
"cmt_id": "1294d355881cc5c3421d24fee512f16974addb6c"
}
},
"4.4.27": {
"CVE-2016-7425": {
"cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()",
"cmt_id": "24040922827859d1d69597c3bc0c31fad523fd21"
}
},
"4.4.29": {
"CVE-2016-8666": {
"cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.",
"cmt_id": "5699b3431e0b14736867484b8669ead2d40f575e"
},
"CVE-2016-8658": {
"cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()",
"cmt_id": "b82a7f93b4e60d8689d8f4e687ef58ed2098739f"
},
"CVE-2016-9644": {
"cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options",
"cmt_id": "fcf5e5198b447969ed2a56ec335dae3c695a6b46"
},
"CVE-2016-7097": {
"cmt_msg": "posix_acl: Clear SGID bit when setting file permissions",
"cmt_id": "57c9cfdb61ea270936fab76da99a742c6ef0b86f"
}
},
"4.4.31": {
"CVE-2016-7042": {
"cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function",
"cmt_id": "940d7ecbc57c94d6cd174d9d3247e07fd1b1467d"
},
"CVE-2016-8633": {
"cmt_msg": "firewire: net: guard against rx buffer overflows",
"cmt_id": "46e14262a063714610b916404a20880fbd4cd0ce"
},
"CVE-2016-8630": {
"cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)",
"cmt_id": "91e1f7b0eb252ce8f88d69227ef5f52f9efb2aae"
}
},
"4.4.32": {
"CVE-2016-7039": {
"cmt_msg": "net: add recursion limit to GRO",
"cmt_id": "3cb00b90e8b1bd59382f5e1304dd751f9674f027"
},
"CVE-2016-9555": {
"cmt_msg": "sctp: validate chunk len before actually using it",
"cmt_id": "bd891f40f04f8b96d9148ff8a5d538b60171409c"
}
},
"4.4.34": {
"CVE-2015-8964": {
"cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields",
"cmt_id": "4e772c53ab9836b083c21acf9d2d76805e1d133e"
},
"CVE-2016-8645": {
"cmt_msg": "tcp: take care of truncations done by sk_filter()",
"cmt_id": "225a24ae97331f3b9d97c1bb97b1e30b3633bcf4"
}
},
"4.4.36": {
"CVE-2016-9756": {
"cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far",
"cmt_id": "b7f9404d1b488b6773c7a2e6da92aa6cb5bd125e"
},
"CVE-2016-8650": {
"cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()",
"cmt_id": "249090830942565fb0ce7c1e018d927a14282ead"
}
},
"4.4.37": {
"CVE-2016-9794": {
"cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock",
"cmt_id": "58cebd1a08ed114e05cc9d16dee9e5423f564c82"
}
},
"4.4.38": {
"CVE-2016-9793": {
"cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE",
"cmt_id": "77125815f058d587cac9217ac2c468038a7285c4"
},
"CVE-2016-10200": {
"cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()",
"cmt_id": "56366fa0ad46a59abe2460b8acb775f7f84fbf16"
},
"CVE-2016-8655": {
"cmt_msg": "packet: fix race condition in packet_set_ring",
"cmt_id": "5a01eaf19858278cc22525be118fe9c6a3c86e83"
},
"CVE-2016-8399": {
"cmt_msg": "net: ping: check minimum size on ICMP header length",
"cmt_id": "06cdad2b6d921dee33c8efc84922533dfb1458c6"
}
},
"4.4.39": {
"CVE-2016-10147": {
"cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility",
"cmt_id": "9a3baed9103bc413a5e98e13e31cd8ae7c0b5563"
}
},
"4.4.40": {
"CVE-2015-8709": {
"cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks",
"cmt_id": "03eed7afbc09e061f66b448daf7863174c3dc3f3"
}
},
"4.4.41": {
"CVE-2016-9588": {
"cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)",
"cmt_id": "19aa9c14989e7a3fe04b444f146a05ff857b058e"
},
"CVE-2016-10088": {
"cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS",
"cmt_id": "d85727365859108cbcf832c2b3c38358ddc7638b"
}
},
"4.4.43": {
"CVE-2017-7273": {
"cmt_msg": "HID: hid-cypress: validate length of report",
"cmt_id": "a2f727149ee4e746da55d209a0179b68d31d3915"
}
},
"4.4.44": {
"CVE-2017-2583": {
"cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"",
"cmt_id": "816307c80d4ddad5414a05ff5861f063d29cda6f"
},
"CVE-2016-9191": {
"cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir",
"cmt_id": "b9d6631395a1e25b210ce112b1bc10f3c665ea20"
},
"CVE-2017-5549": {
"cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling",
"cmt_id": "3ef5bc0b385f81e88574c29a13edf80f092d515f"
},
"CVE-2017-2584": {
"cmt_msg": "KVM: x86: Introduce segmented_write_std",
"cmt_id": "9d3875c0c462808f4d59dfa18a79d4b5b235acbd"
}
},
"4.4.45": {
"CVE-2017-5547": {
"cmt_msg": "HID: corsair: fix DMA buffers on stack",
"cmt_id": "0f37d20fdc70ee54f002bd77ce54a2a303ad0437"
},
"CVE-2017-5551": {
"cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs",
"cmt_id": "36672b8b99e2cf2ab0587f08a19f394f8f65a861"
}
},
"4.4.46": {
"CVE-2016-8405": {
"cmt_msg": "fbdev: color map copying bounds checking",
"cmt_id": "63db7c91a3c0ebe0e291feea53e4c63391db9465"
}
},
"4.4.48": {
"CVE-2016-10208": {
"cmt_msg": "ext4: validate s_first_meta_bg at mount time",
"cmt_id": "e21a3cad35bc2f4c7fff317e2c7d38eed363a430"
}
},
"4.4.49": {
"CVE-2017-2618": {
"cmt_msg": "selinux: fix off-by-one in setprocattr",
"cmt_id": "e72c13d93e9ed2b131ceb9a290ab056ce0dd41ab"
}
},
"4.4.50": {
"CVE-2017-5986": {
"cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf",
"cmt_id": "a4226c7ebfb5748447f1640c97f0306ed69e44f8"
},
"CVE-2017-5897": {
"cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads",
"cmt_id": "eaa3a58f450383aaa8632eea23f2a70d85c55d9d"
},
"CVE-2017-6214": {
"cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()",
"cmt_id": "82e9f6b90a0e7fbc017bdce23845c7580db6f657"
},
"CVE-2017-5970": {
"cmt_msg": "ipv4: keep skb->dst around in presence of IP options",
"cmt_id": "2d9c2e011fd3f1be4e5643d6ad186faa5e50d4d1"
}
},
"4.4.52": {
"CVE-2017-6345": {
"cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()",
"cmt_id": "2b3eb43342a00d03e953208f45866925ca255e15"
},
"CVE-2017-6346": {
"cmt_msg": "packet: fix races in fanout_add()",
"cmt_id": "abd672deb170c4443e41173160de0ba2ae1abc08"
},
"CVE-2017-6347": {
"cmt_msg": "ip: fix IP_CHECKSUM handling",
"cmt_id": "ce9ecb8d7f3c698c48b0885936d0b7275dacde9c"
},
"CVE-2017-6348": {
"cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().",
"cmt_id": "353dd7290025bc33555282848ab015c1bbf21186"
},
"CVE-2017-6074": {
"cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO",
"cmt_id": "a95df078e86624ee330e82aad34cfd3b5fcf21ce"
}
},
"4.4.53": {
"CVE-2017-5669": {
"cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection",
"cmt_id": "f0ae01568e0cf4b00071d1dfd27c90022c2b6d7e"
}
},
"4.4.54": {
"CVE-2017-2636": {
"cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf",
"cmt_id": "999853d941b99ca2ac4a331552c388e2603a9b1d"
}
},
"4.4.55": {
"CVE-2016-2188": {
"cmt_msg": "USB: iowarrior: fix NULL-deref at probe",
"cmt_id": "179295c38d23874357ca75af104fd6f1fe769cfd"
},
"CVE-2017-8924": {
"cmt_msg": "USB: serial: io_ti: fix information leak in completion handler",
"cmt_id": "72bb2b96b8568a74f28e2a2c39e005583595b2c2"
},
"CVE-2017-8925": {
"cmt_msg": "USB: serial: omninet: fix reference leaks at open",
"cmt_id": "54f11a9662b632defe4d75c7574fddbc5c503c9c"
}
},
"4.4.59": {
"CVE-2017-7184": {
"cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window",
"cmt_id": "cce7e56dd73f75fef0a7f594fb129285a660fec0"
},
"CVE-2017-7374": {
"cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation",
"cmt_id": "7a5202190810dde1467718235c1f650fcf57592a"
}
},
"4.4.60": {
"CVE-2017-7187": {
"cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN",
"cmt_id": "a92f411914cad6532e82e4607bc4075a5ffaa366"
}
},
"4.4.61": {
"CVE-2017-7261": {
"cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()",
"cmt_id": "b26629453c7b2a6c82000b36fbd1cfc4d9101808"
},
"CVE-2017-7616": {
"cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.",
"cmt_id": "b73d08ce20c5cb2e0cec8c019a27b9574e2c4ec2"
},
"CVE-2017-7294": {
"cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()",
"cmt_id": "c21636bd64c511160846bdf87ef4c7ff48680c99"
}
},
"4.4.62": {
"CVE-2017-7308": {
"cmt_msg": "net/packet: fix overflow in check for priv area size",
"cmt_id": "d35f8fa0b93e61dd95b8f86928a783c4d8a32d3e"
}
},
"4.4.63": {
"CVE-2017-6353": {
"cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it",
"cmt_id": "e2f5fb9207a6bd7101ad94e73264ac8bb9e3b87a"
},
"CVE-2017-7618": {
"cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback",
"cmt_id": "2673d1c5122ee2492e24d9a135e230b2d0b2e630"
},
"CVE-2017-8064": {
"cmt_msg": "dvb-usb-v2: avoid use-after-free",
"cmt_id": "0cb03b6e7086e59647cf6eb79fec646cdec69691"
},
"CVE-2017-7889": {
"cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads",
"cmt_id": "6739cc12f3dbd7e4b3795f6e809d44ea6b490bb6"
},
"CVE-2017-2596": {
"cmt_msg": "kvm: fix page struct leak in handle_vmon",
"cmt_id": "c1fc1d2f214e33f91565a65ad1b4c09dae618d84"
}
},
"4.4.64": {
"CVE-2017-7472": {
"cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings",
"cmt_id": "c9460fbceb2f3efa1d20050cdbffa51ec025745a"
},
"CVE-2016-9604": {
"cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings",
"cmt_id": "b5737b92560efcb956d2def4dcd3f4b6d4118e58"
}
},
"4.4.65": {
"CVE-2016-7913": {
"cmt_msg": "xc2028: avoid use after free",
"cmt_id": "0d9dac5d7cc31df50757f26bcbdfbcf47277a1b2"
},
"CVE-2016-6213": {
"cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts",
"cmt_id": "c50fd34e10897114a7be2120133bd7e0b4184024"
},
"CVE-2016-8632": {
"cmt_msg": "tipc: check minimum bearer MTU",
"cmt_id": "65d30f7545ffdddcf10a59f3e54b032c5ade2e9d"
},
"CVE-2017-2671": {
"cmt_msg": "ping: implement proper locking",
"cmt_id": "b7f47c794bc45eae975bf2a52a4463333111bb2a"
},
"CVE-2016-9120": {
"cmt_msg": "staging/android/ion : fix a race condition in the ion driver",
"cmt_id": "a7544fdd1626b65db635022c9d36007bb32dd6d8"
},
"CVE-2016-9084": {
"cmt_msg": "vfio/pci: Fix integer overflows, bitmask check",
"cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e"
},
"CVE-2016-7917": {
"cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages",
"cmt_id": "9540baadb61ba5ed08832bb2a4cbfd876db37ff4"
},
"CVE-2016-9083": {
"cmt_msg": "vfio/pci: Fix integer overflows, bitmask check",
"cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e"
},
"CVE-2017-6001": {
"cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race",
"cmt_id": "416bd4a366f3b4cd3f6a3246f91bd9f425891547"
}
},
"4.4.66": {
"CVE-2017-0750": {
"cmt_msg": "f2fs: do more integrity verification for superblock",
"cmt_id": "716bcfeb12b8d55d278af47b927839b382d2837a"
},
"CVE-2017-7645": {
"cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments",
"cmt_id": "82a0d8aabe043ac94efa255502754c70363dab0e"
}
},
"4.4.67": {
"CVE-2017-10661": {
"cmt_msg": "timerfd: Protect the might cancel mechanism proper",
"cmt_id": "911bd54922cdcc259daf73cb1a3a9d0305b9061d"
},
"CVE-2017-7895": {
"cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops",
"cmt_id": "da1ce38aaac7f08d319b4b76130aa4fd27c4489f"
}
},
"4.4.68": {
"CVE-2017-10662": {
"cmt_msg": "f2fs: sanity check segment count",
"cmt_id": "4edbdf57bc26a126aa3cbafd63fae4b00e002e2d"
}
},
"4.4.70": {
"CVE-2017-18360": {
"cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios",
"cmt_id": "1e6e9c4c36f9626d5ad2b63aa7ad5686dde737e7"
},
"CVE-2017-7487": {
"cmt_msg": "ipx: call ipxitf_put() in ioctl error path",
"cmt_id": "8a5b15e198f1701da75a8223cfe72c04bcb15160"
},
"CVE-2017-1000363": {
"cmt_msg": "char: lp: fix possible integer overflow in lp_setup()",
"cmt_id": "cda5c7e625cefed46311cb0b37816fb2ff42a8ee"
}
},
"4.4.71": {
"CVE-2017-9077": {
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent",
"cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0"
},
"CVE-2017-9076": {
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent",
"cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0"
},
"CVE-2017-9075": {
"cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent",
"cmt_id": "ffa551def59c9b0e1747955af6a742443ae152fc"
},
"CVE-2017-9074": {
"cmt_msg": "ipv6: Prevent overrun when parsing v6 header options",
"cmt_id": "017fabead5c2aacb36df910bbfbfb1e813517ae3"
},
"CVE-2017-18221": {
"cmt_msg": "mlock: fix mlock count can not decrease in race condition",
"cmt_id": "03489bfc78304a0be057ec827a67c0d87dd97b2e"
},
"CVE-2017-8890": {
"cmt_msg": "dccp/tcp: do not inherit mc_list from parent",
"cmt_id": "5f67a1663c03a73962fb240cf821338f78981a23"
},
"CVE-2017-9242": {
"cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()",
"cmt_id": "38f02f2ce0ca58c45d95567a5d64f7dc90aa9c95"
}
},
"4.4.72": {
"CVE-2017-9605": {
"cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid",
"cmt_id": "74276868b45585f77eae2372c95e016aacfd0d3c"
},
"CVE-2017-15274": {
"cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length",
"cmt_id": "bc6be3433e694d1ab1d0012b6053ae4e9a3b189e"
},
"CVE-2017-7346": {
"cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()",
"cmt_id": "619cc02fd85d69270c95e7db320b305e975aae00"
},
"CVE-2017-1000380": {
"cmt_msg": "ALSA: timer: Fix race between read and ioctl",
"cmt_id": "f5bc918760c8100410847a6a6e4c25f24e358e0c"
}
},
"4.4.74": {
"CVE-2017-1000364": {
"cmt_msg": "mm: larger stack guard gap, between vmas",
"cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741"
},
"CVE-2017-1000379": {
"cmt_msg": "mm: larger stack guard gap, between vmas",
"cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741"
}
},
"4.4.75": {
"CVE-2017-1000365": {
"cmt_msg": "fs/exec.c: account for argv/envp pointers",
"cmt_id": "1d3d0f8b7cf758136ed36b30620442d989601737"
},
"CVE-2017-7482": {
"cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode",
"cmt_id": "eab38dfd66d7f13b9eecfae7728ff0d2e49ff16f"
}
},
"4.4.76": {
"CVE-2017-18017": {
"cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff",
"cmt_id": "234e649840d191379cd132d89f4b01a2495cfcc3"
}
},
"4.4.77": {
"CVE-2017-11176": {
"cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()",
"cmt_id": "034e10b4f8348c2c267e491d1e2872023c35f310"
},
"CVE-2017-10810": {
"cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure",
"cmt_id": "a080ec466c3412dcf58cff69d6c05d1e670adc0c"
},
"CVE-2017-12146": {
"cmt_msg": "driver core: platform: fix race condition with driver_override",
"cmt_id": "c01ace719ebe6353f0c96e56f6c75c22ad3f67b0"
}
},
"4.4.78": {
"CVE-2019-9457": {
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM",
"cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991"
},
"CVE-2018-14634": {
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM",
"cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991"
},
"CVE-2017-11089": {
"cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE",
"cmt_id": "05bf0b6ef9ce7e8967c96fd419ad0ee5d7fe5418"
},
"CVE-2017-7541": {
"cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()",
"cmt_id": "4c7021c2fb74047649c03845ce6fd13626a5a418"
},
"CVE-2017-1000371": {
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE",
"cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8"
},
"CVE-2017-1000370": {
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE",
"cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8"
}
},
"4.4.79": {
"CVE-2017-11473": {
"cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables",
"cmt_id": "fa7ddee3485f17c28fe4079954c5716036de6152"
},
"CVE-2017-18079": {
"cmt_msg": "Input: i8042 - fix crash at boot time",
"cmt_id": "bba6b69e11777695256619a77f90081ac7f99de7"
}
},
"4.4.80": {
"CVE-2017-7533": {
"cmt_msg": "dentry name snapshots",
"cmt_id": "407669f2c9fe9f32aeb39f715d748fe456718aac"
},
"CVE-2016-10741": {
"cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O",
"cmt_id": "56548b6f505a6df1c43dcb151a18d6190c250ed6"
},
"CVE-2017-12762": {
"cmt_msg": "isdn/i4l: fix buffer overflow",
"cmt_id": "d4b159f14d612132fdb1ade6d5015ee03a263e62"
}
},
"4.4.81": {
"CVE-2017-10663": {
"cmt_msg": "f2fs: sanity check checkpoint segno and blkoff",
"cmt_id": "76517ed2a7fe059840c1984165984e69cb488568"
},
"CVE-2017-8831": {
"cmt_msg": "saa7164: fix double fetch PCIe access condition",
"cmt_id": "deae9956cfb42f3d480c71f416f934d3ce84c033"
},
"CVE-2017-7542": {
"cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt",
"cmt_id": "f09db7559c1faf6f7c2128a92050b978a480681c"
}
},
"4.4.82": {
"CVE-2017-1000": {
"cmt_msg": "udp: consistently apply ufo or fragmentation",
"cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87"
},
"CVE-2017-1000112": {
"cmt_msg": "udp: consistently apply ufo or fragmentation",
"cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87"
},
"CVE-2017-1000111": {
"cmt_msg": "packet: fix tp_reserve race in packet_set_ring",
"cmt_id": "63364a508d24944abb0975bd823cb11367c56283"
}
},
"4.4.84": {
"CVE-2017-12134": {
"cmt_msg": "xen: fix bio vec merging",
"cmt_id": "c0b397fd6b2b8ed7b39a717340b85b4b1add5332"
},
"CVE-2017-14140": {
"cmt_msg": "Sanitize 'move_pages()' permission checks",
"cmt_id": "46d51a26efbc7cbaa2bc1f01628a00a604193856"
},
"CVE-2018-10675": {
"cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy",
"cmt_id": "cc971fa12bd2dff6c0432c860d784c6cdaf5a04b"
}
},
"4.4.87": {
"CVE-2017-11600": {
"cmt_msg": "xfrm: policy: check policy direction value",
"cmt_id": "9b3dcc98d8df16913d260c8dae64ad6e5bfcb953"
}
},
"4.4.88": {
"CVE-2017-14340": {
"cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present",
"cmt_id": "ad3903434142953a03b84ec8719ce80373a62266"
},
"CVE-2017-1000251": {
"cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length",
"cmt_id": "f7ec367c8ea7021517c9c04b0022c225d2d0785a"
},
"CVE-2017-9985": {
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops",
"cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608"
},
"CVE-2017-9984": {
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops",
"cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608"
}
},
"4.4.89": {
"CVE-2017-14106": {
"cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0",
"cmt_id": "611a98c8eca3098173309642df187056c17e0f65"
},
"CVE-2017-14991": {
"cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE",
"cmt_id": "72896ca30a7f6ceb5238714d5761e4ad4521ccc5"
},
"CVE-2017-14051": {
"cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code",
"cmt_id": "d8663aa2778965c75b5e75c7948b44f5de601a88"
},
"CVE-2017-0627": {
"cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls",
"cmt_id": "4931578fbeb525e717a7aa96f83f4d85cf48d0b2"
}
},
"4.4.90": {
"CVE-2020-14353": {
"cmt_msg": "KEYS: prevent creating a different user's keyrings",
"cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c"
},
"CVE-2017-14156": {
"cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace",
"cmt_id": "27323cb81eae618e68e4dea1345090c37dee5485"
},
"CVE-2017-12153": {
"cmt_msg": "nl80211: check for the required netlink attributes presence",
"cmt_id": "9d74367d1a35e87f46e5e0c2e8dd9f5d21f701b0"
},
"CVE-2017-1000252": {
"cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ",
"cmt_id": "7520be6a454c28955e711fdb49c81519bc537b39"
},
"CVE-2017-12154": {
"cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8",
"cmt_id": "21a638c5efd6ec7a10441bfb94e15e5288920f07"
},
"CVE-2017-18270": {
"cmt_msg": "KEYS: prevent creating a different user's keyrings",
"cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c"
},
"CVE-2017-14489": {
"cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly",
"cmt_id": "9d2534917c25a58b67864ea1db930670d48dee75"
},
"CVE-2017-12192": {
"cmt_msg": "KEYS: prevent KEYCTL_READ on negative key",
"cmt_id": "638b38505045e1090313ff7ed284911870cd29f8"
},
"CVE-2017-15537": {
"cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv",
"cmt_id": "d25fea066a8ed4457a9f8b23eb78204b9b6896cf"
}
},
"4.4.92": {
"CVE-2017-16526": {
"cmt_msg": "uwb: properly check kthread_run return value",
"cmt_id": "5a21af11c6810b936b17a2c5c69518be0da8f4c3"
},
"CVE-2017-16534": {
"cmt_msg": "USB: core: harden cdc_parse_cdc_header",
"cmt_id": "feab51a916ed07219dee38b898fe22bd2a98193a"
},
"CVE-2017-16531": {
"cmt_msg": "USB: fix out-of-bounds in usb_set_configuration",
"cmt_id": "13713e63bdb306f9a58d359b15edd60f34eac5ee"
},
"CVE-2017-16530": {
"cmt_msg": "USB: uas: fix bug in handling of alternate settings",
"cmt_id": "5d9a9c3dcc1f63215b5a5b877be589974ec4f31d"
},
"CVE-2017-16529": {
"cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor",
"cmt_id": "46c7b1fa4911a859a82575e3ffb55b34a89a222d"
}
},
"4.4.93": {
"CVE-2017-0786": {
"cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()",
"cmt_id": "6721969c7b8a35f85a41acaabdad190ed32cf704"
},
"CVE-2017-16527": {
"cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting",
"cmt_id": "dc7c3bd09c7d2063c4d1be23d72ee85f1b3bb947"
},
"CVE-2017-16525": {
"cmt_msg": "USB: serial: console: fix use-after-free after failed setup",
"cmt_id": "208563455aac7540755bb9d8e8edaf7c5ef61d8c"
},
"CVE-2017-16533": {
"cmt_msg": "HID: usbhid: fix out-of-bounds bug",
"cmt_id": "2929cb995378205bceda86d6fd3cbc22e522f97f"
},
"CVE-2017-15265": {
"cmt_msg": "ALSA: seq: Fix use-after-free at creating a port",
"cmt_id": "23709ae9b61429502fcd4686e7a97333f3b3544a"
},
"CVE-2017-12190": {
"cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov",
"cmt_id": "399c46095eb5d41934c8a99732028a9f1cf0ac50"
}
},
"4.4.94": {
"CVE-2018-9568": {
"cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto",
"cmt_id": "685699703a0a39896ba0af91e6d2a80103fe4966"
},
"CVE-2017-15649": {
"cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held",
"cmt_id": "1b6c80e797eeadf643861f8340ed5791d813d80c"
}
},
"4.4.95": {
"CVE-2017-15299": {
"cmt_msg": "KEYS: don't let add_key() update an uninstantiated key",
"cmt_id": "33dea302f9bc1e2c41392a308cfb50f6c02bb096"
},
"CVE-2017-16535": {
"cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()",
"cmt_id": "9dff499d822660c6dbb2a407a7d85be26f87da07"
},
"CVE-2017-15951": {
"cmt_msg": "KEYS: Fix race between updating and finding a negative key",
"cmt_id": "8a004caec12bf241e567e3640401256cc9bc2e45"
}
},
"4.4.96": {
"CVE-2017-16643": {
"cmt_msg": "Input: gtco - fix potential out-of-bound access",
"cmt_id": "2c99438cf66d585ba939068c8b8562e9104cd5c4"
},
"CVE-2017-12193": {
"cmt_msg": "assoc_array: Fix a buggy node-splitting case",
"cmt_id": "1cbbd99f3bfe27115c05332e7db73e23651b9f8b"
}
},
"4.4.99": {
"CVE-2018-7191": {
"cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()",
"cmt_id": "4b27fe34a226dd9087cb2e93161ffec03952c05a"
},
"CVE-2017-13080": {
"cmt_msg": "mac80211: accept key reinstall without changing anything",
"cmt_id": "6440f0ee8a1779f53526bccb9de00914daeb9094"
},
"CVE-2017-16645": {
"cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane",
"cmt_id": "b7c625ce6d279bf3e138c25c0cd3f595923825f3"
},
"CVE-2017-16528": {
"cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device",
"cmt_id": "1e98fd54c356bb2bcf827a74949c9372c455409f"
},
"CVE-2017-16532": {
"cmt_msg": "usb: usbtest: fix NULL pointer dereference",
"cmt_id": "de46c1adbea694109036d3e7dee1fa6250b72660"
}
},
"4.4.100": {
"CVE-2017-16537": {
"cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe",
"cmt_id": "c344019c48a92e559b7f910e53e0c6f9018680fb"
},
"CVE-2017-9150": {
"cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged",
"cmt_id": "49630dd2e10a3b2fee0cec19feb63f08453b876f"
},
"CVE-2017-10911": {
"cmt_msg": "xen-blkback: don't leak stack data via response ring",
"cmt_id": "11e8e55be18cd39c3d54674362aa18695b243e22"
},
"CVE-2017-16646": {
"cmt_msg": "media: dib0700: fix invalid dvb_detach argument",
"cmt_id": "0a418e57717d2d33275e9340c726ded671be7698"
},
"CVE-2017-16650": {
"cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors",
"cmt_id": "e455048c7ae95633c8778a0282d1ee86f78c5349"
},
"CVE-2017-7518": {
"cmt_msg": "KVM: x86: fix singlestepping over syscall",
"cmt_id": "07e3aff243cdcb70d1e81e515aea553df3080f43"
},
"CVE-2017-16649": {
"cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors",
"cmt_id": "caeeef8438c30e7d0e43293fcb7beb9f953bb2a9"
},
"CVE-2017-15115": {
"cmt_msg": "sctp: do not peel off an assoc from one netns to another one",
"cmt_id": "46bdabbca02ebabd292d0ea3f610aa54e53f0e25"
}
},
"4.4.101": {
"CVE-2017-18204": {
"cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()",
"cmt_id": "c4baa4a5870cb02f713def1620052bfca7a82bbb"
},
"CVE-2017-16994": {
"cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges",
"cmt_id": "a3805b10de80953db316985f567453fc18329423"
}
},
"4.4.103": {
"CVE-2017-18203": {
"cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()",
"cmt_id": "4e82464aa4a398207e2ecbc4877c82319ecdbafa"
},
"CVE-2017-16536": {
"cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor",
"cmt_id": "0870fb4c3566088dc222e582e43edbc9ececbce4"
}
},
"4.4.104": {
"CVE-2017-16939": {
"cmt_msg": "ipsec: Fix aborted xfrm policy dump crash",
"cmt_id": "b377c453b3631531679cbe594b7d28c5ecd82cea"
},
"CVE-2017-18208": {
"cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances",
"cmt_id": "0d05a5593f6309cb0df0df474a807a3220855703"
}
},
"4.4.106": {
"CVE-2017-0861": {
"cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info",
"cmt_id": "659e7d2588f0fd970044fe00d9edeb482d375288"
},
"CVE-2018-7492": {
"cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map",
"cmt_id": "6c154d536d9457bee261d057559e43d3f8ae5fd5"
},
"CVE-2017-1000407": {
"cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts",
"cmt_id": "477b837533a2f592702d2affab36b8052691287b"
},
"CVE-2018-18559": {
"cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()",
"cmt_id": "b90f87c641bc9af04f0d8a21008880ae032de72c"
}
},
"4.4.107": {
"CVE-2017-17558": {
"cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow",
"cmt_id": "dfdf5fa3e6647c0fc02be8d857b6b8b7098946ff"
},
"CVE-2017-17806": {
"cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed",
"cmt_id": "43cd7f38612df31fbd929588c065cfbc42102aab"
},
"CVE-2017-17805": {
"cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage",
"cmt_id": "8a311b0462b59d12cb14e82e626d3612d988135b"
},
"CVE-2017-17807": {
"cmt_msg": "KEYS: add missing permission check for request_key() destination",
"cmt_id": "13e86efb2eee6bd1f2d0aae5b0273e8e65683c9d"
},
"CVE-2017-16914": {
"cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer",
"cmt_id": "2862cfca39894ac265fbb5cde9a3ff90c02201f3"
}
},
"4.4.109": {
"CVE-2017-17712": {
"cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg",
"cmt_id": "be27b620a861dc2a143b78e81e23f5622d9105da"
},
"CVE-2017-18595": {
"cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer",
"cmt_id": "c2a62f84d49ff71cd7ffbe898c706ccc39955218"
},
"CVE-2017-15129": {
"cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()",
"cmt_id": "5854ca90c6c6c2ed65355eded45615bf8bcd6fd3"
},
"CVE-2018-18386": {
"cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)",
"cmt_id": "2e3883922530aa25ecc23cc27bab1d3fda779f5a"
},
"CVE-2017-17449": {
"cmt_msg": "netlink: Add netns check on taps",
"cmt_id": "f778ce6faa0d4c8d7a90b7bd11c3db7fb687c8cc"
}
},
"4.4.111": {
"CVE-2017-18075": {
"cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances",
"cmt_id": "3ad85176e78d6671ede52eed588c3588d087b587"
}
},
"4.4.112": {
"CVE-2017-13216": {
"cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl",
"cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392"
},
"CVE-2017-17741": {
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio",
"cmt_id": "eb91461daa77eb0ddb4c24aa427051f3669ba1f3"
},
"CVE-2018-5333": {
"cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op",
"cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b"
},
"CVE-2017-1000410": {
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.",
"cmt_id": "0ae86454c435e554d01c51535c3cd4312577cc74"
},
"CVE-2018-5332": {
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()",
"cmt_id": "10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c"
}
},
"4.4.113": {
"CVE-2018-6927": {
"cmt_msg": "futex: Prevent overflow by strengthen input validation",
"cmt_id": "58c82be944f58561e77eb9db5039a4b0eca96ac5"
}
},
"4.4.114": {
"CVE-2017-16913": {
"cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input",
"cmt_id": "b6f826ba10dce86f74efd3c0953cb9982a3c51e2"
},
"CVE-2017-16912": {
"cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number",
"cmt_id": "80e733a9b37fb6b40351bf1924d5a90d89c375ae"
},
"CVE-2017-16911": {
"cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address",
"cmt_id": "28f467e0bdda754aa36390fd90b01823f0d3b18d"
},
"CVE-2017-11472": {
"cmt_msg": "ACPICA: Namespace: fix operand cache leak",
"cmt_id": "4c19b00e5588828f0d3198b926efade766dcf2c8"
},
"CVE-2018-1000028": {
"cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled",
"cmt_id": "3f84339bd344b2cf0afe64b78d3964bb6422d0f3"
},
"CVE-2017-17448": {
"cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks",
"cmt_id": "a359a437fbc6bb08aa9cc8e25ef4ac3b77ca727b"
},
"CVE-2017-17450": {
"cmt_msg": "netfilter: xt_osf: Add missing permission checks",
"cmt_id": "d01ceb4722cd8d64176272434fe332b596750d9c"
}
},
"4.4.115": {
"CVE-2018-5344": {
"cmt_msg": "loop: fix concurrent lo_open/lo_release",
"cmt_id": "b392225467b8066538dfa200dc925c844b76880b"
},
"CVE-2018-1000004": {
"cmt_msg": "ALSA: seq: Make ioctls race-free",
"cmt_id": "623e5c8ae32b39cc8baea83478695dc624935318"
},
"CVE-2017-17862": {
"cmt_msg": "bpf: fix branch pruning logic",
"cmt_id": "1367d854b97493bfb1f3d24cf89ba60cb7f059ea"
}
},
"4.4.116": {
"CVE-2018-5873": {
"cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS",
"cmt_id": "49ffe04fcdf29c8925344bce314d9398b2d7743d"
},
"CVE-2017-8824": {
"cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code",
"cmt_id": "3196c1515ea683bb6f95673feb2998f605ab581d"
},
"CVE-2017-16538": {
"cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start",
"cmt_id": "ca48c81cff0e5b56e525414b75990bcb64b7cbb9"
},
"CVE-2018-5750": {
"cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message",
"cmt_id": "591060a7a0a09cbaa5b6c04bd309966586aa9d2e"
},
"CVE-2017-13305": {
"cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()",
"cmt_id": "33813d43dd593e1c32c567c75483233212b825ae"
},
"CVE-2017-18344": {
"cmt_msg": "posix-timer: Properly check sigevent->sigev_notify",
"cmt_id": "77f56f5d39e95a152a755d53b0d870b92fbf466b"
}
},
"4.4.117": {
"CVE-2018-7566": {
"cmt_msg": "ALSA: seq: Fix racy pool initializations",
"cmt_id": "b374197df2deb08fec55d48763711ea1df8efde7"
}
},
"4.4.120": {
"CVE-2017-18193": {
"cmt_msg": "f2fs: fix a bug caused by NULL extent tree",
"cmt_id": "023ca5b884d2759b56dc8d480942835881853513"
}
},
"4.4.121": {
"CVE-2018-5803": {
"cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()",
"cmt_id": "54b183ea4fe96c7b80439971ee04cf634a6e0459"
}
},
"4.4.122": {
"CVE-2018-1068": {
"cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets",
"cmt_id": "6d31b2ef34fd718386a73c983877461bca58d3db"
},
"CVE-2018-7995": {
"cmt_msg": "x86/MCE: Serialize sysfs changes",
"cmt_id": "e882c0baab3325c409d21edc24254c515d90d160"
},
"CVE-2018-1065": {
"cmt_msg": "netfilter: add back stackpointer size checks",
"cmt_id": "48db3004d40d97d3ac205d2d64ab580a8cfcfe63"
},
"CVE-2019-9456": {
"cmt_msg": "usb: usbmon: Read text within supplied buffer size",
"cmt_id": "abe0ecd5597c31c6b70dc347145789000f4cf68f"
}
},
"4.4.123": {
"CVE-2018-7480": {
"cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue",
"cmt_id": "633a5a5235d697b145171ca1e702d3a4f6778131"
},
"CVE-2017-16995": {
"cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()",
"cmt_id": "a6132276ab5dcc38b3299082efeb25b948263adb"
}
},
"4.4.124": {
"CVE-2017-18222": {
"cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver",
"cmt_id": "7d7100094cd83e84ce53c51155ee9f507e2e9028"
},
"CVE-2018-1066": {
"cmt_msg": "CIFS: Enable encryption during session setup phase",
"cmt_id": "26dc7476efad2151aadb7f72c0c8a253823ef289"
}
},
"4.4.125": {
"CVE-2018-8822": {
"cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()",
"cmt_id": "badf74b65fc27112f5fee871c7ade9199c74b2e1"
},
"CVE-2018-8781": {
"cmt_msg": "drm: udl: Properly check framebuffer mmap offsets",
"cmt_id": "224eaa8a8e644e0d3df35fe232b08fd8fead8864"
},
"CVE-2018-1087": {
"cmt_msg": "kvm/x86: fix icebp instruction handling",
"cmt_id": "5e4e65a940c91b61bfaf8d6e4448522577beb5ef"
},
"CVE-2018-8897": {
"cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack",
"cmt_id": "c6fe55e30bb6d431ee56cd4bbb582e30766c5e0e"
}
},
"4.4.126": {
"CVE-2018-1130": {
"cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()",
"cmt_id": "de31c391673aeb2c1d09552ac75a6b7ee96d65ac"
}
},
"4.4.127": {
"CVE-2018-1000199": {
"cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation",
"cmt_id": "d60017da67463bd7a11a7f7e08115be324afe216"
},
"CVE-2017-17975": {
"cmt_msg": "media: usbtv: prevent double free in error case",
"cmt_id": "607a6b7b6a7ad995c4c9cf3c2df66dc3f4febb52"
}
},
"4.4.128": {
"CVE-2018-9422": {
"cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()",
"cmt_id": "93dcb09e29bb24a86aa7b7eff65e424f7dc98af2"
},
"CVE-2018-7757": {
"cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()",
"cmt_id": "92b72d2f84389e27d81c93beaf9093f8cf1ef449"
}
},
"4.4.129": {
"CVE-2018-1092": {
"cmt_msg": "ext4: fail ext4_iget for root directory if unallocated",
"cmt_id": "990251318b97ed7153d9adbf633035536c7d685b"
}
},
"4.4.130": {
"CVE-2018-10940": {
"cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()",
"cmt_id": "e47611257d7b46bfdc70726a8a236881180cf990"
}
},
"4.4.131": {
"CVE-2018-9415": {
"cmt_msg": "ARM: amba: Fix race condition with driver_override",
"cmt_id": "7488404d3bab4eccb590c80c8827520394444630"
},
"CVE-2018-9385": {
"cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer",
"cmt_id": "30a80ca6dbbda67b0c902448993ed6a35b52612a"
},
"CVE-2018-1093": {
"cmt_msg": "ext4: add validity checks for bitmap block numbers",
"cmt_id": "ea057aed06d8f13d931652bc4faa604ac0c50aa2"
}
},
"4.4.132": {
"CVE-2017-18257": {
"cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()",
"cmt_id": "0678adf8f8a99c66c48c608ea9a79588743bc615"
},
"CVE-2017-18255": {
"cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check",
"cmt_id": "609124d60341bf8870318c201cec50548824f2e2"
}
},
"4.4.133": {
"CVE-2018-5814": {
"cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors",
"cmt_id": "02995a5882371a9fca3033fd356598a805d46040"
},
"CVE-2018-10087": {
"cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()",
"cmt_id": "ea00b22b02f228cb58ee6c6707c86ec270e37fba"
},
"CVE-2018-10021": {
"cmt_msg": "scsi: libsas: defer ata device eh commands to libata",
"cmt_id": "6efcc74e1b0c16aebf5d8107543ce63475af35c1"
},
"CVE-2018-1000204": {
"cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()",
"cmt_id": "93314640426ddb6af618d0802e622f6fa771792c"
}
},
"4.4.134": {
"CVE-2018-10124": {
"cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info",
"cmt_id": "cb1c92e55420dad73ce717ef4029dd6e984dcbd0"
},
"CVE-2018-9518": {
"cmt_msg": "NFC: llcp: Limit size of SDP URI",
"cmt_id": "50e54d56744cda70a1c3bc980c56e461ecde3a6d"
},
"CVE-2017-13695": {
"cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c",
"cmt_id": "dfcb739c20d88461fbd0dc007670f63ad82db881"
},
"CVE-2018-6412": {
"cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().",
"cmt_id": "bfffc2c3f56b462cdf5eeea639d898a69b323001"
}
},
"4.4.137": {
"CVE-2019-18675": {
"cmt_msg": "mmap: introduce sane default mmap limits",
"cmt_id": "bd2f9ce5bacb15ad54fc6c345480c4df0c76c3ee"
}
},
"4.4.139": {
"CVE-2018-13406": {
"cmt_msg": "video: uvesafb: Fix integer overflow in allocation",
"cmt_id": "842803e4a66bd2a0b663dae18b80535a575d427f"
}
},
"4.4.140": {
"CVE-2018-10878": {
"cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()",
"cmt_id": "afa9c75025bd1e24ccdc56fa331e865b626769e6"
},
"CVE-2018-9516": {
"cmt_msg": "HID: debug: check length before copy_to_user()",
"cmt_id": "ef111ea31575bdc50c0c914fe036a1d0ad0cae4e"
},
"CVE-2017-13168": {
"cmt_msg": "scsi: sg: mitigate read/write abuse",
"cmt_id": "9a737329c7c4a341009b7398164db8fa8e5358f0"
},
"CVE-2018-10877": {
"cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()",
"cmt_id": "353ebd3e98869b50ed47364d05acdf679c2c05c6"
},
"CVE-2018-10876": {
"cmt_msg": "ext4: only look at the bg_flags field if it is valid",
"cmt_id": "db3b00e3f392e9f879f7fd202437e68f90f35765"
},
"CVE-2018-10879": {
"cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors",
"cmt_id": "b7d29dc8fe8d23243d3d87109099bdc34a684712"
},
"CVE-2018-10881": {
"cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data",
"cmt_id": "b88fc699a023e0ef86f647c3d48a17d7cfff1f2a"
},
"CVE-2018-10882": {
"cmt_msg": "ext4: add more inode number paranoia checks",
"cmt_id": "ff6c96461be35381399466ad58f02b8d78ab480a"
},
"CVE-2018-10883": {
"cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits",
"cmt_id": "2cd33a53177ce739fe5f68052b2a737f1c40b425"
}
},
"4.4.141": {
"CVE-2018-13405": {
"cmt_msg": "Fix up non-directory creation in SGID directories",
"cmt_id": "e71dbad7563db674f91af9e12ef592c107d0c2cd"
},
"CVE-2018-16276": {
"cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler",
"cmt_id": "2638a67a0c50a97e0564491325c24c2c12083dbb"
}
},
"4.4.143": {
"CVE-2017-18216": {
"cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent",
"cmt_id": "b9e22bd82856a794986d75bb3bb585b8bfbf4d99"
}
},
"4.4.144": {
"CVE-2017-5754": {
"cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control",
"cmt_id": "7169b43e7c68edd550efa812c295685947ffa8a0"
},
"CVE-2018-3639": {
"cmt_msg": "x86/nospec: Simplify alternative_msr_write()",
"cmt_id": "b2dab2dc776cea8e1f190523456b32b850506ce3"
},
"CVE-2018-10902": {
"cmt_msg": "ALSA: rawmidi: Change resized buffers atomically",
"cmt_id": "01b6ca65e10f2669965fbc62440cb9b09a25d086"
}
},
"4.4.146": {
"CVE-2018-14734": {
"cmt_msg": "infiniband: fix a possible use-after-free bug",
"cmt_id": "52175c849bd4c01dd14038b4401d5044d99a6b0a"
}
},
"4.4.147": {
"CVE-2018-12233": {
"cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size",
"cmt_id": "0749d5b3ec62310b747751ea7d4d5ccca51bc80f"
}
},
"4.4.148": {
"CVE-2018-15572": {
"cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB",
"cmt_id": "7744abbe29a59db367f59b0c9890356732f25a3b"
}
},
"4.4.149": {
"CVE-2018-9363": {
"cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report",
"cmt_id": "17c1e0b1f6a161cc4f533d4869ff574273dbfe8d"
}
},
"4.4.152": {
"CVE-2018-3693": {
"cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()",
"cmt_id": "a89f83823b97b6da1ecf7a51184b28822e78cc07"
}
},
"4.4.154": {
"CVE-2018-10938": {
"cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop",
"cmt_id": "8ed0ff83f5fd0ca412a52bd71af332598c01ca46"
},
"CVE-2018-16658": {
"cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status",
"cmt_id": "eb08a285899df82056f712421988c6ccd0b58ba6"
}
},
"4.4.155": {
"CVE-2019-12881": {
"cmt_msg": "drm/i915/userptr: reject zero user_size",
"cmt_id": "182e963432d867384f2e55487ec60ca7a9f99cd1"
}
},
"4.4.156": {
"CVE-2018-6554": {
"cmt_msg": "staging: irda: remove the irda network stack and drivers",
"cmt_id": "4a7811bb3ae10d76d9e76c2b0ce7b27bc02a9370"
},
"CVE-2018-6555": {
"cmt_msg": "staging: irda: remove the irda network stack and drivers",
"cmt_id": "131a3b82c853483b1809cad06f8997421dd49500"
},
"CVE-2018-14617": {
"cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()",
"cmt_id": "fed5bd3352a3fbf9494449ffee3b4bab5e8cc3a6"
},
"CVE-2018-14609": {
"cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized",
"cmt_id": "510825b3f8c1f5dc29b81660e1eb68e7fb0b8d50"
}
},
"4.4.157": {
"CVE-2018-17182": {
"cmt_msg": "mm: get rid of vmacache_flush_all() entirely",
"cmt_id": "88d6918401a4ecdc50fe77df3e1e77c1e49d8579"
}
},
"4.4.159": {
"CVE-2018-20511": {
"cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT",
"cmt_id": "fee0d234419708192925c9e25a461f1f43dab24f"
},
"CVE-2018-14633": {
"cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation",
"cmt_id": "afba6121b3b7e1737b7e7dafbf6b7eafbcdc659c"
}
},
"4.4.160": {
"CVE-2018-17972": {
"cmt_msg": "proc: restrict kernel stack dumps to root",
"cmt_id": "574757073482f77ec10caea5e57726190a2837fa"
},
"CVE-2019-9458": {
"cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed",
"cmt_id": "bbbc4dabca5d51c608b0fd608eb3cd8659266653"
},
"CVE-2018-7755": {
"cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl",
"cmt_id": "ef0a9f76fda4a7ffce6ceee5abdd554a719e8bd8"
},
"CVE-2018-13053": {
"cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep",
"cmt_id": "2e17841715313cab2464b3b6360a289a1cb2744b"
},
"CVE-2018-18021": {
"cmt_msg": "arm64: KVM: Tighten guest core register access from userspace",
"cmt_id": "14a65511bc7c1eec560764fe53018b0765fb8d2d"
},
"CVE-2018-10880": {
"cmt_msg": "ext4: never move the system.data xattr out of the inode body",
"cmt_id": "cd3d6463759d21f4093d3434effacc358dd0caf8"
}
},
"4.4.163": {
"CVE-2018-18281": {
"cmt_msg": "mremap: properly flush TLB before releasing the page",
"cmt_id": "2e3ae534fb98c7a6a5cf3e80a190181154328f80"
}
},
"4.4.164": {
"CVE-2018-18710": {
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.",
"cmt_id": "661aa0b46dfb23700b569ac319b95e0b0154832f"
}
},
"4.4.167": {
"CVE-2019-2024": {
"cmt_msg": "media: em28xx: Fix use-after-free when disconnecting",
"cmt_id": "4de120cba4ed4ef009edb2b17b2fa21b679b00b2"
},
"CVE-2018-19824": {
"cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c",
"cmt_id": "82fa3e95432f95254fd07556c55b1018145e1439"
},
"CVE-2018-16862": {
"cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation",
"cmt_id": "78b572c9e3a1b7edf46da17ad96a86110dd65fe8"
},
"CVE-2018-20169": {
"cmt_msg": "USB: check usb_get_extra_descriptor for proper size",
"cmt_id": "c380600bf71c35dc23aa0c3628a1013ec10cb349"
}
},
"4.4.168": {
"CVE-2018-1120": {
"cmt_msg": "proc: do not access cmdline nor environ from file-backed areas",
"cmt_id": "adc143b97d06a3305707726e69b4247db050cb88"
},
"CVE-2018-5953": {
"cmt_msg": "printk: hash addresses printed with %p",
"cmt_id": "c873dfa0ccbdb08e9fb42f497503e148f79cdebb"
},
"CVE-2018-5848": {
"cmt_msg": "wil6210: missing length check in wmi_set_ie",
"cmt_id": "e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a"
},
"CVE-2018-12896": {
"cmt_msg": "posix-timers: Sanitize overrun handling",
"cmt_id": "954648ebf8e27fcbf23b7954b79a22a5cacc83b1"
}
},
"4.4.169": {
"CVE-2017-18241": {
"cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control",
"cmt_id": "0fd7726d69afb0b61817f8d51e80f385cbfb2b10"
}
},
"4.4.170": {
"CVE-2019-15927": {
"cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()",
"cmt_id": "a5e09a908ea3c64bf522822b7923d2d8fc1a7af2"
},
"CVE-2019-6133": {
"cmt_msg": "fork: record start_time late",
"cmt_id": "d447cf0ceefa01ee9203145d011eedca6e1194e6"
},
"CVE-2018-19985": {
"cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data",
"cmt_id": "8846b1dbfd2146b145d73ba31a4caa4a4789aefb"
}
},
"4.4.171": {
"CVE-2018-16884": {
"cmt_msg": "sunrpc: use-after-free in svc_process_common()",
"cmt_id": "9615b6aeccbfb233fd672107aa6885bf039c3de3"
},
"CVE-2018-14611": {
"cmt_msg": "btrfs: validate type when reading a chunk",
"cmt_id": "50962a7b4877f26d1f3f49cd77ad1814a9e81bac"
},
"CVE-2018-14610": {
"cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time",
"cmt_id": "ee5e37a26791f9c842b3298e594c6e3c93bb1355"
},
"CVE-2018-14613": {
"cmt_msg": "btrfs: tree-checker: Verify block_group_item",
"cmt_id": "ae94efaf2b609e811bce6280d5c88cf557cd1238"
},
"CVE-2018-14612": {
"cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees",
"cmt_id": "42d263820480ab1f7eba54590f2c7283b3428723"
}
},
"4.4.172": {
"CVE-2018-14616": {
"cmt_msg": "f2fs: fix to do sanity check with block address in main area v2",
"cmt_id": "4901e126b6e1677c90d3c0a668193e52ecdd4971"
},
"CVE-2018-13096": {
"cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks",
"cmt_id": "cbe5e5cd70c0f6fd187114e7f146f29830fedf9c"
},
"CVE-2018-13097": {
"cmt_msg": "f2fs: fix to do sanity check with user_block_count",
"cmt_id": "b31ccde086671b372957e1fe1c60968e6d7464d7"
},
"CVE-2018-14614": {
"cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum",
"cmt_id": "98beb84af7212a2ba50370497e569ae3f61b1c8b"
},
"CVE-2018-13099": {
"cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode",
"cmt_id": "3bfe2049c222b23342ff2a216cd5a869e8a14897"
},
"CVE-2018-13100": {
"cmt_msg": "f2fs: fix to do sanity check with secs_per_zone",
"cmt_id": "056120a8c192871c558e742f83ae18bf8721d97c"
},
"CVE-2019-3701": {
"cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification",
"cmt_id": "693ae291197429f404e7d9c191e1541f61925278"
},
"CVE-2018-18690": {
"cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE",
"cmt_id": "f00ebf4f84ed2e9344743d86e274ff77269df02a"
},
"CVE-2017-18249": {
"cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer",
"cmt_id": "a4f4f97573bfb057bbc30696d803cc37ed629d02"
},
"CVE-2020-10769": {
"cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len",
"cmt_id": "461652efc1545a1a074bf0df826dcd3bce520db4"
}
},
"4.4.174": {
"CVE-2018-5391": {
"cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.",
"cmt_id": "ef0f963de1d2c5bc99d3d6ace3dd44a7d6002717"
}
},
"4.4.175": {
"CVE-2019-7222": {
"cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)",
"cmt_id": "1b5fd913a4eb07cb13e969bb8e3b1633a40e683f"
},
"CVE-2019-7221": {
"cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)",
"cmt_id": "9872ddae1949b46d5310e0e71ca26bb5c4e52a70"
}
},
"4.4.176": {
"CVE-2019-6974": {
"cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)",
"cmt_id": "bc4db52485cc6edfd6861417d178bb71f743ced7"
}
},
"4.4.177": {
"CVE-2019-16995": {
"cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()",
"cmt_id": "453e3b319d28f2023d45073e6eb30c5efa2fd06b"
},
"CVE-2019-9455": {
"cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()",
"cmt_id": "7b5115689bf9dafc5127b28ace4589f698d4adfa"
},
"CVE-2019-2101": {
"cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow",
"cmt_id": "bba078c9fc3c7e44370f870d97c5eed64f6c5d1f"
},
"CVE-2019-16413": {
"cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit",
"cmt_id": "f289ac1f6eb2d024793732ddb629595ab85674b7"
},
"CVE-2019-12818": {
"cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails",
"cmt_id": "6e7339d5ee302fcbfe8ef29c058cc85c360849b9"
},
"CVE-2019-12819": {
"cmt_msg": "mdio_bus: Fix use-after-free on device_register fails",
"cmt_id": "a1b4ace43842791d908a8837304031e439c2ea39"
},
"CVE-2019-15916": {
"cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject",
"cmt_id": "d28a029290fd80e9fb40850eb6eb2b7281f1f007"
},
"CVE-2019-9213": {
"cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()",
"cmt_id": "40952b6a649b9bfad11ae4fa2862fa0108c9ec24"
}
},
"4.4.178": {
"CVE-2019-3459": {
"cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer",
"cmt_id": "ade4560e4fea198866e033fe1c02f063d6d7db2e"
},
"CVE-2019-20054": {
"cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links",
"cmt_id": "6271fa6fc366827c0249864157e8fd18c4eac68a"
},
"CVE-2019-3460": {
"cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt",
"cmt_id": "d22036003893cbe479404e20fdae10addc6c18dd"
}
},
"4.4.179": {
"CVE-2019-9454": {
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA",
"cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425"
},
"CVE-2019-11486": {
"cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN",
"cmt_id": "c3e76f072adbcc426fbeef5d7469f847a2f700d6"
},
"CVE-2019-15214": {
"cmt_msg": "ALSA: core: Fix card races between register and disconnect",
"cmt_id": "f94135f92d97d85444691bcc4f79784d995a5458"
},
"CVE-2017-18551": {
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA",
"cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425"
},
"CVE-2019-15292": {
"cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit",
"cmt_id": "d49a75f5add4543eb138fb0a8fe0560fb276352e"
},
"CVE-2019-11190": {
"cmt_msg": "binfmt_elf: switch to new creds when switching to new mm",
"cmt_id": "1eb40df35d99f353e7bdfcbb21f249428ec0f4b6"
},
"CVE-2019-11810": {
"cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed",
"cmt_id": "09a6db51dcb41990fe020e45af8b2e44010fc1e7"
},
"CVE-2019-11815": {
"cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().",
"cmt_id": "c4e97b06cfdc5213494c22dd5c2b41ff8b15e0ee"
},
"CVE-2019-10639": {
"cmt_msg": "netns: provide pure entropy for net_hash_mix()",
"cmt_id": "0ede14314f6d9e6a172eb4c4b6b9fe5477aa70bc"
}
},
"4.4.180": {
"CVE-2018-20836": {
"cmt_msg": "scsi: libsas: fix a race condition when smp task timeout",
"cmt_id": "fe3f6511c9af47847e3547c1525de290a3d908eb"
},
"CVE-2019-3882": {
"cmt_msg": "vfio/type1: Limit DMA mappings per container",
"cmt_id": "e1a5cdbf7cb32a168d37a4804379b9b70d31b39b"
},
"CVE-2019-11884": {
"cmt_msg": "Bluetooth: hidp: fix buffer overflow",
"cmt_id": "dd150bcc93ffaa80ca67d5a71d7850fffe5eb549"
},
"CVE-2019-10142": {
"cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl",
"cmt_id": "9db489ed49711d1575f631b68aaa911d3b6198f9"
},
"CVE-2019-15216": {
"cmt_msg": "USB: yurex: Fix protection fault after device removal",
"cmt_id": "438b075fc77d63472892df735fe2a27d3f23dcbf"
}
},
"4.4.181": {
"CVE-2020-10720": {
"cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()",
"cmt_id": "4f9c73aa293051359ef1f2f6d816895ab50c9f3e"
},
"CVE-2018-20510": {
"cmt_msg": "binder: replace \"%p\" with \"%pK\"",
"cmt_id": "c53c1a821d62eb8476425ebe79c0c0054ab45315"
},
"CVE-2019-15219": {
"cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe",
"cmt_id": "30e66d7d2fb978f7b59fbf6106bdc1092acbb7ef"
},
"CVE-2019-15218": {
"cmt_msg": "media: usb: siano: Fix general protection fault in smsusb",
"cmt_id": "b1782be70e1e281216f58ba283a0e55ad6364aaf"
},
"CVE-2019-15666": {
"cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink",
"cmt_id": "86040d722b29976dfef0ef2b68eab832c358d04b"
},
"CVE-2019-15212": {
"cmt_msg": "USB: rio500: refuse more than one device at a time",
"cmt_id": "b92be99a0c8b2c1c66fe37f1fb21ef069c7732f1"
},
"CVE-2019-9466": {
"cmt_msg": "brcmfmac: add subtype check for event handling in data path",
"cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5"
},
"CVE-2019-11833": {
"cmt_msg": "ext4: zero out the unused memory region in the extent tree block",
"cmt_id": "98529ecd313bbeff006930056dad26529510054f"
},
"CVE-2019-9503": {
"cmt_msg": "brcmfmac: add subtype check for event handling in data path",
"cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5"
},
"CVE-2018-1000026": {
"cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware",
"cmt_id": "c55a2cffa5caaf72db415558f8058f995578a773"
},
"CVE-2019-19966": {
"cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit",
"cmt_id": "a04e71a0dbc62083bd31ae4d252d2c07a0035e4a"
}
},
"4.4.182": {
"CVE-2019-11479": {
"cmt_msg": "tcp: add tcp_min_snd_mss sysctl",
"cmt_id": "e757d052f3b8ce739d068a1e890643376c16b7a9"
},
"CVE-2019-11478": {
"cmt_msg": "tcp: tcp_fragment() should apply sane memory limits",
"cmt_id": "ad472d3a9483abc155e1644ad740cd8c039b5170"
},
"CVE-2019-11477": {
"cmt_msg": "tcp: limit payload size of sacked skbs",
"cmt_id": "4657ee0fe05e15ab572b157f13a82e080d4b7d73"
}
},
"4.4.183": {
"CVE-2019-11599": {
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
"cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85"
},
"CVE-2019-3892": {
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
"cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85"
},
"CVE-2019-15807": {
"cmt_msg": "scsi: libsas: delete sas port if expander discover failed",
"cmt_id": "39c7c903c63db10c99b1083ea9a688f63fb2c4a7"
}
},
"4.4.185": {
"CVE-2019-13272": {
"cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME",
"cmt_id": "54562d2b0be5c120b01c8bb94baef1aca37fd329"
},
"CVE-2018-16597": {
"cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes",
"cmt_id": "b24be4acd17a8963a29b2a92e1d80b9ddf759c95"
},
"CVE-2019-0136": {
"cmt_msg": "mac80211: drop robust management frames from unknown TA",
"cmt_id": "c7c680979b503a1bb64ee26ffa34207f886090ab"
},
"CVE-2019-9506": {
"cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check",
"cmt_id": "993699d9de09097e2bfd49100b8904774e5304fb"
}
},
"4.4.186": {
"CVE-2019-10126": {
"cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()",
"cmt_id": "3a611df229a90247c9a5159d136c60f4008c29a2"
},
"CVE-2019-3846": {
"cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor",
"cmt_id": "5d43b417e60ab25984fc7c41175f3ce8cee992bd"
}
},
"4.4.187": {
"CVE-2019-13631": {
"cmt_msg": "Input: gtco - bounds check collection indent level",
"cmt_id": "3ca20e950203a6c7759186ec4e89cbd33ee2bf81"
},
"CVE-2019-20934": {
"cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers",
"cmt_id": "da358f365dab8fea00c6254621e2cfb2fd817d01"
},
"CVE-2019-15211": {
"cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc",
"cmt_id": "56ea214b175643476a7f2979118c2ac560f29b3f"
},
"CVE-2019-10207": {
"cmt_msg": "Bluetooth: hci_uart: check for missing tty operations",
"cmt_id": "37fb924139954a28a1f04959070c3cc762b0de4c"
},
"CVE-2019-15215": {
"cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect",
"cmt_id": "63a80df0ea2b94813f60e8372f9ee93856bcfd5b"
},
"CVE-2019-15926": {
"cmt_msg": "ath6kl: add some bounds checking",
"cmt_id": "c1e1288d2e61727c1a9b9f28d0cf61da592a76bc"
},
"CVE-2017-18509": {
"cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt",
"cmt_id": "ee2f25641633ffb03fb88e4fa8a6424d24d3f295"
},
"CVE-2019-15239": {
"cmt_msg": "unknown",
"cmt_id": "8f0b77b71f3fec09f86f80cd98c36a1a35109499"
},
"CVE-2019-14284": {
"cmt_msg": "floppy: fix div-by-zero in setup_format_params",
"cmt_id": "26d6284d5d392bd96c414f745bcbf3620e93c8fd"
},
"CVE-2019-14283": {
"cmt_msg": "floppy: fix out-of-bounds read in copy_buffer",
"cmt_id": "d105eaf5fb67a193df8fe72e64690c43e343a560"
},
"CVE-2019-13648": {
"cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM",
"cmt_id": "e67fd28f9ed887d0c8124bda96b66dab87823eac"
}
},
"4.4.189": {
"CVE-2018-20856": {
"cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case",
"cmt_id": "e6ea77dd5a6a72583453e8703583ce0ef538aea4"
},
"CVE-2019-1125": {
"cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations",
"cmt_id": "e3d8c979c49d6113566acf4b3002073979cd35c3"
}
},
"4.4.190": {
"CVE-2019-19536": {
"cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices",
"cmt_id": "abea9fa28b64d0a875cc3659002dc87b64836265"
},
"CVE-2019-19537": {
"cmt_msg": "USB: core: Fix races in character device registration and deregistraion",
"cmt_id": "8f67bc7c8da8622fddf4d29a2f422678dfbadf77"
},
"CVE-2019-19527": {
"cmt_msg": "HID: hiddev: do cleanup in failure of opening a device",
"cmt_id": "8e73f43b6772a262d1884511f694e0f90c3dfa68"
},
"CVE-2019-19535": {
"cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices",
"cmt_id": "67112944e756484c5d62529597a0181f846340d0"
},
"CVE-2018-20961": {
"cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi",
"cmt_id": "3dae85a803a265c65e6032cd68a13fb717d766d9"
},
"CVE-2019-19530": {
"cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough",
"cmt_id": "8fed007578dba671e131781360dd87c4683672e7"
},
"CVE-2019-19531": {
"cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete",
"cmt_id": "2ef494ad6274e963dc0fe64a8b405d22e0700e9b"
}
},
"4.4.191": {
"CVE-2019-3900": {
"cmt_msg": "vhost_net: fix possible infinite loop",
"cmt_id": "bb85b4cbd8f69cdea3a0caa9aa4edb1d4d7bc24f"
},
"CVE-2019-15902": {
"cmt_msg": "unknown",
"cmt_id": "61263fbe574b0b74c50552983bdcc2bb9a409b1e"
},
"CVE-2019-15118": {
"cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term",
"cmt_id": "735a16d1afc01320392669f4ea64c84d435faf1c"
},
"CVE-2016-10906": {
"cmt_msg": "net: arc_emac: fix koops caused by sk_buff free",
"cmt_id": "b31c9932f84ce06b08735884ae7e19eca2b6c80a"
},
"CVE-2016-10905": {
"cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree",
"cmt_id": "d61e517e39149bff6be936c922f47af99d54509a"
},
"CVE-2019-10638": {
"cmt_msg": "inet: switch IP ID generator to siphash",
"cmt_id": "66f8c5ff8ed3d99dd21d8f24aac89410de7a4a05"
},
"CVE-2019-15117": {
"cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit",
"cmt_id": "a485888b5189845f0b6c58ae89661a402a80402a"
}
},
"4.4.193": {
"CVE-2019-14835": {
"cmt_msg": "vhost: make sure log_num < in_num",
"cmt_id": "35b29a78cc9b2523f6b0c080e6b44d2eeb367023"
}
},
"4.4.194": {
"CVE-2019-14816": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2"
},
"CVE-2019-14814": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2"
},
"CVE-2019-15505": {
"cmt_msg": "media: technisat-usb2: break out of loop at end of buffer",
"cmt_id": "db38be77199f16dd23d1504a9dfddf7e4479652a"
},
"CVE-2019-14821": {
"cmt_msg": "KVM: coalesced_mmio: add bounds checking",
"cmt_id": "ae41539657ce0a4e9f4588e89e5e19a8b8f11928"
}
},
"4.4.195": {
"CVE-2019-19533": {
"cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()",
"cmt_id": "b54d1e51bba72256f977912b6b4197bd1494c72e"
},
"CVE-2019-17053": {
"cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "a279cd311c1e3870de25fe48e948487b4785e9cd"
},
"CVE-2019-17052": {
"cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "c15d89b5cb86dfcdee536d093ece512091ed6e5c"
},
"CVE-2019-17054": {
"cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "ec1e04b8979464990e000850d14d3e562999a82d"
},
"CVE-2019-17056": {
"cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "001ff467264f3e51c8bb18de5cbe62e91d05cfc5"
},
"CVE-2019-17055": {
"cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "a03818269bfbc2ff6d25e3e44eb2247df53648ca"
},
"CVE-2019-18680": {
"cmt_msg": "unknown",
"cmt_id": "91573ae4aed0a49660abdad4d42f2a0db995ee5e"
}
},
"4.4.196": {
"CVE-2019-2215": {
"cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.",
"cmt_id": "80eb98a4ee70428d5b4b7202195a916385a76809"
},
"CVE-2020-0030": {
"cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.",
"cmt_id": "fcf46dcedbc419633771e16bfdf97a528f4d7dab"
},
"CVE-2019-18806": {
"cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers",
"cmt_id": "a35f1bb8c300a46c194bb5154ee8fc040c5ae392"
}
},
"4.4.197": {
"CVE-2019-19525": {
"cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect",
"cmt_id": "1fb673245b24832acb411db7ffe207fb470559ab"
},
"CVE-2019-16746": {
"cmt_msg": "nl80211: validate beacon head",
"cmt_id": "fd27e0779cf62f72bd8242d003d30742d11e451e"
},
"CVE-2018-20976": {
"cmt_msg": "xfs: clear sb->s_fs_info on mount failure",
"cmt_id": "748edae843c30f41fdcb320f1a8335bc2238b961"
},
"CVE-2019-19523": {
"cmt_msg": "USB: adutux: fix use-after-free on disconnect",
"cmt_id": "cd3cfbafe8eb9761950873c04c0147b40a85d29f"
},
"CVE-2019-19528": {
"cmt_msg": "USB: iowarrior: fix use-after-free on disconnect",
"cmt_id": "f723d7ea08e2c69ac9ecd87828c650745270fb98"
}
},
"4.4.198": {
"CVE-2019-17075": {
"cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack",
"cmt_id": "3cd0698561d3e9dcb7c969077932e072fbb4689e"
},
"CVE-2019-17133": {
"cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs",
"cmt_id": "3ca40f2f6015580caf11a4fd23503ea7529ed861"
}
},
"4.4.199": {
"CVE-2020-10773": {
"cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()",
"cmt_id": "1cdb53607683a4fa8625a3f3eb65e5d9f4572166"
},
"CVE-2019-17666": {
"cmt_msg": "rtlwifi: Fix potential overflow on P2P code",
"cmt_id": "3da8d0e777fa8a0934a288b115373cf12d7800f8"
},
"CVE-2019-19532": {
"cmt_msg": "HID: Fix assumption that devices have inputs",
"cmt_id": "2be873faad369e0b6b70761506995fd2d4cb0257"
},
"CVE-2019-15098": {
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()",
"cmt_id": "d7619be74f341630989c7edfd21a9ed8f51ab2d1"
}
},
"4.4.200": {
"CVE-2019-18282": {
"cmt_msg": "net/flow_dissector: switch to siphash",
"cmt_id": "491cd03f3b44f58f346ec15e2fc958d0def7b5a7"
},
"CVE-2019-19049": {
"cmt_msg": "of: unittest: fix memory leak in unittest_data_add",
"cmt_id": "265c6b8ab54cf46ac4e3c768f2be1489dc13a494"
}
},
"4.4.201": {
"CVE-2019-19534": {
"cmt_msg": "can: peak_usb: fix slab info leak",
"cmt_id": "1afef2b7a5d8d97cee332aee1c4d5a96597c223d"
},
"CVE-2019-0155": {
"cmt_msg": "drm/i915: Rename gen7 cmdparser tables",
"cmt_id": "e5e3c0154c19f2d8213e0af88b7a10d9de7fbafd"
},
"CVE-2019-0154": {
"cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs",
"cmt_id": "1433b8d41b1aa346e100b839c19fc033871ac5a6"
},
"CVE-2019-19052": {
"cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak",
"cmt_id": "7f18860337d74fdf79e7152bee7117d945ff6945"
}
},
"4.4.202": {
"CVE-2019-11135": {
"cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR",
"cmt_id": "124635392ef394772850172bd5370e62cfe781b4"
}
},
"4.4.203": {
"CVE-2019-19524": {
"cmt_msg": "Input: ff-memless - kill timer in destroy()",
"cmt_id": "af618124c69794bf215bf8cefb67890f95246ef8"
},
"CVE-2019-15917": {
"cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()",
"cmt_id": "29d9c5714096a47ed8d2a1632e382c949b089563"
}
},
"4.4.204": {
"CVE-2019-18660": {
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch",
"cmt_id": "3a79351beb549634c217570a5a8e500b8f466ad0"
},
"CVE-2019-15291": {
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking",
"cmt_id": "89660684ceca03bcaf5d1637709a4875e98387c6"
},
"CVE-2019-18683": {
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop",
"cmt_id": "7f8286d2b526a86d9bbdf20690b4245d0ea1fac3"
}
},
"4.4.206": {
"CVE-2019-12614": {
"cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()",
"cmt_id": "27cb5fbc84ed4d97a4bbcab04fb186705bac303e"
}
},
"4.4.207": {
"CVE-2019-19227": {
"cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client",
"cmt_id": "7ae3525ee708f867a2d2321c246b285136cdbed8"
},
"CVE-2019-19062": {
"cmt_msg": "crypto: user - fix memory leak in crypto_report",
"cmt_id": "5020350fb0012816ee35f7b744ded18bb75ecc1e"
},
"CVE-2019-19332": {
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)",
"cmt_id": "385bddaf5ee11acdf8d823ecc429c675b5416ac2"
}
},
"4.4.208": {
"CVE-2019-19057": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring",
"cmt_id": "4a6cf20ca09434486bfbfc742c960157c23c931d"
},
"CVE-2019-19063": {
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe",
"cmt_id": "ca4fb6974bb645ebf3352f5bba7699db4b44b75f"
},
"CVE-2019-20812": {
"cmt_msg": "af_packet: set defaule value for tmo",
"cmt_id": "b424ed744453c1b0ce0e67f2e64e7719725f65a3"
},
"CVE-2019-19447": {
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely",
"cmt_id": "0a5a9d02428d4e8c181413a51f7bcf0d7080dbf3"
}
},
"4.4.209": {
"CVE-2019-19965": {
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected",
"cmt_id": "8febe765539fbcc7d47e4e2ad44a0bcb2adbf02b"
}
},
"4.4.210": {
"CVE-2019-14895": {
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()",
"cmt_id": "d1bd8bd7e5ebda57580372d2b8b69182f9d8d113"
},
"CVE-2020-0305": {
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'",
"cmt_id": "3cce9309df73def742692ffddde05638b6eda6d9"
},
"CVE-2019-19066": {
"cmt_msg": "scsi: bfa: release allocated memory in case of error",
"cmt_id": "8c67bbd0754f8b35f28d8b5626c16d5721e9a8f7"
},
"CVE-2019-20636": {
"cmt_msg": "Input: add safety guards to input_set_keycode()",
"cmt_id": "68442780f2c223531de9d25104fd04e1bfdb583b"
},
"CVE-2019-19068": {
"cmt_msg": "rtl8xxxu: prevent leaking urb",
"cmt_id": "57d09152eef9e1afca04b2f7bebccd07e0efa881"
},
"CVE-2020-0431": {
"cmt_msg": "HID: hid-input: clear unmapped usages",
"cmt_id": "3be648c80db794a3bc1b22a1115071402a1f9803"
},
"CVE-2019-14615": {
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch",
"cmt_id": "e2546a83a7e291f412978cf6a580e43698c308bc"
},
"CVE-2019-19056": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf",
"cmt_id": "c858dc3c047e2962994d28acaccd52272558c9ff"
}
},
"4.4.211": {
"CVE-2019-17351": {
"cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free",
"cmt_id": "b39b4801d50956256711db83be28b9cff2620fda"
},
"CVE-2019-20096": {
"cmt_msg": "dccp: Fix memleak in __feat_register_sp",
"cmt_id": "a5c290ebb46d33f8700aab2edb996c9a0478b3b8"
},
"CVE-2019-15217": {
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap",
"cmt_id": "e6c986b15703eb2e0d59a3f79e99fd2aa6221b51"
},
"CVE-2018-21008": {
"cmt_msg": "rsi: add fix for crash during assertions",
"cmt_id": "80427a7b1195e7946992baffeb112b2635245198"
},
"CVE-2019-15220": {
"cmt_msg": "p54usb: Fix race between disconnect and firmware loading",
"cmt_id": "e2c48c1e6ef5e806b68ca685216dda05e5267be2"
},
"CVE-2019-15221": {
"cmt_msg": "ALSA: line6: Fix write on zero-sized buffer",
"cmt_id": "81b83ca3e45b83e632b8063cd27bdb072ecfc135"
},
"CVE-2020-12652": {
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl",
"cmt_id": "952fc03b38b8dca3923f3c61e3273c8f8ed2bd86"
},
"CVE-2019-5108": {
"cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization",
"cmt_id": "622c77a3addefa54d61205177635409de87a8a7c"
}
},
"4.4.212": {
"CVE-2019-14896": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f"
},
"CVE-2019-14897": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f"
},
"CVE-2020-14416": {
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU",
"cmt_id": "6169e11e1f14dd272ec9c746050820e5cc2cf853"
}
},
"4.4.213": {
"CVE-2020-0432": {
"cmt_msg": "staging: most: net: fix buffer overflow",
"cmt_id": "917c8fe39f4d42c3850b22d6a0bf3ffab1466d19"
}
},
"4.4.214": {
"CVE-2020-12653": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()",
"cmt_id": "4dd90d14f902074f18238dc104868debbd3cd250"
},
"CVE-2020-12654": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()",
"cmt_id": "91b836b01c788932d86a448d26561740d22e7c9b"
},
"CVE-2020-0404": {
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors",
"cmt_id": "f941047b5e5abd73be6c058a67a06533728c3422"
}
},
"4.4.215": {
"CVE-2020-9383": {
"cmt_msg": "floppy: check FDC index for errors before assigning it",
"cmt_id": "3dd989efdd97a42dc18e9bd653b16f0d84f45fc2"
},
"CVE-2020-2732": {
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode",
"cmt_id": "27021607e18ee2946cbbc74c19031ad966b9c883"
},
"CVE-2019-16233": {
"cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference",
"cmt_id": "d50a2a486d941417ca7abaebfe433a3af3c773fb"
},
"CVE-2020-0009": {
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped",
"cmt_id": "a349db843c640ad1fbab6625a7a4e9d4dd45f26a"
}
},
"4.4.216": {
"CVE-2020-8649": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4"
},
"CVE-2020-8648": {
"cmt_msg": "vt: selection, close sel_buffer race",
"cmt_id": "63f529ab35671d1c7433cb8283980289c8832bad"
},
"CVE-2019-11487": {
"cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get",
"cmt_id": "c326585619b99cce3240403faa56f599e06893cb"
},
"CVE-2020-8647": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4"
},
"CVE-2020-27068": {
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE",
"cmt_id": "bfb70b52540845bd1574de6f0e58fcc7907d8a07"
},
"CVE-2020-0444": {
"cmt_msg": "audit: fix error handling in audit_data_to_entry()",
"cmt_id": "c99bc56eba9e90c28d8bb42712b9b262d99df630"
},
"CVE-2019-16234": {
"cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation",
"cmt_id": "32b63f22e4c16aee095b2c116f0c7526b7fd3e66"
}
},
"4.4.217": {
"CVE-2019-14901": {
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()",
"cmt_id": "4ca9ed6965cc0b9ace3758355ff13d71b97bf008"
},
"CVE-2020-29370": {
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()",
"cmt_id": "3698fe758684cf3600a0aa91a5af3eba27722cfd"
}
},
"4.4.218": {
"CVE-2020-14381": {
"cmt_msg": "futex: Fix inode life-time issue",
"cmt_id": "24bbfe34bb44c036c3a0874bf74fc2387d5557bf"
},
"CVE-2020-11668": {
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks",
"cmt_id": "89fb5aa765cf8e47ac168810dd76afe37312dff2"
},
"CVE-2021-3715": {
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable",
"cmt_id": "7518af6464b47a0d775173570c3d25f699da2a5e"
},
"CVE-2020-10942": {
"cmt_msg": "vhost: Check docket sk_family instead of call getname",
"cmt_id": "79152052fbb703ff5f66778b3e585c69b95d83d2"
},
"CVE-2020-27066": {
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer",
"cmt_id": "0ac1dd7bb8f1b40f1bf494f6a27235a7a3b36350"
},
"CVE-2020-11608": {
"cmt_msg": "media: ov519: add missing endpoint sanity checks",
"cmt_id": "3de5ed1a64b96f0a482e2a325bcea38d51a2a1fd"
},
"CVE-2020-11609": {
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks",
"cmt_id": "eca73facbd01d15bd6f8c08c9c39d255a752e4b6"
}
},
"4.4.219": {
"CVE-2020-11494": {
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding",
"cmt_id": "f7dd0134a169df7dd9b68b6c135fe10629e66599"
},
"CVE-2020-0429": {
"cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()",
"cmt_id": "d845bf594d68d309a39ce8df72942e2b3fbbb176"
},
"CVE-2020-11565": {
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED",
"cmt_id": "4489253d0625c4841620160b2461925b695c651c"
}
},
"4.4.220": {
"CVE-2020-12826": {
"cmt_msg": "signal: Extend exec_id to 64bits",
"cmt_id": "6b9e27da8fc595e8abd4374c230d5b9404efac83"
}
},
"4.4.221": {
"CVE-2019-19319": {
"cmt_msg": "ext4: protect journal inode's blocks using block_validity",
"cmt_id": "7eff961ca9f364be255d279346517ba0158ec8e3"
},
"CVE-2020-12114": {
"cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount",
"cmt_id": "83354adbd7a967230bd23a547c5b695567ddba2c"
},
"CVE-2020-12464": {
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary",
"cmt_id": "f613d830fae7cbf8799378338d4df977f8667d5c"
}
},
"4.4.222": {
"CVE-2020-10751": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da"
},
"CVE-2020-0255": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da"
}
},
"4.4.224": {
"CVE-2020-10711": {
"cmt_msg": "netlabel: cope with NULL catmap",
"cmt_id": "b8ff52e4bdaabfee050ae4e8c721305a924a8633"
},
"CVE-2020-0433": {
"cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter",
"cmt_id": "fa9355afd5b07707e15a5f75b854f04a9c14a798"
},
"CVE-2020-1749": {
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup",
"cmt_id": "7c9d04e1c3ed58f60592329459d9ca7789442ff7"
},
"CVE-2020-27786": {
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses",
"cmt_id": "718eede1eeb602531e09191d3107eb849bbe64eb"
},
"CVE-2020-12769": {
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls",
"cmt_id": "3549e7aaa20947df2338305509c534c79c43e765"
},
"CVE-2020-10690": {
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev",
"cmt_id": "6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57"
},
"CVE-2020-13143": {
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC",
"cmt_id": "c18a8b0d7b8fdb299bcfab2feb9c0f410580794a"
},
"CVE-2019-19768": {
"cmt_msg": "blktrace: Protect q->blk_trace with RCU",
"cmt_id": "3d5d64aea941a45efda1bd02c0ec8dd57e8ce4ca"
},
"CVE-2020-12770": {
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write",
"cmt_id": "af9a86cc9f1acfc380e96a9beb59462f32a4b6c4"
}
},
"4.4.225": {
"CVE-2018-9517": {
"cmt_msg": "l2tp: pass tunnel pointer to ->session_create()",
"cmt_id": "3ca51032627e9bfea7d609f008461efdfdba1a5c"
},
"CVE-2021-0447": {
"cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU",
"cmt_id": "c2984681fe15cfb803a9132aaaf1140ab20a72c1"
},
"CVE-2020-27067": {
"cmt_msg": "l2tp: fix l2tp_eth module loading",
"cmt_id": "c30b34ce7944ec7026d4803cd51da2521df992a3"
}
},
"4.4.226": {
"CVE-2020-10732": {
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()",
"cmt_id": "2673a0cb646affc7ff66970cfc884d9e2223bc60"
}
},
"4.4.227": {
"CVE-2020-13974": {
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii",
"cmt_id": "dad0bf9ce93fa40b667eccd3306783f4db4b932b"
},
"CVE-2020-0543": {
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()",
"cmt_id": "4ebffa4b0a198d8671ee68742ba6d3f56164301f"
}
},
"4.4.228": {
"CVE-2019-20810": {
"cmt_msg": "media: go7007: fix a miss of snd_card_free",
"cmt_id": "ce7fcdd544fbc07a2c327d18b0712754cf1557d2"
},
"CVE-2020-10766": {
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown",
"cmt_id": "37368554eaf7815a3ef3c2cbbd242fc19d3cb32b"
},
"CVE-2020-10767": {
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.",
"cmt_id": "317b9c418ea38089a6d5c42fcaa9a545334838c3"
},
"CVE-2020-10768": {
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.",
"cmt_id": "7a5764e8990096fd08e8566b87df3c111bf5a736"
}
},
"4.4.229": {
"CVE-2020-12771": {
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce",
"cmt_id": "9517bec2c1ff8f223f8f2d28c743731e8f216bbe"
},
"CVE-2020-15436": {
"cmt_msg": "block: Fix use-after-free in blkdev_get()",
"cmt_id": "f9aa90e1b8aa2a133d4046223248ab61688445f5"
}
},
"4.4.230": {
"CVE-2020-15393": {
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect",
"cmt_id": "831eebad70a25f55b5745453ac252d4afe997187"
}
},
"4.4.232": {
"CVE-2020-15437": {
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()",
"cmt_id": "f5e7de4f4232154835f4c3d87e01350457340c16"
},
"CVE-2018-10323": {
"cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree",
"cmt_id": "f88efa4d6cb1fcacb9591979bacc6c57ec9d7c53"
}
},
"4.4.233": {
"CVE-2020-26088": {
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.",
"cmt_id": "de7c8ab8cb412d21ffdac94a99ef2f29f7802fd1"
},
"CVE-2019-19054": {
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe",
"cmt_id": "84c9c409286617385e71d4d0d0c9dd940b574469"
},
"CVE-2020-25212": {
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow",
"cmt_id": "db61fb8278925f54ccb0172471164aeb56ec6537"
},
"CVE-2019-9445": {
"cmt_msg": "f2fs: check if file namelen exceeds max value",
"cmt_id": "559eff3dca325947bc3d88d17f4c454111884be5"
},
"CVE-2018-13094": {
"cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp",
"cmt_id": "3d5eb8428488648c544e82e6b8b9fd391b107ed9"
},
"CVE-2018-8043": {
"cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()",
"cmt_id": "52e4b929c3bd6fac2a8cf4c2609d71486bde072c"
},
"CVE-2020-16166": {
"cmt_msg": "random32: update the net random state on interrupt and activity",
"cmt_id": "40713057d1d11fc86f0ed02383373281d87841a3"
},
"CVE-2020-36386": {
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()",
"cmt_id": "491602ede684bb8554254f12f4b1bd242dd15c61"
},
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling",
"cmt_id": "cd44c411a441d994b234605f51f0d1ee5740e353"
},
"CVE-2019-19448": {
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space",
"cmt_id": "b086fe8442d20dbd660812337f152ec868c64c0e"
},
"CVE-2019-19074": {
"cmt_msg": "ath9k: release allocated buffer if timed out",
"cmt_id": "94e3650b2568ae7a06e10c282f588ddede5df1d6"
},
"CVE-2019-19073": {
"cmt_msg": "ath9k_htc: release allocated buffer if timed out",
"cmt_id": "60fa3632210b1dc99296100227ae2d79ebbb4780"
}
},
"4.4.234": {
"CVE-2020-14314": {
"cmt_msg": "ext4: fix potential negative array index in do_split()",
"cmt_id": "059b1480105478c5f68cf664301545b8cad6a7cf"
},
"CVE-2020-29371": {
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()",
"cmt_id": "2935e0a3cec1ffa558eea90db6279cff83aa3592"
},
"CVE-2020-0466": {
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit",
"cmt_id": "d85e2b06662e7f46d0f174ecc603fc1c3554d5cf"
}
},
"4.4.236": {
"CVE-2020-25285": {
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers",
"cmt_id": "9c9757b4a2cd8039dddc01e8b589d9157f5d756a"
},
"CVE-2020-0465": {
"cmt_msg": "HID: core: Sanitize event code and type when mapping input",
"cmt_id": "de801a7d3228aed8ea2bbfe36ccf3af7f9ef6f39"
},
"CVE-2021-1048": {
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"",
"cmt_id": "6504c100804870911f074fd67f280756b6805958"
}
},
"4.4.237": {
"CVE-2020-25284": {
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping",
"cmt_id": "e349a5786f4c23eb11d1e7385703ddbf94f3f061"
},
"CVE-2020-14390": {
"cmt_msg": "fbcon: remove soft scrollback code",
"cmt_id": "1f08e80ec5751b8f565139cd7a921fbee46f8a22"
},
"CVE-2020-28097": {
"cmt_msg": "vgacon: remove software scrollback support",
"cmt_id": "5f76b4c6ac297ce836abe17f495123f45bfc4fb3"
}
},
"4.4.238": {
"CVE-2020-25643": {
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()",
"cmt_id": "a49ef91286776c3f095460112846cd85a063c29a"
},
"CVE-2021-0605": {
"cmt_msg": "af_key: pfkey_dump needs parameter validation",
"cmt_id": "831587619afe78cd72651b34a0f6ccb2acf3c503"
}
},
"4.4.239": {
"CVE-2020-25211": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641"
},
"CVE-2021-0448": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641"
},
"CVE-2021-39634": {
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done",
"cmt_id": "ea984dfe0e7978cd294eb6a640ac27fa1834ac8d"
},
"CVE-2020-28915": {
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()",
"cmt_id": "0e3e69e0a8bc516e37ee3b496779b60e660b5ea5"
}
},
"4.4.240": {
"CVE-2020-10135": {
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm",
"cmt_id": "554ab8c6e143606bb205c7d694656fac3d6e3cc2"
},
"CVE-2020-12352": {
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members",
"cmt_id": "e7b465bda9b90bec5427775bcbbfc47fe7a6012b"
}
},
"4.4.241": {
"CVE-2020-25705": {
"cmt_msg": "icmp: randomize the global rate limiter",
"cmt_id": "a9d0ba6aa7485aabed7b8f2ed5a3975684847e0b"
}
},
"4.4.242": {
"CVE-2020-28974": {
"cmt_msg": "vt: Disable KD_FONT_OP_COPY",
"cmt_id": "81f26642406c16bf52015683511c814ecbe2abc3"
},
"CVE-2020-25668": {
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed",
"cmt_id": "e847c4e2ccc80295338cc96136aec2877be82359"
},
"CVE-2020-25656": {
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers",
"cmt_id": "f4cfdf9b1487d3512da27a1a542b4c33a4737bca"
},
"CVE-2020-35508": {
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent",
"cmt_id": "33175e2d8fdf7b07be9691ee7747a3982dcf52cd"
}
},
"4.4.243": {
"CVE-2020-8694": {
"cmt_msg": "powercap: restrict energy meter to root access",
"cmt_id": "ed3691aa7e4ad0a987da49b9165a22255b39e9b7"
}
},
"4.4.244": {
"CVE-2020-14351": {
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function",
"cmt_id": "17b235e6cc9d701a2eece74a64f89062072b81b1"
},
"CVE-2020-25645": {
"cmt_msg": "geneve: add transport ports in route lookup for geneve",
"cmt_id": "e98bcb65299870dfa98d2067d423da80555188c4"
},
"CVE-2020-0427": {
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string",
"cmt_id": "03f69244302d7954f42f528ea2d45903ebbf59f3"
},
"CVE-2020-27673": {
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking",
"cmt_id": "33f38ccfe479fdb53bf0409e9b74e993e30d4d1f"
},
"CVE-2019-0148": {
"cmt_msg": "i40e: Wrong truncation from u16 to u8",
"cmt_id": "0f60ed1afff42f84dcba5a7950ee8712da8363d5"
},
"CVE-2020-27675": {
"cmt_msg": "xen/events: avoid removing an event channel while handling it",
"cmt_id": "c0e77192829a1a02983d672ac144e6196098cad7"
}
},
"4.4.245": {
"CVE-2018-13093": {
"cmt_msg": "xfs: validate cached inodes are free when allocated",
"cmt_id": "f17ef9beebc7c55c5a791aacdc5992880ea15d8c"
},
"CVE-2020-25669": {
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths",
"cmt_id": "640ede0a21a0b9bd68e47ccbca87fd747e38ea0a"
},
"CVE-2020-4788": {
"cmt_msg": "powerpc/64s: flush L1D on kernel entry",
"cmt_id": "4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6"
}
},
"4.4.247": {
"CVE-2019-19813": {
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference",
"cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385"
},
"CVE-2019-19816": {
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference",
"cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385"
}
},
"4.4.248": {
"CVE-2020-29661": {
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()",
"cmt_id": "30f7752609a8030862f4c7faed5c845e2aa300be"
},
"CVE-2020-29660": {
"cmt_msg": "tty: Fix ->session locking",
"cmt_id": "7b4a4b9403c52343d00901babc3987588bc0b085"
},
"CVE-2020-35519": {
"cmt_msg": "net/x25: prevent a couple of overflows",
"cmt_id": "3cb72fe7ac64d5f647dbefd94ce7b54f6b92ede9"
}
},
"4.4.249": {
"CVE-2020-27815": {
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree",
"cmt_id": "b01bec9ec3b196a8a33d0d68991c8a45c8c24551"
},
"CVE-2020-29568": {
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing",
"cmt_id": "de66402f45c0cae9566b1568cc1b2df2b5ccbbf8"
}
},
"4.4.250": {
"CVE-2020-36158": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start",
"cmt_id": "878ba6234c5827722d79767d39450340e228ce86"
}
},
"4.4.252": {
"CVE-2020-28374": {
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup",
"cmt_id": "87be50177ddb789330e6c5ddcc2f301cec0017dc"
}
},
"4.4.253": {
"CVE-2021-3178": {
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export",
"cmt_id": "c89b2b56fc536d4fd41745bcbf394aa21162e277"
}
},
"4.4.254": {
"CVE-2020-27825": {
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call",
"cmt_id": "a7c2dd4438056fb665a376860242463a30f2d2e8"
},
"CVE-2021-39657": {
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback",
"cmt_id": "a4cdbf4805bfed8f39e6b25f113588064d9a6ac5"
}
},
"4.4.258": {
"CVE-2021-26931": {
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()",
"cmt_id": "74e38b7a6972fd6983e6fbd929b65746ce975aed"
},
"CVE-2021-26930": {
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()",
"cmt_id": "2e6cc64b7b56e5c2d2c01de8ff1b3986342c2b18"
},
"CVE-2021-26932": {
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()",
"cmt_id": "15b6ca2cef13f06ef41d9ebc094ef7770fd98ab3"
}
},
"4.4.259": {
"CVE-2021-0512": {
"cmt_msg": "HID: make arrays usage and value to be the same",
"cmt_id": "795a8c31cabf1a452b0b63bb3f8d9159b353e5ce"
},
"CVE-2021-3612": {
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl",
"cmt_id": "ade5180681d778d36b569ad35cc175ab22196c5f"
}
},
"4.4.260": {
"CVE-2021-30002": {
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy",
"cmt_id": "432b08869893ebd751e815465b822bb99cf710e7"
},
"CVE-2021-27365": {
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE",
"cmt_id": "b8a757b57ba3e27d6399106a78350af513fb0bb5"
},
"CVE-2021-27364": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512"
},
"CVE-2021-27363": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512"
},
"CVE-2021-28038": {
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis",
"cmt_id": "f2c9673ce689801ef3bee517013b0c9b94dd14fa"
}
},
"4.4.262": {
"CVE-2019-19060": {
"cmt_msg": "iio: imu: adis16400: release allocated memory on failure",
"cmt_id": "00552ca5cae5e86311df6cfd5911213c89ece4e2"
},
"CVE-2019-19061": {
"cmt_msg": "iio: imu: adis16400: fix memory leak",
"cmt_id": "7671c44edfd0411c7411266f0c90dd21b535c3d4"
},
"CVE-2021-28660": {
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()",
"cmt_id": "36f8d0af46daf6eb4c7c5edf6adbfa02e9c70f92"
},
"CVE-2021-20261": {
"cmt_msg": "floppy: fix lock_fdc() signal handling",
"cmt_id": "b93c6b400ed51e526e724b430a115293fd147466"
},
"CVE-2021-29265": {
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf",
"cmt_id": "9ee196f307ec006cac386a0d8b7935dd2ccd0083"
},
"CVE-2019-16232": {
"cmt_msg": "libertas: fix a potential NULL pointer dereference",
"cmt_id": "3b431b60940fa2cda06d6b4906e11acd222d471a"
}
},
"4.4.263": {
"CVE-2021-28964": {
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root",
"cmt_id": "2922e2e894781c36ce014935f05163287635609c"
},
"CVE-2021-28972": {
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions",
"cmt_id": "4639466722c2ea832bc145c06cd5aa2012db9102"
}
},
"4.4.264": {
"CVE-2021-28688": {
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()",
"cmt_id": "47b6b2742ee60334c40d75bfaab49028688f1510"
}
},
"4.4.265": {
"CVE-2021-3483": {
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()",
"cmt_id": "63d8737a59ae58e5c2d5fd640c294e7b5bb1d394"
}
},
"4.4.266": {
"CVE-2021-29154": {
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64",
"cmt_id": "ca97582a3fe79543de8e5905e829c5ad3661a1ef"
}
},
"4.4.267": {
"CVE-2021-3659": {
"cmt_msg": "net: mac802154: Fix general protection fault",
"cmt_id": "cd19d85e6d4a361beb11431af3d22248190f5b48"
},
"CVE-2021-0937": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531"
},
"CVE-2020-25672": {
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()",
"cmt_id": "7ed6c0c7db2099792768150c070efca71e85bdf3"
},
"CVE-2020-25673": {
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()",
"cmt_id": "7f6c9e4314aa7d90b6261b8ae571d14c454ba964"
},
"CVE-2020-25670": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()",
"cmt_id": "a1cdd18c49d23ec38097ac2c5b0d761146fc0109"
},
"CVE-2020-25671": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()",
"cmt_id": "a524eabb5e309e49ee2d8422a771c5cedef003c4"
},
"CVE-2021-22555": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531"
}
},
"4.4.269": {
"CVE-2021-33034": {
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy",
"cmt_id": "b27a218d166b7f07cd5616fb90e727b6ed662b1a"
},
"CVE-2017-0605": {
"cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()",
"cmt_id": "150381302389fa01425396489a21dc7c53383a5b"
},
"CVE-2021-31916": {
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices",
"cmt_id": "0c0f93fbd20276d65ae0581edfcdc93579aa1dc7"
},
"CVE-2021-4157": {
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()",
"cmt_id": "0c5ccd5e2a2e291774618c24c459fa397fd1b7da"
}
},
"4.4.270": {
"CVE-2020-26558": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0"
},
"CVE-2021-0129": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0"
}
},
"4.4.271": {
"CVE-2020-24587": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8"
},
"CVE-2020-24586": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8"
},
"CVE-2021-34981": {
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails",
"cmt_id": "61a811e8f5229264b822361f8b23d7638fd8c914"
},
"CVE-2020-24588": {
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks",
"cmt_id": "daea7ff51861cec93ff7f561095d9048b673b51f"
},
"CVE-2020-26139": {
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames",
"cmt_id": "e3d4030498c304d7c36bccc6acdedacf55402387"
},
"CVE-2020-26147": {
"cmt_msg": "mac80211: assure all fragments are encrypted",
"cmt_id": "16cbc9756dd84e870867f003a200553931dd461b"
},
"CVE-2021-29650": {
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.",
"cmt_id": "9bc6c1246941cf88cf06a27153d6a1108a240067"
},
"CVE-2021-32399": {
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller",
"cmt_id": "a7dc1c981038bbd5f7379148d7fd8821d2a7b9ae"
}
},
"4.4.272": {
"CVE-2021-3564": {
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order",
"cmt_id": "054b0b4f9bf86baac0774e1ea38f4b65497089e5"
},
"CVE-2021-38208": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477"
},
"CVE-2021-3573": {
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object",
"cmt_id": "2260759b5300865dc209150e925aaeb9df758630"
},
"CVE-2021-3587": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477"
}
},
"4.4.274": {
"CVE-2021-34693": {
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head",
"cmt_id": "f638caa211e7a121a5596986d29ebbdaf9156398"
},
"CVE-2021-45486": {
"cmt_msg": "inet: use bigger hash table for IP ID generation",
"cmt_id": "8fb8c138b5d69128964e54e1b5ee49fc395f011c"
}
},
"4.4.276": {
"CVE-2021-38160": {
"cmt_msg": "virtio_console: Assure used length from device is limited",
"cmt_id": "187f14fb88a9e62d55924748a274816fe6f34de6"
},
"CVE-2021-3609": {
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()",
"cmt_id": "9c47fa9295ce58433cae4376240b738b126637d4"
},
"CVE-2021-45485": {
"cmt_msg": "ipv6: use prandom_u32() for ID generation",
"cmt_id": "c43fa9ee9f1de295474a28903607f84209d7e611"
},
"CVE-2022-0850": {
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header",
"cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9"
},
"CVE-2021-33909": {
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations",
"cmt_id": "3533e50cbee8ff086bfa04176ac42a01ee3db37d"
}
},
"4.4.277": {
"CVE-2021-38204": {
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory",
"cmt_id": "fc2a7c2280fa2be8ff9b5af702368fcd49a0acdb"
},
"CVE-2021-3679": {
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.",
"cmt_id": "afa091792525dfa6c3c854069ec6b8a5ccc62c11"
},
"CVE-2021-37576": {
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow",
"cmt_id": "1e90a673f6ee09c668fe01aa1b94924f972c9811"
}
},
"4.4.278": {
"CVE-2021-0920": {
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK",
"cmt_id": "72247f34d90e25c1493436e45e193e8306082b19"
},
"CVE-2021-21781": {
"cmt_msg": "ARM: ensure the signal page contains defined contents",
"cmt_id": "8db77dca7e1d1d1d6aa9334207ead57853832bb7"
}
},
"4.4.281": {
"CVE-2021-38205": {
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer",
"cmt_id": "3d4ba14fc5ffbe5712055af09a5c0cbab93c0f44"
},
"CVE-2021-3732": {
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed",
"cmt_id": "c6e8810d25295acb40a7b69ed3962ff181919571"
}
},
"4.4.282": {
"CVE-2021-3653": {
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)",
"cmt_id": "53723b7be26ef31ad642ce5ffa8b42dec16db40e"
},
"CVE-2021-42008": {
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data",
"cmt_id": "d66736076bd84742c18397785476e9a84d5b54ef"
}
},
"4.4.283": {
"CVE-2021-3753": {
"cmt_msg": "vt_kdsetmode: extend console locking",
"cmt_id": "01da584f08cbb1e04f22796cc49b10d570cd5ec1"
}
},
"4.4.284": {
"CVE-2021-40490": {
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing",
"cmt_id": "69d82df68fbc5e368820123200d7b88f6c058350"
},
"CVE-2020-3702": {
"cmt_msg": "ath: Use safer key clearing with key cache entries",
"cmt_id": "4d6b4335838fd89419212e1e486c415ec36fb610"
}
},
"4.4.285": {
"CVE-2021-20320": {
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions",
"cmt_id": "a738597a79e588bcf9817d4ec12740c99842db3b"
},
"CVE-2021-3655": {
"cmt_msg": "sctp: validate from_addr_param return",
"cmt_id": "c299c5925ab774b64ca6aba87fb8c497f5663780"
}
},
"4.4.288": {
"CVE-2021-4203": {
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses",
"cmt_id": "323f0968a81b082cf02ef15b447cd35e4328385e"
}
},
"4.4.289": {
"CVE-2020-29374": {
"cmt_msg": "gup: document and work around \"COW can break either way\" issue",
"cmt_id": "58facc9c7ae307be5ecffc1697552550fedb55bd"
}
},
"4.4.290": {
"CVE-2021-3896": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036"
},
"CVE-2021-20321": {
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()",
"cmt_id": "a4f281ffc1d128d7ea693cbc3a796e56e919fd7c"
},
"CVE-2021-3760": {
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object",
"cmt_id": "1d5e0107bfdbef6cc140fb5d7a1a817a40948528"
},
"CVE-2021-43389": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036"
}
},
"4.4.291": {
"CVE-2021-3772": {
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk",
"cmt_id": "629d2823abf957bcbcba32154f1f6fd49bdb850c"
}
},
"4.4.292": {
"CVE-2021-37159": {
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device",
"cmt_id": "cbefdf724282e6a948885f379dc92ab841c2fee0"
}
},
"4.4.293": {
"CVE-2021-4202": {
"cmt_msg": "NFC: reorganize the functions in nci_request",
"cmt_id": "6dc051117ba0e1dac9324593ff2c1c520f67ad21"
},
"CVE-2021-3752": {
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()",
"cmt_id": "88aed7d67197d155260f09078835290adfa1debd"
},
"CVE-2021-45868": {
"cmt_msg": "quota: check block number when reading the block in quota file",
"cmt_id": "7a40f3e53f5de1d6876df8a9e8025b50616b8818"
},
"CVE-2021-39686": {
"cmt_msg": "binder: use euid from cred instead of using task",
"cmt_id": "120ffcd83596fe94b6d6735d21349f118b60c936"
},
"CVE-2021-3640": {
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()",
"cmt_id": "f632f88fe209240f5cad853e33f74fda4d341004"
}
},
"4.4.294": {
"CVE-2021-4002": {
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare",
"cmt_id": "8a8ae093b52ba76b650b493848d67e7b526c8751"
},
"CVE-2021-4083": {
"cmt_msg": "fget: check that the fd still exists after getting a ref to it",
"cmt_id": "8afa4ef999191477506b396fae518338b8996fec"
}
},
"4.4.295": {
"CVE-2021-39698": {
"cmt_msg": "wait: add wake_up_pollfree()",
"cmt_id": "d0ceebaae0e406263b83462701b5645e075c1467"
},
"CVE-2021-39685": {
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests",
"cmt_id": "93cd7100fe471c5f76fb942358de4ed70dbcaf35"
}
},
"4.4.296": {
"CVE-2021-28715": {
"cmt_msg": "xen/netback: don't queue unlimited number of packages",
"cmt_id": "0928efb09178e01d3dc8e8849aa1c807436c3c37"
},
"CVE-2021-28713": {
"cmt_msg": "xen/console: harden hvc_xen against event channel storms",
"cmt_id": "c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027"
},
"CVE-2021-28712": {
"cmt_msg": "xen/netfront: harden netfront against event channel storms",
"cmt_id": "81900aa7d7a130dec4c55b68875e30fb8c9effec"
},
"CVE-2021-28711": {
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms",
"cmt_id": "3e04b9e6aa7d77287e70a400be83060d2b7b2cfe"
}
},
"4.4.297": {
"CVE-2022-1195": {
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD",
"cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6"
}
},
"4.4.299": {
"CVE-2021-45095": {
"cmt_msg": "phonet: refcount leak in pep_sock_accep",
"cmt_id": "172b3f506c24a61805b3910b9acfe7159d980b9b"
},
"CVE-2021-4155": {
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate",
"cmt_id": "56adcda55aa213e106224ff3d18ef4625e25f52b"
}
},
"4.4.300": {
"CVE-2021-43976": {
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()",
"cmt_id": "7d5e12e452771509d94db391a3b5e428325ed268"
}
},
"4.4.301": {
"CVE-2022-0330": {
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store",
"cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a"
}
},
"4.4.302": {
"CVE-2022-0617": {
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format",
"cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea"
}
},
"outstanding": {
"CVE-2020-36322": {
"cmt_msg": "fuse: fix bad inode"
},
"CVE-2020-26556": {
"cmt_msg": ""
},
"CVE-2020-26557": {
"cmt_msg": ""
},
"CVE-2020-26555": {
"cmt_msg": ""
},
"CVE-2019-20794": {
"cmt_msg": ""
},
"CVE-2020-26559": {
"cmt_msg": ""
},
"CVE-2020-35501": {
"cmt_msg": ""
},
"CVE-2021-0929": {
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
},
"CVE-2018-1128": {
"cmt_msg": "libceph: add authorizer challenge"
},
"CVE-2018-1129": {
"cmt_msg": "libceph: implement CEPHX_V2 calculation mode"
},
"CVE-2022-0001": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
},
"CVE-2022-29156": {
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
},
"CVE-2022-0002": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE"
},
"CVE-2018-20854": {
"cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read"
},
"CVE-2018-20855": {
"cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace"
},
"CVE-2019-19378": {
"cmt_msg": ""
},
"CVE-2022-1419": {
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
},
"CVE-2021-33098": {
"cmt_msg": "ixgbe: fix large MTU request from VF"
},
"CVE-2017-5753": {
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
},
"CVE-2022-0995": {
"cmt_msg": "watch_queue: Fix filter limit check"
},
"CVE-2020-26560": {
"cmt_msg": ""
},
"CVE-2022-0492": {
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent"
},
"CVE-2022-0998": {
"cmt_msg": "vdpa: clean up get_config_size ret value handling"
},
"CVE-2019-19377": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
},
"CVE-2019-2181": {
"cmt_msg": "binder: check for overflow when alloc for security context"
},
"CVE-2022-0644": {
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()"
},
"CVE-2020-27820": {
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
},
"CVE-2022-0854": {
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\""
},
"CVE-2020-24503": {
"cmt_msg": ""
},
"CVE-2020-24502": {
"cmt_msg": ""
},
"CVE-2020-0067": {
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr"
},
"CVE-2019-19449": {
"cmt_msg": "f2fs: fix to do sanity check on segment/section count"
},
"CVE-2022-0487": {
"cmt_msg": "moxart: fix potential use-after-free on remove path"
},
"CVE-2020-26140": {
"cmt_msg": ""
},
"CVE-2020-26541": {
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries"
},
"CVE-2020-11725": {
"cmt_msg": ""
},
"CVE-2021-20317": {
"cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer"
},
"CVE-2021-33061": {
"cmt_msg": "ixgbe: add improvement for MDD response functionality"
},
"CVE-2022-1263": {
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push"
},
"CVE-2022-1158": {
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
},
"CVE-2021-35477": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
},
"CVE-2019-15222": {
"cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check"
},
"CVE-2019-15223": {
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection"
},
"CVE-2017-18552": {
"cmt_msg": "RDS: validate the requested traces user input against max supported"
},
"CVE-2019-19815": {
"cmt_msg": "f2fs: support swap file w/ DIO"
},
"CVE-2019-19814": {
"cmt_msg": ""
},
"CVE-2022-27950": {
"cmt_msg": "HID: elo: fix memory leak in elo_probe"
},
"CVE-2022-1015": {
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
},
"CVE-2021-39648": {
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name"
},
"CVE-2022-1011": {
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io"
},
"CVE-2019-19241": {
"cmt_msg": "io_uring: async workers should inherit the user creds"
},
"CVE-2019-9453": {
"cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary"
},
"CVE-2021-43975": {
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait"
},
"CVE-2022-25636": {
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size"
},
"CVE-2017-1000405": {
"cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()"
},
"CVE-2016-8660": {
"cmt_msg": ""
},
"CVE-2019-12379": {
"cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c"
},
"CVE-2019-12378": {
"cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
},
"CVE-2022-23041": {
"cmt_msg": "xen/9p: use alloc/free_pages_exact()"
},
"CVE-2022-0494": {
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern"
},
"CVE-2021-0941": {
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len"
},
"CVE-2020-16120": {
"cmt_msg": "ovl: switch to mounter creds in readdir"
},
"CVE-2020-15802": {
"cmt_msg": ""
},
"CVE-2008-2544": {
"cmt_msg": ""
},
"CVE-2022-28796": {
"cmt_msg": "jbd2: fix use-after-free of transaction_t race"
},
"CVE-2021-39713": {
"cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock"
},
"CVE-2018-25020": {
"cmt_msg": "bpf: fix truncated jump targets on heavy expansions"
},
"CVE-2019-20908": {
"cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down"
},
"CVE-2018-7754": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2018-1121": {
"cmt_msg": ""
},
"CVE-2022-24448": {
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails"
},
"CVE-2018-3646": {
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled"
},
"CVE-2007-3719": {
"cmt_msg": ""
},
"CVE-2021-4037": {
"cmt_msg": "xfs: fix up non-directory creation in SGID directories"
},
"CVE-2021-22543": {
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages"
},
"CVE-2019-1999": {
"cmt_msg": "binder: fix race between munmap() and direct reclaim"
},
"CVE-2021-3506": {
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access"
},
"CVE-2020-0435": {
"cmt_msg": "f2fs: fix to do sanity check with i_extra_isize"
},
"CVE-2019-3874": {
"cmt_msg": "sctp: implement memory accounting on tx path"
},
"CVE-2020-26145": {
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe"
},
"CVE-2022-25265": {
"cmt_msg": ""
},
"CVE-2010-4563": {
"cmt_msg": ""
},
"CVE-2019-7308": {
"cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths"
},
"CVE-2020-26143": {
"cmt_msg": ""
},
"CVE-2020-26142": {
"cmt_msg": ""
},
"CVE-2022-28893": {
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()"
},
"CVE-2021-29155": {
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic"
},
"CVE-2017-9986": {
"cmt_msg": "sound: Retire OSS"
},
"CVE-2021-39711": {
"cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb"
},
"CVE-2021-34556": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
},
"CVE-2021-28714": {
"cmt_msg": "xen/netback: fix rx queue stall detection"
},
"CVE-2021-39714": {
"cmt_msg": "staging: android: ion: Drop ion_map_kernel interface"
},
"CVE-2017-18261": {
"cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled"
},
"CVE-2018-13095": {
"cmt_msg": "xfs: More robust inode extent count validation"
},
"CVE-2022-24958": {
"cmt_msg": "usb: gadget: don't release an existing dev->buf"
},
"CVE-2018-13098": {
"cmt_msg": "f2fs: fix to do sanity check with extra_attr feature"
},
"CVE-2021-38300": {
"cmt_msg": "bpf, mips: Validate conditional branch offsets"
},
"CVE-2021-3669": {
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
},
"CVE-2019-18885": {
"cmt_msg": "btrfs: merge btrfs_find_device and find_device"
},
"CVE-2022-23042": {
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()"
},
"CVE-2019-11091": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
},
"CVE-2021-0695": {
"cmt_msg": ""
},
"CVE-2015-8952": {
"cmt_msg": "ext2: convert to mbcache2"
},
"CVE-2017-13693": {
"cmt_msg": ""
},
"CVE-2021-0399": {
"cmt_msg": ""
},
"CVE-2021-38198": {
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page"
},
"CVE-2022-23039": {
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()"
},
"CVE-2017-13694": {
"cmt_msg": ""
},
"CVE-2020-36516": {
"cmt_msg": ""
},
"CVE-2022-23036": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
},
"CVE-2022-23037": {
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status"
},
"CVE-2021-4149": {
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error"
},
"CVE-2012-4542": {
"cmt_msg": ""
},
"CVE-2021-3894": {
"cmt_msg": "sctp: account stream padding length for reconf chunk"
},
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations"
},
"CVE-2022-1184": {
"cmt_msg": ""
},
"CVE-2013-7445": {
"cmt_msg": ""
},
"CVE-2019-19036": {
"cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations"
},
"CVE-2022-28390": {
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path"
},
"CVE-2018-12130": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
},
"CVE-2021-20292": {
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure."
},
"CVE-2017-8065": {
"cmt_msg": "crypto: ccm - move cbcmac input off the stack"
},
"CVE-2005-3660": {
"cmt_msg": ""
},
"CVE-2022-1508": {
"cmt_msg": "io_uring: reexpand under-reexpanded iters"
},
"CVE-2015-1350": {
"cmt_msg": "fs: Avoid premature clearing of capabilities"
},
"CVE-2020-11669": {
"cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle"
},
"CVE-2019-19922": {
"cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices"
},
"CVE-2019-19927": {
"cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
},
"CVE-2021-4023": {
"cmt_msg": "io-wq: fix cancellation on create-worker failure"
},
"CVE-2019-16921": {
"cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
},
"CVE-2021-4159": {
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()"
},
"CVE-2017-8797": {
"cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify"
},
"CVE-2017-5715": {
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
},
"CVE-2022-25258": {
"cmt_msg": "USB: gadget: validate interface OS descriptor requests"
},
"CVE-2019-20806": {
"cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame"
},
"CVE-2008-4609": {
"cmt_msg": ""
},
"CVE-2021-4150": {
"cmt_msg": "block: fix incorrect references to disk objects"
},
"CVE-2021-28951": {
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit"
},
"CVE-2020-14304": {
"cmt_msg": ""
},
"CVE-2020-14305": {
"cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers"
},
"CVE-2018-3620": {
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled"
},
"CVE-2020-27777": {
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace"
},
"CVE-2020-0347": {
"cmt_msg": ""
},
"CVE-2019-12615": {
"cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()"
},
"CVE-2021-3714": {
"cmt_msg": ""
},
"CVE-2022-27223": {
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc"
},
"CVE-2022-28388": {
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path"
},
"CVE-2019-16230": {
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)"
},
"CVE-2019-16231": {
"cmt_msg": "fjes: Handle workqueue allocation failure"
},
"CVE-2017-12168": {
"cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access"
},
"CVE-2017-18174": {
"cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration"
},
"CVE-2021-3892": {
"cmt_msg": ""
},
"CVE-2022-28356": {
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()"
},
"CVE-2021-4197": {
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks"
},
"CVE-2020-12362": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2020-12363": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2021-39636": {
"cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace"
},
"CVE-2022-28389": {
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path"
},
"CVE-2018-12127": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
},
"CVE-2018-12126": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option"
},
"CVE-2022-0500": {
"cmt_msg": "bpf: Introduce MEM_RDONLY flag"
},
"CVE-2018-20509": {
"cmt_msg": "binder: refactor binder ref inc/dec for thread safety"
},
"CVE-2022-0168": {
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()"
},
"CVE-2022-1055": {
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()"
},
"CVE-2022-0480": {
"cmt_msg": "memcg: enable accounting for file lock caches"
},
"CVE-2021-45469": {
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()"
},
"CVE-2020-12888": {
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory"
},
"CVE-2019-12456": {
"cmt_msg": ""
},
"CVE-2019-20811": {
"cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success"
},
"CVE-2020-26141": {
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe"
},
"CVE-2019-2025": {
"cmt_msg": "binder: fix race that allows malicious free of live buffer"
},
"CVE-2022-1199": {
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device"
},
"CVE-2021-4218": {
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
},
"CVE-2022-23960": {
"cmt_msg": "ARM: report Spectre v2 status through sysfs"
},
"CVE-2022-23222": {
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
},
"CVE-2018-5995": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2019-15290": {
"cmt_msg": ""
},
"CVE-2018-7273": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2018-9465": {
"cmt_msg": "binder: fix proc->files use-after-free"
},
"CVE-2018-17977": {
"cmt_msg": ""
},
"CVE-2022-26878": {
"cmt_msg": ""
},
"CVE-2016-5728": {
"cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver"
},
"CVE-2022-23038": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()"
},
"CVE-2010-5321": {
"cmt_msg": ""
},
"CVE-2022-1353": {
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register"
},
"CVE-2018-12930": {
"cmt_msg": ""
},
"CVE-2018-12931": {
"cmt_msg": ""
},
"CVE-2021-4148": {
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files"
},
"CVE-2022-1198": {
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()"
},
"CVE-2022-1043": {
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check"
},
"CVE-2017-5967": {
"cmt_msg": "time: Remove CONFIG_TIMER_STATS"
},
"CVE-2021-39801": {
"cmt_msg": ""
},
"CVE-2021-39800": {
"cmt_msg": ""
},
"CVE-2021-39802": {
"cmt_msg": ""
},
"CVE-2022-0382": {
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
},
"CVE-2019-2054": {
"cmt_msg": "arm/ptrace: run seccomp after ptrace"
},
"CVE-2020-36385": {
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
},
"CVE-2022-1048": {
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
},
"CVE-2021-39633": {
"cmt_msg": "ip_gre: add validation for csum_start"
},
"CVE-2019-12380": {
"cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code"
},
"CVE-2019-12381": {
"cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()"
},
"CVE-2019-12382": {
"cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()"
},
"CVE-2020-12364": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2021-3542": {
"cmt_msg": ""
},
"CVE-2022-25375": {
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command"
},
"CVE-2017-13166": {
"cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt"
},
"CVE-2021-44879": {
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
},
"CVE-2018-12207": {
"cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry"
},
"CVE-2022-1516": {
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect"
},
"CVE-2022-1016": {
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()"
},
"CVE-2020-12656": {
"cmt_msg": "sunrpc: check that domain table is empty at module unload."
},
"CVE-2022-23040": {
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case"
},
"CVE-2020-12655": {
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify"
},
"CVE-2018-12929": {
"cmt_msg": ""
},
"CVE-2018-12928": {
"cmt_msg": ""
},
"CVE-2020-36310": {
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address"
},
"CVE-2020-36313": {
"cmt_msg": "KVM: Fix out of range accesses to memslots"
},
"CVE-2015-2877": {
"cmt_msg": ""
},
"CVE-2022-1204": {
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()"
},
"CVE-2022-1205": {
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers"
},
"CVE-2022-29582": {
"cmt_msg": "io_uring: fix race between timeout flush and removal"
},
"CVE-2019-0146": {
"cmt_msg": ""
},
"CVE-2020-10708": {
"cmt_msg": ""
},
"CVE-2016-10723": {
"cmt_msg": "mm, oom: remove sleep from under oom_lock"
},
"CVE-2022-0400": {
"cmt_msg": ""
},
"CVE-2021-0707": {
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode"
},
"CVE-2019-11191": {
"cmt_msg": "x86: Deprecate a.out support"
},
"CVE-2022-26966": {
"cmt_msg": "sr9700: sanity check for packet length"
},
"CVE-2021-42739": {
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()"
},
"CVE-2022-26490": {
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION"
},
"CVE-2019-19039": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
},
"CVE-2021-3847": {
"cmt_msg": ""
},
"CVE-2018-10322": {
"cmt_msg": "xfs: enhance dinode verifier"
},
"CVE-2020-8832": {
"cmt_msg": "drm/i915: Record the default hw state after reset upon load"
},
"CVE-2022-1280": {
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
},
"CVE-2011-4917": {
"cmt_msg": ""
},
"CVE-2022-0742": {
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()"
},
"CVE-2021-32078": {
"cmt_msg": "ARM: footbridge: remove personal server platform"
},
"CVE-2019-10220": {
"cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()"
},
"CVE-2021-3864": {
"cmt_msg": ""
},
"CVE-2019-5489": {
"cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
},
"CVE-2019-2213": {
"cmt_msg": "binder: fix possible UAF when freeing buffer"
},
"CVE-2017-18232": {
"cmt_msg": "scsi: libsas: direct call probe and destruct"
},
"CVE-2017-16648": {
"cmt_msg": "dvb_frontend: don't use-after-free the frontend struct"
}
}
},
"5.4": {
"5.4-rc1": {
"CVE-2019-15099": {
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()",
"cmt_id": "39d170b3cb62ba98567f5c4f40c27b5864b304e5"
}
},
"5.4.1": {
"CVE-2019-18660": {
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch",
"cmt_id": "79f6bca3bc524d8b2e29bbc96ad541d13d6d9547"
},
"CVE-2019-15291": {
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking",
"cmt_id": "acfcb05fbdb8ee3aad4359372c1b238a366b5355"
},
"CVE-2019-18683": {
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop",
"cmt_id": "5aa7ad7e991e6cb0c3a1825dbe7f78c2a8116ccc"
}
},
"5.4.2": {
"CVE-2019-19767": {
"cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling",
"cmt_id": "69412e8ac6206e36aa09a6e3f5503be020b64ba8"
},
"CVE-2019-19241": {
"cmt_msg": "io_uring: async workers should inherit the user creds",
"cmt_id": "8387e3688aa9e06a12b58abbcfe2cbfd0cf0f589"
},
"CVE-2019-19602": {
"cmt_msg": "x86/fpu: Don't cache access to fpu_fpregs_owner_ctx",
"cmt_id": "4c1bb6bbc541a1961ac3605a5507236961983185"
}
},
"5.4.3": {
"CVE-2019-19062": {
"cmt_msg": "crypto: user - fix memory leak in crypto_report",
"cmt_id": "b022e155ccbcfadeaf5543d5b4d99c3c6d260ced"
},
"CVE-2019-19050": {
"cmt_msg": "crypto: user - fix memory leak in crypto_reportstat",
"cmt_id": "d8d63ea238cc34dd3874969b13d44a158cd0fdd0"
},
"CVE-2019-19338": {
"cmt_msg": "KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIES",
"cmt_id": "52c8b0c6e11e139f0e27ea41a7444bfbf17aa2e1"
},
"CVE-2019-19071": {
"cmt_msg": "rsi: release skb if rsi_prepare_beacon fails",
"cmt_id": "9f513166a8e773081f86b198371f6a80b4bd52ec"
},
"CVE-2019-19252": {
"cmt_msg": "vcs: prevent write access to vcsu devices",
"cmt_id": "0b0923bb6d2808bc6f3b03028fec685144227ba8"
},
"CVE-2019-19332": {
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)",
"cmt_id": "8ad39a3b44c1b452e51c0fc996d65911e2545b84"
}
},
"5.4.4": {
"CVE-2020-0041": {
"cmt_msg": "binder: fix incorrect calculation for num_valid",
"cmt_id": "34d8a89fe156b082823f438f8240e8d57291c9f2"
},
"CVE-2019-19447": {
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely",
"cmt_id": "a44a5939a4097c98481a5b873b7bd9f387e56f59"
}
},
"5.4.5": {
"CVE-2020-1749": {
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup",
"cmt_id": "48d58ae9e87aaa11814364ddb52b3461f9abac57"
}
},
"5.4.7": {
"CVE-2019-18786": {
"cmt_msg": "media: rcar_drif: fix a memory disclosure",
"cmt_id": "96d7c3cb33c591070d067b048129a4ddd9fb9346"
},
"CVE-2019-19057": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring",
"cmt_id": "01b987532b79828ca67efb63eeec2bf07f3099df"
},
"CVE-2019-19063": {
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe",
"cmt_id": "39a974f8970268e7a02933e5cd6fab3e2dd8228e"
},
"CVE-2020-0427": {
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string",
"cmt_id": "f739a699db7d5a5cf39ca3ce2c84e4fe4a8f4c5d"
},
"CVE-2019-19947": {
"cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices",
"cmt_id": "9562cdb0af47c4040c4e7e842b87a43f86845c7a"
},
"CVE-2019-20812": {
"cmt_msg": "af_packet: set defaule value for tmo",
"cmt_id": "772f76457932305e63e2b796228158b842830022"
},
"CVE-2019-19037": {
"cmt_msg": "ext4: fix ext4_empty_dir() for directories with holes",
"cmt_id": "6cc4ccdd0b975f5f4c334fac71fee47e564472bf"
},
"CVE-2019-16230": {
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)",
"cmt_id": "fbeec1d0e552662539a1b72e2530a7006bd677fa"
},
"CVE-2019-16232": {
"cmt_msg": "libertas: fix a potential NULL pointer dereference",
"cmt_id": "6ab523073f222e2e3a4545cbe436ef94a33bffff"
},
"CVE-2019-16229": {
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)",
"cmt_id": "fbeec1d0e552662539a1b72e2530a7006bd677fa"
},
"CVE-2019-19070": {
"cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe",
"cmt_id": "d7bb7d20a8bac687c16838f2b7b5629d595512d1"
}
},
"5.4.8": {
"CVE-2020-10690": {
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev",
"cmt_id": "bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad"
}
},
"5.4.9": {
"CVE-2019-18809": {
"cmt_msg": "media: usb: fix memory leak in af9005_identify_state",
"cmt_id": "3dba6e50d09ee8c05d5ba68bd69624ac1ea0c814"
},
"CVE-2019-19965": {
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected",
"cmt_id": "55c89290c7948e62ceac9eb3ffe6dd1555aa38d6"
}
},
"5.4.11": {
"CVE-2019-14901": {
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()",
"cmt_id": "389c0f743f9629392d119a11da780054456e9c49"
}
},
"5.4.12": {
"CVE-2019-14895": {
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()",
"cmt_id": "cbd6a85021a38ce3071fc50f2e11b709b0add8c7"
},
"CVE-2019-19053": {
"cmt_msg": "rpmsg: char: release allocated memory",
"cmt_id": "5bbe72cf486c3b983f739b3e1d98b61c8a205795"
},
"CVE-2019-19066": {
"cmt_msg": "scsi: bfa: release allocated memory in case of error",
"cmt_id": "448fe0b67c68d36cb45c09444c6b8298130d4c5e"
},
"CVE-2019-20636": {
"cmt_msg": "Input: add safety guards to input_set_keycode()",
"cmt_id": "39f711b69799c49e0e385494b9b8c0787f51293f"
},
"CVE-2019-19068": {
"cmt_msg": "rtl8xxxu: prevent leaking urb",
"cmt_id": "e380d974731502d24e0353df36a883fe232c866b"
},
"CVE-2020-0305": {
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'",
"cmt_id": "341464390512ed50d5e96cf8f5340dcfbebd837a"
},
"CVE-2020-0431": {
"cmt_msg": "HID: hid-input: clear unmapped usages",
"cmt_id": "4091fbf6cc143c8ccd8275eaa642b2f2afe7c4ab"
},
"CVE-2019-14615": {
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch",
"cmt_id": "53b9bd37af59d1def99b20707536105857eb9bd0"
},
"CVE-2019-19056": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf",
"cmt_id": "3fe1ced40e189e31c21f6723fbe4bdf8d2731922"
},
"CVE-2019-19078": {
"cmt_msg": "ath10k: fix memory leak",
"cmt_id": "ad1e0d1976b9061bf2aca99249b0187c9bbd3334"
}
},
"5.4.13": {
"CVE-2019-19064": {
"cmt_msg": "spi: lpspi: fix memory leak in fsl_lpspi_probe",
"cmt_id": "bf3b4bc7bb03a2b0e67078d42a1d43ce05a14b7b"
}
},
"5.4.14": {
"CVE-2020-12652": {
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl",
"cmt_id": "b307a5e97483d72c4a18cc8755d362d88b50c6d1"
},
"CVE-2021-3635": {
"cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption",
"cmt_id": "8f4dc50b5c12e159ac846fdc00702c547fdf2e95"
},
"CVE-2019-19043": {
"cmt_msg": "i40e: prevent memory leak in i40e_setup_macvlans",
"cmt_id": "97e81f01f03c25a03ca1699111323e3984c3779c"
}
},
"5.4.15": {
"CVE-2019-19046": {
"cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register",
"cmt_id": "57d748f43f0742f58b5cf01b2d7b9a0d2e113e3d"
}
},
"5.4.16": {
"CVE-2019-14896": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "40b1747b03684f03827b6323a17e4aa67af1e307"
},
"CVE-2019-14897": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "40b1747b03684f03827b6323a17e4aa67af1e307"
},
"CVE-2020-14416": {
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU",
"cmt_id": "34545cad8e0476aa6843f132e1177fe1517b2814"
},
"CVE-2020-8428": {
"cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late",
"cmt_id": "454759886d0b463213fad0f1c733469e2c501ab9"
}
},
"5.4.17": {
"CVE-2020-0432": {
"cmt_msg": "staging: most: net: fix buffer overflow",
"cmt_id": "b5e5d81230ec6a24b3ce452fc41d8260292c686a"
},
"CVE-2020-12769": {
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls",
"cmt_id": "7db4e6c728cbb4caf6708b0181bc11763d1e89a7"
}
},
"5.4.19": {
"CVE-2020-0404": {
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors",
"cmt_id": "6fcbff54ded118b29ca05f56aea85825d24a5645"
},
"CVE-2019-3016": {
"cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit",
"cmt_id": "68460ceba319a46ea14b36129bfd0a152e0f00c3"
}
},
"5.4.20": {
"CVE-2020-12653": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()",
"cmt_id": "3c822e1f31186767d6b7261c3c066f01907ecfca"
},
"CVE-2020-12654": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()",
"cmt_id": "c5b071e3f44d1125694ad4dcf1234fb9a78d0be6"
}
},
"5.4.21": {
"CVE-2022-1419": {
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create",
"cmt_id": "3ea7f138cec139be98f8bb9fc1a6b432003f834e"
},
"CVE-2020-8992": {
"cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode",
"cmt_id": "94f0fe04da78adc214b51523499031664f9db408"
}
},
"5.4.23": {
"CVE-2020-9383": {
"cmt_msg": "floppy: check FDC index for errors before assigning it",
"cmt_id": "1eb78bc92c847f9e1c01a01b2773fc2fe7b134cf"
},
"CVE-2020-2732": {
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode",
"cmt_id": "24dfae91a23a55c9f4cbe8fd778ed229ee9cced1"
},
"CVE-2020-0110": {
"cmt_msg": "sched/psi: Fix OOB write when writing 0 bytes to PSI files",
"cmt_id": "e61c236dcf3416211008774b6c2bfa01753a82c1"
},
"CVE-2020-0009": {
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped",
"cmt_id": "41a53f5b68ec36bcd100816554c31e3cff7b6c6e"
},
"CVE-2020-9391": {
"cmt_msg": "mm: Avoid creating virtual address aliases in brk()/mmap()/mremap()",
"cmt_id": "95236ae76bf8c5a71bcbb90a0c46a564613831d7"
}
},
"5.4.24": {
"CVE-2020-27068": {
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE",
"cmt_id": "f0593f5b1b64d3e08c67ee756c4253080e52afb2"
},
"CVE-2019-19768": {
"cmt_msg": "blktrace: Protect q->blk_trace with RCU",
"cmt_id": "6f9cff84dde800b4d9eab071810fbe284686601e"
},
"CVE-2020-10942": {
"cmt_msg": "vhost: Check docket sk_family instead of call getname",
"cmt_id": "f09fbb1175cffdbbb36b28e2ff7db96dcc90de08"
},
"CVE-2020-0444": {
"cmt_msg": "audit: fix error handling in audit_data_to_entry()",
"cmt_id": "37f4c2775267c6fea23172f4d0461eb42c8497a6"
}
},
"5.4.25": {
"CVE-2020-8647": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "5d230547476eea90b57ed9fda4bfe5307779abbb"
},
"CVE-2020-8649": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "5d230547476eea90b57ed9fda4bfe5307779abbb"
},
"CVE-2020-8648": {
"cmt_msg": "vt: selection, close sel_buffer race",
"cmt_id": "4387bfa605206b57451e6f77af1287960981ffa2"
}
},
"5.4.26": {
"CVE-2020-12465": {
"cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet",
"cmt_id": "02013734629bf57070525a3515509780092a63ab"
}
},
"5.4.27": {
"CVE-2020-29370": {
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()",
"cmt_id": "ae119b7e12472517bc35c1c003d5abf26653674a"
}
},
"5.4.28": {
"CVE-2019-19769": {
"cmt_msg": "locks: fix a potential use-after-free problem when wakeup a waiter",
"cmt_id": "384e15fc4226551a45b54226dc57bca7e23db9d8"
},
"CVE-2020-14381": {
"cmt_msg": "futex: Fix inode life-time issue",
"cmt_id": "553d46b07dc4813e1d8e6a3b3d6eb8603b4dda74"
}
},
"5.4.29": {
"CVE-2021-3715": {
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable",
"cmt_id": "ff28c6195814bdbd4038b08d39e40f8d65d2025e"
},
"CVE-2020-11608": {
"cmt_msg": "media: ov519: add missing endpoint sanity checks",
"cmt_id": "e4af1cf37b901839320e40515d9a60a1c8b51f3a"
},
"CVE-2020-11609": {
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks",
"cmt_id": "4490085a9e2d2cde69e865e3691223ea9e94513b"
},
"CVE-2020-11668": {
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks",
"cmt_id": "e7cd85f398cd1ffe3ce707ce7e2ec0e4a5010475"
},
"CVE-2020-27066": {
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer",
"cmt_id": "21af83e17ffae4955bbd8154a1e975826b8188a1"
}
},
"5.4.31": {
"CVE-2020-11565": {
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED",
"cmt_id": "c3f87e03f90ff2901525cc99c0e3bfb6fcbfd184"
}
},
"5.4.32": {
"CVE-2020-11494": {
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding",
"cmt_id": "fdb6a094ba41e985d9fb14ae2bfc180e3e983720"
}
},
"5.4.33": {
"CVE-2019-19039": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors",
"cmt_id": "941dabde6c1a56908696d6642229521a125dd77e"
},
"CVE-2020-12826": {
"cmt_msg": "signal: Extend exec_id to 64bits",
"cmt_id": "5f2d04139aa5ed04eab54b84e8a25bab87a2449c"
},
"CVE-2020-12657": {
"cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body",
"cmt_id": "b37de1b1e882fa3741d252333e5745eea444483b"
},
"CVE-2019-19377": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors",
"cmt_id": "941dabde6c1a56908696d6642229521a125dd77e"
}
},
"5.4.35": {
"CVE-2020-12659": {
"cmt_msg": "xsk: Add missing check on user supplied headroom size",
"cmt_id": "25c9cdef57488578da21d99eb614b97ffcf6e59f"
}
},
"5.4.36": {
"CVE-2020-0067": {
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr",
"cmt_id": "5811f24abd27a8a0791c6909c6ff803659060c84"
},
"CVE-2020-12464": {
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary",
"cmt_id": "b48193a7c303272d357b27dd7d72cbf89f7b2d35"
},
"CVE-2020-11884": {
"cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses",
"cmt_id": "44d9eb0ebe8fd04f46b18d10a18b2c543b379a0c"
}
},
"5.4.39": {
"CVE-2020-10751": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "eeef0d9fd40df3c033dca68bca8249e5951660ac"
},
"CVE-2020-0255": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "eeef0d9fd40df3c033dca68bca8249e5951660ac"
}
},
"5.4.42": {
"CVE-2020-13143": {
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC",
"cmt_id": "6bb054f006c3df224cc382f1ebd81b7276dcfb1c"
},
"CVE-2020-10711": {
"cmt_msg": "netlabel: cope with NULL catmap",
"cmt_id": "debcbc56fdfc2847804d3d00d43f68f3074c5987"
},
"CVE-2020-12770": {
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write",
"cmt_id": "2d6d0ce4de03832c8deedeb16c7af52868d7e99e"
},
"CVE-2020-27786": {
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses",
"cmt_id": "3fa58fc9f8c4d2b3557bca4363653464546e497e"
}
},
"5.4.43": {
"CVE-2020-12768": {
"cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()",
"cmt_id": "ac46cea606d59be18a6afd4560c48bcca836c44c"
},
"CVE-2019-18814": {
"cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init",
"cmt_id": "97d817b9ef13e2d52a86ea032b0df6a922e0e9df"
}
},
"5.4.44": {
"CVE-2020-10732": {
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()",
"cmt_id": "a02c130efbbce91af1e9dd99a5a381dd43494e15"
}
},
"5.4.45": {
"CVE-2020-10757": {
"cmt_msg": "mm: Fix mremap not considering huge pmd devmap",
"cmt_id": "df4988aa1c9618d9c612639e96002cd4e772def2"
},
"CVE-2019-19462": {
"cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open",
"cmt_id": "1c44e6e09dc81dcc891a6ada446f86add73baa38"
}
},
"5.4.46": {
"CVE-2020-13974": {
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii",
"cmt_id": "9619c2f746f7991486d556789e8675f1d1a0a67d"
},
"CVE-2020-0543": {
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()",
"cmt_id": "dab0161b8a0bc6a86319412e39b221670ca758ca"
}
},
"5.4.47": {
"CVE-2021-0342": {
"cmt_msg": "tun: correct header offsets in napi frags mode",
"cmt_id": "747d5bcb97eba1ecef0ceaa6b6234ba1aca87f60"
},
"CVE-2020-10766": {
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown",
"cmt_id": "9d1dcba6dd48cf7c5801d8aee12852ca41110896"
},
"CVE-2020-10767": {
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.",
"cmt_id": "6d60d5462a91eb46fb88b016508edfa8ee0bc7c8"
},
"CVE-2020-10768": {
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.",
"cmt_id": "e1545848ad5510e82eb75717c1f5757b984014cb"
},
"CVE-2020-29374": {
"cmt_msg": "gup: document and work around \"COW can break either way\" issue",
"cmt_id": "1027dc04f557328eb7b7b7eea48698377a959157"
}
},
"5.4.48": {
"CVE-2020-29368": {
"cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()",
"cmt_id": "a88d8aaf9b8b5e0af163a235a3baa9fdcb7d430a"
},
"CVE-2019-20810": {
"cmt_msg": "media: go7007: fix a miss of snd_card_free",
"cmt_id": "6e688a315acf9c2b9b6e8c3e3b7a0c2720f72cba"
}
},
"5.4.49": {
"CVE-2020-12771": {
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce",
"cmt_id": "f651e94899ed08b1766bda30f410d33fdd3970ff"
},
"CVE-2020-15436": {
"cmt_msg": "block: Fix use-after-free in blkdev_get()",
"cmt_id": "b3dc33946a742256ad9d2ccac848c9e3c2aaafef"
}
},
"5.4.50": {
"CVE-2020-15780": {
"cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down",
"cmt_id": "824d0b6225f3fa2992704478a8df520537cfcb56"
},
"CVE-2020-12655": {
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify",
"cmt_id": "ffd40b7962d463daa531a8110e5b708bcb5c6da7"
}
},
"5.4.51": {
"CVE-2020-24394": {
"cmt_msg": "nfsd: apply umask on fs without ACL support",
"cmt_id": "fe05e114d0fde7f644ac9ab5edfce3fa65650875"
},
"CVE-2020-15393": {
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect",
"cmt_id": "3dca0a299ff43204a69c9a7a00ce2b3e7ab3088c"
}
},
"5.4.53": {
"CVE-2020-14356": {
"cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()",
"cmt_id": "94886c86e833dbc8995202b6c6aaff592b7abd24"
},
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations",
"cmt_id": "c8a4452da9f4b09c28d904f70247b097d4c14932"
},
"CVE-2020-10781": {
"cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"",
"cmt_id": "72648019cd52488716891c2cbb096ad1023ab83e"
}
},
"5.4.54": {
"CVE-2020-29369": {
"cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()",
"cmt_id": "549bfc14270681cd776c6d9b78fe544cbd21673a"
},
"CVE-2020-15437": {
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()",
"cmt_id": "af811869db0698b587aa5418eab05c9f7e0bea3c"
}
},
"5.4.56": {
"CVE-2019-18808": {
"cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid",
"cmt_id": "ecfa7fa198fc66731ded5dabefccc8e9e2f3b311"
},
"CVE-2020-24490": {
"cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report",
"cmt_id": "9acd96f14a49f59401478eefe158aec489e0161f"
},
"CVE-2020-12656": {
"cmt_msg": "sunrpc: check that domain table is empty at module unload.",
"cmt_id": "98cef10fbcca40e70f9f389a4bea42384376376b"
},
"CVE-2019-19054": {
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe",
"cmt_id": "84da97713b9112c9529a941b230219b759e6f206"
}
},
"5.4.57": {
"CVE-2020-16166": {
"cmt_msg": "random32: update the net random state on interrupt and activity",
"cmt_id": "c15a77bdda2c4f8acaa3e436128630a81f904ae7"
}
},
"5.4.58": {
"CVE-2020-36386": {
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()",
"cmt_id": "c26eaaf547b785ae98fa08607b599c7df0da51bc"
},
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling",
"cmt_id": "8c3215a0426c404f4b7b02a1e0fdb0f7f4f1e6d3"
}
},
"5.4.59": {
"CVE-2020-26088": {
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.",
"cmt_id": "0b305f259ca9b85c48f9cb3159d034b7328ed225"
},
"CVE-2021-20292": {
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.",
"cmt_id": "c6d2ddf1a30d524106265ad2c48b907cd7a083d4"
},
"CVE-2019-19770": {
"cmt_msg": "blktrace: fix debugfs use after free",
"cmt_id": "6a291f9c21e4acf3429aacfa2e019d9965806c51"
}
},
"5.4.60": {
"CVE-2019-19448": {
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space",
"cmt_id": "7bbf647dbb5a28e754633512065146763a35ff77"
},
"CVE-2020-25212": {
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow",
"cmt_id": "75cf7f895f563e14c82c1aeea0362dc155b5baf3"
}
},
"5.4.61": {
"CVE-2020-14314": {
"cmt_msg": "ext4: fix potential negative array index in do_split()",
"cmt_id": "ea54176e5821936d109bb45dc2c19bd53559e735"
},
"CVE-2020-29371": {
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()",
"cmt_id": "19a77c937a1914bdd655366e79a2a1b7d675f554"
},
"CVE-2020-0466": {
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit",
"cmt_id": "42694912aaf1d7fa426bd02b0b313f05601b6488"
}
},
"5.4.62": {
"CVE-2021-3428": {
"cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount",
"cmt_id": "8e63c86f658005a9d8bc672642e587a787c53a72"
}
},
"5.4.63": {
"CVE-2020-0465": {
"cmt_msg": "HID: core: Sanitize event code and type when mapping input",
"cmt_id": "4bae1afed43212ee3ec64f2bdc9e39e800974e7e"
}
},
"5.4.64": {
"CVE-2020-25641": {
"cmt_msg": "block: allow for_each_bvec to support zero len bvec",
"cmt_id": "84c041c12442d233c9b3c593cbe9eb8a77875578"
},
"CVE-2021-1048": {
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"",
"cmt_id": "88405cf0f2bd771670b76c42b169527ff86048da"
},
"CVE-2020-14386": {
"cmt_msg": "net/packet: fix overflow in tpacket_rcv",
"cmt_id": "bc846b58fe5cecaa2632d566355e607954779d45"
},
"CVE-2020-25285": {
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers",
"cmt_id": "af7786b20c717ff13d9148161dad4b8e286bfd39"
},
"CVE-2020-14385": {
"cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify",
"cmt_id": "da7a1676d6c19971758976a84e87f5b1009409e7"
},
"CVE-2020-12888": {
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory",
"cmt_id": "8f747b0149c5a0c72626a87eb0dd2a5ec91f1a7d"
}
},
"5.4.66": {
"CVE-2020-25284": {
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping",
"cmt_id": "ea3d3bf85669195247ad6a522f4e4209695edca2"
},
"CVE-2020-14390": {
"cmt_msg": "fbcon: remove soft scrollback code",
"cmt_id": "cf5a7ded53652c3d63d7243944c6a8ec1f0ef392"
},
"CVE-2020-28097": {
"cmt_msg": "vgacon: remove software scrollback support",
"cmt_id": "087b6cb17df5834d395ab72da3f937380470ba15"
},
"CVE-2020-36312": {
"cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()",
"cmt_id": "41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d"
}
},
"5.4.68": {
"CVE-2020-25645": {
"cmt_msg": "geneve: add transport ports in route lookup for geneve",
"cmt_id": "745c24fd1d79b588a951d3c5beca43575907f881"
},
"CVE-2020-25643": {
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()",
"cmt_id": "c3de9daa662617132744731f1b4eb7b5cd1270a8"
},
"CVE-2021-0605": {
"cmt_msg": "af_key: pfkey_dump needs parameter validation",
"cmt_id": "a769bff2333a8212cff4fd8bbe986979bf41c528"
}
},
"5.4.70": {
"CVE-2020-25211": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "253052b636e98083b1ecc3e9b0cf6f151e1cb8c6"
},
"CVE-2021-0448": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "253052b636e98083b1ecc3e9b0cf6f151e1cb8c6"
},
"CVE-2021-39634": {
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done",
"cmt_id": "8993da3d4d3a7ae721e9dafa140ba64c0e632a50"
}
},
"5.4.71": {
"CVE-2020-28915": {
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()",
"cmt_id": "1b2fcd82c0ca23f6fa01298c0d7b59eb4efbaf48"
}
},
"5.4.72": {
"CVE-2020-10135": {
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm",
"cmt_id": "ed6c361e3229a2aa64b04617baa7f452bed28bcc"
},
"CVE-2020-12352": {
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members",
"cmt_id": "0d9e9b6e1a26bb248c0afee754d5a577abd4376b"
},
"CVE-2020-12351": {
"cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel",
"cmt_id": "66a14350de9a4e3db7dedb524518b1394a5f7162"
}
},
"5.4.73": {
"CVE-2020-0423": {
"cmt_msg": "binder: fix UAF when releasing todo list",
"cmt_id": "401d4d79a8ed5ac1c78031a00f8ac414e6605a38"
},
"CVE-2020-25705": {
"cmt_msg": "icmp: randomize the global rate limiter",
"cmt_id": "8df0ffe2f32c09b4627cbce5cd5faf8e98a6a71e"
}
},
"5.4.75": {
"CVE-2020-27777": {
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace",
"cmt_id": "240baebeda09e1e010fff58acc9183992f41f638"
},
"CVE-2020-27673": {
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking",
"cmt_id": "4bea575a10691a99b03d5e9055f3079040b59868"
},
"CVE-2020-25668": {
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed",
"cmt_id": "c2313d7818b979f8b3751f052a8db34a7ed26780"
},
"CVE-2020-25656": {
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers",
"cmt_id": "87d398f348b8a2d5246d3670a93fb63d4fd9f62a"
},
"CVE-2020-27675": {
"cmt_msg": "xen/events: avoid removing an event channel while handling it",
"cmt_id": "a01379671d67d34f254cc81f42cf854aa628f3a3"
}
},
"5.4.76": {
"CVE-2020-28974": {
"cmt_msg": "vt: Disable KD_FONT_OP_COPY",
"cmt_id": "642181fe3567419d84d2457b58f262c37467f525"
},
"CVE-2020-35508": {
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent",
"cmt_id": "beeb658cfd3544ceca894375c36b6572e4ae7a5f"
},
"CVE-2020-25704": {
"cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()",
"cmt_id": "b7f7474b392194530d1ec07203c8668e81b7fdb9"
}
},
"5.4.77": {
"CVE-2020-8694": {
"cmt_msg": "powercap: restrict energy meter to root access",
"cmt_id": "19f6d91bdad42200aac557a683c17b1f65ee6c94"
}
},
"5.4.78": {
"CVE-2020-14351": {
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function",
"cmt_id": "c5cf5c7b585c7f48195892e44b76237010c0747a"
}
},
"5.4.79": {
"CVE-2020-4788": {
"cmt_msg": "powerpc/64s: flush L1D on kernel entry",
"cmt_id": "b65458b6be8032c5179d4f562038575d7b3a6be3"
},
"CVE-2020-25669": {
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths",
"cmt_id": "df33054114475477b5e7810aa0efb26916220474"
}
},
"5.4.80": {
"CVE-2020-28941": {
"cmt_msg": "speakup: Do not let the line discipline be used several times",
"cmt_id": "3b78db264675e47ad3cf9c1e809e85d02fe1de90"
}
},
"5.4.82": {
"CVE-2020-35519": {
"cmt_msg": "net/x25: prevent a couple of overflows",
"cmt_id": "8bfe5b73b185d931b77c965002f84ad986aa94f1"
}
},
"5.4.83": {
"CVE-2020-29661": {
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()",
"cmt_id": "c536ecd4856084604701b95bd7e3fb15f05634bf"
},
"CVE-2020-29660": {
"cmt_msg": "tty: Fix ->session locking",
"cmt_id": "35ee9ac513280f46eeb1196bac82ed5320380412"
},
"CVE-2020-27830": {
"cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup",
"cmt_id": "b0d4fa10bfcc3051e9426b6286fb2d80bad04d74"
},
"CVE-2020-28588": {
"cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms",
"cmt_id": "867fbf2bb739bc7ba02cca09093f2d35ed7eadc5"
}
},
"5.4.84": {
"CVE-2021-0938": {
"cmt_msg": "compiler.h: fix barrier_data() on clang",
"cmt_id": "c2c5dc84ac51da90cadcb12554c69bdd5ac7aeeb"
}
},
"5.4.86": {
"CVE-2020-27815": {
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree",
"cmt_id": "cbeb61258186978c26f9ee738c86fe4812cc27af"
},
"CVE-2020-29568": {
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing",
"cmt_id": "eac0c12e329d489ff36e85fed5ce2a8606e3124d"
},
"CVE-2020-29569": {
"cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()",
"cmt_id": "8f3f6de44f7cc93a4723e63ea4381332826a6790"
}
},
"5.4.88": {
"CVE-2020-36322": {
"cmt_msg": "fuse: fix bad inode",
"cmt_id": "732251cabeb3bfd917d453a42274d769d6883fc4"
},
"CVE-2020-36158": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start",
"cmt_id": "0a49aaf4df2936bca119ee38fe5a570a7024efdc"
}
},
"5.4.89": {
"CVE-2021-0707": {
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode",
"cmt_id": "ef8133b1b47ed67873c291e9248fafd428d1767d"
},
"CVE-2020-28374": {
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup",
"cmt_id": "485e21729b1e1235e6075318225c09e76b376e81"
},
"CVE-2021-39648": {
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name",
"cmt_id": "bcffe2de9dde74174805d5f56a990353e33b8072"
}
},
"5.4.92": {
"CVE-2021-3178": {
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export",
"cmt_id": "4aef760c28e8bd1860a27fd78067b4ea77124987"
}
},
"5.4.93": {
"CVE-2021-39657": {
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback",
"cmt_id": "97853a7eae80a695a18ce432524eaa7432199a41"
}
},
"5.4.94": {
"CVE-2020-27825": {
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call",
"cmt_id": "b899d5b2a42a963d6ca7e33d51a35b2eb25f6d10"
},
"CVE-2021-3347": {
"cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()",
"cmt_id": "0dae88a92596db9405fd4a341c1915cf7d8fbad4"
}
},
"5.4.95": {
"CVE-2021-3348": {
"cmt_msg": "nbd: freeze the queue while we're adding connections",
"cmt_id": "587c6b75d7fdd366ad7dc615471006ce73c03a51"
}
},
"5.4.98": {
"CVE-2021-3600": {
"cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod",
"cmt_id": "78e2f71b89b22222583f74803d14f3d90cdf9d12"
}
},
"5.4.99": {
"CVE-2021-21781": {
"cmt_msg": "ARM: ensure the signal page contains defined contents",
"cmt_id": "f49bff85b6dbb60a410c7f7dc53b52ee1dc22470"
}
},
"5.4.100": {
"CVE-2021-26931": {
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()",
"cmt_id": "7109f61d25ff4dc2041f4be71042219869112e4c"
},
"CVE-2021-26930": {
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()",
"cmt_id": "524a77aa5d69e726369b38813333f20c6511b66c"
},
"CVE-2021-26932": {
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()",
"cmt_id": "104eef95231497cdb4e4de24a1ddef7c831a8b44"
}
},
"5.4.101": {
"CVE-2021-0512": {
"cmt_msg": "HID: make arrays usage and value to be the same",
"cmt_id": "fce3654c648d8f92882d0dae117c20231b8b224f"
},
"CVE-2021-3444": {
"cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero",
"cmt_id": "185c2266c1df80bec001c987d64cae2d9cd13816"
}
},
"5.4.102": {
"CVE-2020-25639": {
"cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails",
"cmt_id": "0faef25462f886a77e0b397cca31d51163215332"
},
"CVE-2021-3612": {
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl",
"cmt_id": "80168ba86034fc938970500b40c88b3914fede96"
}
},
"5.4.103": {
"CVE-2021-30002": {
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy",
"cmt_id": "027ddd67f68583a178a9bd65220611e9f978f014"
},
"CVE-2021-27365": {
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE",
"cmt_id": "567a234a231db16a99067db3d31d351d9e770a82"
},
"CVE-2021-27364": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "ca3afdd0377379f5031f376aec4b0c1b0285b556"
},
"CVE-2021-27363": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "ca3afdd0377379f5031f376aec4b0c1b0285b556"
},
"CVE-2021-28038": {
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis",
"cmt_id": "474773c42ffd89f7606b54443990ccf5086a4734"
}
},
"5.4.106": {
"CVE-2021-28375": {
"cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages",
"cmt_id": "e4b52c7cbaaf4d11288d331b654b0fac450e4971"
},
"CVE-2021-33033": {
"cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts",
"cmt_id": "b4800e7a1c9f80a1a0e417ab36a1da4959f8b399"
},
"CVE-2021-29265": {
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf",
"cmt_id": "8698133003cfb67e0f04dd044c954198e421b152"
},
"CVE-2021-39656": {
"cmt_msg": "configfs: fix a use-after-free in __configfs_open_file",
"cmt_id": "73aa6f93e1e980f392b3da4fee830b0e0a4a40ff"
},
"CVE-2021-28660": {
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()",
"cmt_id": "da5abe369b03447b3df1e5816b9560cbae503993"
}
},
"5.4.108": {
"CVE-2021-28964": {
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root",
"cmt_id": "5b3b99525c4f18e543f6ef17ef97c29f5694e8b4"
},
"CVE-2021-28972": {
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions",
"cmt_id": "51a2b19b554c8c75ee2d253b87240309cd81f1fc"
},
"CVE-2021-28971": {
"cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status",
"cmt_id": "da326ba3b84aae8ac0513aa4725a49843f2f871e"
}
},
"5.4.109": {
"CVE-2021-28688": {
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()",
"cmt_id": "057dd3e6986b260f0bec68bd1f2cd23a5d9dbda3"
},
"CVE-2021-31916": {
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices",
"cmt_id": "e6587d142d0214eb466f9978e25f0575c19b1ea0"
},
"CVE-2021-29264": {
"cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash",
"cmt_id": "ec7ce1e337ec2b5641dcc639396e04a28454f21a"
},
"CVE-2021-29647": {
"cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()",
"cmt_id": "ae23957bd1fb3184a9935bd99c5ad2351a59d7c8"
},
"CVE-2021-29650": {
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.",
"cmt_id": "19a5fb4ceada903e692de96b8aa8494179abbf0b"
}
},
"5.4.110": {
"CVE-2021-0941": {
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len",
"cmt_id": "42c83e3bca434d9f63c58f9cbf2881e635679fee"
},
"CVE-2021-3483": {
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()",
"cmt_id": "5ecfad1efbc31ab913f16ed60f0efff301aebfca"
}
},
"5.4.111": {
"CVE-2021-29154": {
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64",
"cmt_id": "a0b3927a07be0c4cedd69970e082a8c23c92eb72"
}
},
"5.4.112": {
"CVE-2021-3659": {
"cmt_msg": "net: mac802154: Fix general protection fault",
"cmt_id": "38ea2b3ed00fb4632a706f2c796d6aa4a884f573"
},
"CVE-2020-25672": {
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()",
"cmt_id": "404daa4d62a364623b48349eb73a18579edf51ac"
},
"CVE-2020-25673": {
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()",
"cmt_id": "aa0cff2e075152d474b0b01233ac0adfcfc0c0db"
},
"CVE-2020-25670": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()",
"cmt_id": "c89903c9eff219a4695e63715cf922748d743f65"
},
"CVE-2020-25671": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()",
"cmt_id": "41bc58ba0945d69578f60c6f06729d8e2dc327dc"
}
},
"5.4.113": {
"CVE-2021-0937": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "cc59b872f2e1995b8cc819b9445c1198bfe83b2d"
},
"CVE-2021-22555": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "cc59b872f2e1995b8cc819b9445c1198bfe83b2d"
}
},
"5.4.114": {
"CVE-2021-23133": {
"cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock",
"cmt_id": "6180d2274b17fc0473fb0764d3417c0bddb99b2e"
}
},
"5.4.117": {
"CVE-2021-31829": {
"cmt_msg": "bpf: Fix masking negation logic upon negative dst register",
"cmt_id": "53e0db429b37a32b8fc706d0d90eb4583ad13848"
}
},
"5.4.118": {
"CVE-2021-3506": {
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access",
"cmt_id": "27a130638406815eba083c632ee083f0c5e688c2"
}
},
"5.4.119": {
"CVE-2021-33034": {
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy",
"cmt_id": "3a826ffa80d5c73ad7338fd98ace9c5b53844968"
},
"CVE-2021-45486": {
"cmt_msg": "inet: use bigger hash table for IP ID generation",
"cmt_id": "fee81285bd09ec2080ce2cbb5063aad0e58eb272"
},
"CVE-2021-32399": {
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller",
"cmt_id": "eeec325c9944b4427f482018d00b737220c31fd9"
}
},
"5.4.120": {
"CVE-2021-4157": {
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()",
"cmt_id": "89862bd77e9cf511628eb7a97fe7f8d246192eec"
}
},
"5.4.122": {
"CVE-2020-26558": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e"
},
"CVE-2021-0129": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e"
}
},
"5.4.124": {
"CVE-2021-33098": {
"cmt_msg": "ixgbe: fix large MTU request from VF",
"cmt_id": "cf20c704a26eb763daf6bfb10369a4f11fef2d9a"
},
"CVE-2020-24587": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59"
},
"CVE-2020-24586": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59"
},
"CVE-2021-34981": {
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails",
"cmt_id": "fe201316ac36c48fc3cb2891dfdc8ab68058734d"
},
"CVE-2020-24588": {
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks",
"cmt_id": "fa00d4928eafe4fe8d854028f73f7af8fdbc9c3c"
},
"CVE-2020-26139": {
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames",
"cmt_id": "88664d5e5dc9eedddbea9cc8ebb3d57d933f9f8a"
},
"CVE-2020-26145": {
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe",
"cmt_id": "96d4d82652fa013d8b452871305a0c1e5f805d9e"
},
"CVE-2020-26147": {
"cmt_msg": "mac80211: assure all fragments are encrypted",
"cmt_id": "b90cf214e2bbb3f0a25d19937807238f646d1d72"
},
"CVE-2020-26141": {
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe",
"cmt_id": "aee0121afee53cde39e49086317af5d029911857"
}
},
"5.4.125": {
"CVE-2021-3564": {
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order",
"cmt_id": "8d3d0ac73a4a1d31e3d4f7c068312aba78470166"
},
"CVE-2021-38208": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70"
},
"CVE-2021-3573": {
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object",
"cmt_id": "b6f97555c71f78288682bc967121572f10715c89"
},
"CVE-2021-3587": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70"
}
},
"5.4.128": {
"CVE-2021-34693": {
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head",
"cmt_id": "c297559a2a2a6b6f0de61ed333a978a118b0e660"
},
"CVE-2021-3743": {
"cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post",
"cmt_id": "26b8d10703a9be45d6097946b2b4011f7dd2c56f"
}
},
"5.4.129": {
"CVE-2020-26541": {
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries",
"cmt_id": "e20b90e4f81bb04e2b180824caae585928e24ba9"
},
"CVE-2021-35039": {
"cmt_msg": "module: limit enabling module.sig_enforce",
"cmt_id": "e2dc07ca4e0148d75963e14d2b78afc12426a487"
},
"CVE-2021-22543": {
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages",
"cmt_id": "bb85717e3797123ae7724751af21d0c9d605d61e"
}
},
"5.4.131": {
"CVE-2020-36311": {
"cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy",
"cmt_id": "abbd42939db646f7210e1473e9cb17c6bc6f184c"
}
},
"5.4.132": {
"CVE-2021-3609": {
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()",
"cmt_id": "70a9116b9e5ccd5332d3a60b359fb5902d268fd0"
},
"CVE-2022-0850": {
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header",
"cmt_id": "ed628b2531196cc76d7c9b730abe4020cad26b0b"
}
},
"5.4.133": {
"CVE-2021-3655": {
"cmt_msg": "sctp: validate from_addr_param return",
"cmt_id": "03a5e454614dc095a70d88c85ac45ba799c79971"
},
"CVE-2021-45485": {
"cmt_msg": "ipv6: use prandom_u32() for ID generation",
"cmt_id": "ccde03a6a0fbdc3c0ba81930e629b8b14974cce4"
}
},
"5.4.134": {
"CVE-2021-38160": {
"cmt_msg": "virtio_console: Assure used length from device is limited",
"cmt_id": "52bd1bce8624acb861fa96b7c8fc2e75422dc8f7"
},
"CVE-2021-38199": {
"cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()",
"cmt_id": "81e03fe5bf8f5f66b8a62429fb4832b11ec6b272"
},
"CVE-2021-4154": {
"cmt_msg": "cgroup: verify that source is a string",
"cmt_id": "c17363ccd620c1a57ede00d5c777f0b8624debe6"
},
"CVE-2021-33909": {
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations",
"cmt_id": "c1dafbb26164f43f2bb70bee9e5c4e1cad228ca7"
}
},
"5.4.136": {
"CVE-2021-38204": {
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory",
"cmt_id": "863d071dbcd54dacf47192a1365faec46b7a68ca"
},
"CVE-2021-3679": {
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.",
"cmt_id": "f899f24d34d964593b16122a774c192a78e2ca56"
},
"CVE-2021-37576": {
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow",
"cmt_id": "2b9ffddd70b449cdc42b943788dc82a6d7b0d175"
}
},
"5.4.137": {
"CVE-2021-0920": {
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK",
"cmt_id": "85abe0d47fe65391ed41f78a66b5eff73987c086"
}
},
"5.4.139": {
"CVE-2021-33624": {
"cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data",
"cmt_id": "283d742988f6b304f32110f39e189a00d4e52b92"
}
},
"5.4.141": {
"CVE-2021-38198": {
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page",
"cmt_id": "d28adaabbbf4a6949d0f6f71daca6744979174e2"
},
"CVE-2021-38205": {
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer",
"cmt_id": "38b8485b72cbe4521fd2e0b8770e3d78f9b89e60"
},
"CVE-2021-3732": {
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed",
"cmt_id": "812f39ed5b0b7f34868736de3055c92c7c4cf459"
}
},
"5.4.142": {
"CVE-2021-3653": {
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)",
"cmt_id": "7c1c96ffb658fbfe66c5ebed6bcb5909837bc267"
},
"CVE-2021-3656": {
"cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)",
"cmt_id": "a17f2f2c89494c0974529579f3552ecbd1bc2d52"
}
},
"5.4.143": {
"CVE-2021-42008": {
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data",
"cmt_id": "a73b9aa142691c2ae313980a8734997a78f74b22"
},
"CVE-2020-3702": {
"cmt_msg": "ath: Use safer key clearing with key cache entries",
"cmt_id": "0c049ce432b37a51a0da005314ac32e5d9324ccf"
}
},
"5.4.144": {
"CVE-2021-39633": {
"cmt_msg": "ip_gre: add validation for csum_start",
"cmt_id": "53b480e68c1c2c778b620cc7f45a2ba5dff518ca"
},
"CVE-2021-3753": {
"cmt_msg": "vt_kdsetmode: extend console locking",
"cmt_id": "f4418015201bdca0cd4e28b363d88096206e4ad0"
},
"CVE-2021-3739": {
"cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id",
"cmt_id": "d7f7eca72ecc08f0bb6897fda2290293fca63068"
}
},
"5.4.145": {
"CVE-2021-40490": {
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing",
"cmt_id": "9b3849ba667af99ee99a7853a021a7786851b9fd"
}
},
"5.4.146": {
"CVE-2021-20322": {
"cmt_msg": "ipv6: make exception cache less predictible",
"cmt_id": "f73cbdd1b8e7ea32c66138426f826c8734b70c18"
},
"CVE-2021-34556": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4",
"cmt_id": "e80c3533c354ede56146ab0e4fbb8304d0c1209f"
},
"CVE-2021-35477": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4",
"cmt_id": "e80c3533c354ede56146ab0e4fbb8304d0c1209f"
}
},
"5.4.148": {
"CVE-2021-42252": {
"cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap",
"cmt_id": "2712f29c44f18db826c7e093915a727b6f3a20e4"
},
"CVE-2021-20320": {
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions",
"cmt_id": "a5fc48000b0ed5c389d426c341b43f580faa7904"
},
"CVE-2020-16119": {
"cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock",
"cmt_id": "5ab04a4ffed02f66e8e6310ba8261a43d1572343"
}
},
"5.4.151": {
"CVE-2021-3764": {
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"cmt_id": "24f3d2609114f1e1f6b487b511ce5fa36f21e0ae"
},
"CVE-2021-4203": {
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses",
"cmt_id": "0fcfaa8ed9d1dcbe377b202a1b3cdfd4e566114c"
},
"CVE-2021-3744": {
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"cmt_id": "24f3d2609114f1e1f6b487b511ce5fa36f21e0ae"
},
"CVE-2021-37159": {
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device",
"cmt_id": "fe57d53dd91d7823f1ceef5ea8e9458a4aeb47fa"
}
},
"5.4.153": {
"CVE-2021-20321": {
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()",
"cmt_id": "fab338f33c25c4816ca0b2d83a04a0097c2c4aaf"
},
"CVE-2021-41864": {
"cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()",
"cmt_id": "b14f28126c51533bb329379f65de5b0dd689b13a"
},
"CVE-2021-38300": {
"cmt_msg": "bpf, mips: Validate conditional branch offsets",
"cmt_id": "1a0fe45501a273ac52252448e43f975f0c18811e"
}
},
"5.4.155": {
"CVE-2021-3894": {
"cmt_msg": "sctp: account stream padding length for reconf chunk",
"cmt_id": "d88774539539dcbf825a25e61234f110513f5963"
},
"CVE-2021-4149": {
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error",
"cmt_id": "005a07c9acd6cf8a40555884f0650dfd4ec23fbe"
},
"CVE-2022-0322": {
"cmt_msg": "sctp: account stream padding length for reconf chunk",
"cmt_id": "d88774539539dcbf825a25e61234f110513f5963"
}
},
"5.4.156": {
"CVE-2021-3896": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54"
},
"CVE-2021-43056": {
"cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest",
"cmt_id": "d0148cfaf89ce2af0d76e39943e200365e7fc99a"
},
"CVE-2022-0644": {
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()",
"cmt_id": "0f218ba4c8aac7041cd8b81a5a893b0d121e6316"
},
"CVE-2021-3760": {
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object",
"cmt_id": "1f75f8883b4fe9fe1856d71f055120315e758188"
},
"CVE-2021-43389": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54"
}
},
"5.4.157": {
"CVE-2021-3772": {
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk",
"cmt_id": "5953ee99bab134d74c805a00eaa20fed33f54255"
}
},
"5.4.158": {
"CVE-2021-42739": {
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()",
"cmt_id": "2461f38384d50dd966e1db44fe165b1896f5df5a"
}
},
"5.4.160": {
"CVE-2021-3752": {
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()",
"cmt_id": "67bd269a84ce29dfc543c1683a2553b4169f9a55"
},
"CVE-2021-45868": {
"cmt_msg": "quota: check block number when reading the block in quota file",
"cmt_id": "10b808307d37d09b132fc086002bc1aa9910d315"
},
"CVE-2021-39686": {
"cmt_msg": "binder: use euid from cred instead of using task",
"cmt_id": "28a1e470b000d45bcf6c05f18a01d07cdc0b3235"
},
"CVE-2021-3640": {
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()",
"cmt_id": "d416020f1a9cc5f903ae66649b2c56d9ad5256ab"
}
},
"5.4.162": {
"CVE-2021-4202": {
"cmt_msg": "NFC: reorganize the functions in nci_request",
"cmt_id": "e418bb556ff801e11592851fd465415757a2ef68"
},
"CVE-2021-4002": {
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare",
"cmt_id": "201340ca4eb748c52062c5e938826ddfbe313088"
},
"CVE-2020-27820": {
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal",
"cmt_id": "1c4af56ffbfb2fc6bd222f5dc8cb210c5ffaab70"
}
},
"5.4.164": {
"CVE-2021-43975": {
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait",
"cmt_id": "89d15a2e40d7edaaa16da2763b349dd7b056cc09"
},
"CVE-2021-4083": {
"cmt_msg": "fget: check that the fd still exists after getting a ref to it",
"cmt_id": "03d4462ba3bc8f830d9807e3c3fde54fad06e2e2"
}
},
"5.4.165": {
"CVE-2021-39698": {
"cmt_msg": "wait: add wake_up_pollfree()",
"cmt_id": "e0c03d15cd03476dd698c1ae7fb32a16d3e87f5c"
},
"CVE-2021-39685": {
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests",
"cmt_id": "fd6de5a0cd42fc43810bd74ad129d98ab962ec6b"
}
},
"5.4.168": {
"CVE-2021-28715": {
"cmt_msg": "xen/netback: don't queue unlimited number of packages",
"cmt_id": "0d99b3c6bd39a0a023e972d8f912fd47698bbbb8"
},
"CVE-2021-28714": {
"cmt_msg": "xen/netback: fix rx queue stall detection",
"cmt_id": "8bfcd0385211044627f93d170991da1ae5937245"
},
"CVE-2021-28713": {
"cmt_msg": "xen/console: harden hvc_xen against event channel storms",
"cmt_id": "560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3"
},
"CVE-2021-28712": {
"cmt_msg": "xen/netfront: harden netfront against event channel storms",
"cmt_id": "3e68d099f09c260a7dee28b99af02fe6977a9e66"
},
"CVE-2021-28711": {
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms",
"cmt_id": "4ed9f5c511ce95cb8db05ff82026ea901f45fd76"
},
"CVE-2021-4135": {
"cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc",
"cmt_id": "699e794c12a3cd79045ff135bc87a53b97024e43"
}
},
"5.4.169": {
"CVE-2021-45469": {
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()",
"cmt_id": "b0406b5ef4e2c4fb21d9e7d5c36a0453b4279e9b"
},
"CVE-2022-1195": {
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD",
"cmt_id": "a5c6a13e9056d87805ba3042c208fbd4164ad22b"
}
},
"5.4.170": {
"CVE-2021-44733": {
"cmt_msg": "tee: handle lookup of shm with reference count 0",
"cmt_id": "940e68e57ab69248fabba5889e615305789db8a7"
}
},
"5.4.171": {
"CVE-2021-45095": {
"cmt_msg": "phonet: refcount leak in pep_sock_accep",
"cmt_id": "2a6a811a45fde5acb805ead4d1e942be3875b302"
},
"CVE-2021-4155": {
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate",
"cmt_id": "102af6edfd3a372db6e229177762a91f552e5f5e"
}
},
"5.4.173": {
"CVE-2022-0185": {
"cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param",
"cmt_id": "bd2aed0464ae3d6e83ce064cd91fc1a7fec48826"
}
},
"5.4.174": {
"CVE-2021-43976": {
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()",
"cmt_id": "ae56c5524a750fd8cf32565cb3902ce5baaeb4e6"
}
},
"5.4.175": {
"CVE-2022-0330": {
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store",
"cmt_id": "1b5553c79d52f17e735cd924ff2178a2409e6d0b"
},
"CVE-2022-22942": {
"cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy",
"cmt_id": "84b1259fe36ae0915f3d6ddcea6377779de48b82"
}
},
"5.4.176": {
"CVE-2022-24448": {
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails",
"cmt_id": "0dfacee40021dcc0a9aa991edd965addc04b9370"
},
"CVE-2022-0617": {
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format",
"cmt_id": "31136e5467f381cf18e2cfd467207dda7678c7a2"
},
"CVE-2022-24959": {
"cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()",
"cmt_id": "7afc09c8915b0735203ebcb8d766d7db37b794c0"
}
},
"5.4.177": {
"CVE-2022-0492": {
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent",
"cmt_id": "0e8283cbe4996ae046cd680b3ed598a8f2b0d5d8"
},
"CVE-2022-1055": {
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()",
"cmt_id": "b1d17e920dfcd4b56fa2edced5710c191f7e50b5"
}
},
"5.4.179": {
"CVE-2022-0435": {
"cmt_msg": "tipc: improve size validations for received domain records",
"cmt_id": "d692e3406e052dbf9f6d9da0cba36cb763272529"
},
"CVE-2022-0487": {
"cmt_msg": "moxart: fix potential use-after-free on remove path",
"cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e"
}
},
"5.4.180": {
"CVE-2022-25375": {
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command",
"cmt_id": "c9e952871ae47af784b4aef0a77db02e557074d6"
},
"CVE-2022-25258": {
"cmt_msg": "USB: gadget: validate interface OS descriptor requests",
"cmt_id": "38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18"
}
},
"5.4.182": {
"CVE-2022-25636": {
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size",
"cmt_id": "49c011a44edd14adb555dbcbaf757f52b1f2f748"
},
"CVE-2022-27223": {
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc",
"cmt_id": "6b23eda989236fd75b4a9893cc816cd690c29dfc"
},
"CVE-2022-26966": {
"cmt_msg": "sr9700: sanity check for packet length",
"cmt_id": "b95d71abeb7d31d4d51cd836d80f99fd783fd6d5"
}
},
"5.4.183": {
"CVE-2022-24958": {
"cmt_msg": "usb: gadget: don't release an existing dev->buf",
"cmt_id": "ba6fdd55b16677dcc1d7011270c140d2a37e5f35"
}
},
"5.4.184": {
"CVE-2022-23038": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()",
"cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0"
},
"CVE-2022-23039": {
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()",
"cmt_id": "d193785a4bc91c2b9e004d16d0c9ea5bc0a2f34d"
},
"CVE-2022-23960": {
"cmt_msg": "ARM: report Spectre v2 status through sysfs",
"cmt_id": "fdfc0baf829dfb306a1ec45900d2cfbee265ae60"
},
"CVE-2022-23036": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()",
"cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0"
},
"CVE-2022-23037": {
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status",
"cmt_id": "b507879c1e2d2c55752f658439df71595f4adff2"
},
"CVE-2022-0001": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE",
"cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5"
},
"CVE-2022-0002": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE",
"cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5"
},
"CVE-2022-23041": {
"cmt_msg": "xen/9p: use alloc/free_pages_exact()",
"cmt_id": "be63ea883e56aacf9326e581b53dff9ac087ace1"
},
"CVE-2022-23040": {
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case",
"cmt_id": "95ff82383266a7720d596eb8b4499ed01746a730"
},
"CVE-2022-23042": {
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()",
"cmt_id": "0e35f3ab69bcb01fdbf5aadc78f1731778963b1c"
}
},
"5.4.185": {
"CVE-2022-1199": {
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device",
"cmt_id": "0a64aea5fe023cf1e4973676b11f49038b1f045b"
},
"CVE-2022-1011": {
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io",
"cmt_id": "a9174077febfb1608ec3361622bf5f91e2668d7f"
}
},
"5.4.188": {
"CVE-2022-26490": {
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION",
"cmt_id": "0aef7184630b599493a0dcad4eec6d42b3e68e91"
},
"CVE-2022-28356": {
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()",
"cmt_id": "572f9a0d3f3feb8bd3422e88ad71882bc034b3ff"
},
"CVE-2022-1016": {
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()",
"cmt_id": "06f0ff82c70241a766a811ae1acf07d6e2734dcb"
},
"CVE-2022-27666": {
"cmt_msg": "esp: Fix possible buffer overflow in ESP transformation",
"cmt_id": "fee4dfbda68ba10f3bbcf51c861d6aa32f08f9e4"
}
},
"5.4.189": {
"CVE-2022-28390": {
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path",
"cmt_id": "e27caad38b59b5b00b9c5228d04c13111229deec"
},
"CVE-2022-1158": {
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address",
"cmt_id": "1553126eccf4fad17afaeaed08db9e5944aa2d55"
},
"CVE-2022-1353": {
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register",
"cmt_id": "ef388db2fe351230ff7194b37d507784bef659ec"
},
"CVE-2022-1198": {
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()",
"cmt_id": "28c8fd84bea13cbf238d7b19d392de2fcc31331c"
},
"CVE-2021-4197": {
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks",
"cmt_id": "691a0fd625e06c138f7662286a87ffba48773f34"
},
"CVE-2022-28389": {
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path",
"cmt_id": "2dfe9422d528630e2ce0d454147230cce113f814"
},
"CVE-2022-1516": {
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect",
"cmt_id": "9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f"
}
},
"5.4.190": {
"CVE-2022-1204": {
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()",
"cmt_id": "9e1e088a57c23251f1cfe9601bbd90ade2ea73b9"
},
"CVE-2022-1205": {
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers",
"cmt_id": "40cb8b3b19c087a4e20f6740701e53fefbe19a7b"
}
},
"5.4.191": {
"CVE-2022-28388": {
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path",
"cmt_id": "660784e7194ac2953aebe874c1f75f2441ba3d19"
}
},
"outstanding": {
"CVE-2021-0929": {
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
},
"CVE-2020-26556": {
"cmt_msg": ""
},
"CVE-2020-26557": {
"cmt_msg": ""
},
"CVE-2020-26555": {
"cmt_msg": ""
},
"CVE-2019-20794": {
"cmt_msg": ""
},
"CVE-2020-26559": {
"cmt_msg": ""
},
"CVE-2020-35501": {
"cmt_msg": ""
},
"CVE-2022-0168": {
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()"
},
"CVE-2018-1121": {
"cmt_msg": ""
},
"CVE-2019-19378": {
"cmt_msg": ""
},
"CVE-2022-0995": {
"cmt_msg": "watch_queue: Fix filter limit check"
},
"CVE-2022-0998": {
"cmt_msg": "vdpa: clean up get_config_size ret value handling"
},
"CVE-2019-15794": {
"cmt_msg": "ovl: fix reference counting in ovl_mmap error path"
},
"CVE-2021-3759": {
"cmt_msg": "memcg: enable accounting of ipc resources"
},
"CVE-2022-0854": {
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\""
},
"CVE-2020-24503": {
"cmt_msg": ""
},
"CVE-2020-24502": {
"cmt_msg": ""
},
"CVE-2019-19449": {
"cmt_msg": "f2fs: fix to do sanity check on segment/section count"
},
"CVE-2020-24504": {
"cmt_msg": "ice: create scheduler aggregator node config and move VSIs"
},
"CVE-2020-11725": {
"cmt_msg": ""
},
"CVE-2022-0382": {
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
},
"CVE-2021-33061": {
"cmt_msg": "ixgbe: add improvement for MDD response functionality"
},
"CVE-2022-1263": {
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push"
},
"CVE-2021-3864": {
"cmt_msg": ""
},
"CVE-2020-29373": {
"cmt_msg": "io_uring: grab ->fs as part of async preparation"
},
"CVE-2019-19814": {
"cmt_msg": ""
},
"CVE-2022-27950": {
"cmt_msg": "HID: elo: fix memory leak in elo_probe"
},
"CVE-2022-1015": {
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
},
"CVE-2021-26934": {
"cmt_msg": ""
},
"CVE-2016-8660": {
"cmt_msg": ""
},
"CVE-2021-3669": {
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
},
"CVE-2022-0494": {
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern"
},
"CVE-2018-12929": {
"cmt_msg": ""
},
"CVE-2020-15802": {
"cmt_msg": ""
},
"CVE-2008-2544": {
"cmt_msg": ""
},
"CVE-2022-28796": {
"cmt_msg": "jbd2: fix use-after-free of transaction_t race"
},
"CVE-2019-15239": {
"cmt_msg": "unknown"
},
"CVE-2007-3719": {
"cmt_msg": ""
},
"CVE-2021-4037": {
"cmt_msg": "xfs: fix up non-directory creation in SGID directories"
},
"CVE-2010-4563": {
"cmt_msg": ""
},
"CVE-2020-26140": {
"cmt_msg": ""
},
"CVE-2020-26143": {
"cmt_msg": ""
},
"CVE-2020-26142": {
"cmt_msg": ""
},
"CVE-2022-28893": {
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()"
},
"CVE-2022-29156": {
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
},
"CVE-2021-20177": {
"cmt_msg": "netfilter: add and use nf_hook_slow_list()"
},
"CVE-2020-10708": {
"cmt_msg": ""
},
"CVE-2021-4023": {
"cmt_msg": "io-wq: fix cancellation on create-worker failure"
},
"CVE-2017-13693": {
"cmt_msg": ""
},
"CVE-2021-0399": {
"cmt_msg": ""
},
"CVE-2017-13694": {
"cmt_msg": ""
},
"CVE-2020-36516": {
"cmt_msg": ""
},
"CVE-2021-4148": {
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files"
},
"CVE-2013-7445": {
"cmt_msg": ""
},
"CVE-2005-3660": {
"cmt_msg": ""
},
"CVE-2022-1508": {
"cmt_msg": "io_uring: reexpand under-reexpanded iters"
},
"CVE-2021-4159": {
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()"
},
"CVE-2021-0695": {
"cmt_msg": ""
},
"CVE-2008-4609": {
"cmt_msg": ""
},
"CVE-2021-4150": {
"cmt_msg": "block: fix incorrect references to disk objects"
},
"CVE-2021-28951": {
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit"
},
"CVE-2020-14304": {
"cmt_msg": ""
},
"CVE-2020-0347": {
"cmt_msg": ""
},
"CVE-2021-29155": {
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic"
},
"CVE-2021-3714": {
"cmt_msg": ""
},
"CVE-2019-12456": {
"cmt_msg": ""
},
"CVE-2020-26560": {
"cmt_msg": ""
},
"CVE-2021-3892": {
"cmt_msg": ""
},
"CVE-2020-12362": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2020-12363": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2022-0742": {
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()"
},
"CVE-2020-12364": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2022-0500": {
"cmt_msg": "bpf: Introduce MEM_RDONLY flag"
},
"CVE-2022-0480": {
"cmt_msg": "memcg: enable accounting for file lock caches"
},
"CVE-2022-1184": {
"cmt_msg": ""
},
"CVE-2022-25265": {
"cmt_msg": ""
},
"CVE-2022-1043": {
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check"
},
"CVE-2021-4218": {
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
},
"CVE-2022-23222": {
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
},
"CVE-2019-15902": {
"cmt_msg": "unknown"
},
"CVE-2019-15290": {
"cmt_msg": ""
},
"CVE-2018-17977": {
"cmt_msg": ""
},
"CVE-2022-26878": {
"cmt_msg": ""
},
"CVE-2022-29582": {
"cmt_msg": "io_uring: fix race between timeout flush and removal"
},
"CVE-2010-5321": {
"cmt_msg": ""
},
"CVE-2018-12930": {
"cmt_msg": ""
},
"CVE-2018-12931": {
"cmt_msg": ""
},
"CVE-2020-29534": {
"cmt_msg": "io_uring: don't rely on weak ->files references"
},
"CVE-2012-4542": {
"cmt_msg": ""
},
"CVE-2021-20239": {
"cmt_msg": "net: pass a sockptr_t into ->setsockopt"
},
"CVE-2021-39801": {
"cmt_msg": ""
},
"CVE-2021-39800": {
"cmt_msg": ""
},
"CVE-2021-39802": {
"cmt_msg": ""
},
"CVE-2022-1048": {
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
},
"CVE-2020-36385": {
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
},
"CVE-2021-3542": {
"cmt_msg": ""
},
"CVE-2021-44879": {
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
},
"CVE-2020-16120": {
"cmt_msg": "ovl: switch to mounter creds in readdir"
},
"CVE-2018-12928": {
"cmt_msg": ""
},
"CVE-2020-36310": {
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address"
},
"CVE-2020-36313": {
"cmt_msg": "KVM: Fix out of range accesses to memslots"
},
"CVE-2015-2877": {
"cmt_msg": ""
},
"CVE-2019-0146": {
"cmt_msg": ""
},
"CVE-2019-16089": {
"cmt_msg": ""
},
"CVE-2022-0400": {
"cmt_msg": ""
},
"CVE-2021-3847": {
"cmt_msg": ""
},
"CVE-2022-1280": {
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
},
"CVE-2011-4917": {
"cmt_msg": ""
},
"CVE-2021-32078": {
"cmt_msg": "ARM: footbridge: remove personal server platform"
},
"CVE-2020-27835": {
"cmt_msg": "IB/hfi1: Ensure correct mm is used at all times"
}
}
},
"4.14": {
"4.14": {
"CVE-2017-16647": {
"cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend",
"cmt_id": "baedf68a068ca29624f241426843635920f16e1d"
},
"CVE-2017-16650": {
"cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors",
"cmt_id": "7fd078337201cf7468f53c3d9ef81ff78cb6df3b"
},
"CVE-2017-16649": {
"cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors",
"cmt_id": "2cb80187ba065d7decad7c6614e35e07aec8a974"
}
},
"4.14.1": {
"CVE-2017-16646": {
"cmt_msg": "media: dib0700: fix invalid dvb_detach argument",
"cmt_id": "75d9dd294e2a41ddce75cc02d1675a9cf40873fc"
},
"CVE-2017-16537": {
"cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe",
"cmt_id": "16edf1a6a8a52040841e3e875c76bad0aa28f85f"
}
},
"4.14.2": {
"CVE-2017-18204": {
"cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()",
"cmt_id": "44ec0aecc73dc3959bdbb6fa733c69dc0bb633f4"
},
"CVE-2017-16994": {
"cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges",
"cmt_id": "bbce81fc966f59421e5f54c4bd3d3a4670f45e33"
}
},
"4.14.3": {
"CVE-2017-18203": {
"cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()",
"cmt_id": "3bfb87ecb4f7e19c53c31b7beca4ecd9bb906a67"
},
"CVE-2017-16536": {
"cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor",
"cmt_id": "5a482b8a75500ec7516f3d11c7fb063e3f4abc45"
}
},
"4.14.4": {
"CVE-2017-18208": {
"cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances",
"cmt_id": "8a0bb9ebaa8b8faee61f095757662fe5d7fd8da6"
},
"CVE-2017-18202": {
"cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry",
"cmt_id": "786b924d39bad16ff99aacdb4076df027cc2f8b8"
}
},
"4.14.6": {
"CVE-2017-17807": {
"cmt_msg": "KEYS: add missing permission check for request_key() destination",
"cmt_id": "69d5894ce0a67d37f900d2597fc0b2b8cef6c863"
},
"CVE-2017-0861": {
"cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info",
"cmt_id": "0482dcd51004920b13b59995b7afb66df49937da"
},
"CVE-2017-1000407": {
"cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts",
"cmt_id": "a52c2829cd60492fc75bafc323145cab1af915f5"
}
},
"4.14.7": {
"CVE-2018-18559": {
"cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()",
"cmt_id": "589983eb9986ea9c851c8906a81781f317207313"
},
"CVE-2018-7492": {
"cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map",
"cmt_id": "9d9a63d74b2b6ed7c30c7d1584d87c16ae8d5862"
},
"CVE-2017-16648": {
"cmt_msg": "dvb_frontend: don't use-after-free the frontend struct",
"cmt_id": "7bc8eb30f1e02b4dd6fd2869720c64d9bf39d765"
}
},
"4.14.8": {
"CVE-2018-14619": {
"cmt_msg": "crypto: algif_aead - fix reference counting of null skcipher",
"cmt_id": "96c2dfaebe1a8eba95d43732a1413c777469128c"
},
"CVE-2017-16913": {
"cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input",
"cmt_id": "1621db059603e781f61a9bf33cba639b42faf0bc"
},
"CVE-2017-16912": {
"cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number",
"cmt_id": "7120d742ad8d0f1fe37e4b73827e166fc1e01eea"
},
"CVE-2017-16911": {
"cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address",
"cmt_id": "b6a2ad646c13bb9d1231bce5599cb3176ff33ca4"
},
"CVE-2017-16914": {
"cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer",
"cmt_id": "d78a5506cf0ea112124c1ffa5c0aae09b579d96d"
},
"CVE-2017-17558": {
"cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow",
"cmt_id": "4c5ae6a301a5415d1334f6c655bebf91d475bd89"
},
"CVE-2017-18344": {
"cmt_msg": "posix-timer: Properly check sigevent->sigev_notify",
"cmt_id": "3df23f7ce7255d1ef2a616071cac359a245fb6de"
},
"CVE-2017-17806": {
"cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed",
"cmt_id": "902ae89f841de0c8d2857919296923f6332e174f"
},
"CVE-2017-17805": {
"cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage",
"cmt_id": "c68b31521d5fb7216cb1113130399afe65437c6c"
}
},
"4.14.9": {
"CVE-2017-17857": {
"cmt_msg": "bpf: fix missing error return in check_stack_boundary()",
"cmt_id": "2120fca0ecfb4552d27608d409ebd3403ce02ce4"
},
"CVE-2017-17864": {
"cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer",
"cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d"
},
"CVE-2017-17862": {
"cmt_msg": "bpf: fix branch pruning logic",
"cmt_id": "2b3ea8ceb2bb71e9e58527661261dba127137d9b"
},
"CVE-2017-17863": {
"cmt_msg": "bpf: fix integer overflows",
"cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862"
},
"CVE-2017-17853": {
"cmt_msg": "bpf/verifier: fix bounds calculation on BPF_RSH",
"cmt_id": "4d54f7df5131d67f653f674003ec5f52c9818b53"
},
"CVE-2017-17852": {
"cmt_msg": "bpf: fix 32-bit ALU op verification",
"cmt_id": "6c8e098d0324412d4ae9e06c7e611a96b87faf80"
},
"CVE-2017-17855": {
"cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer",
"cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d"
},
"CVE-2017-16996": {
"cmt_msg": "bpf: fix incorrect tracking of register size truncation",
"cmt_id": "bf5ee24e87e39548bf30d4e18e479e61a5a98336"
},
"CVE-2017-16995": {
"cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()",
"cmt_id": "6e12ea4fb45ca86cdd7425276b6993455fee947a"
},
"CVE-2017-17856": {
"cmt_msg": "bpf: force strict alignment checks for stack pointers",
"cmt_id": "c90268f7cbee0781331b96d1423d0f28a6183889"
},
"CVE-2017-17854": {
"cmt_msg": "bpf: fix integer overflows",
"cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862"
}
},
"4.14.11": {
"CVE-2017-18595": {
"cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer",
"cmt_id": "21a9c7346ef696161dacbbd9f47dabb0f062c4c8"
},
"CVE-2018-9465": {
"cmt_msg": "binder: fix proc->files use-after-free",
"cmt_id": "d87f1bc7d15b89bd3bcf31020eb7f3b3cd6f84b5"
},
"CVE-2018-18386": {
"cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)",
"cmt_id": "aaa5a91ff744f91fb1d1c91853aa0c8f126be563"
},
"CVE-2017-17449": {
"cmt_msg": "netlink: Add netns check on taps",
"cmt_id": "e3fb538e5715250d6a61a26925215229f2e9f52f"
},
"CVE-2017-17712": {
"cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg",
"cmt_id": "3bc400bad0e003d40a0a2412411aed7cbae16f96"
},
"CVE-2017-15129": {
"cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()",
"cmt_id": "dd9a2648b3e35c2369f580215d916baf7e23253a"
}
},
"4.14.13": {
"CVE-2017-18075": {
"cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances",
"cmt_id": "7156c794b8ab462705e6ac80c5fa69565eb44c62"
}
},
"4.14.14": {
"CVE-2017-13216": {
"cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl",
"cmt_id": "242e20a5b3cc2b99ace977546d3cffc6a2a35991"
},
"CVE-2017-17741": {
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio",
"cmt_id": "653c41ac4729261cb356ee1aff0f3f4f342be1eb"
},
"CVE-2018-5333": {
"cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op",
"cmt_id": "5edbe3c0249f54578636b71377861d579b1781cf"
},
"CVE-2017-1000410": {
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.",
"cmt_id": "02462928e2234eea95dd1ce05ca1f2c02088dc13"
},
"CVE-2018-5332": {
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()",
"cmt_id": "5d127d15ad2f9f33af788f1edf720ba29317f55b"
}
},
"4.14.15": {
"CVE-2017-18551": {
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA",
"cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a"
},
"CVE-2018-6927": {
"cmt_msg": "futex: Prevent overflow by strengthen input validation",
"cmt_id": "17ae6ccfe5dd85605dc44534348b506f95d16a61"
},
"CVE-2019-9454": {
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA",
"cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a"
},
"CVE-2018-1000004": {
"cmt_msg": "ALSA: seq: Make ioctls race-free",
"cmt_id": "c3162384aed4cfe3f1a1f40041f3ba8cd7704d88"
}
},
"4.14.16": {
"CVE-2018-1000028": {
"cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled",
"cmt_id": "54e67ba7d20a5921cfe712cfe4bd773e75df10e0"
},
"CVE-2017-17450": {
"cmt_msg": "netfilter: xt_osf: Add missing permission checks",
"cmt_id": "19848ca7b7dad5153860239c893c1eadd603217e"
},
"CVE-2017-17448": {
"cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks",
"cmt_id": "671624872144abc37bc5e8f3b27987890f6e87f3"
}
},
"4.14.17": {
"CVE-2019-2215": {
"cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.",
"cmt_id": "7a3cee43e935b9d526ad07f20bf005ba7e74d05b"
},
"CVE-2018-5344": {
"cmt_msg": "loop: fix concurrent lo_open/lo_release",
"cmt_id": "d5e06a1867210049bbfe27864ee0a40cfd9b1e9b"
}
},
"4.14.18": {
"CVE-2017-5754": {
"cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control",
"cmt_id": "343c91242d092852ab22411780f886317d7001aa"
}
},
"4.14.20": {
"CVE-2017-13166": {
"cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt",
"cmt_id": "ea96d8f676dd3caeb77e3dc509c880cc81d303a6"
},
"CVE-2018-5750": {
"cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message",
"cmt_id": "f232bfdcdd768bb6ba5945f1f8f28faa94fc10b8"
},
"CVE-2017-16538": {
"cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start",
"cmt_id": "fd31a38d268f50afe9c5cd3d4beafa020ad39e90"
},
"CVE-2017-8824": {
"cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code",
"cmt_id": "e5e1e153ecd40c2b09c23d2b2c161a6c8ddbba07"
},
"CVE-2017-16644": {
"cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()",
"cmt_id": "dd24d173b50af3aadb1ea2e04edaa8d68ca59b23"
}
},
"4.14.21": {
"CVE-2018-7566": {
"cmt_msg": "ALSA: seq: Fix racy pool initializations",
"cmt_id": "7466294dad8963e29f051d8ab2f4d3f67d2f62a6"
}
},
"4.14.22": {
"CVE-2018-20510": {
"cmt_msg": "binder: replace \"%p\" with \"%pK\"",
"cmt_id": "b46af094b82a47ca1cbba9092578f8f96af82798"
},
"CVE-2020-0030": {
"cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.",
"cmt_id": "441b5d10e4602b25ad960d1ca1c6bb77e788c220"
}
},
"4.14.25": {
"CVE-2018-5803": {
"cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()",
"cmt_id": "1fc74a57a8ae863c95afedef2510e7e42b194e56"
}
},
"4.14.27": {
"CVE-2018-1068": {
"cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets",
"cmt_id": "eaa06bfba8eabd44ce952758046492eebc973bbe"
},
"CVE-2018-7995": {
"cmt_msg": "x86/MCE: Serialize sysfs changes",
"cmt_id": "5c1c405d393648da95339c3e0f2dcfd7a1021388"
},
"CVE-2018-1065": {
"cmt_msg": "netfilter: add back stackpointer size checks",
"cmt_id": "638c2e4eff89aae86593e80ac2be01eee195fccb"
}
},
"4.14.28": {
"CVE-2019-9456": {
"cmt_msg": "usb: usbmon: Read text within supplied buffer size",
"cmt_id": "59b0613d3f40f0ba621bb9c7ddf06dea2948e0b7"
}
},
"4.14.31": {
"CVE-2018-8822": {
"cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()",
"cmt_id": "2a2b9ef3092680bdf09751d55420910f81fd0c3c"
},
"CVE-2018-7740": {
"cmt_msg": "hugetlbfs: check for pgoff value overflow",
"cmt_id": "1e8628443ede418464b0ab101b24fbb7030949b2"
},
"CVE-2018-1087": {
"cmt_msg": "kvm/x86: fix icebp instruction handling",
"cmt_id": "06b2810150542cfe0e66407c77ea2de6790e35dc"
},
"CVE-2018-8781": {
"cmt_msg": "drm: udl: Properly check framebuffer mmap offsets",
"cmt_id": "c8deec7181212f170191c7ffbb01a16367682f5b"
},
"CVE-2018-8897": {
"cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack",
"cmt_id": "5a29ce2b9880a26e1ac95169dedabc988360c734"
}
},
"4.14.32": {
"CVE-2019-15239": {
"cmt_msg": "unknown",
"cmt_id": "dbbf2d1e4077bab0c65ece2765d3fc69cf7d610f"
},
"CVE-2021-0935": {
"cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure",
"cmt_id": "a8f02befc87d6f1a882c9b14a31bcfa1fbd3d430"
},
"CVE-2018-1130": {
"cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()",
"cmt_id": "91d27e0c302501e148460db9981b5b04481781ce"
}
},
"4.14.33": {
"CVE-2018-1000199": {
"cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation",
"cmt_id": "ca04476df8fd39c71818352db43090bd17dd1d58"
},
"CVE-2017-17975": {
"cmt_msg": "media: usbtv: prevent double free in error case",
"cmt_id": "1f17d5033fe3c435556d8fb731f3a51ca073ce85"
}
},
"4.14.34": {
"CVE-2018-7757": {
"cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()",
"cmt_id": "8644d14c3240b6875c9e0e72c346146c24a6d8c1"
}
},
"4.14.35": {
"CVE-2020-35513": {
"cmt_msg": "nfsd: fix incorrect umasks",
"cmt_id": "9a0a509839f31dc17f2ea788dc362c93589e077a"
}
},
"4.14.36": {
"CVE-2019-14763": {
"cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()",
"cmt_id": "59d3a952e4f3d505f9444e86db069081323351c7"
},
"CVE-2018-1094": {
"cmt_msg": "ext4: always initialize the crc32c checksum driver",
"cmt_id": "26dbb30c58ffb85bc015bd5e58831483d50f7d18"
},
"CVE-2018-1095": {
"cmt_msg": "ext4: limit xattr size to INT_MAX",
"cmt_id": "a57eb14b740e6175aff8b8941bec628403992dfa"
},
"CVE-2018-1108": {
"cmt_msg": "random: fix crng_ready() test",
"cmt_id": "6e513bc20ca63f594632eca4e1968791240b8f18"
},
"CVE-2018-1092": {
"cmt_msg": "ext4: fail ext4_iget for root directory if unallocated",
"cmt_id": "8e0e94683f8449f4e83b4b563b80eb9c76b9e18f"
},
"CVE-2018-20961": {
"cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi",
"cmt_id": "96dc465173a1f790e805246206aee3d18770f614"
}
},
"4.14.37": {
"CVE-2018-8087": {
"cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()",
"cmt_id": "afadc440a1cc08895f451b4a9db551a45f2a1a21"
},
"CVE-2021-39636": {
"cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace",
"cmt_id": "ad10785a706e63ff155fc97860cdcc5e3bc5992d"
}
},
"4.14.38": {
"CVE-2018-10940": {
"cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()",
"cmt_id": "68c09d548bfc61aec99fa9a24e703c3d6fdba9b1"
}
},
"4.14.39": {
"CVE-2018-9415": {
"cmt_msg": "ARM: amba: Fix race condition with driver_override",
"cmt_id": "23abff7b984ff46b78b9964f9cdba42036b4149a"
},
"CVE-2018-9385": {
"cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer",
"cmt_id": "f671ee8de31a3c2702250e64e5f18ebceb21f1e6"
},
"CVE-2018-1093": {
"cmt_msg": "ext4: add validity checks for bitmap block numbers",
"cmt_id": "b39430ea068797bb45b72429db3743064280b1be"
}
},
"4.14.41": {
"CVE-2018-1000200": {
"cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3",
"cmt_id": "2270dfcc4b12d49c6d74394d245858ae882a8b79"
},
"CVE-2018-11508": {
"cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field",
"cmt_id": "ef7c4825fe5fe9ed251bda8d4c04d47fe33c3afb"
}
},
"4.14.42": {
"CVE-2018-1120": {
"cmt_msg": "proc: do not access cmdline nor environ from file-backed areas",
"cmt_id": "5c9a9508de30d4d27a270047c7ab5f2817b1366d"
}
},
"4.14.43": {
"CVE-2018-5814": {
"cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors",
"cmt_id": "ec0c93951ecb3ab9463c9a0d0a79c69e4bcb2b2a"
},
"CVE-2018-3639": {
"cmt_msg": "x86/nospec: Simplify alternative_msr_write()",
"cmt_id": "8410540f5aaf06ab01197443371be89822971e58"
}
},
"4.14.44": {
"CVE-2018-10021": {
"cmt_msg": "scsi: libsas: defer ata device eh commands to libata",
"cmt_id": "58442874542fb41fd53de4ab34be180ad43779c9"
},
"CVE-2018-1000204": {
"cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()",
"cmt_id": "d827bea2d18c07ba514f7d48cde49f90da9a1384"
}
},
"4.14.45": {
"CVE-2018-11506": {
"cmt_msg": "sr: pass down correctly sized SCSI sense buffer",
"cmt_id": "2a039b93679fb2e974bedf5b0d76da81731474ba"
},
"CVE-2018-9518": {
"cmt_msg": "NFC: llcp: Limit size of SDP URI",
"cmt_id": "54881db3251a48f9a27ac8b7223a9b421757d395"
},
"CVE-2017-13695": {
"cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c",
"cmt_id": "1d1646c408f62148fd2bbc399927bdc5381cb3ba"
},
"CVE-2018-6412": {
"cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().",
"cmt_id": "ccf92117d49d77f3d88ad81d63ea5c0d02a94e3f"
}
},
"4.14.49": {
"CVE-2019-18675": {
"cmt_msg": "mmap: introduce sane default mmap limits",
"cmt_id": "16d7ceb04b554207aa68dd27c1bc11f8933813fd"
}
},
"4.14.50": {
"CVE-2018-10853": {
"cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access",
"cmt_id": "53e4b19fcd0ce08933e0f7a7fe11654f6eac1f19"
},
"CVE-2018-12904": {
"cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions",
"cmt_id": "b1bd9caf5e98d8111361f53367fece3444b0a7c2"
}
},
"4.14.52": {
"CVE-2018-10840": {
"cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs",
"cmt_id": "21542545990c5aba4b919ac0f8c8ae6a408b49d4"
},
"CVE-2018-1118": {
"cmt_msg": "vhost: fix info leak due to uninitialized memory",
"cmt_id": "7446344baafba2f23da58ac837b86770ec977b90"
},
"CVE-2018-11412": {
"cmt_msg": "ext4: do not allow external inodes for inline data",
"cmt_id": "e81d371dac30019816a1c5a3a2c4c44bb3c68558"
},
"CVE-2018-12232": {
"cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()",
"cmt_id": "91717ffc9057f38a0203a40ef36ae2e482fd7cbe"
}
},
"4.14.53": {
"CVE-2018-13406": {
"cmt_msg": "video: uvesafb: Fix integer overflow in allocation",
"cmt_id": "9aa818d42bf5f5477f66dbc941b4daddfcae290d"
}
},
"4.14.55": {
"CVE-2018-9516": {
"cmt_msg": "HID: debug: check length before copy_to_user()",
"cmt_id": "50b4d984f55e7e8d75f75da6803505ca3c122cef"
},
"CVE-2018-10879": {
"cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors",
"cmt_id": "ac93c718365ac6ea9d7631641c8dec867d623491"
},
"CVE-2018-10881": {
"cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data",
"cmt_id": "deb465ec750b80776cc4ac5b92b72c0a71fd4f0b"
},
"CVE-2018-10878": {
"cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()",
"cmt_id": "ac48bb9bc0a32f5a4432be1645b57607f8c46aa7"
},
"CVE-2018-10877": {
"cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()",
"cmt_id": "d69a9df614fc68741efcb0fcc020f05caa99d668"
},
"CVE-2018-10876": {
"cmt_msg": "ext4: only look at the bg_flags field if it is valid",
"cmt_id": "44a4bc970bfae625d0ec9ecdfefc88c9d93dfe6c"
},
"CVE-2018-10880": {
"cmt_msg": "ext4: never move the system.data xattr out of the inode body",
"cmt_id": "8a9ef17c0dc93def47e17b227ada95c682592a1d"
},
"CVE-2017-13168": {
"cmt_msg": "scsi: sg: mitigate read/write abuse",
"cmt_id": "6e51bfa950864343cfe210a75268e826a2b4b2e8"
},
"CVE-2018-10882": {
"cmt_msg": "ext4: add more inode number paranoia checks",
"cmt_id": "c24aab6d86640ccf321b87be6096319f55b16274"
},
"CVE-2018-10883": {
"cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits",
"cmt_id": "0321e68838d7ba2528b367b879b2fcf9d96a2099"
}
},
"4.14.56": {
"CVE-2018-13405": {
"cmt_msg": "Fix up non-directory creation in SGID directories",
"cmt_id": "298243a5fb640f018e2fae22c0c895f1b27f0963"
},
"CVE-2018-16276": {
"cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler",
"cmt_id": "90f2a76ccd37cce2530df49335bcea6cd0e23797"
}
},
"4.14.57": {
"CVE-2017-18216": {
"cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent",
"cmt_id": "c59a8f13f36b51f2100111121b39c6d15eca124d"
},
"CVE-2017-18224": {
"cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()",
"cmt_id": "1ccab2bf726e1cd9292deecf4d72d732527035d6"
}
},
"4.14.58": {
"CVE-2018-10902": {
"cmt_msg": "ALSA: rawmidi: Change resized buffers atomically",
"cmt_id": "5d251646ab1588077b26e89dcaa116aba105d097"
}
},
"4.14.59": {
"CVE-2018-5390": {
"cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()",
"cmt_id": "f3a5ba6310e11df370f6888ed716d1486896d983"
}
},
"4.14.60": {
"CVE-2018-14734": {
"cmt_msg": "infiniband: fix a possible use-after-free bug",
"cmt_id": "e27dad1eb1ac7bedb5a033ac2e068543742c807b"
}
},
"4.14.62": {
"CVE-2018-13093": {
"cmt_msg": "xfs: validate cached inodes are free when allocated",
"cmt_id": "6f021e4ef39ace7f58c415856aef9308c70e89b9"
},
"CVE-2018-13094": {
"cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp",
"cmt_id": "59f35b983e8aeb98188c6ef93f8eabc594f8f953"
},
"CVE-2018-12233": {
"cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size",
"cmt_id": "7d29fb53439c8c91874550cc078eda6db8feafe7"
}
},
"4.14.63": {
"CVE-2018-3646": {
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled",
"cmt_id": "e456004eb77734e274e520c83ad9be76736e622c"
},
"CVE-2018-15572": {
"cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB",
"cmt_id": "f374b5593e44c01265156b4c4070b618097f401b"
},
"CVE-2018-3620": {
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled",
"cmt_id": "e456004eb77734e274e520c83ad9be76736e622c"
}
},
"4.14.64": {
"CVE-2018-9363": {
"cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report",
"cmt_id": "6e2c702e797c25b49dac3a9f663c449f30cf8efc"
}
},
"4.14.67": {
"CVE-2018-3693": {
"cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()",
"cmt_id": "4bc32484df6a3bdc173301adff0c2fdc66667a40"
}
},
"4.14.68": {
"CVE-2018-16658": {
"cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status",
"cmt_id": "73b2e7073b51de0b03ebd15c97dd3ad0c3470810"
}
},
"4.14.69": {
"CVE-2018-20856": {
"cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case",
"cmt_id": "0affbaece6d0b7c75c5166732d0481ae9a28be60"
},
"CVE-2019-12881": {
"cmt_msg": "drm/i915/userptr: reject zero user_size",
"cmt_id": "7188f7416438a34412a6702f548f81be9e2cf56c"
}
},
"4.14.70": {
"CVE-2018-6554": {
"cmt_msg": "staging: irda: remove the irda network stack and drivers",
"cmt_id": "77be9452d0e5768bab9a041a62116cbeb9dc3174"
},
"CVE-2018-6555": {
"cmt_msg": "staging: irda: remove the irda network stack and drivers",
"cmt_id": "e37957305de356b4f8719a3a4c7bc1453a2f0ca3"
},
"CVE-2018-14617": {
"cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()",
"cmt_id": "68e787c3c80059c776d1d7afb20f5eb9f20237a5"
},
"CVE-2018-14609": {
"cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized",
"cmt_id": "0cdbc3faf960de16ebe8a427feb3b0544ad983cc"
}
},
"4.14.71": {
"CVE-2018-5391": {
"cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.",
"cmt_id": "1c44969111cc68f361638b6e54f5a176609aa05a"
},
"CVE-2018-13099": {
"cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode",
"cmt_id": "7fb2b50ee59689578d5a712633d1e6755fc98933"
},
"CVE-2018-17182": {
"cmt_msg": "mm: get rid of vmacache_flush_all() entirely",
"cmt_id": "06274364edb4407b386a996a7ff46c3ca3459b70"
}
},
"4.14.73": {
"CVE-2018-20511": {
"cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT",
"cmt_id": "9951e17efd05b8ad49bbc0db2e6b483f95d94d86"
},
"CVE-2018-14633": {
"cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation",
"cmt_id": "755e45f3155cc51e37dc1cce9ccde10b84df7d93"
}
},
"4.14.74": {
"CVE-2019-9458": {
"cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed",
"cmt_id": "d61ba3417e4fb71963441aa0c2e9c26f4568215b"
},
"CVE-2018-18021": {
"cmt_msg": "arm64: KVM: Tighten guest core register access from userspace",
"cmt_id": "38d070f9090af15b5bdb26fc0e084b22f34eabd9"
},
"CVE-2018-7755": {
"cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl",
"cmt_id": "04bc4dd86d0f2b166640c8ea5b7a030d92a3d993"
},
"CVE-2018-13053": {
"cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep",
"cmt_id": "a4dbaf7c2de0d622e0fe29840dd2bf4a281277a5"
},
"CVE-2018-12896": {
"cmt_msg": "posix-timers: Sanitize overrun handling",
"cmt_id": "3e3f075f72bd2dfcd5211bd1ff3919bc118ad4cd"
}
},
"4.14.75": {
"CVE-2018-17972": {
"cmt_msg": "proc: restrict kernel stack dumps to root",
"cmt_id": "f8566a92ab75d442a823453414c6158b0b3c5ce7"
}
},
"4.14.76": {
"CVE-2018-15471": {
"cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()",
"cmt_id": "309a1c5cfc598c162dfc951fac040554164056e4"
}
},
"4.14.78": {
"CVE-2018-18281": {
"cmt_msg": "mremap: properly flush TLB before releasing the page",
"cmt_id": "541500abfe9eb30a89ff0a6eb42a21521996d68d"
}
},
"4.14.82": {
"CVE-2018-19854": {
"cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace",
"cmt_id": "fdc427442b374e84077d4214733764efb1a38a0e"
},
"CVE-2018-16871": {
"cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set",
"cmt_id": "6d1c38aa47d432f425c5829261eaa8e624274a4f"
},
"CVE-2018-18710": {
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.",
"cmt_id": "a8c254d8e96032d5bb235cb2e777203d9acda09d"
}
},
"4.14.86": {
"CVE-2018-13100": {
"cmt_msg": "f2fs: fix to do sanity check with secs_per_zone",
"cmt_id": "f3d6361a96a455c8ba12226a04efa67a0ada4966"
},
"CVE-2018-5703": {
"cmt_msg": "tls: Use correct sk->sk_prot for IPV6",
"cmt_id": "2a0f5919e1e6a1c0423d895ab75eb15f94a67c69"
},
"CVE-2018-13096": {
"cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks",
"cmt_id": "b8321ccd045710ee04fd5322c34cadd13a5e58af"
},
"CVE-2018-13097": {
"cmt_msg": "f2fs: fix to do sanity check with user_block_count",
"cmt_id": "f9cf5462b51d98026275cc51437fc531e808b64a"
},
"CVE-2018-14615": {
"cmt_msg": "f2fs: fix to do sanity check with i_extra_isize",
"cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220"
},
"CVE-2018-14614": {
"cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum",
"cmt_id": "30130700acfad8a705c109325379f5bbe21b3ccc"
},
"CVE-2018-13098": {
"cmt_msg": "f2fs: fix to do sanity check with extra_attr feature",
"cmt_id": "0081c90ebacebb3a82d0d24bf0f42273ce2d902e"
},
"CVE-2018-5848": {
"cmt_msg": "wil6210: missing length check in wmi_set_ie",
"cmt_id": "107b02c81a8761f1f7efc1e8b54d435324ccd13e"
},
"CVE-2018-14611": {
"cmt_msg": "btrfs: validate type when reading a chunk",
"cmt_id": "f7eef132ccc95c9af50b647c5da0511d2b8492f8"
},
"CVE-2018-14610": {
"cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time",
"cmt_id": "34407a175a59b668a1a2bbf0d0e495d87a7777d8"
},
"CVE-2018-14613": {
"cmt_msg": "btrfs: tree-checker: Verify block_group_item",
"cmt_id": "9f268b5cf2d6a716779dfe11f4bc02d6461db693"
},
"CVE-2018-14612": {
"cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees",
"cmt_id": "c0dfb99847851fb830d1e8ea7d5e0571f50c325a"
},
"CVE-2018-1128": {
"cmt_msg": "libceph: add authorizer challenge",
"cmt_id": "3fd73c8a71f299e30359a63add1f33e3fd834831"
},
"CVE-2018-1129": {
"cmt_msg": "libceph: implement CEPHX_V2 calculation mode",
"cmt_id": "b16d0c5d32468a0624505a7b6b211e20488295e9"
},
"CVE-2019-2024": {
"cmt_msg": "media: em28xx: Fix use-after-free when disconnecting",
"cmt_id": "30cdc0c3bac950bebd3ba59f5ff980cdd3710e0f"
},
"CVE-2018-18690": {
"cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE",
"cmt_id": "cb7ccb9924bb3596f211badf0d2becf131a979cd"
},
"CVE-2018-19407": {
"cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization",
"cmt_id": "83f00ab9a7c03e9f1410727d985b7fe9473002e1"
},
"CVE-2020-0435": {
"cmt_msg": "f2fs: fix to do sanity check with i_extra_isize",
"cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220"
},
"CVE-2019-2025": {
"cmt_msg": "binder: fix race that allows malicious free of live buffer",
"cmt_id": "fd6cc33d0775b0d902906d88dd05cc1a2a059f8d"
}
},
"4.14.87": {
"CVE-2018-16862": {
"cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation",
"cmt_id": "60720df8bf43e8ca2ce1a17936904a52129c8471"
},
"CVE-2018-18397": {
"cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails",
"cmt_id": "82c5a8c0debac552750a00b4fc7551c89c7b34b8"
}
},
"4.14.88": {
"CVE-2018-20169": {
"cmt_msg": "USB: check usb_get_extra_descriptor for proper size",
"cmt_id": "7b6e85da8d94948201abb8d576d485892a6a878f"
},
"CVE-2018-5953": {
"cmt_msg": "printk: hash addresses printed with %p",
"cmt_id": "f2a4f7622d052eb987e8693633468c239c13575a"
},
"CVE-2018-14616": {
"cmt_msg": "f2fs: fix to do sanity check with block address in main area v2",
"cmt_id": "38fce19d4d7bc8acfa183ee2918758d279a69c9a"
},
"CVE-2018-14625": {
"cmt_msg": "vhost/vsock: fix use-after-free in network stack callers",
"cmt_id": "f15c072d6576c5e2b693c22e39ccc9103c952078"
},
"CVE-2018-19824": {
"cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c",
"cmt_id": "19f74e45746253cafb8cb1e773041e7cadbac622"
}
},
"4.14.91": {
"CVE-2018-16882": {
"cmt_msg": "KVM: Fix UAF in nested posted interrupt processing",
"cmt_id": "cc70f14956fa0ea84ee1a3a5b79347730c6c2d08"
},
"CVE-2018-19985": {
"cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data",
"cmt_id": "49be8dc589aee04c64d61e362c5029ab20fd6fd7"
}
},
"4.14.93": {
"CVE-2019-15927": {
"cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()",
"cmt_id": "1117b7a380f4b4f575d90a318a43d2e168c01fbd"
},
"CVE-2018-20784": {
"cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c",
"cmt_id": "c6a9a1ccafc49fe95d8de54eef154ad5c3b94077"
},
"CVE-2019-6133": {
"cmt_msg": "fork: record start_time late",
"cmt_id": "3f2e4e1d9a6cffa95d31b7a491243d5e92a82507"
}
},
"4.14.94": {
"CVE-2018-16884": {
"cmt_msg": "sunrpc: use-after-free in svc_process_common()",
"cmt_id": "65dba32522065b79a16393efc75f8006c2c3dbb8"
}
},
"4.14.95": {
"CVE-2019-3701": {
"cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification",
"cmt_id": "39ff087b5c6be2ff0b08e617d334e5bf72a08b44"
},
"CVE-2020-10769": {
"cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len",
"cmt_id": "b9119fd2749c1459416ebb559cf7c1d379786cff"
}
},
"4.14.96": {
"CVE-2019-11085": {
"cmt_msg": "drm/i915/gvt: Fix mmap range check",
"cmt_id": "e89ec9b92f9b75b44e1ff9f52dab48bd01834ed6"
}
},
"4.14.99": {
"CVE-2019-7222": {
"cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)",
"cmt_id": "ef1b3d4893cec543305d30e8160df8c096135950"
},
"CVE-2019-6974": {
"cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)",
"cmt_id": "8c1b11bc3555b5d1207b0e179cbdd8b945e71e69"
},
"CVE-2019-7221": {
"cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)",
"cmt_id": "1c965b1b5ecc2c9e1d59b2514cedb6f7483a0241"
}
},
"4.14.102": {
"CVE-2018-1000026": {
"cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware",
"cmt_id": "60cd31866de4386d940e55073491c3ee17ca593e"
}
},
"4.14.103": {
"CVE-2019-8912": {
"cmt_msg": "net: crypto set sk to NULL when af_alg_release.",
"cmt_id": "6e4c01ee785c2192fcc4be234cedde3706309a7e"
}
},
"4.14.105": {
"CVE-2019-9213": {
"cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()",
"cmt_id": "f5817069248630b3b7b17ebfcdee0b679c52be33"
}
},
"4.14.106": {
"CVE-2019-16994": {
"cmt_msg": "net: sit: fix memory leak in sit_init_net()",
"cmt_id": "46a5caa79ff73c9403ab37475ef47ed4c027e712"
},
"CVE-2019-12818": {
"cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails",
"cmt_id": "b275f8e6a0096cac11cf697c4e3ad226070264f5"
},
"CVE-2019-8980": {
"cmt_msg": "exec: Fix mem leak in kernel_read_file",
"cmt_id": "069fb92ea221c72bd75f4863b3540420082f32ba"
},
"CVE-2019-15916": {
"cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject",
"cmt_id": "306bbaeb077068141d472b922ae1adf7ab81fd72"
},
"CVE-2019-2101": {
"cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow",
"cmt_id": "aa4ba765e0903926de64b359e8653bfd29a3c353"
}
},
"4.14.107": {
"CVE-2019-16995": {
"cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()",
"cmt_id": "1aa1e0a3f6dde5c37bb5d6a9121847b95b255c1f"
},
"CVE-2019-12819": {
"cmt_msg": "mdio_bus: Fix use-after-free on device_register fails",
"cmt_id": "07c2216c3783daca34ea0d86affb9dfc5346f183"
}
},
"4.14.108": {
"CVE-2019-10124": {
"cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()",
"cmt_id": "c02fd076842636fb7506d4ca8a2bb3f91faf1af3"
},
"CVE-2019-9455": {
"cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()",
"cmt_id": "8d6df5097c0005320ab6f3cd8dda2ef31db6c6d1"
},
"CVE-2019-16413": {
"cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit",
"cmt_id": "be0b155c2b2f8c39adaa1641f3f6a4be47277993"
}
},
"4.14.109": {
"CVE-2019-15917": {
"cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()",
"cmt_id": "a1dbb34da6f2edf321df5023cb2accd92579269b"
}
},
"4.14.110": {
"CVE-2019-20811": {
"cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success",
"cmt_id": "e331c9066901dfe40bea4647521b86e9fb9901bb"
},
"CVE-2019-20054": {
"cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links",
"cmt_id": "0d9ef3f5b07e4b6fe6105a45603de1e133e4df49"
},
"CVE-2019-3460": {
"cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt",
"cmt_id": "82868814a87236b17ac588fbb779c87616e99345"
},
"CVE-2019-15921": {
"cmt_msg": "genetlink: Fix a memory leak on error path",
"cmt_id": "111fdc6e948b36115e29cf3b1981058d033ffd54"
},
"CVE-2019-3459": {
"cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer",
"cmt_id": "2b59d36f22622c92c0b06aee7571f0a86a217188"
}
},
"4.14.111": {
"CVE-2019-11810": {
"cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed",
"cmt_id": "90fca247abf6adc1ee6eef9b3de199448c8a4ad6"
}
},
"4.14.112": {
"CVE-2019-11486": {
"cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN",
"cmt_id": "429977fd9f7153607230a6040ee12510a525e930"
},
"CVE-2019-11815": {
"cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().",
"cmt_id": "c8a88799e632045399af886a1b1a5205e5d49897"
},
"CVE-2019-10639": {
"cmt_msg": "netns: provide pure entropy for net_hash_mix()",
"cmt_id": "adbb8bdd392db14dc80ad1ac29f8f1d37ab57a62"
}
},
"4.14.113": {
"CVE-2019-15292": {
"cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit",
"cmt_id": "0ba1fa56351e6e9c2f8db4ffc823cb7057e4ea82"
},
"CVE-2019-7308": {
"cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths",
"cmt_id": "6588a490bfe1b879f11b5e74724ef53a33b68641"
}
},
"4.14.114": {
"CVE-2018-5995": {
"cmt_msg": "printk: hash addresses printed with %p",
"cmt_id": "47ad82a34560ea70e85d2eb56be0ada03dc4fd35"
},
"CVE-2019-11599": {
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
"cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b"
},
"CVE-2019-3892": {
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
"cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b"
},
"CVE-2019-15214": {
"cmt_msg": "ALSA: core: Fix card races between register and disconnect",
"cmt_id": "d11a33e9ba584bb6f5cc74df9d74b26156ba9bb2"
}
},
"4.14.115": {
"CVE-2019-3882": {
"cmt_msg": "vfio/type1: Limit DMA mappings per container",
"cmt_id": "73a95f1a41c0bb586b8c62622ebf25aca1582af3"
},
"CVE-2019-15924": {
"cmt_msg": "fm10k: Fix a potential NULL pointer dereference",
"cmt_id": "2617f9af19ce93c509ebf3fd3ce26048b8f85216"
}
},
"4.14.116": {
"CVE-2019-11487": {
"cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get",
"cmt_id": "c88a0aa7ace7eb10dca42be59f21e2cbd263575e"
}
},
"4.14.117": {
"CVE-2019-15216": {
"cmt_msg": "USB: yurex: Fix protection fault after device removal",
"cmt_id": "5696fa3f42168ee33256c0b0b72ca963d224327f"
}
},
"4.14.118": {
"CVE-2018-20836": {
"cmt_msg": "scsi: libsas: fix a race condition when smp task timeout",
"cmt_id": "3739f98aea7113a21d11b1a604525049e422e29e"
},
"CVE-2019-11884": {
"cmt_msg": "Bluetooth: hidp: fix buffer overflow",
"cmt_id": "2c33156b2d2f5efe820d8efdd610fb168c9acf72"
}
},
"4.14.119": {
"CVE-2019-11091": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239"
},
"CVE-2018-12130": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239"
},
"CVE-2018-12127": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239"
},
"CVE-2018-12126": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239"
}
},
"4.14.120": {
"CVE-2019-10142": {
"cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl",
"cmt_id": "1a3a561df5e176a4422270e3d2cca1cd835b292e"
}
},
"4.14.121": {
"CVE-2019-11833": {
"cmt_msg": "ext4: zero out the unused memory region in the extent tree block",
"cmt_id": "d7d9e4823b658eb795f4a379d121d3f0539c1117"
}
},
"4.14.122": {
"CVE-2019-15666": {
"cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink",
"cmt_id": "1a2bb5125acb5be09ac8dcbf0f1e47ec28468fdc"
}
},
"4.14.123": {
"CVE-2019-20095": {
"cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd",
"cmt_id": "ccebaeca5089c49f2b331e91334b2d2e7a40e53c"
},
"CVE-2019-19543": {
"cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module",
"cmt_id": "f1c9f1f3665635d86e4d507312f4d114d0d738e3"
},
"CVE-2019-9466": {
"cmt_msg": "brcmfmac: add subtype check for event handling in data path",
"cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4"
},
"CVE-2019-9500": {
"cmt_msg": "brcmfmac: assure SSID length from firmware is limited",
"cmt_id": "f9ba91b5d1bfb6124640e00dca6562f69b71ca19"
},
"CVE-2019-9503": {
"cmt_msg": "brcmfmac: add subtype check for event handling in data path",
"cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4"
},
"CVE-2019-19966": {
"cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit",
"cmt_id": "b7eaea002ad0a3d2563df9d18e2ca3c6bd81abd3"
}
},
"4.14.124": {
"CVE-2020-10720": {
"cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()",
"cmt_id": "385ee66eaf88e1f04be973f623b81e4bf0ec0c6f"
},
"CVE-2019-15219": {
"cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe",
"cmt_id": "47ffaae93ea154ae149315389a30780fa3189caf"
},
"CVE-2019-15218": {
"cmt_msg": "media: usb: siano: Fix general protection fault in smsusb",
"cmt_id": "5a7adcda3de26a44fc0fa3f68199358b1527daf4"
},
"CVE-2019-15212": {
"cmt_msg": "USB: rio500: refuse more than one device at a time",
"cmt_id": "f18227d08e6b50717e1560a86fbebda0ca911507"
},
"CVE-2019-1999": {
"cmt_msg": "binder: fix race between munmap() and direct reclaim",
"cmt_id": "c2a035d7822ac8d2870cd6dbaadc1ab407713b83"
},
"CVE-2019-10638": {
"cmt_msg": "inet: switch IP ID generator to siphash",
"cmt_id": "e10789acbe6a76b304f45cbc8bb77a926ae4f201"
}
},
"4.14.127": {
"CVE-2019-11479": {
"cmt_msg": "tcp: add tcp_min_snd_mss sysctl",
"cmt_id": "cd6f35b8421ff20365ff711c0ac7647fd70e9af7"
},
"CVE-2019-11478": {
"cmt_msg": "tcp: tcp_fragment() should apply sane memory limits",
"cmt_id": "9daf226ff92679d09aeca1b5c1240e3607153336"
},
"CVE-2019-11477": {
"cmt_msg": "tcp: limit payload size of sacked skbs",
"cmt_id": "d632920554c5aec81d8a79c23dac07efcbabbd54"
}
},
"4.14.128": {
"CVE-2019-15090": {
"cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead",
"cmt_id": "af1630c6dc4fd96c09fef088f9c400c35e259e72"
}
},
"4.14.129": {
"CVE-2019-15807": {
"cmt_msg": "scsi: libsas: delete sas port if expander discover failed",
"cmt_id": "5992a6926eb037cb8ed30521c74e2bef082a8946"
}
},
"4.14.130": {
"CVE-2019-12615": {
"cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()",
"cmt_id": "b1013624a8adb9caa83b4c9f487778c7b51467a0"
},
"CVE-2019-0136": {
"cmt_msg": "mac80211: drop robust management frames from unknown TA",
"cmt_id": "7a680d6e5441400b768d6e6cfe5524726ebd6b7f"
}
},
"4.14.133": {
"CVE-2019-13272": {
"cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME",
"cmt_id": "bf71ef9655d25e8b275ec6ed649b6bd719231ddc"
},
"CVE-2019-15221": {
"cmt_msg": "ALSA: line6: Fix write on zero-sized buffer",
"cmt_id": "37eaa74451c1003a6bec548c957890c264559463"
},
"CVE-2019-9506": {
"cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check",
"cmt_id": "05206de4e9ae033afd32f685c4a005cbc1dceb39"
},
"CVE-2019-3900": {
"cmt_msg": "vhost_net: fix possible infinite loop",
"cmt_id": "ae446749492d8bd23f1d0b81adba16e5739dc740"
}
},
"4.14.134": {
"CVE-2019-10126": {
"cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()",
"cmt_id": "b1459fb34061337efbf0d47a3ba6208f2f59829d"
},
"CVE-2019-3846": {
"cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor",
"cmt_id": "d50f6b58d7ad30ad8e96c0bbc3e5ecfe9b91ba77"
},
"CVE-2019-15220": {
"cmt_msg": "p54usb: Fix race between disconnect and firmware loading",
"cmt_id": "c760ecb74f84f729ae31b9fbc6b772923cdc78df"
}
},
"4.14.135": {
"CVE-2019-17351": {
"cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free",
"cmt_id": "ba110e6dc391f70195c161bcc3de2c58ba705045"
},
"CVE-2019-12382": {
"cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()",
"cmt_id": "df56de8931b924c1d850b80e1b22b62449758e90"
},
"CVE-2019-13631": {
"cmt_msg": "Input: gtco - bounds check collection indent level",
"cmt_id": "81bf168d855cc1d97a7c9cde6787ff42485556c8"
},
"CVE-2019-15925": {
"cmt_msg": "net: hns3: add some error checking in hclge_tm module",
"cmt_id": "18f05a6fc4cfb78ff1de275d9ebf88c3ed5522a2"
},
"CVE-2019-15926": {
"cmt_msg": "ath6kl: add some bounds checking",
"cmt_id": "193a754afbe979a43893c88373a625ed384123ab"
},
"CVE-2019-14284": {
"cmt_msg": "floppy: fix div-by-zero in setup_format_params",
"cmt_id": "a904a690ea0317fcd88c5b9dfef40ef0f98d9530"
},
"CVE-2019-14283": {
"cmt_msg": "floppy: fix out-of-bounds read in copy_buffer",
"cmt_id": "80637a906eded08e04ed8a6fbbdd2b8112eaa387"
},
"CVE-2019-13648": {
"cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM",
"cmt_id": "26bee6ef0d72193d58a085610fe49169d23baa83"
}
},
"4.14.136": {
"CVE-2019-15211": {
"cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc",
"cmt_id": "c4c213d9aadc85a2808b04d3676970ea5f90340e"
},
"CVE-2019-10207": {
"cmt_msg": "Bluetooth: hci_uart: check for missing tty operations",
"cmt_id": "69f9c2bc3f754ad1d610b30b940681d678c8e684"
},
"CVE-2019-20934": {
"cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers",
"cmt_id": "d0919216e468d5613cc8c53d4d0676026960fe39"
},
"CVE-2019-15215": {
"cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect",
"cmt_id": "3566a98e59b5cb19829d21bfe18cd396812ce15e"
},
"CVE-2019-2213": {
"cmt_msg": "binder: fix possible UAF when freeing buffer",
"cmt_id": "a4a3c070b8760f71c8311399fa9bfe67c8629bca"
}
},
"4.14.137": {
"CVE-2019-1125": {
"cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations",
"cmt_id": "83e6e48e70a133a5ea6167bf152ce2b274008b3d"
}
},
"4.14.139": {
"CVE-2019-19536": {
"cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices",
"cmt_id": "dc741536d5d04065217a8402c52ad49df4cf134c"
},
"CVE-2019-19535": {
"cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices",
"cmt_id": "15312ff709e6a5598a33edb3d31882951233d765"
},
"CVE-2019-19531": {
"cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete",
"cmt_id": "f0d684599b4f2525a6a7fe0cde8dff6800d16a22"
}
},
"4.14.140": {
"CVE-2019-19537": {
"cmt_msg": "USB: core: Fix races in character device registration and deregistraion",
"cmt_id": "282a771475c2016ef77871f4438d9aaf9c8aa2b7"
},
"CVE-2019-19527": {
"cmt_msg": "HID: hiddev: do cleanup in failure of opening a device",
"cmt_id": "d65ca54d05c209571cf2b3913277f75ab477e214"
},
"CVE-2019-19530": {
"cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough",
"cmt_id": "e630f38040b5d2ecc56920742f7bafd57834cd2a"
}
},
"4.14.141": {
"CVE-2019-15538": {
"cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT",
"cmt_id": "044d098441df8fabffba3b084a70beba0e77f8d4"
}
},
"4.14.142": {
"CVE-2019-15118": {
"cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term",
"cmt_id": "6e1a602dfd51709538fc371d053708934909e3ba"
},
"CVE-2019-15902": {
"cmt_msg": "unknown",
"cmt_id": "3a647417696217c5861a81ccfe5d2e6791d696ac"
},
"CVE-2019-15117": {
"cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit",
"cmt_id": "96b0e80b6d5fb88c4f5b1e9d5224f2aa56395926"
}
},
"4.14.144": {
"CVE-2019-14835": {
"cmt_msg": "vhost: make sure log_num < in_num",
"cmt_id": "7e9480b480a57fb4ef2e4d2c2cddbb1a31d56b33"
},
"CVE-2019-15030": {
"cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction",
"cmt_id": "32b803e81ce17eec816f09d5388ef0a1cc9e4c2f"
}
},
"4.14.146": {
"CVE-2019-14816": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215"
},
"CVE-2019-14814": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215"
},
"CVE-2019-14815": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215"
},
"CVE-2019-15505": {
"cmt_msg": "media: technisat-usb2: break out of loop at end of buffer",
"cmt_id": "120d5674a14f5d641970bc4287a752e60415b17c"
},
"CVE-2019-14821": {
"cmt_msg": "KVM: coalesced_mmio: add bounds checking",
"cmt_id": "bf81752d808cd31e18d9a8db6d92b73497aa48d2"
}
},
"4.14.147": {
"CVE-2019-17056": {
"cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "b6a2d6c11272b3cf5d2d902bb9aaf7558560a5eb"
},
"CVE-2019-17053": {
"cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "70f80cb205649c7350617ca79515b98419e90475"
},
"CVE-2019-17052": {
"cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "6567debe7f9c0423e18a758060cc63ee69e2e7d0"
},
"CVE-2019-19533": {
"cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()",
"cmt_id": "580ee4a521ddc18aad5c750cc84bf43171599b29"
},
"CVE-2019-17055": {
"cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "371af137855d633d7c6226f659bbb6dcceb21322"
},
"CVE-2019-17054": {
"cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "272f46fe19daa1a18c0243cc8ac150e291ea51fd"
}
},
"4.14.148": {
"CVE-2019-18806": {
"cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers",
"cmt_id": "dca8aabd7198e1aa7210ff2de081befba79d0d41"
}
},
"4.14.149": {
"CVE-2019-19525": {
"cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect",
"cmt_id": "481376cc2ccb32113a2492ed1f8de32b5c777b00"
},
"CVE-2019-16746": {
"cmt_msg": "nl80211: validate beacon head",
"cmt_id": "01ec813e457954d8eeaf768d57d625752d245bc9"
}
},
"4.14.150": {
"CVE-2018-20976": {
"cmt_msg": "xfs: clear sb->s_fs_info on mount failure",
"cmt_id": "6921174cd2fb5f2d0608770fe23056ab128b6d97"
},
"CVE-2019-19523": {
"cmt_msg": "USB: adutux: fix use-after-free on disconnect",
"cmt_id": "b074263b69bc7683d5ac595cb135b4b5dfd04813"
},
"CVE-2019-19528": {
"cmt_msg": "USB: iowarrior: fix use-after-free on disconnect",
"cmt_id": "10b0e388a18353d224ccf17cc46a57f1070abb2b"
}
},
"4.14.151": {
"CVE-2019-19075": {
"cmt_msg": "ieee802154: ca8210: prevent memory leak",
"cmt_id": "0cafebaf5719dc84361e39f3f3874721ec95d1af"
},
"CVE-2019-17075": {
"cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack",
"cmt_id": "1db19d6805d9dc5c79f8a19dddde324dbf0a33f9"
},
"CVE-2019-17133": {
"cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs",
"cmt_id": "63eb9c2849bc377c6bbf491f752c6cc6b9b75bca"
}
},
"4.14.152": {
"CVE-2019-19065": {
"cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init",
"cmt_id": "8f7b8f1d14d714181b35e69f4cb73f02ea8f0156"
},
"CVE-2019-17666": {
"cmt_msg": "rtlwifi: Fix potential overflow on P2P code",
"cmt_id": "1b940dd55d42133791d7ba4841adfcf436fab98e"
},
"CVE-2019-15099": {
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()",
"cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a"
},
"CVE-2019-15098": {
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()",
"cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a"
},
"CVE-2020-10773": {
"cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()",
"cmt_id": "119e9aef452a6b6976d20dac8f35aa2dc3e01348"
},
"CVE-2019-19526": {
"cmt_msg": "NFC: pn533: fix use-after-free and memleaks",
"cmt_id": "2a571bd399084762a67519f35ef586407fbd3cb2"
},
"CVE-2019-19532": {
"cmt_msg": "HID: Fix assumption that devices have inputs",
"cmt_id": "e13a3d84494ca7b560551a9927231e7ecf27d96a"
}
},
"4.14.153": {
"CVE-2019-18282": {
"cmt_msg": "net/flow_dissector: switch to siphash",
"cmt_id": "a9de6f42e945cdb24b59c7ab7ebad1eba6cb5875"
},
"CVE-2019-19049": {
"cmt_msg": "of: unittest: fix memory leak in unittest_data_add",
"cmt_id": "9f4ca715dae36ff5b737d56165df1b7964a2cb3e"
}
},
"4.14.154": {
"CVE-2019-19045": {
"cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq",
"cmt_id": "d905f0cea5e0f29b8aced5a38b1ce243051887de"
},
"CVE-2019-19052": {
"cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak",
"cmt_id": "3f5e99731cd55f9be6468e9af7985a838ce7255b"
},
"CVE-2018-12207": {
"cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry",
"cmt_id": "82e77746f07db70367f66ef272256037d6415353"
},
"CVE-2019-0155": {
"cmt_msg": "drm/i915: Rename gen7 cmdparser tables",
"cmt_id": "82e0caec38b8eb2ec4fa90b614ba02fc297faeb7"
},
"CVE-2019-0154": {
"cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs",
"cmt_id": "d302d64a90b0b390ead3f70832aac2662e34323b"
},
"CVE-2019-19922": {
"cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices",
"cmt_id": "3dec71e388f95382d83ebb5589f0016eac4a6d2b"
},
"CVE-2019-19529": {
"cmt_msg": "can: mcba_usb: fix use-after-free on disconnect",
"cmt_id": "72e535208bc328e0617a8adb242bf8d89cdfd7d4"
},
"CVE-2019-11135": {
"cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR",
"cmt_id": "74bccd0ec712fdff716cec80ba1553d41bc887b8"
},
"CVE-2019-16231": {
"cmt_msg": "fjes: Handle workqueue allocation failure",
"cmt_id": "81370ee55d9250e0744e09493186cb0e071dbcb2"
},
"CVE-2019-19534": {
"cmt_msg": "can: peak_usb: fix slab info leak",
"cmt_id": "89a23a5d03956b44eac1a778806449577d690c6c"
}
},
"4.14.155": {
"CVE-2019-19524": {
"cmt_msg": "Input: ff-memless - kill timer in destroy()",
"cmt_id": "5edab14154213a4b6bcc527f60adb6124034a0be"
}
},
"4.14.157": {
"CVE-2019-18660": {
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch",
"cmt_id": "bc06abfb2bc7e5856f997ebc57c361caa08cd961"
},
"CVE-2019-15291": {
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking",
"cmt_id": "9a611c200ee2777bb3551ee1d979bf923b93653a"
},
"CVE-2019-18683": {
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop",
"cmt_id": "4a2c9b037a08b8496f04a76987332ca6f19bd794"
}
},
"4.14.158": {
"CVE-2019-12614": {
"cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()",
"cmt_id": "0583dc6fceb6b70cbd7e39802da41d8269fe82ac"
},
"CVE-2019-19767": {
"cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling",
"cmt_id": "eb3257cba634f9a520467f6c8c56f4abfa347484"
}
},
"4.14.159": {
"CVE-2019-19227": {
"cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client",
"cmt_id": "39de8cc3678f5cd1f4e0ae274c20acabbd85a8b1"
},
"CVE-2019-19062": {
"cmt_msg": "crypto: user - fix memory leak in crypto_report",
"cmt_id": "41b3b8e0775465c33083ce1998df7f15c039c9bf"
},
"CVE-2019-19332": {
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)",
"cmt_id": "f70609f898d63973388b36adf3650489311b13b9"
},
"CVE-2019-19071": {
"cmt_msg": "rsi: release skb if rsi_prepare_beacon fails",
"cmt_id": "0d8b2921af273b9545e16ad21375fabcb647c56e"
},
"CVE-2019-19447": {
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely",
"cmt_id": "d5a2955049171e48feba628e60f15206689bba94"
}
},
"4.14.161": {
"CVE-2019-18786": {
"cmt_msg": "media: rcar_drif: fix a memory disclosure",
"cmt_id": "3feec89682118fad5139e745c3453a4cf8580ef0"
},
"CVE-2019-19057": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring",
"cmt_id": "1cdafe368ec4ad7e878eddc30ea0d11a0f57b222"
},
"CVE-2019-19063": {
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe",
"cmt_id": "9c84ba30947a9d8ac2c67abaafc17087ead04426"
},
"CVE-2020-0427": {
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string",
"cmt_id": "679c4f27b8958b65bb51d1c3dfdbf3befe4a33a3"
},
"CVE-2019-20812": {
"cmt_msg": "af_packet: set defaule value for tmo",
"cmt_id": "665c9af8987880414e141e623bf7e6481d1c1696"
},
"CVE-2019-16232": {
"cmt_msg": "libertas: fix a potential NULL pointer dereference",
"cmt_id": "b88d9f8b8ba5722ab4aef7d01c2a5a66b5414b83"
}
},
"4.14.162": {
"CVE-2020-10690": {
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev",
"cmt_id": "2dece4d6d13fe179ee3a5991811712725a56e2f7"
}
},
"4.14.163": {
"CVE-2019-18809": {
"cmt_msg": "media: usb: fix memory leak in af9005_identify_state",
"cmt_id": "2d7c27957cac081eeacea7c38d8c9c59049883dc"
},
"CVE-2019-19965": {
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected",
"cmt_id": "82df1d3fa11bc7b25789efa4232bf0c188c8bc72"
}
},
"4.14.164": {
"CVE-2019-14901": {
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()",
"cmt_id": "ec3bb975c6013aa2f5e8a96a0bee2c8d39618e89"
},
"CVE-2020-0430": {
"cmt_msg": "bpf: reject passing modified ctx to helper functions",
"cmt_id": "7fed98f4a1e6eb77a5d66ecfdf9345e21df6ac82"
}
},
"4.14.165": {
"CVE-2019-14895": {
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()",
"cmt_id": "c2544fb30080aecc3fff99f2e97999ce8e625f45"
},
"CVE-2020-0305": {
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'",
"cmt_id": "c807f43500e14ed24599106745bb6005665f74d6"
},
"CVE-2019-19066": {
"cmt_msg": "scsi: bfa: release allocated memory in case of error",
"cmt_id": "f4e8c78fad1294c785de5e92562862dbef1e9c1e"
},
"CVE-2019-20636": {
"cmt_msg": "Input: add safety guards to input_set_keycode()",
"cmt_id": "af62c38b0f86539504dc5c0e5dcfc7613b1150a5"
},
"CVE-2019-19068": {
"cmt_msg": "rtl8xxxu: prevent leaking urb",
"cmt_id": "32079b0c59f4620fdf7a5576af7502b0d05fcb01"
},
"CVE-2020-0431": {
"cmt_msg": "HID: hid-input: clear unmapped usages",
"cmt_id": "cb0a3edf8d00740303e5b42e9c0e72d924fc23d2"
},
"CVE-2019-14615": {
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch",
"cmt_id": "39465647eda707db7c7561006da3a8450ca634b9"
},
"CVE-2019-19056": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf",
"cmt_id": "6ddbe82681d911534f460e6afd297fcf7f388049"
},
"CVE-2019-19078": {
"cmt_msg": "ath10k: fix memory leak",
"cmt_id": "4af2276845448609264360e95973246f222a7d86"
}
},
"4.14.166": {
"CVE-2019-20096": {
"cmt_msg": "dccp: Fix memleak in __feat_register_sp",
"cmt_id": "d0c15c1e8f9223552818fe5340b0427483b34f22"
},
"CVE-2019-15217": {
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap",
"cmt_id": "ffe76c896fbc91af8859aaea15b75b0b887960f3"
},
"CVE-2019-19058": {
"cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable",
"cmt_id": "db1fb5a39747a680a4cc182c8bb4648b845a841f"
},
"CVE-2018-21008": {
"cmt_msg": "rsi: add fix for crash during assertions",
"cmt_id": "ba8bbddaa188235df007411fdead5832f9e0cb59"
},
"CVE-2019-2182": {
"cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings",
"cmt_id": "68a066f6ff13e7029d54da9d322ad686694c7039"
},
"CVE-2019-15918": {
"cmt_msg": "cifs: Fix lease buffer length error",
"cmt_id": "1059b758b6fb0fb6949b8c0474d5db27ea269b01"
},
"CVE-2019-5108": {
"cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization",
"cmt_id": "57e1b5f6b55acb655358bd62c7e2f14d8af90e0a"
}
},
"4.14.167": {
"CVE-2020-12652": {
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl",
"cmt_id": "fedf64ea8f461ac51d9772998b277a30cbf8375e"
}
},
"4.14.168": {
"CVE-2019-20806": {
"cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame",
"cmt_id": "f4c8d9e5ea524d7f53e54da2920a7d1250822ec5"
}
},
"4.14.169": {
"CVE-2019-14896": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875"
},
"CVE-2019-14897": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875"
},
"CVE-2020-14416": {
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU",
"cmt_id": "c39c4e9116943faf30fb7fb9cc1e739c732b4443"
}
},
"4.14.170": {
"CVE-2020-0432": {
"cmt_msg": "staging: most: net: fix buffer overflow",
"cmt_id": "6560fd66278fec045902010ff7b07878a13e501f"
},
"CVE-2020-12769": {
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls",
"cmt_id": "b56f2a4a4327f609e30872e37eda6d73a6433ed2"
}
},
"4.14.171": {
"CVE-2020-12653": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()",
"cmt_id": "43e189049f32740c0d015f43a407658ac53d1743"
},
"CVE-2020-12654": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()",
"cmt_id": "49e9f1057ef968af57a62860697898cb35246936"
},
"CVE-2020-0404": {
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors",
"cmt_id": "52f001bf9ba6d5fc628852dd6102a98f573e0b3b"
}
},
"4.14.172": {
"CVE-2020-9383": {
"cmt_msg": "floppy: check FDC index for errors before assigning it",
"cmt_id": "e4c587650f64608fcd3506fa2cb47f81c0f88348"
},
"CVE-2020-2732": {
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode",
"cmt_id": "ee1238c0285f40d8297e70f3aaa0d8a981ea0b53"
},
"CVE-2019-16233": {
"cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference",
"cmt_id": "2011a54b6161cdeb42ec8d7843170977701f97b6"
},
"CVE-2020-0009": {
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped",
"cmt_id": "60ba005bbf5751c2c58ca23ccfc9289ae06782b7"
}
},
"4.14.173": {
"CVE-2020-8649": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff"
},
"CVE-2020-8648": {
"cmt_msg": "vt: selection, close sel_buffer race",
"cmt_id": "432ef54c0444e7cab85a291347bfc1f69ee6257a"
},
"CVE-2020-8647": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff"
},
"CVE-2020-10942": {
"cmt_msg": "vhost: Check docket sk_family instead of call getname",
"cmt_id": "ff8e12b0cfe277a54edbab525f068b39c7ed0de3"
},
"CVE-2020-27068": {
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE",
"cmt_id": "ffe09a48bd96094786c303f1cf29b32a29aa6dc8"
},
"CVE-2020-0444": {
"cmt_msg": "audit: fix error handling in audit_data_to_entry()",
"cmt_id": "edde9fcd5f41b2e22e455250214de0c4b126b255"
},
"CVE-2019-16234": {
"cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation",
"cmt_id": "864ef06aaef5b164669a5292eb822c454c46dd69"
}
},
"4.14.174": {
"CVE-2020-29370": {
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()",
"cmt_id": "992a5c90af04da6e1e047f10c5ee5d6d8752a699"
}
},
"4.14.175": {
"CVE-2020-14381": {
"cmt_msg": "futex: Fix inode life-time issue",
"cmt_id": "e52694b56eb6d4b1fe424bda6126b8ce13c246a8"
},
"CVE-2020-11668": {
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks",
"cmt_id": "e251c592321cb82e5f31b06542b2f1f6e81cb2b8"
},
"CVE-2021-3715": {
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable",
"cmt_id": "f0c92f59cf528bc1b872f2ca91b01e128a2af3e6"
},
"CVE-2020-27066": {
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer",
"cmt_id": "dc0ea9b710102ef628a26663d892031a2c381549"
},
"CVE-2020-11608": {
"cmt_msg": "media: ov519: add missing endpoint sanity checks",
"cmt_id": "ea7d13d02a76c76dd3a0ee7bda97bb4361473b62"
},
"CVE-2020-11609": {
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks",
"cmt_id": "b4ac6fbe5b1a3cb83d84cb9f7ab8df71d104f535"
}
},
"4.14.176": {
"CVE-2020-11494": {
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding",
"cmt_id": "d0a7c3373404bd931565f361802d320462fbe9f9"
},
"CVE-2020-11565": {
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED",
"cmt_id": "c51609ac4c48d31a8881af669f1192d2ee405928"
},
"CVE-2020-0433": {
"cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter",
"cmt_id": "574eb136ec7f315c3ef2ca68fa9b3e16c56baa24"
}
},
"4.14.177": {
"CVE-2020-12826": {
"cmt_msg": "signal: Extend exec_id to 64bits",
"cmt_id": "28c63ef17d620f0e95458c56c5d839ea3de3e500"
},
"CVE-2020-12657": {
"cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body",
"cmt_id": "f83b75ef20ac868046f90a7006b44bfea671a7c3"
},
"CVE-2020-11669": {
"cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle",
"cmt_id": "66a93f57330d3e172bf2c3da29f0501634bfac7a"
}
},
"4.14.178": {
"CVE-2019-19319": {
"cmt_msg": "ext4: protect journal inode's blocks using block_validity",
"cmt_id": "795762468125a6412c089651e74f780bee154118"
},
"CVE-2020-12114": {
"cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount",
"cmt_id": "e21c8c03af20932c15d8b1d3bb9cbad9607a6eab"
},
"CVE-2020-12464": {
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary",
"cmt_id": "b49aa64f1d2526de71ae0354d37026e5861ccb4b"
}
},
"4.14.179": {
"CVE-2020-10751": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613"
},
"CVE-2020-0255": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613"
}
},
"4.14.181": {
"CVE-2019-9245": {
"cmt_msg": "f2fs: sanity check of xattr entry size",
"cmt_id": "ec236cd6a254da2192c35a65fa0011a0268d66b7"
},
"CVE-2020-10711": {
"cmt_msg": "netlabel: cope with NULL catmap",
"cmt_id": "0f5ae0f5b2675e4e703b980221976a1c2d79dba9"
},
"CVE-2020-13143": {
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC",
"cmt_id": "3d1e9fbbfb888ef59697766561e982524c0a6a03"
},
"CVE-2020-1749": {
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup",
"cmt_id": "8ab8786f78c3fc930f9abf6d6d85e95567de4e1f"
},
"CVE-2020-27786": {
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses",
"cmt_id": "8645ac3684a70e4e8a21c7c407c07a1a4316beec"
},
"CVE-2019-9453": {
"cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary",
"cmt_id": "1d295b32df866ea09aa8cc94500ed6e96e2ea09e"
},
"CVE-2020-0067": {
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr",
"cmt_id": "ae811cecbbb231f11a84acaf74baca1283b964c7"
},
"CVE-2019-19768": {
"cmt_msg": "blktrace: Protect q->blk_trace with RCU",
"cmt_id": "7a35c8cbf2522e4f45d266dca95dacc71cf412ed"
},
"CVE-2020-12770": {
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write",
"cmt_id": "3f743dd319951491d005ea51470e180f6df9125e"
}
},
"4.14.182": {
"CVE-2021-0447": {
"cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU",
"cmt_id": "26f8819ddd10141ebe7bbce700fbab36bfa5f478"
}
},
"4.14.183": {
"CVE-2020-10732": {
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()",
"cmt_id": "61ce1733b30fdcf45e31308bc7795b6dc7f2ffba"
}
},
"4.14.184": {
"CVE-2020-13974": {
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii",
"cmt_id": "26079af52bf616bc492acc1fe41dce53fe199456"
},
"CVE-2020-0543": {
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()",
"cmt_id": "9c98ba3f69b156c9fee72b71260d51f623a4a457"
},
"CVE-2019-19462": {
"cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open",
"cmt_id": "7821131c16cb2d32a5014009b50d362317418556"
},
"CVE-2020-10757": {
"cmt_msg": "mm: Fix mremap not considering huge pmd devmap",
"cmt_id": "469ef673629d36d8ed5912b52f5d87ecc0309b3c"
}
},
"4.14.185": {
"CVE-2019-20810": {
"cmt_msg": "media: go7007: fix a miss of snd_card_free",
"cmt_id": "033e86f47388583d460e1ea075fc4581d23c0fe1"
},
"CVE-2018-20669": {
"cmt_msg": "make 'user_access_begin()' do 'access_ok()'",
"cmt_id": "b25df2918ba94ccc0ae44b4bb53f0f76a4bb0e96"
},
"CVE-2020-29368": {
"cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()",
"cmt_id": "3b6c93db0a02b843694cf91f8bacd94f8e7259c8"
},
"CVE-2020-10766": {
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown",
"cmt_id": "d808ea8d0b4deaf6be37a58d41550df48f117a3a"
},
"CVE-2020-10767": {
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.",
"cmt_id": "b4eba1edf71e3ce882d79fd46d654770a7b277b0"
},
"CVE-2020-10768": {
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.",
"cmt_id": "96f1500aedc9ee67ad9614917d7c6e97bc7dbaa1"
}
},
"4.14.186": {
"CVE-2020-12771": {
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce",
"cmt_id": "80d90125a3e1c98aafb6b13e62bd680fe9a4cd5a"
},
"CVE-2020-15436": {
"cmt_msg": "block: Fix use-after-free in blkdev_get()",
"cmt_id": "a43abf15844c9e5de016957b8e612f447b7fb077"
}
},
"4.14.187": {
"CVE-2020-12655": {
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify",
"cmt_id": "115267e8d9fce8d5efe0949f1d2e5cee30441cf7"
}
},
"4.14.188": {
"CVE-2020-24394": {
"cmt_msg": "nfsd: apply umask on fs without ACL support",
"cmt_id": "15fefb108c7af7ec8e19a88caed928d8b88120ff"
},
"CVE-2020-15393": {
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect",
"cmt_id": "4336374bc2220bf3c439b70c31d9e8f6f9583ea8"
}
},
"4.14.189": {
"CVE-2020-14356": {
"cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()",
"cmt_id": "82fd2138a5ffd7e0d4320cdb669e115ee976a26e"
},
"CVE-2020-10781": {
"cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"",
"cmt_id": "5cd9ec70b9f6431fc3e60075c01bc00f08c5606b"
}
},
"4.14.190": {
"CVE-2020-15437": {
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()",
"cmt_id": "c5760ab7aae09899412646e0cf842e23bea5b7a2"
}
},
"4.14.191": {
"CVE-2018-10323": {
"cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree",
"cmt_id": "8a443ffcf7b572c071398644d35cf9cc55cfa2cb"
}
},
"4.14.192": {
"CVE-2019-19061": {
"cmt_msg": "iio: imu: adis16400: fix memory leak",
"cmt_id": "8d75cc141d702ebc280dde2b32b50cfdea3a02b3"
},
"CVE-2019-9445": {
"cmt_msg": "f2fs: check if file namelen exceeds max value",
"cmt_id": "6a27f426266ac0d29faa95bed8934afeef1f9d13"
},
"CVE-2019-19054": {
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe",
"cmt_id": "12273ec840cc67b2ec469ee5f5214559357436bb"
},
"CVE-2018-8043": {
"cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()",
"cmt_id": "9e06953ee2a406c4bf4ff08c700d3ce1254974d1"
},
"CVE-2019-18808": {
"cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid",
"cmt_id": "a42f149865da48f25e5a49ca344dbcad61b66ae1"
},
"CVE-2019-19074": {
"cmt_msg": "ath9k: release allocated buffer if timed out",
"cmt_id": "83c212df7794563a2f45a3be8fbc097e352b2c3a"
},
"CVE-2019-19073": {
"cmt_msg": "ath9k_htc: release allocated buffer if timed out",
"cmt_id": "5502de13f91db625b063cb9d0793c7391f38452d"
},
"CVE-2017-18232": {
"cmt_msg": "scsi: libsas: direct call probe and destruct",
"cmt_id": "3a156abd24346a3188eb7e88cf86386a409e0d02"
},
"CVE-2019-3016": {
"cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit",
"cmt_id": "fd4a641bb5731c0ce5397698560a823602dbaac2"
}
},
"4.14.193": {
"CVE-2020-16166": {
"cmt_msg": "random32: update the net random state on interrupt and activity",
"cmt_id": "583bcbc024f6bf8daa266f4f71b99e9d6e78c40b"
}
},
"4.14.194": {
"CVE-2020-26088": {
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.",
"cmt_id": "980415fffec6952602edac586eb8c3a7d3f50b43"
},
"CVE-2020-36386": {
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()",
"cmt_id": "d91299b8382b129156708708d69876e753b9ade6"
},
"CVE-2019-19448": {
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space",
"cmt_id": "10742034076daea73acc17779e8f234060e03489"
},
"CVE-2020-25212": {
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow",
"cmt_id": "e4ddf4e58946c7dfe8568a21ee3d27b03d96bc56"
},
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling",
"cmt_id": "041a5a238a1e31992b5f22ef4f9792729d3b46ca"
}
},
"4.14.195": {
"CVE-2020-14314": {
"cmt_msg": "ext4: fix potential negative array index in do_split()",
"cmt_id": "fbbfd55a40d5d0806b59ee0403c75d5ac517533f"
},
"CVE-2020-29371": {
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()",
"cmt_id": "89346bc395e7bc0a7d3c36c824782050b17d4fec"
},
"CVE-2020-0466": {
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit",
"cmt_id": "6875d79ba740f47a480908cf9fa791715ea0e4f1"
}
},
"4.14.197": {
"CVE-2020-25285": {
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers",
"cmt_id": "c4b219136040bc57e9704afee8f5c5a9430795a5"
},
"CVE-2020-0465": {
"cmt_msg": "HID: core: Sanitize event code and type when mapping input",
"cmt_id": "a083dcdcfa2568747112edf865b3e848d70835e5"
},
"CVE-2020-25641": {
"cmt_msg": "block: allow for_each_bvec to support zero len bvec",
"cmt_id": "b7aae706e84ac271f755a574d6a18fc9b42e8e8f"
},
"CVE-2021-1048": {
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"",
"cmt_id": "c5c6e00f6cc5d3ed0d6464b14e33f2f5c8505888"
}
},
"4.14.198": {
"CVE-2020-12888": {
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory",
"cmt_id": "1356c3e8539ac48b9362e60b1fa80ec06bb960ec"
}
},
"4.14.199": {
"CVE-2020-25284": {
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping",
"cmt_id": "af4a88994936474294b2f484be01117dc7550e68"
},
"CVE-2020-14390": {
"cmt_msg": "fbcon: remove soft scrollback code",
"cmt_id": "6e2e0735dadecc1c1657e458e8f88e0ca6a4ec04"
},
"CVE-2020-28097": {
"cmt_msg": "vgacon: remove software scrollback support",
"cmt_id": "34c050b531a72639e61a3be24b608604753f885a"
}
},
"4.14.200": {
"CVE-2020-25645": {
"cmt_msg": "geneve: add transport ports in route lookup for geneve",
"cmt_id": "494648fc5286830b149bc1c1a059a827a45df3c8"
},
"CVE-2021-0605": {
"cmt_msg": "af_key: pfkey_dump needs parameter validation",
"cmt_id": "05570d97443f8e569a79cf6e140f5ed96e6ac172"
},
"CVE-2020-25643": {
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()",
"cmt_id": "8f0addb36dd1c61fe0f1a458a48b1a5ddc96aa24"
},
"CVE-2020-36312": {
"cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()",
"cmt_id": "40a023f681befd9b2862a3c16fb306a38b359ae5"
}
},
"4.14.201": {
"CVE-2020-14386": {
"cmt_msg": "net/packet: fix overflow in tpacket_rcv",
"cmt_id": "5b08356f184a0314d87f9a889be2ed9fef087691"
},
"CVE-2020-25211": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1"
},
"CVE-2021-0448": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1"
},
"CVE-2021-39634": {
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done",
"cmt_id": "23fb662b13e4f75688123e1d16aa7116f602db32"
},
"CVE-2020-28915": {
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()",
"cmt_id": "30386c13a1bfb0d1ce59ea83b825aa73bd516bc5"
}
},
"4.14.202": {
"CVE-2020-10135": {
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm",
"cmt_id": "7c9748f455b9206b279a4710210c902cb1f275e2"
},
"CVE-2020-12352": {
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members",
"cmt_id": "d53b1e94d08c032754a9aabeb3df309209c00347"
},
"CVE-2020-12351": {
"cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel",
"cmt_id": "2acf87436517894275a804210caa33b9a08cf93c"
}
},
"4.14.203": {
"CVE-2020-0423": {
"cmt_msg": "binder: fix UAF when releasing todo list",
"cmt_id": "d4c49b6733c3125c3cc71617399d22f5b8ff962f"
},
"CVE-2020-25705": {
"cmt_msg": "icmp: randomize the global rate limiter",
"cmt_id": "e1b8b57623521b7f4974476a20bd6ff971fde6c4"
}
},
"4.14.204": {
"CVE-2020-27777": {
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace",
"cmt_id": "818783bf8da5c20eb75a6bcf749eb97003ea9983"
},
"CVE-2020-25668": {
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed",
"cmt_id": "0182d680ead968cea5673ed5dcac0e4505a75f29"
},
"CVE-2020-25656": {
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers",
"cmt_id": "7f4c966f2ad5f580fd5b1e2dcb19ba1c06a9254f"
}
},
"4.14.205": {
"CVE-2019-0148": {
"cmt_msg": "i40e: Wrong truncation from u16 to u8",
"cmt_id": "9900bf4d433be6a2ed8c158779137c7a4742ab67"
},
"CVE-2020-35508": {
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent",
"cmt_id": "ee55b8c6bf4d59c7b82079b8a7d67597bb3a5539"
},
"CVE-2020-28974": {
"cmt_msg": "vt: Disable KD_FONT_OP_COPY",
"cmt_id": "9421bad22e9fb7f513d81ef8fec513c8a4850c0d"
},
"CVE-2019-0147": {
"cmt_msg": "i40e: add num_vectors checker in iwarp handler",
"cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618"
},
"CVE-2019-19770": {
"cmt_msg": "blktrace: fix debugfs use after free",
"cmt_id": "8268f88785ca9476c68da06d1f93c3d0d9747d28"
},
"CVE-2019-0145": {
"cmt_msg": "i40e: add num_vectors checker in iwarp handler",
"cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618"
}
},
"4.14.206": {
"CVE-2020-8694": {
"cmt_msg": "powercap: restrict energy meter to root access",
"cmt_id": "bab6310b64994ee6ca679d86c90ca24111783516"
}
},
"4.14.207": {
"CVE-2020-14351": {
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function",
"cmt_id": "30c8324e9e7ee57b58af2501cb7db5d9d4f7b69b"
},
"CVE-2020-27673": {
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking",
"cmt_id": "025ea15db5665fa14d1c48e39aa788acaf30471b"
},
"CVE-2020-27675": {
"cmt_msg": "xen/events: avoid removing an event channel while handling it",
"cmt_id": "b559da71974b5eb93311f7f475b2e4b16c0f9bb3"
},
"CVE-2020-25704": {
"cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()",
"cmt_id": "65c4000ccf7cc58a455977c5ec928525954058ac"
}
},
"4.14.208": {
"CVE-2020-4788": {
"cmt_msg": "powerpc/64s: flush L1D on kernel entry",
"cmt_id": "db01cad9efe3c3838a6b3a3f68affd295c4b92d6"
},
"CVE-2020-25669": {
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths",
"cmt_id": "436aff975718106d8e168fde69a3786962ca356e"
}
},
"4.14.209": {
"CVE-2020-28941": {
"cmt_msg": "speakup: Do not let the line discipline be used several times",
"cmt_id": "e712cefb3699ea978611edb3c2a5d3acd57d4004"
}
},
"4.14.210": {
"CVE-2019-19813": {
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference",
"cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974"
},
"CVE-2019-19816": {
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference",
"cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974"
}
},
"4.14.211": {
"CVE-2020-35519": {
"cmt_msg": "net/x25: prevent a couple of overflows",
"cmt_id": "f1fbbcb61d840792ae38bc4007160fc80c14ee90"
}
},
"4.14.212": {
"CVE-2020-29661": {
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()",
"cmt_id": "882e038d2cd276163a8fc7bbeffda59ae0924471"
},
"CVE-2020-29660": {
"cmt_msg": "tty: Fix ->session locking",
"cmt_id": "8deb3d9018400fab0a7401a910d3341053f5ec82"
},
"CVE-2020-27830": {
"cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup",
"cmt_id": "bccd77063e971a006164968873f4c2918b7188e6"
}
},
"4.14.213": {
"CVE-2020-27815": {
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree",
"cmt_id": "4a0809752ef23cd4be99b0cd8f7586c8ed7bd433"
},
"CVE-2020-29568": {
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing",
"cmt_id": "92d4ced9881361aefa2f7bc58dab19aa4d28ddf8"
},
"CVE-2020-29569": {
"cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()",
"cmt_id": "62afce1adda51bd9d033dbec1dfe413891021bae"
}
},
"4.14.214": {
"CVE-2020-36158": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start",
"cmt_id": "d367530330f7f638eecdfc724ae276546f1b1e68"
}
},
"4.14.215": {
"CVE-2020-28374": {
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup",
"cmt_id": "c842ead67ae3cac58e84e7880153e68cccd59773"
},
"CVE-2021-39648": {
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name",
"cmt_id": "6766064c794afeacc29b21fc09ea4dbe3cae1af3"
}
},
"4.14.217": {
"CVE-2021-3178": {
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export",
"cmt_id": "0f60f9d1e6182d9440614c13cdf6106e2d470f89"
}
},
"4.14.218": {
"CVE-2020-27825": {
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call",
"cmt_id": "fdb2310d58812b15f6b460509b43ff0b87e59367"
},
"CVE-2021-39657": {
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback",
"cmt_id": "30f2a89f9481f851bc68e51a1e7114392b052231"
}
},
"4.14.219": {
"CVE-2021-3348": {
"cmt_msg": "nbd: freeze the queue while we're adding connections",
"cmt_id": "51359110d9d9b0231dc6a60716895104c73e7770"
}
},
"4.14.222": {
"CVE-2021-26931": {
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()",
"cmt_id": "fd8ec8c708953323feb7c6177d894d39a23b08e4"
},
"CVE-2021-26930": {
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()",
"cmt_id": "5571633988e02a1107720544a57ab4878c4446be"
},
"CVE-2021-21781": {
"cmt_msg": "ARM: ensure the signal page contains defined contents",
"cmt_id": "b71cc506778eb283b752400e234784ee86b5891c"
},
"CVE-2021-26932": {
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()",
"cmt_id": "da2e2a5c88abfe0974b4b8575c798fcafb552fc9"
}
},
"4.14.223": {
"CVE-2021-0512": {
"cmt_msg": "HID: make arrays usage and value to be the same",
"cmt_id": "00022873fdc1a304fd89016d227e3781f413dfbd"
},
"CVE-2021-3612": {
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl",
"cmt_id": "d4b7440883871cbcaf6c1cd95a76048a86b005c7"
}
},
"4.14.224": {
"CVE-2021-30002": {
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy",
"cmt_id": "d4daa80676bfa53359ae31e601105cbdefaf2554"
},
"CVE-2021-27365": {
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE",
"cmt_id": "1a588b51ff984aadc027078125064807c5c7bc3f"
},
"CVE-2021-27364": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e"
},
"CVE-2021-27363": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e"
},
"CVE-2021-28038": {
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis",
"cmt_id": "893a88ea0ee11a1f5e2279cad3c0ed7736187288"
}
},
"4.14.226": {
"CVE-2019-19060": {
"cmt_msg": "iio: imu: adis16400: release allocated memory on failure",
"cmt_id": "593b7ff46bc064f2acac9ed6b7baa3189d2bcd90"
},
"CVE-2021-33033": {
"cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts",
"cmt_id": "ab44f7317c16ddcf9ee12ba2aca60771266c2dc6"
},
"CVE-2021-29265": {
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf",
"cmt_id": "04f879ba79b056041972122c1dc597b79d2464e5"
},
"CVE-2021-28660": {
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()",
"cmt_id": "33cdc63f0e07abf637ba326b6016731be958088d"
}
},
"4.14.227": {
"CVE-2021-28964": {
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root",
"cmt_id": "0fbf41006d8c850963049c35563e7775fe7c2164"
},
"CVE-2021-28972": {
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions",
"cmt_id": "6d7724c9c507d5b526991dcdef861c6b28c45eb2"
},
"CVE-2021-28971": {
"cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status",
"cmt_id": "403fdabcc1bcd0d31f9fcb9b9b2e831214ab2192"
}
},
"4.14.228": {
"CVE-2021-28688": {
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()",
"cmt_id": "db108b67d81397cdbaf3f91aeca6e5eb5f71de1d"
},
"CVE-2021-29647": {
"cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()",
"cmt_id": "749d2e33bfbacb3112cbfaafde75e507cb46c67d"
},
"CVE-2021-31916": {
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices",
"cmt_id": "ba73e621ced58ff4ad1020a140ccb5843da1cb26"
}
},
"4.14.229": {
"CVE-2021-0941": {
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len",
"cmt_id": "64cf6c3156a5cbd9c29f54370b801b336d2f7894"
},
"CVE-2021-3483": {
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()",
"cmt_id": "8aa6e548a5ee59c91e9e5d67fd6de5cbaa5c458a"
}
},
"4.14.230": {
"CVE-2021-29154": {
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64",
"cmt_id": "32f9a870ab6b1f72f100e9db55b8a022072f78a6"
}
},
"4.14.231": {
"CVE-2021-3659": {
"cmt_msg": "net: mac802154: Fix general protection fault",
"cmt_id": "d103fd20f0539e2bd615ed6f6159537cb7e2c5ba"
},
"CVE-2021-0937": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d"
},
"CVE-2020-25672": {
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()",
"cmt_id": "02b99cae71335f9f38d0a164ffe3a7a1328f44fc"
},
"CVE-2020-25673": {
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()",
"cmt_id": "892e1f065c1b3c99a12a1a41683f9ddbc22abb3e"
},
"CVE-2020-25670": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()",
"cmt_id": "538a6ff11516d38a61e237d2d2dc04c30c845fbe"
},
"CVE-2020-25671": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()",
"cmt_id": "b1d5c07a3b597766bbf5bf61083cd65e72034144"
},
"CVE-2021-22555": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d"
}
},
"4.14.232": {
"CVE-2020-29374": {
"cmt_msg": "gup: document and work around \"COW can break either way\" issue",
"cmt_id": "407faed92b4a4e2ad900d61ea3831dd597640f29"
},
"CVE-2021-23133": {
"cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock",
"cmt_id": "54b63c76b9bb95fba20cd268086ee448f87208c6"
}
},
"4.14.233": {
"CVE-2021-4157": {
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()",
"cmt_id": "40286f0852d2ecfa713438199557c706dc6a8db3"
},
"CVE-2021-33034": {
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy",
"cmt_id": "21f6aee6682a1f7415e23f96ce94ff387d9cdb2e"
},
"CVE-2021-32399": {
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller",
"cmt_id": "40acc1aa3e2a705a3c2ed171ed563ef04f7ba19e"
}
},
"4.14.234": {
"CVE-2020-26558": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5"
},
"CVE-2021-0129": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5"
}
},
"4.14.235": {
"CVE-2021-33098": {
"cmt_msg": "ixgbe: fix large MTU request from VF",
"cmt_id": "5217f9cab7dd28e9c7626cd795e51da98ecb2af4"
},
"CVE-2020-24587": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "f643397142c196d3ac653b2df32997dad991cb29"
},
"CVE-2020-24586": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "f643397142c196d3ac653b2df32997dad991cb29"
},
"CVE-2021-34981": {
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails",
"cmt_id": "6f6ac2a7959b1864886d07fcf3b9cec587dfe635"
},
"CVE-2020-24588": {
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks",
"cmt_id": "a3558e1b75fefb2299659ee0070ee917927d9220"
},
"CVE-2020-26139": {
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames",
"cmt_id": "557bb37533a365f9d8a0093ecce29417da4b9228"
},
"CVE-2020-26147": {
"cmt_msg": "mac80211: assure all fragments are encrypted",
"cmt_id": "c39f180c7bd8379de238a4fd4a2f7515e03802f8"
},
"CVE-2021-29650": {
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.",
"cmt_id": "f1fd7a174018f1107881150c6c2ce00e49a1e643"
}
},
"4.14.236": {
"CVE-2021-3564": {
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order",
"cmt_id": "fa7d2874963312030d9618541b9bc2e549e19ac1"
},
"CVE-2021-38208": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9"
},
"CVE-2021-3573": {
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object",
"cmt_id": "88481ea480756644b5221648216bb67866e51391"
},
"CVE-2021-3587": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9"
}
},
"4.14.238": {
"CVE-2021-34693": {
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head",
"cmt_id": "4fa028860bb1656f370851c2c26de15fc67da300"
},
"CVE-2021-45486": {
"cmt_msg": "inet: use bigger hash table for IP ID generation",
"cmt_id": "3ba51ed2c3ac36aa947d0b250d318de6ed7cf552"
}
},
"4.14.240": {
"CVE-2021-45485": {
"cmt_msg": "ipv6: use prandom_u32() for ID generation",
"cmt_id": "4b55d7b3106a410cdab4ea60f5e55ca0668c6a09"
},
"CVE-2021-3655": {
"cmt_msg": "sctp: validate from_addr_param return",
"cmt_id": "f01bfaea62d14938ff2fbeaf67f0afec2ec64ab9"
},
"CVE-2021-3609": {
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()",
"cmt_id": "630f13442f1472abe5013ef98f76a3bbca64dd80"
},
"CVE-2022-0850": {
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header",
"cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4"
},
"CVE-2021-33909": {
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations",
"cmt_id": "3c07d1335d17ae0411101024de438dbc3734e992"
},
"CVE-2021-38160": {
"cmt_msg": "virtio_console: Assure used length from device is limited",
"cmt_id": "56cf748562d3cbfd33d1ba2eb4a7603a5e20da88"
}
},
"4.14.241": {
"CVE-2021-38204": {
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory",
"cmt_id": "edddc79c4391f8001095320d3ca423214b9aa4bf"
},
"CVE-2021-3679": {
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.",
"cmt_id": "76598512d5d7fc407c319ca4448cf5348b65058a"
},
"CVE-2021-37576": {
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow",
"cmt_id": "b67a821813c7b8160b54d83928281fec84a42d88"
}
},
"4.14.242": {
"CVE-2021-0920": {
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK",
"cmt_id": "af3e2b87b36100c28feb71da52c57293c4540690"
}
},
"4.14.243": {
"CVE-2021-22543": {
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages",
"cmt_id": "46d75ff2c1beebe90e7af8887256d8f0323679e4"
}
},
"4.14.244": {
"CVE-2021-38205": {
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer",
"cmt_id": "1994eacac7af52da86e4b0cb6ae61621bef7393f"
},
"CVE-2021-3732": {
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed",
"cmt_id": "517b875dfbf58f0c6c9e32dc90f5cf42d71a42ce"
}
},
"4.14.245": {
"CVE-2021-42008": {
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data",
"cmt_id": "5e0e782874ad03ae6d47d3e55aff378da0b51104"
},
"CVE-2021-3653": {
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)",
"cmt_id": "26af47bdc45e454877f15fa7658a167bb9799681"
},
"CVE-2021-3656": {
"cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)",
"cmt_id": "6ed198381ed2496fbc82214108e56a441d3b0213"
},
"CVE-2020-3702": {
"cmt_msg": "ath: Use safer key clearing with key cache entries",
"cmt_id": "2cbb22fd4b4fb4d0822d185bf5bd6d027107bfda"
}
},
"4.14.246": {
"CVE-2021-38198": {
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page",
"cmt_id": "cea9e8ee3b8059bd2b36d68f1f428d165e5d13ce"
},
"CVE-2021-39633": {
"cmt_msg": "ip_gre: add validation for csum_start",
"cmt_id": "99279223a37b46dc7716ec4e0ed4b3e03f1cfa4c"
},
"CVE-2021-3753": {
"cmt_msg": "vt_kdsetmode: extend console locking",
"cmt_id": "3f488313d96fc6512a4a0fe3ed56cce92cbeec94"
}
},
"4.14.247": {
"CVE-2021-42252": {
"cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap",
"cmt_id": "b1b55e4073d3da6119ecc41636a2994b67a2be37"
},
"CVE-2021-40490": {
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing",
"cmt_id": "9569234645f102025aaf0fc83d3dcbf1b8cbf2dc"
}
},
"4.14.248": {
"CVE-2021-20320": {
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions",
"cmt_id": "daf48f68fca9040b542282a5cd17397af316dd89"
}
},
"4.14.249": {
"CVE-2021-3764": {
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a"
},
"CVE-2021-4203": {
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses",
"cmt_id": "9d76f723256d68eea16f0c563fc80b3c14258634"
},
"CVE-2021-3744": {
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a"
},
"CVE-2021-37159": {
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device",
"cmt_id": "4c0db9c4b3701c29f47bac0721e2f7d2b15d8edb"
}
},
"4.14.250": {
"CVE-2021-20317": {
"cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer",
"cmt_id": "0135fcb86a0bc9e4484f7e1228cadcc343c5edef"
}
},
"4.14.251": {
"CVE-2021-20321": {
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()",
"cmt_id": "1caaa820915d802328bc72e4de0d5b1629eab5da"
},
"CVE-2021-41864": {
"cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()",
"cmt_id": "f34bcd10c4832d491049905d25ea3f46a410c426"
},
"CVE-2021-38300": {
"cmt_msg": "bpf, mips: Validate conditional branch offsets",
"cmt_id": "3401bca8827ba4918b3d582bd2c27708d4b133fe"
}
},
"4.14.252": {
"CVE-2021-3894": {
"cmt_msg": "sctp: account stream padding length for reconf chunk",
"cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e"
},
"CVE-2022-0322": {
"cmt_msg": "sctp: account stream padding length for reconf chunk",
"cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e"
}
},
"4.14.253": {
"CVE-2021-3896": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75"
},
"CVE-2022-0644": {
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()",
"cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d"
},
"CVE-2021-3760": {
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object",
"cmt_id": "a2efe3df65359add2164740a5777c26e64dd594b"
},
"CVE-2021-43389": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75"
}
},
"4.14.254": {
"CVE-2021-3772": {
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk",
"cmt_id": "82ad781d98040b4a5eea4eeb9a5acdd200a420c6"
}
},
"4.14.255": {
"CVE-2021-42739": {
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()",
"cmt_id": "8d6c05da808f8351db844b69a9d6ce7f295214bb"
}
},
"4.14.256": {
"CVE-2021-4202": {
"cmt_msg": "NFC: reorganize the functions in nci_request",
"cmt_id": "6e2944d8bbc58682691438b57620491b5a4b7cfb"
},
"CVE-2021-3752": {
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()",
"cmt_id": "cd76d797a690969186c0c100e8a301c4480e4e7f"
},
"CVE-2021-45868": {
"cmt_msg": "quota: check block number when reading the block in quota file",
"cmt_id": "1d0606dc3e27e6c281a2684cb8bdf47134051114"
},
"CVE-2021-39686": {
"cmt_msg": "binder: use euid from cred instead of using task",
"cmt_id": "8989da231b3b989e48d885d61345fe290114b648"
},
"CVE-2021-3640": {
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()",
"cmt_id": "3eb50acbc96c9de3d8a056982938ece9bd1c2b91"
}
},
"4.14.257": {
"CVE-2021-4002": {
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare",
"cmt_id": "7bf1f5cb5150b1a53f6ccaadc0bc77f8f33206c8"
},
"CVE-2021-4083": {
"cmt_msg": "fget: check that the fd still exists after getting a ref to it",
"cmt_id": "98548c3a9882a1ea993a103be7c1b499f3b88202"
}
},
"4.14.258": {
"CVE-2021-39698": {
"cmt_msg": "wait: add wake_up_pollfree()",
"cmt_id": "a36e1978c6cb6282fadd5d62d4b3e7808cf0597b"
},
"CVE-2021-39685": {
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests",
"cmt_id": "e7c8afee149134b438df153b09af7fd928a8bc24"
}
},
"4.14.259": {
"CVE-2021-39711": {
"cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb",
"cmt_id": "20fdf274472998123a8d173ba4cb6282ff6b63bd"
},
"CVE-2021-28715": {
"cmt_msg": "xen/netback: don't queue unlimited number of packages",
"cmt_id": "9bebb2eedf679b3be4acaa20efda97f32c999d74"
},
"CVE-2021-28714": {
"cmt_msg": "xen/netback: fix rx queue stall detection",
"cmt_id": "eae85b8c6e17d3e3888d9159205390e8dbcff6a8"
},
"CVE-2021-28713": {
"cmt_msg": "xen/console: harden hvc_xen against event channel storms",
"cmt_id": "68b78f976ca47d52c03c41eded207a312e46b934"
},
"CVE-2021-28712": {
"cmt_msg": "xen/netfront: harden netfront against event channel storms",
"cmt_id": "4bf81386e3d6e5083c93d51eff70260bcec091bb"
},
"CVE-2021-28711": {
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms",
"cmt_id": "5ac3b68b79c9e964dd6f3cf80ff825518e502b79"
}
},
"4.14.260": {
"CVE-2021-45469": {
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()",
"cmt_id": "88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5"
},
"CVE-2022-1195": {
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD",
"cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9"
}
},
"4.14.261": {
"CVE-2021-44733": {
"cmt_msg": "tee: handle lookup of shm with reference count 0",
"cmt_id": "3d556a28bbfe34a80b014db49908b0f1bcb1ae80"
}
},
"4.14.262": {
"CVE-2021-45095": {
"cmt_msg": "phonet: refcount leak in pep_sock_accep",
"cmt_id": "a025db5658d5c10019ffed0d59026da8172897b6"
},
"CVE-2021-4155": {
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate",
"cmt_id": "2af625c89bf4a41c8a0bc818d8cf30a291f216ca"
}
},
"4.14.263": {
"CVE-2021-29264": {
"cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash",
"cmt_id": "93e83b226a16bcc800013c6e02c98eef7ba9868c"
},
"CVE-2020-36322": {
"cmt_msg": "fuse: fix bad inode",
"cmt_id": "2cd45139c0f28ebfa7604866faee00c99231a62b"
},
"CVE-2021-20292": {
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.",
"cmt_id": "4a2cec066dc8d099d30c649ae7ed26771029e0b5"
},
"CVE-2021-43976": {
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()",
"cmt_id": "8c9261b84c9b90d130d97fc7d13727706253af87"
},
"CVE-2021-38199": {
"cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()",
"cmt_id": "d5e6dff8c92943a2719fa5415cc3d333e57d5d90"
}
},
"4.14.264": {
"CVE-2022-0330": {
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store",
"cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0"
},
"CVE-2022-22942": {
"cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy",
"cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516"
}
},
"4.14.265": {
"CVE-2022-24448": {
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails",
"cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8"
},
"CVE-2018-25020": {
"cmt_msg": "bpf: fix truncated jump targets on heavy expansions",
"cmt_id": "6824208b59a4727b8a8653f83d8e685584d04606"
},
"CVE-2022-0617": {
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format",
"cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76"
}
},
"4.14.266": {
"CVE-2022-0492": {
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent",
"cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045"
},
"CVE-2022-0435": {
"cmt_msg": "tipc: improve size validations for received domain records",
"cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d"
},
"CVE-2022-0487": {
"cmt_msg": "moxart: fix potential use-after-free on remove path",
"cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e"
}
},
"4.14.267": {
"CVE-2022-25375": {
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command",
"cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175"
},
"CVE-2022-25258": {
"cmt_msg": "USB: gadget: validate interface OS descriptor requests",
"cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731"
}
},
"4.14.269": {
"CVE-2022-27223": {
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc",
"cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa"
},
"CVE-2022-26966": {
"cmt_msg": "sr9700: sanity check for packet length",
"cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26"
}
},
"4.14.270": {
"CVE-2022-24958": {
"cmt_msg": "usb: gadget: don't release an existing dev->buf",
"cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2"
}
},
"4.14.271": {
"CVE-2022-23038": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()",
"cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51"
},
"CVE-2022-23039": {
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()",
"cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354"
},
"CVE-2022-23960": {
"cmt_msg": "ARM: report Spectre v2 status through sysfs",
"cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143"
},
"CVE-2022-23036": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()",
"cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51"
},
"CVE-2022-23037": {
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status",
"cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5"
},
"CVE-2022-0001": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE",
"cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879"
},
"CVE-2022-0002": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE",
"cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879"
},
"CVE-2022-23041": {
"cmt_msg": "xen/9p: use alloc/free_pages_exact()",
"cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5"
},
"CVE-2022-23040": {
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case",
"cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc"
},
"CVE-2022-23042": {
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()",
"cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296"
}
},
"4.14.272": {
"CVE-2022-1199": {
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device",
"cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5"
},
"CVE-2021-4149": {
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error",
"cmt_id": "e0956dd95ddd6b02b7eb084d127b926a509ae8e7"
}
},
"4.14.274": {
"CVE-2022-26490": {
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION",
"cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9"
},
"CVE-2022-28356": {
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()",
"cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210"
},
"CVE-2022-1016": {
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()",
"cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9"
},
"CVE-2022-27666": {
"cmt_msg": "esp: Fix possible buffer overflow in ESP transformation",
"cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d"
}
},
"4.14.276": {
"CVE-2022-28390": {
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path",
"cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8"
},
"CVE-2022-1353": {
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register",
"cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031"
},
"CVE-2022-1198": {
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()",
"cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018"
},
"CVE-2021-4197": {
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks",
"cmt_id": "a70bcf9ed08f3628a9324f054b0e041697b26853"
},
"CVE-2022-28389": {
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path",
"cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411"
},
"CVE-2022-1516": {
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect",
"cmt_id": "858642789ada1b48630f322e59416ca9fca3e6b7"
},
"CVE-2022-1011": {
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io",
"cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e"
}
},
"4.14.277": {
"CVE-2022-1204": {
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()",
"cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456"
},
"CVE-2022-1205": {
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers",
"cmt_id": "331210983ba5ce82bf63b827bca0e1c833f293db"
},
"CVE-2022-28388": {
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path",
"cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614"
}
},
"outstanding": {
"CVE-2021-0929": {
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
},
"CVE-2020-26556": {
"cmt_msg": ""
},
"CVE-2020-26557": {
"cmt_msg": ""
},
"CVE-2020-26555": {
"cmt_msg": ""
},
"CVE-2019-20794": {
"cmt_msg": ""
},
"CVE-2020-26559": {
"cmt_msg": ""
},
"CVE-2020-35501": {
"cmt_msg": ""
},
"CVE-2022-0168": {
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()"
},
"CVE-2018-20854": {
"cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read"
},
"CVE-2018-1121": {
"cmt_msg": ""
},
"CVE-2019-19378": {
"cmt_msg": ""
},
"CVE-2022-1419": {
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
},
"CVE-2017-5753": {
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
},
"CVE-2022-0995": {
"cmt_msg": "watch_queue: Fix filter limit check"
},
"CVE-2022-0998": {
"cmt_msg": "vdpa: clean up get_config_size ret value handling"
},
"CVE-2019-19377": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
},
"CVE-2019-2181": {
"cmt_msg": "binder: check for overflow when alloc for security context"
},
"CVE-2021-3759": {
"cmt_msg": "memcg: enable accounting of ipc resources"
},
"CVE-2020-27820": {
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
},
"CVE-2022-0854": {
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\""
},
"CVE-2020-24503": {
"cmt_msg": ""
},
"CVE-2020-24502": {
"cmt_msg": ""
},
"CVE-2019-19449": {
"cmt_msg": "f2fs: fix to do sanity check on segment/section count"
},
"CVE-2020-26541": {
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries"
},
"CVE-2020-11725": {
"cmt_msg": ""
},
"CVE-2022-0382": {
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
},
"CVE-2021-33061": {
"cmt_msg": "ixgbe: add improvement for MDD response functionality"
},
"CVE-2022-1263": {
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push"
},
"CVE-2022-1158": {
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
},
"CVE-2021-35477": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
},
"CVE-2019-15222": {
"cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check"
},
"CVE-2019-15223": {
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection"
},
"CVE-2021-3864": {
"cmt_msg": ""
},
"CVE-2019-19815": {
"cmt_msg": "f2fs: support swap file w/ DIO"
},
"CVE-2019-19814": {
"cmt_msg": ""
},
"CVE-2022-27950": {
"cmt_msg": "HID: elo: fix memory leak in elo_probe"
},
"CVE-2022-1015": {
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
},
"CVE-2019-19241": {
"cmt_msg": "io_uring: async workers should inherit the user creds"
},
"CVE-2021-43975": {
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait"
},
"CVE-2022-25636": {
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size"
},
"CVE-2017-1000405": {
"cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()"
},
"CVE-2016-8660": {
"cmt_msg": ""
},
"CVE-2019-12379": {
"cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c"
},
"CVE-2019-12378": {
"cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
},
"CVE-2022-0494": {
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern"
},
"CVE-2018-12929": {
"cmt_msg": ""
},
"CVE-2020-15802": {
"cmt_msg": ""
},
"CVE-2008-2544": {
"cmt_msg": ""
},
"CVE-2022-28796": {
"cmt_msg": "jbd2: fix use-after-free of transaction_t race"
},
"CVE-2021-39713": {
"cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock"
},
"CVE-2019-20908": {
"cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down"
},
"CVE-2018-7754": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2018-20855": {
"cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace"
},
"CVE-2007-3719": {
"cmt_msg": ""
},
"CVE-2021-4037": {
"cmt_msg": "xfs: fix up non-directory creation in SGID directories"
},
"CVE-2019-9444": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2021-3506": {
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access"
},
"CVE-2019-19067": {
"cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init"
},
"CVE-2019-3874": {
"cmt_msg": "sctp: implement memory accounting on tx path"
},
"CVE-2020-26145": {
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe"
},
"CVE-2010-4563": {
"cmt_msg": ""
},
"CVE-2020-26140": {
"cmt_msg": ""
},
"CVE-2020-26143": {
"cmt_msg": ""
},
"CVE-2020-26142": {
"cmt_msg": ""
},
"CVE-2022-28893": {
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()"
},
"CVE-2017-9986": {
"cmt_msg": "sound: Retire OSS"
},
"CVE-2021-34556": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4"
},
"CVE-2022-29156": {
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
},
"CVE-2018-13095": {
"cmt_msg": "xfs: More robust inode extent count validation"
},
"CVE-2021-3669": {
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
},
"CVE-2019-18885": {
"cmt_msg": "btrfs: merge btrfs_find_device and find_device"
},
"CVE-2020-10708": {
"cmt_msg": ""
},
"CVE-2018-7273": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2021-4023": {
"cmt_msg": "io-wq: fix cancellation on create-worker failure"
},
"CVE-2019-18680": {
"cmt_msg": ""
},
"CVE-2017-13693": {
"cmt_msg": ""
},
"CVE-2021-0399": {
"cmt_msg": ""
},
"CVE-2017-13694": {
"cmt_msg": ""
},
"CVE-2020-36516": {
"cmt_msg": ""
},
"CVE-2012-4542": {
"cmt_msg": ""
},
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations"
},
"CVE-2013-7445": {
"cmt_msg": ""
},
"CVE-2019-19036": {
"cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations"
},
"CVE-2005-3660": {
"cmt_msg": ""
},
"CVE-2022-1508": {
"cmt_msg": "io_uring: reexpand under-reexpanded iters"
},
"CVE-2019-19927": {
"cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages"
},
"CVE-2019-16921": {
"cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext"
},
"CVE-2021-4159": {
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()"
},
"CVE-2017-5715": {
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
},
"CVE-2021-0695": {
"cmt_msg": ""
},
"CVE-2008-4609": {
"cmt_msg": ""
},
"CVE-2021-4150": {
"cmt_msg": "block: fix incorrect references to disk objects"
},
"CVE-2021-28951": {
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit"
},
"CVE-2020-14304": {
"cmt_msg": ""
},
"CVE-2022-25265": {
"cmt_msg": ""
},
"CVE-2020-0347": {
"cmt_msg": ""
},
"CVE-2021-29155": {
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic"
},
"CVE-2021-3714": {
"cmt_msg": ""
},
"CVE-2019-16230": {
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)"
},
"CVE-2019-12455": {
"cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()"
},
"CVE-2019-12456": {
"cmt_msg": ""
},
"CVE-2020-26560": {
"cmt_msg": ""
},
"CVE-2021-3892": {
"cmt_msg": ""
},
"CVE-2020-12362": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2020-12363": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2022-0742": {
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()"
},
"CVE-2020-12364": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2022-0500": {
"cmt_msg": "bpf: Introduce MEM_RDONLY flag"
},
"CVE-2022-1055": {
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()"
},
"CVE-2022-0480": {
"cmt_msg": "memcg: enable accounting for file lock caches"
},
"CVE-2022-1184": {
"cmt_msg": ""
},
"CVE-2020-26141": {
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe"
},
"CVE-2020-8834": {
"cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm"
},
"CVE-2021-4218": {
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
},
"CVE-2022-23222": {
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
},
"CVE-2019-15290": {
"cmt_msg": ""
},
"CVE-2020-15780": {
"cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down"
},
"CVE-2018-17977": {
"cmt_msg": ""
},
"CVE-2022-26878": {
"cmt_msg": ""
},
"CVE-2022-29582": {
"cmt_msg": "io_uring: fix race between timeout flush and removal"
},
"CVE-2010-5321": {
"cmt_msg": ""
},
"CVE-2018-12930": {
"cmt_msg": ""
},
"CVE-2018-12931": {
"cmt_msg": ""
},
"CVE-2021-4148": {
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files"
},
"CVE-2022-1043": {
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check"
},
"CVE-2021-39801": {
"cmt_msg": ""
},
"CVE-2021-39800": {
"cmt_msg": ""
},
"CVE-2021-39802": {
"cmt_msg": ""
},
"CVE-2022-1048": {
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
},
"CVE-2020-36385": {
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
},
"CVE-2019-12380": {
"cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code"
},
"CVE-2019-12381": {
"cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()"
},
"CVE-2020-7053": {
"cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr"
},
"CVE-2021-3542": {
"cmt_msg": ""
},
"CVE-2021-44879": {
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
},
"CVE-2020-12656": {
"cmt_msg": "sunrpc: check that domain table is empty at module unload."
},
"CVE-2020-16120": {
"cmt_msg": "ovl: switch to mounter creds in readdir"
},
"CVE-2018-12928": {
"cmt_msg": ""
},
"CVE-2020-36310": {
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address"
},
"CVE-2020-36313": {
"cmt_msg": "KVM: Fix out of range accesses to memslots"
},
"CVE-2015-2877": {
"cmt_msg": ""
},
"CVE-2019-0146": {
"cmt_msg": ""
},
"CVE-2018-20449": {
"cmt_msg": "printk: hash addresses printed with %p"
},
"CVE-2016-10723": {
"cmt_msg": "mm, oom: remove sleep from under oom_lock"
},
"CVE-2022-0400": {
"cmt_msg": ""
},
"CVE-2021-0707": {
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode"
},
"CVE-2019-11191": {
"cmt_msg": "x86: Deprecate a.out support"
},
"CVE-2019-19039": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors"
},
"CVE-2021-3847": {
"cmt_msg": ""
},
"CVE-2018-10322": {
"cmt_msg": "xfs: enhance dinode verifier"
},
"CVE-2020-8832": {
"cmt_msg": "drm/i915: Record the default hw state after reset upon load"
},
"CVE-2022-1280": {
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
},
"CVE-2011-4917": {
"cmt_msg": ""
},
"CVE-2019-16089": {
"cmt_msg": ""
},
"CVE-2021-32078": {
"cmt_msg": "ARM: footbridge: remove personal server platform"
},
"CVE-2019-10220": {
"cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()"
},
"CVE-2020-27835": {
"cmt_msg": "IB/hfi1: Ensure correct mm is used at all times"
},
"CVE-2019-5489": {
"cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
}
}
},
"4.19": {
"4.19": {
"CVE-2018-18281": {
"cmt_msg": "mremap: properly flush TLB before releasing the page",
"cmt_id": "eb66ae030829605d61fbef1909ce310e29f78821"
}
},
"4.19-rc1": {
"CVE-2019-19083": {
"cmt_msg": "drm/amd/display: memory leak",
"cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b"
}
},
"4.19.2": {
"CVE-2018-18955": {
"cmt_msg": "userns: also map extents in the reverse map to kernel IDs",
"cmt_id": "9a7a80fb02cc7515b273dbb4249374d6e6a35b70"
}
},
"4.19.3": {
"CVE-2018-19854": {
"cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace",
"cmt_id": "a0f044f025e9a023e1e2b33c0731291059e2748d"
},
"CVE-2018-16871": {
"cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set",
"cmt_id": "20965de7f47207394ffe03d70a4806f5e1cfcd7f"
},
"CVE-2018-18710": {
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.",
"cmt_id": "c8099dbf492b565a4f75ae7b8c08b76ca18c4c3f"
}
},
"4.19.7": {
"CVE-2018-19407": {
"cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization",
"cmt_id": "61c42d657c859ccc95e53afdac64f73a0053b8ea"
},
"CVE-2018-19406": {
"cmt_msg": "KVM: LAPIC: Fix pv ipis use-before-initialization",
"cmt_id": "ffb01e73737b4d3e66734c901ee666ae8a23a857"
},
"CVE-2019-2025": {
"cmt_msg": "binder: fix race that allows malicious free of live buffer",
"cmt_id": "553927d6aab993e1297d0c69274cd0c2df5440ca"
},
"CVE-2018-16862": {
"cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation",
"cmt_id": "16a2d602244ff5327cecd210fdd50ad5ad443c9c"
}
},
"4.19.8": {
"CVE-2018-18397": {
"cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails",
"cmt_id": "10f98c134b02d11923d45ce6688c2479435e8ec9"
}
},
"4.19.9": {
"CVE-2018-20169": {
"cmt_msg": "USB: check usb_get_extra_descriptor for proper size",
"cmt_id": "1b2e742bf7230ce04cda5b7348f922174bef2d7a"
},
"CVE-2018-14625": {
"cmt_msg": "vhost/vsock: fix use-after-free in network stack callers",
"cmt_id": "f9cd25b1e5e575a5f18547bdc04ea40a23ad511a"
},
"CVE-2018-19824": {
"cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c",
"cmt_id": "a7e719ace75e4451b7958cb73cbc12c627760007"
}
},
"4.19.13": {
"CVE-2018-16882": {
"cmt_msg": "KVM: Fix UAF in nested posted interrupt processing",
"cmt_id": "1972ca04708330b0edd52956e644e3974065a613"
},
"CVE-2018-19985": {
"cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data",
"cmt_id": "8f980122236c1fc8e11ffb57ec73315d01dc88e0"
}
},
"4.19.14": {
"CVE-2019-9245": {
"cmt_msg": "f2fs: sanity check of xattr entry size",
"cmt_id": "5036fcd9b14516f62efae6ed0c42dfbb9798b643"
}
},
"4.19.15": {
"CVE-2019-15927": {
"cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()",
"cmt_id": "8ee6f180d56fe760b275ab7f060c7b12fc05d7b7"
},
"CVE-2018-20784": {
"cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c",
"cmt_id": "dc8408ea0b22ab181ee541f3786b4fd6161e0ce3"
},
"CVE-2019-6133": {
"cmt_msg": "fork: record start_time late",
"cmt_id": "bc999b5099d70030a9cb1aff2c48b073f65e0f8f"
}
},
"4.19.16": {
"CVE-2018-16884": {
"cmt_msg": "sunrpc: use-after-free in svc_process_common()",
"cmt_id": "44e7bab39f877c9c095bfaaee943b0807574a7f7"
}
},
"4.19.17": {
"CVE-2019-3701": {
"cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification",
"cmt_id": "8db82a6f2b76d42ec2615f8def6e797e064e7822"
},
"CVE-2020-10769": {
"cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len",
"cmt_id": "44c67402c3f738b7048de4464c02461bc8d0fd37"
},
"CVE-2019-11085": {
"cmt_msg": "drm/i915/gvt: Fix mmap range check",
"cmt_id": "ac8b9e8e7ddd69f3efa91e8a99312de5729382c0"
}
},
"4.19.18": {
"CVE-2019-9003": {
"cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda",
"cmt_id": "1c393ca118cfaf36c95270b9bed295bba109fafa"
}
},
"4.19.19": {
"CVE-2019-7308": {
"cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths",
"cmt_id": "eed84f94ff8d97abcbc5706f6f9427520fd60a10"
}
},
"4.19.20": {
"CVE-2018-16880": {
"cmt_msg": "vhost: fix OOB in get_rx_bufs()",
"cmt_id": "aafe74b726891386cd139d3432ec619ed5189b29"
}
},
"4.19.21": {
"CVE-2019-3819": {
"cmt_msg": "HID: debug: fix the ring buffer implementation",
"cmt_id": "c70374ce418e7ae9276d3dc26aed0301e4da5e35"
},
"CVE-2019-8956": {
"cmt_msg": "sctp: walk the list of asoc safely",
"cmt_id": "7c2361308e1727c3135ebb3b5c6906fb781bb261"
},
"CVE-2019-7222": {
"cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)",
"cmt_id": "5a45d3720b5437515f8c094f1c3d61f6afe211c1"
},
"CVE-2019-6974": {
"cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)",
"cmt_id": "24b027d2b1386da03aafb2aaac69d4fa67ee7d9c"
},
"CVE-2019-7221": {
"cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)",
"cmt_id": "236fd677125f974aaf39f09074d226a884b4fe0e"
}
},
"4.19.25": {
"CVE-2019-9162": {
"cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs",
"cmt_id": "6a3f7237871c4d5c090ab9a6fce3ba6a1baf1f82"
},
"CVE-2019-8912": {
"cmt_msg": "net: crypto set sk to NULL when af_alg_release.",
"cmt_id": "eb5e6869125f69dd28513f92992d97ec62bb9773"
}
},
"4.19.27": {
"CVE-2019-9213": {
"cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()",
"cmt_id": "de04d2973a62e4efb3de45e93bd46acd6d510e0a"
}
},
"4.19.28": {
"CVE-2019-16994": {
"cmt_msg": "net: sit: fix memory leak in sit_init_net()",
"cmt_id": "d0bedaac932f4c02c080a50d4a30b2a1fec5d682"
},
"CVE-2019-12818": {
"cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails",
"cmt_id": "f132b3f5f1ad1cbe818474ab8d0b555ff39369d5"
},
"CVE-2019-8980": {
"cmt_msg": "exec: Fix mem leak in kernel_read_file",
"cmt_id": "b60d90b2d3d14c426693a0a34041db11be66d29e"
},
"CVE-2019-15916": {
"cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject",
"cmt_id": "7ce2a517fd8b7742e381d3b3551b9b03e667ad79"
}
},
"4.19.29": {
"CVE-2019-2101": {
"cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow",
"cmt_id": "ac8befb6dd601fd35c1d64167750c6698bc27c80"
}
},
"4.19.30": {
"CVE-2019-16995": {
"cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()",
"cmt_id": "996ee1aca7def6125e9d96f58151799d44082cfc"
},
"CVE-2019-12819": {
"cmt_msg": "mdio_bus: Fix use-after-free on device_register fails",
"cmt_id": "96a3b14450afa83f4f3ffdeafaca19db8e05c2fd"
}
},
"4.19.31": {
"CVE-2019-11811": {
"cmt_msg": "ipmi_si: fix use-after-free of resource->name",
"cmt_id": "a441fdaf8c3034436fb6045ee285e515628fc555"
},
"CVE-2019-10124": {
"cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()",
"cmt_id": "234c0cc982211bb5539db632f31490bf0ad54827"
},
"CVE-2019-9455": {
"cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()",
"cmt_id": "573d423a9bd76b396954ddf847ff24d97658453d"
},
"CVE-2019-16413": {
"cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit",
"cmt_id": "e08ba890dc29250fafdfa7c9dba62ccfeec8ef7f"
}
},
"4.19.32": {
"CVE-2019-15917": {
"cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()",
"cmt_id": "e365b94086f9dec02ddfcc193dcad72858c6d973"
}
},
"4.19.33": {
"CVE-2019-20811": {
"cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success",
"cmt_id": "d9d215be3a3aa8b3638f2705826f52a7fb84cf24"
},
"CVE-2019-20054": {
"cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links",
"cmt_id": "07d0d2bd957ad922cf571e7cabb6c34067142b93"
},
"CVE-2019-3460": {
"cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt",
"cmt_id": "2318c0e4b87e590c9d8e88db185477cfac18abe2"
},
"CVE-2019-15921": {
"cmt_msg": "genetlink: Fix a memory leak on error path",
"cmt_id": "9b8ef421b481d6e648438131d867986c649c297c"
},
"CVE-2019-3459": {
"cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer",
"cmt_id": "15d6538a0d6e0f6de5116081a948cba7cc3e1d3d"
}
},
"4.19.34": {
"CVE-2019-11810": {
"cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed",
"cmt_id": "8032fc9120c211cd40beef4c91c8206f4167e523"
}
},
"4.19.35": {
"CVE-2019-11486": {
"cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN",
"cmt_id": "894dc8495898cf6075eadf99fd496374decd3986"
},
"CVE-2019-11815": {
"cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().",
"cmt_id": "78b4bf26a8a76569fd6d0b47d98fb553c333b06f"
},
"CVE-2019-3887": {
"cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)",
"cmt_id": "119031be7b0a2ce4ff4cd5525bec6d42817ff53d"
},
"CVE-2019-10639": {
"cmt_msg": "netns: provide pure entropy for net_hash_mix()",
"cmt_id": "a1c2f3229734a4bb8d5ac008c0a67e025aa11547"
}
},
"4.19.36": {
"CVE-2019-15292": {
"cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit",
"cmt_id": "6c42507f426b40c63e8eb98ce6dd4afbc7efcdb5"
},
"CVE-2019-9857": {
"cmt_msg": "inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()",
"cmt_id": "ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b"
}
},
"4.19.37": {
"CVE-2019-3892": {
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
"cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca"
},
"CVE-2019-11599": {
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping",
"cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca"
},
"CVE-2019-15920": {
"cmt_msg": "cifs: Fix use-after-free in SMB2_read",
"cmt_id": "c69330a855ab4342d304f67f8c1e7d1fa2686bec"
},
"CVE-2019-15919": {
"cmt_msg": "cifs: Fix use-after-free in SMB2_write",
"cmt_id": "8fb89b43b65fcd35f15d982712904b96fc64c68a"
},
"CVE-2019-15214": {
"cmt_msg": "ALSA: core: Fix card races between register and disconnect",
"cmt_id": "b50e435df2d8b9a1d3e956e1c767dfc7e30a441b"
}
},
"4.19.38": {
"CVE-2019-3882": {
"cmt_msg": "vfio/type1: Limit DMA mappings per container",
"cmt_id": "f7b467ad1be0478f0341afa8a9ac112732def088"
},
"CVE-2019-15924": {
"cmt_msg": "fm10k: Fix a potential NULL pointer dereference",
"cmt_id": "9b9b0df4e7882638e53c55e8f556aa78915418b9"
},
"CVE-2019-10125": {
"cmt_msg": "aio: simplify - and fix - fget/fput for io_submit()",
"cmt_id": "d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd"
},
"CVE-2019-18805": {
"cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day",
"cmt_id": "250e51f856e1534e3e769add508f121966030462"
}
},
"4.19.39": {
"CVE-2019-11487": {
"cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get",
"cmt_id": "0311ff82b70fa12e80d188635bff24029ec06ae1"
}
},
"4.19.41": {
"CVE-2019-15216": {
"cmt_msg": "USB: yurex: Fix protection fault after device removal",
"cmt_id": "9f632afe4f3989d77fdbf8ac6a015d6beb03ccb9"
}
},
"4.19.42": {
"CVE-2018-20836": {
"cmt_msg": "scsi: libsas: fix a race condition when smp task timeout",
"cmt_id": "0f18e433b97bf74bb62e0caa95c61e8631967fb9"
},
"CVE-2019-11884": {
"cmt_msg": "Bluetooth: hidp: fix buffer overflow",
"cmt_id": "c6d1f9b4b2cb768e29f5d44af143f25ad89062b1"
}
},
"4.19.43": {
"CVE-2019-11091": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5"
},
"CVE-2018-12130": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5"
},
"CVE-2018-12127": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5"
},
"CVE-2018-12126": {
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option",
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5"
}
},
"4.19.44": {
"CVE-2019-10142": {
"cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl",
"cmt_id": "e9ec5073c90d6de2ca5338bd67f7935b19d7c0c7"
}
},
"4.19.45": {
"CVE-2019-11833": {
"cmt_msg": "ext4: zero out the unused memory region in the extent tree block",
"cmt_id": "25d010f4e0ece1ddf0d8d57942c0b0f1568fe498"
}
},
"4.19.46": {
"CVE-2019-25045": {
"cmt_msg": "xfrm: clean up xfrm protocol checks",
"cmt_id": "d410ef75886a4efb3c49b8bacd8e3c295235e744"
},
"CVE-2019-15666": {
"cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink",
"cmt_id": "c9516503fe53c8960f180c1cc1cdf2341bed843d"
}
},
"4.19.47": {
"CVE-2019-20095": {
"cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd",
"cmt_id": "a27ce4840f89acd1e23efe2b4dfc0d512aa5b38a"
},
"CVE-2019-19543": {
"cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module",
"cmt_id": "aec118ecf579a6c70e505b39fc6eb6a2d878c89e"
},
"CVE-2019-9466": {
"cmt_msg": "brcmfmac: add subtype check for event handling in data path",
"cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81"
},
"CVE-2019-9500": {
"cmt_msg": "brcmfmac: assure SSID length from firmware is limited",
"cmt_id": "cc240e057c1d48665dde8036144114854bae058c"
},
"CVE-2019-9503": {
"cmt_msg": "brcmfmac: add subtype check for event handling in data path",
"cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81"
},
"CVE-2019-19966": {
"cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit",
"cmt_id": "bdf3da72ae79f0cfb88c720dedabe16b0d67334b"
}
},
"4.19.48": {
"CVE-2020-10720": {
"cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()",
"cmt_id": "39fd0dc4a5565a1df7d84b1c92d2050233b15b5a"
},
"CVE-2019-10638": {
"cmt_msg": "inet: switch IP ID generator to siphash",
"cmt_id": "07480da0c8a1979e0973d6dd783b6aed966dccf6"
}
},
"4.19.49": {
"CVE-2019-15212": {
"cmt_msg": "USB: rio500: refuse more than one device at a time",
"cmt_id": "d2d93077bac37c6895d8c58f564699a3a897c5db"
},
"CVE-2019-15219": {
"cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe",
"cmt_id": "d27ea5e9eb4ac45e0e4cf8250a45aa06b0944787"
},
"CVE-2019-15218": {
"cmt_msg": "media: usb: siano: Fix general protection fault in smsusb",
"cmt_id": "35b1044566528b26d48b31a52069f45851d49885"
},
"CVE-2019-1999": {
"cmt_msg": "binder: fix race between munmap() and direct reclaim",
"cmt_id": "9d57cfd4e9d81400c1fe2b7cd4503f54830b46c2"
},
"CVE-2019-15223": {
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection",
"cmt_id": "eb2eeec920fb1b9b6faf8ea340f6295a2d03602b"
}
},
"4.19.50": {
"CVE-2019-13233": {
"cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry",
"cmt_id": "b598ddc7b9fc87b09bdadb63abf92b4ba46cd385"
}
},
"4.19.52": {
"CVE-2019-11479": {
"cmt_msg": "tcp: add tcp_min_snd_mss sysctl",
"cmt_id": "7f9f8a37e563c67b24ccd57da1d541a95538e8d9"
},
"CVE-2019-11478": {
"cmt_msg": "tcp: tcp_fragment() should apply sane memory limits",
"cmt_id": "ec83921899a571ad70d582934ee9e3e07f478848"
},
"CVE-2019-11477": {
"cmt_msg": "tcp: limit payload size of sacked skbs",
"cmt_id": "c09be31461ed140976c60a87364415454a2c3d42"
}
},
"4.19.53": {
"CVE-2019-9453": {
"cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary",
"cmt_id": "ae3787d433f7b87ebf6b916e524c6e280e4e5804"
},
"CVE-2019-15090": {
"cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead",
"cmt_id": "f3a7a1137ffc69e1f460eb9e1b5f4fd09d3c4ea9"
}
},
"4.19.54": {
"CVE-2019-15807": {
"cmt_msg": "scsi: libsas: delete sas port if expander discover failed",
"cmt_id": "114e8135ae0031556ead1bcb67249ecb84b804de"
},
"CVE-2019-12984": {
"cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler",
"cmt_id": "4bb4ba362cc1ed3acb181a6d0b68c6de22be78e2"
}
},
"4.19.56": {
"CVE-2019-12817": {
"cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork",
"cmt_id": "cd3e49394cb0f45c8dbf3c17c0818cd3d30b1332"
},
"CVE-2019-12615": {
"cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()",
"cmt_id": "7b460a9bb13db3f442f153c2ab8a9ff8520c368c"
},
"CVE-2019-0136": {
"cmt_msg": "mac80211: drop robust management frames from unknown TA",
"cmt_id": "0e879ef1cb5baddebe1f12a9a3940a87d8e61558"
}
},
"4.19.58": {
"CVE-2019-13272": {
"cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME",
"cmt_id": "54435b7fff7bfb9515cc457b71c3734c1c3fff76"
},
"CVE-2019-15221": {
"cmt_msg": "ALSA: line6: Fix write on zero-sized buffer",
"cmt_id": "7f52af5e9baa9c478edcecdd4058eeef2835b1c3"
},
"CVE-2019-9506": {
"cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check",
"cmt_id": "5dd6139a0aa22112e46a6df5fd283046095822e0"
}
},
"4.19.59": {
"CVE-2019-10126": {
"cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()",
"cmt_id": "c7e427e28a3a2d1b89b8f9fa7c3f559774d91a7b"
},
"CVE-2019-3846": {
"cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor",
"cmt_id": "d4c0f752c1d2c6383cc7582c19b2ed7159d45937"
},
"CVE-2019-15220": {
"cmt_msg": "p54usb: Fix race between disconnect and firmware loading",
"cmt_id": "449a8d08a4bc45101fa26e6d233b98258d33620a"
}
},
"4.19.61": {
"CVE-2019-17351": {
"cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free",
"cmt_id": "e73db096691e5f2720049502a3794a2a0c6d1b1f"
},
"CVE-2019-13631": {
"cmt_msg": "Input: gtco - bounds check collection indent level",
"cmt_id": "d657077eda7b5572d86f2f618391bb016b5d9a64"
},
"CVE-2019-15213": {
"cmt_msg": "media: dvb: usb: fix use after free in dvb_usb_device_exit",
"cmt_id": "94f2b518a7882f562537796b77e3ce6a6461236d"
},
"CVE-2019-15925": {
"cmt_msg": "net: hns3: add some error checking in hclge_tm module",
"cmt_id": "26d86b29e806769adba91bd6fc1f077b94e9b64b"
},
"CVE-2019-15926": {
"cmt_msg": "ath6kl: add some bounds checking",
"cmt_id": "83c911f4bd6846397017aa38c32dd18dc532f754"
},
"CVE-2019-14284": {
"cmt_msg": "floppy: fix div-by-zero in setup_format_params",
"cmt_id": "6e34fd07484a0622a17b40e0ca89ed451260ef45"
},
"CVE-2019-14283": {
"cmt_msg": "floppy: fix out-of-bounds read in copy_buffer",
"cmt_id": "ff54c44f103825a426e46d08b5d3d76e44791a87"
}
},
"4.19.63": {
"CVE-2019-12382": {
"cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()",
"cmt_id": "2a18d76592e0d86c7fddcc6a7aa52509a2900f9d"
},
"CVE-2019-13648": {
"cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM",
"cmt_id": "b993a66d8ddc1c26da0d9aa3471789cc170b28ee"
}
},
"4.19.64": {
"CVE-2019-20934": {
"cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers",
"cmt_id": "48046e092ad557a01d7daf53205624944793b19d"
},
"CVE-2019-15211": {
"cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc",
"cmt_id": "b3836af8560e27cd0d27940ff9c5a08b90b8d256"
},
"CVE-2019-3900": {
"cmt_msg": "vhost_net: fix possible infinite loop",
"cmt_id": "3af3b843aee41ed22343b011a4cf3812a80d2f38"
},
"CVE-2019-10207": {
"cmt_msg": "Bluetooth: hci_uart: check for missing tty operations",
"cmt_id": "56966212e23f82ced10831f7cca02f7339147428"
},
"CVE-2019-15215": {
"cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect",
"cmt_id": "8b44cc225e6024174508164931cab9f01c79dca2"
},
"CVE-2019-2213": {
"cmt_msg": "binder: fix possible UAF when freeing buffer",
"cmt_id": "22068d49d09d2b3890e19d7b2048a33340f992da"
}
},
"4.19.65": {
"CVE-2019-1125": {
"cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations",
"cmt_id": "befb822c062b4c3d93380a58d5fd479395e8b267"
}
},
"4.19.67": {
"CVE-2019-19536": {
"cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices",
"cmt_id": "cab569a44a524709d95bbd88700860ac45e5d5cf"
},
"CVE-2019-19535": {
"cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices",
"cmt_id": "9ce1b3eb5489416338b2fb2b40f30f0d425700b4"
},
"CVE-2019-19531": {
"cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete",
"cmt_id": "33f2240acfa8b4017ee5dd64601c8a5ec7f53b4e"
}
},
"4.19.68": {
"CVE-2019-15118": {
"cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term",
"cmt_id": "46f9a1bc60a4c15a14a6504168cee1c2e0bf3ab4"
},
"CVE-2019-19537": {
"cmt_msg": "USB: core: Fix races in character device registration and deregistraion",
"cmt_id": "7f52d6d2a82df15d7ea01d69d0943d2abc201b43"
},
"CVE-2019-19527": {
"cmt_msg": "HID: hiddev: do cleanup in failure of opening a device",
"cmt_id": "b545dc9debe69ca513b93f4a244451e9be14b0c5"
},
"CVE-2019-19530": {
"cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough",
"cmt_id": "c02c0249ce5523a7a264136ed36f857b85555bac"
},
"CVE-2019-15117": {
"cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit",
"cmt_id": "58b9f19ee438990f6406e61943d0bc7c875a0921"
}
},
"4.19.69": {
"CVE-2019-15538": {
"cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT",
"cmt_id": "11f85d4d77afb8f1cb1989f1565b26df21280118"
}
},
"4.19.70": {
"CVE-2019-15902": {
"cmt_msg": "unknown",
"cmt_id": "b307f99dca5ab33edc1e04b9b479bcb0852ff85f"
}
},
"4.19.73": {
"CVE-2019-15918": {
"cmt_msg": "cifs: Fix lease buffer length error",
"cmt_id": "4061e662c8e9f5fb796b05fd2ab58fed8cd16d59"
},
"CVE-2019-19319": {
"cmt_msg": "ext4: protect journal inode's blocks using block_validity",
"cmt_id": "2fd4629de51974002f4e9cf1a35a1926dd6c9d99"
},
"CVE-2019-14835": {
"cmt_msg": "vhost: make sure log_num < in_num",
"cmt_id": "ba03ee62aed0b0ee2eadfeb4a2fecc7d7eb47871"
},
"CVE-2019-15031": {
"cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts",
"cmt_id": "569775bd536416ed9049aa580d9f89a0b4307d60"
},
"CVE-2019-15030": {
"cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction",
"cmt_id": "47a0f70d7d9ac3d6b1a96b312d07bc67af3834e9"
}
},
"4.19.74": {
"CVE-2019-15504": {
"cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()",
"cmt_id": "3622d621e9beca76d53cd3007eb7b1d6e724716b"
}
},
"4.19.75": {
"CVE-2019-14816": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb"
},
"CVE-2019-14814": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb"
},
"CVE-2019-14815": {
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings",
"cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb"
},
"CVE-2019-15505": {
"cmt_msg": "media: technisat-usb2: break out of loop at end of buffer",
"cmt_id": "b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1"
},
"CVE-2019-14821": {
"cmt_msg": "KVM: coalesced_mmio: add bounds checking",
"cmt_id": "232a6462f43fceeac82bd99ef092b38e3a7ee296"
}
},
"4.19.77": {
"CVE-2019-19533": {
"cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()",
"cmt_id": "8630a4d13683095fbf14091d59a20e1ac71fdd6b"
},
"CVE-2019-19080": {
"cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs",
"cmt_id": "5b6c791f494d5e770dfd015390386f321b9a94da"
},
"CVE-2019-19081": {
"cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs",
"cmt_id": "587df35cbf654a063372fb1b523a0b56a5f789ab"
},
"CVE-2019-17053": {
"cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "dd651ab7a11436f787aed0a987c85864b261ff19"
},
"CVE-2019-17052": {
"cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "6f0f18e532693ecc1e0c7938e0d63531ea62bc3e"
},
"CVE-2019-17056": {
"cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "33fe1f517e29566d842535038be227c71a4bd54d"
},
"CVE-2019-17055": {
"cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "50dddec689cb2105f6bccf4a2c6fe43dcc3295d7"
},
"CVE-2019-17054": {
"cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets",
"cmt_id": "6fbf866276089853727dd9b31f1d251e61dde367"
}
},
"4.19.78": {
"CVE-2019-18806": {
"cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers",
"cmt_id": "9d0995cc268b4a431dbfb29db5cac36546732bc0"
}
},
"4.19.79": {
"CVE-2019-19525": {
"cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect",
"cmt_id": "3f41e88f4bd44284c575ad3fb579581a16b39069"
},
"CVE-2019-16746": {
"cmt_msg": "nl80211: validate beacon head",
"cmt_id": "1bd17a737c9e7e91483d9a603528b0e6d4c772f8"
}
},
"4.19.80": {
"CVE-2019-19528": {
"cmt_msg": "USB: iowarrior: fix use-after-free on disconnect",
"cmt_id": "2fdcf7e19bdefc683da824264c0898af39bf8d50"
},
"CVE-2019-19523": {
"cmt_msg": "USB: adutux: fix use-after-free on disconnect",
"cmt_id": "316f51d7759735a5295301ab22a7c6231b49c24f"
}
},
"4.19.81": {
"CVE-2019-19075": {
"cmt_msg": "ieee802154: ca8210: prevent memory leak",
"cmt_id": "960019214539ce75398eaf38d31c77b86aadd739"
},
"CVE-2019-17075": {
"cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack",
"cmt_id": "27414f90ff6e1d7f6657e4a820b04a7b2d760272"
},
"CVE-2019-17133": {
"cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs",
"cmt_id": "73c066a9552a6d33ed7de002855337d1c966e8ce"
}
},
"4.19.82": {
"CVE-2019-19060": {
"cmt_msg": "iio: imu: adis16400: release allocated memory on failure",
"cmt_id": "4a4206a83fc69782d4ef36d8f5eb28836d8b6814"
},
"CVE-2019-19065": {
"cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init",
"cmt_id": "962cff4f3f89acf54b6fb418e7ff386b720b0fd6"
},
"CVE-2019-17666": {
"cmt_msg": "rtlwifi: Fix potential overflow on P2P code",
"cmt_id": "64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33"
},
"CVE-2019-15099": {
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()",
"cmt_id": "696da02259463ea634821e117088f82afe7bf851"
},
"CVE-2019-15098": {
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()",
"cmt_id": "696da02259463ea634821e117088f82afe7bf851"
},
"CVE-2019-19048": {
"cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr",
"cmt_id": "c2ea451f22f180e9e46225f54b5ec50c50bb639f"
},
"CVE-2020-10773": {
"cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()",
"cmt_id": "ced8cb0230d070274cd26bec818dd7c67514d586"
},
"CVE-2019-19526": {
"cmt_msg": "NFC: pn533: fix use-after-free and memleaks",
"cmt_id": "24aaf7f4528f0df0f29667d3921f4a63aa7b806c"
},
"CVE-2019-19532": {
"cmt_msg": "HID: Fix assumption that devices have inputs",
"cmt_id": "8a01c4b908cf0a5367d3309c1c0d4e9be655ce00"
}
},
"4.19.83": {
"CVE-2019-18282": {
"cmt_msg": "net/flow_dissector: switch to siphash",
"cmt_id": "558d2bdad5f6a0dd65ed7ed4f74419e826a97759"
},
"CVE-2019-16233": {
"cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference",
"cmt_id": "3ee6a8bdae81a09c1dc9c27d3a50e6b1b6a24676"
},
"CVE-2019-19049": {
"cmt_msg": "of: unittest: fix memory leak in unittest_data_add",
"cmt_id": "fcc3f7c810c3bc595ce179ea4d9e18f506fd0d03"
}
},
"4.19.84": {
"CVE-2019-19045": {
"cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq",
"cmt_id": "42de3a902443b64c6e3cf9c61d9cd6f30b2c0d67"
},
"CVE-2019-19052": {
"cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak",
"cmt_id": "9289226f69822de0b716c0fbfc31db0283f14e2b"
},
"CVE-2019-18813": {
"cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe",
"cmt_id": "10eb9abd21bad2a9726f50557b38924cb8d81ccd"
},
"CVE-2019-0155": {
"cmt_msg": "drm/i915: Rename gen7 cmdparser tables",
"cmt_id": "b4b1abdc6b181cb78a072b95557ae392d423c3eb"
},
"CVE-2019-0154": {
"cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs",
"cmt_id": "011b7173cbdbd1a5f1826656693ea51516f15dc1"
},
"CVE-2019-19922": {
"cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices",
"cmt_id": "502bd151448c2c76a927b26783e5538875c534ff"
},
"CVE-2019-19529": {
"cmt_msg": "can: mcba_usb: fix use-after-free on disconnect",
"cmt_id": "ce9b94da0e043b7b0ec1bd3d0e451d956acff9c1"
},
"CVE-2018-12207": {
"cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry",
"cmt_id": "a991063ce57684a2259688886643cf1c430f8188"
},
"CVE-2019-11135": {
"cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR",
"cmt_id": "4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6"
},
"CVE-2019-16231": {
"cmt_msg": "fjes: Handle workqueue allocation failure",
"cmt_id": "f09b99c883e82fd5d28a529e11e66c2e887da636"
},
"CVE-2019-19534": {
"cmt_msg": "can: peak_usb: fix slab info leak",
"cmt_id": "a7be2debb769092c7c07b9a866b055d8bee5afaf"
}
},
"4.19.85": {
"CVE-2019-19524": {
"cmt_msg": "Input: ff-memless - kill timer in destroy()",
"cmt_id": "c02230815282a436366d3d0d6de6d2636dd71b74"
}
},
"4.19.87": {
"CVE-2019-18660": {
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch",
"cmt_id": "0a60d4bddc0ba6a7e06d10efa59f7861837860b0"
},
"CVE-2019-15291": {
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking",
"cmt_id": "8b42c263ec1a348bf098e6255407486c1bf17ece"
},
"CVE-2019-18683": {
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop",
"cmt_id": "467052f6ea5a51524992e43f02b543550495c391"
}
},
"4.19.88": {
"CVE-2019-12614": {
"cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()",
"cmt_id": "32a24a397aee35ca2bb0f835b8f3daabd88890fa"
},
"CVE-2019-19767": {
"cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling",
"cmt_id": "e91cce02f3025da559468729ea0ad9dea242d3eb"
}
},
"4.19.89": {
"CVE-2019-19062": {
"cmt_msg": "crypto: user - fix memory leak in crypto_report",
"cmt_id": "351a567ebf2482de4dd5e5bbd539f2175540b717"
},
"CVE-2019-19227": {
"cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client",
"cmt_id": "0977763a13fd87a7aebe376dc96385758de3aa9e"
},
"CVE-2019-19071": {
"cmt_msg": "rsi: release skb if rsi_prepare_beacon fails",
"cmt_id": "5da96cc31633a9076404621ebb89bbe78f2c8676"
},
"CVE-2019-19079": {
"cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter",
"cmt_id": "754e3c0c31c96cf3a4a54ed2a8c63cca28109136"
},
"CVE-2019-19252": {
"cmt_msg": "vcs: prevent write access to vcsu devices",
"cmt_id": "627f3b9e4dd812dac9d93e578af80de751e704a4"
},
"CVE-2019-19332": {
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)",
"cmt_id": "5119ffd480b644d8bc9af741cc8ef435a7ec5ff7"
}
},
"4.19.90": {
"CVE-2019-19447": {
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely",
"cmt_id": "8e7a865366105b978eef4108f49a12100eea4299"
}
},
"4.19.92": {
"CVE-2019-18786": {
"cmt_msg": "media: rcar_drif: fix a memory disclosure",
"cmt_id": "debdd16cbd99ffc767227685e2738e5b495b7c54"
},
"CVE-2019-19057": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring",
"cmt_id": "1b3e52db38471d5ac896eb9be111565e3734d5b5"
},
"CVE-2019-19063": {
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe",
"cmt_id": "3717a450f83945c481059a6921440e5e6fe3c856"
},
"CVE-2020-0427": {
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string",
"cmt_id": "f88ac1330779c5bfdd79f7d7f7d4d3343c782f92"
},
"CVE-2019-19947": {
"cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices",
"cmt_id": "9ed59600c3524f12144b30cfc1d86734cfb3927b"
},
"CVE-2019-20812": {
"cmt_msg": "af_packet: set defaule value for tmo",
"cmt_id": "e99af2cb552e3fe1ec6157fc15856a89a6388886"
},
"CVE-2019-16230": {
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)",
"cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71"
},
"CVE-2019-16232": {
"cmt_msg": "libertas: fix a potential NULL pointer dereference",
"cmt_id": "60bb6967b543be59f66f60526ca816e1b33ec480"
},
"CVE-2019-16229": {
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)",
"cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71"
}
},
"4.19.93": {
"CVE-2020-10690": {
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev",
"cmt_id": "0393b8720128d5b39db8523e5bfbfc689f18c37c"
}
},
"4.19.94": {
"CVE-2019-18809": {
"cmt_msg": "media: usb: fix memory leak in af9005_identify_state",
"cmt_id": "d933de8115f3263fd50cf3b1f1dac2faff02fd89"
},
"CVE-2019-19965": {
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected",
"cmt_id": "8b9bf467061bc89ccf4a43be637e08d8a70fd76d"
}
},
"4.19.95": {
"CVE-2019-14901": {
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()",
"cmt_id": "21f08020dd8519baf209348c345131a8967e3cef"
}
},
"4.19.96": {
"CVE-2019-14895": {
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()",
"cmt_id": "0aa8632c57930243bea6fa4ebcbff8fac089e664"
},
"CVE-2020-0305": {
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'",
"cmt_id": "ec576895d61356a2cab096e1ca23bf7cc765e5b2"
},
"CVE-2019-19066": {
"cmt_msg": "scsi: bfa: release allocated memory in case of error",
"cmt_id": "486f51201528126bec2c647fa9d4216fc4fda91b"
},
"CVE-2019-20636": {
"cmt_msg": "Input: add safety guards to input_set_keycode()",
"cmt_id": "f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4"
},
"CVE-2019-19068": {
"cmt_msg": "rtl8xxxu: prevent leaking urb",
"cmt_id": "0e27512c5d0bc2c3d33c1e7f73a8983015c82b83"
},
"CVE-2020-0431": {
"cmt_msg": "HID: hid-input: clear unmapped usages",
"cmt_id": "64c8b76e69acdecab62b035e72b12775d6d35a3b"
},
"CVE-2019-14615": {
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch",
"cmt_id": "dd4f3b3508f65fe37975db223365216316da3998"
},
"CVE-2019-19056": {
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf",
"cmt_id": "f2bde0e9989e243345316e3c96b352ab94037340"
},
"CVE-2019-19078": {
"cmt_msg": "ath10k: fix memory leak",
"cmt_id": "aed1b68eadf22513ac1fbd389f591f91c8bdaaf5"
}
},
"4.19.97": {
"CVE-2019-9445": {
"cmt_msg": "f2fs: check if file namelen exceeds max value",
"cmt_id": "4124927e36b7753efb6faf1a508e2bc6783343cf"
},
"CVE-2019-20096": {
"cmt_msg": "dccp: Fix memleak in __feat_register_sp",
"cmt_id": "e58c590c772eb5dc5a3603c5aef4148f47ab2e20"
},
"CVE-2019-15217": {
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap",
"cmt_id": "0648766cb7d336e5932278c316aef6aac35d60ab"
},
"CVE-2019-19059": {
"cmt_msg": "iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init",
"cmt_id": "6e41dd9731e13b0bdf2f57f84b9d25d009bd9f87"
},
"CVE-2019-19058": {
"cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable",
"cmt_id": "09044a4a142404799e519def0bbfcc98fa68c677"
},
"CVE-2019-19927": {
"cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages",
"cmt_id": "8c2cdfb2c81bb533b9e6a3874ee5399102c4c580"
},
"CVE-2019-19077": {
"cmt_msg": "RDMA: Fix goto target to release the allocated memory",
"cmt_id": "d203ff6a3059b7fc3a9b48048eaf5641ed7fda2c"
},
"CVE-2019-5108": {
"cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization",
"cmt_id": "8f483142b0bb278f67eabccbe3d6a0e8c45284ad"
}
},
"4.19.98": {
"CVE-2020-12652": {
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl",
"cmt_id": "3dae5041c65545ac65d610375b4ac30b00f174a3"
},
"CVE-2021-3635": {
"cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption",
"cmt_id": "8260ce5aeee4d7c4a6305e469edeae1066de2800"
}
},
"4.19.99": {
"CVE-2019-19046": {
"cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register",
"cmt_id": "211eabc55d07fc3709e967b08b6f5bb77198dbd0"
},
"CVE-2019-20806": {
"cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame",
"cmt_id": "30fd5b16c9081afebe74d4d614fe582ff84ef6b2"
}
},
"4.19.100": {
"CVE-2019-14896": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4"
},
"CVE-2019-14897": {
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor",
"cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4"
},
"CVE-2020-14416": {
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU",
"cmt_id": "bd1448458c6a67782d4e82c181b5540b5727546b"
},
"CVE-2020-8428": {
"cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late",
"cmt_id": "752f72edea55f9b7c6fd019e71365def13a0f2b6"
}
},
"4.19.101": {
"CVE-2020-0432": {
"cmt_msg": "staging: most: net: fix buffer overflow",
"cmt_id": "9dab6bbc9462c43001a88ee933a491a1502fa6f5"
},
"CVE-2020-12769": {
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls",
"cmt_id": "6fb12237c51e73e65899f9b1df69cd3999b4d90a"
}
},
"4.19.103": {
"CVE-2020-0404": {
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors",
"cmt_id": "3ceb3fcd6d1a6a65e7bf3873a63009d01ba4b05f"
},
"CVE-2019-3016": {
"cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit",
"cmt_id": "25a7898937f4a9f32ca2d1e9b7f5f07176af8037"
}
},
"4.19.104": {
"CVE-2020-12653": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()",
"cmt_id": "48247f7e14911a4d18e9c774ba3a1d368f5d8a6f"
},
"CVE-2020-12654": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()",
"cmt_id": "fab5ca79960b7fbda4e9a79a4754c749fdea2bd0"
}
},
"4.19.107": {
"CVE-2020-9383": {
"cmt_msg": "floppy: check FDC index for errors before assigning it",
"cmt_id": "c8fd87c53a1509162b910cec91c0c46753c58f9a"
},
"CVE-2020-2732": {
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode",
"cmt_id": "ed9e97c35b454ceb1da4f65c318015a7ab298dae"
},
"CVE-2020-0009": {
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped",
"cmt_id": "a4307700608e43dcf9b8abf1ee74f68227e9c61a"
}
},
"4.19.108": {
"CVE-2020-27068": {
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE",
"cmt_id": "0fb31bd53a5e27394916758173eb748c5e0dbd47"
},
"CVE-2020-0444": {
"cmt_msg": "audit: fix error handling in audit_data_to_entry()",
"cmt_id": "c24d457a824f641ca328a20dd28872cfd97a005a"
},
"CVE-2019-16234": {
"cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation",
"cmt_id": "1d8780188c8d7f009a05d40fbb8a111eab89746d"
},
"CVE-2020-10942": {
"cmt_msg": "vhost: Check docket sk_family instead of call getname",
"cmt_id": "ad598a48fe61c6c2407f08a807cb7a2ea83386b3"
}
},
"4.19.109": {
"CVE-2020-8647": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9"
},
"CVE-2020-8649": {
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region",
"cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9"
},
"CVE-2020-8648": {
"cmt_msg": "vt: selection, close sel_buffer race",
"cmt_id": "31559b59040fc0e6ad363642112d4eb03ad4ebb7"
}
},
"4.19.111": {
"CVE-2020-12465": {
"cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet",
"cmt_id": "319478cbd2be90995b011ca6adbd834121eb7acf"
}
},
"4.19.112": {
"CVE-2020-29370": {
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()",
"cmt_id": "30f6cae722654caef2ab4bacb2e910bfd766866b"
}
},
"4.19.113": {
"CVE-2020-14381": {
"cmt_msg": "futex: Fix inode life-time issue",
"cmt_id": "e6d506cd2243aa8f6e19fdb4dc61d85275c2c918"
}
},
"4.19.114": {
"CVE-2021-3715": {
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable",
"cmt_id": "ea3d6652c240978736a91b9e85fde9fee9359be4"
},
"CVE-2020-11608": {
"cmt_msg": "media: ov519: add missing endpoint sanity checks",
"cmt_id": "747a7431661ab3c22ad1e721558bdf9e3d53d4a6"
},
"CVE-2020-11609": {
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks",
"cmt_id": "70764334b2bcb15c67dfbd912d9a9f7076f6d0df"
},
"CVE-2020-11668": {
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks",
"cmt_id": "5d064d7f0327d9425c5f63fa96efc70a74032d8b"
},
"CVE-2020-27066": {
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer",
"cmt_id": "7ad217a824f7fab1e8534a6dfa82899ae1900bcb"
}
},
"4.19.115": {
"CVE-2020-11494": {
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding",
"cmt_id": "b774578329afb238ccd504477731129aa15e9ec2"
},
"CVE-2020-11565": {
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED",
"cmt_id": "fa138035f104ae14651ee3217d81fc16cd3aba4d"
}
},
"4.19.116": {
"CVE-2020-12826": {
"cmt_msg": "signal: Extend exec_id to 64bits",
"cmt_id": "a2a1be2de7e4d9a3a2c6cf8512d38eb24bbeb059"
},
"CVE-2020-12657": {
"cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body",
"cmt_id": "d999063be0cf91bff8e0d6daaea21e1a4f70d336"
},
"CVE-2020-11669": {
"cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle",
"cmt_id": "1855c5436fa50e8dc930b0a24c52157dceef9a54"
}
},
"4.19.118": {
"CVE-2020-12659": {
"cmt_msg": "xsk: Add missing check on user supplied headroom size",
"cmt_id": "ad8fb61c184fe0f8d1e0b5b954d010fb9f94a6ee"
}
},
"4.19.119": {
"CVE-2020-11884": {
"cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses",
"cmt_id": "215d1f3928713d6eaec67244bcda72105b898000"
},
"CVE-2020-1749": {
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup",
"cmt_id": "5dd6835278454a7c7a045462253625de7c16b13e"
},
"CVE-2020-12464": {
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary",
"cmt_id": "45ea77b75a604da875186519fea94997175c38e3"
},
"CVE-2020-0067": {
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr",
"cmt_id": "ed523cbd4a6594edf123dc03ec9d70ea4f793671"
},
"CVE-2019-19768": {
"cmt_msg": "blktrace: Protect q->blk_trace with RCU",
"cmt_id": "473d7f5ed75b8c3750f0c6b442c8e23090d6da8f"
},
"CVE-2020-12114": {
"cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount",
"cmt_id": "f511dc75d22e0c000fc70b54f670c2c17f5fba9a"
}
},
"4.19.121": {
"CVE-2020-10751": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26"
},
"CVE-2020-0255": {
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()",
"cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26"
}
},
"4.19.124": {
"CVE-2020-13143": {
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC",
"cmt_id": "a105bb549252e3e8bd9db0bdd81cdd6a853e4238"
},
"CVE-2020-10711": {
"cmt_msg": "netlabel: cope with NULL catmap",
"cmt_id": "caf6c20c6421ca687751d27b96c8021c655e56e6"
},
"CVE-2020-12770": {
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write",
"cmt_id": "34fcb4291e234468f9bf9d4b851c9f522f3bbb13"
},
"CVE-2020-27786": {
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses",
"cmt_id": "a507658fdb2ad8ca282b0eb42f2a40b805deb1e6"
}
},
"4.19.125": {
"CVE-2020-12768": {
"cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()",
"cmt_id": "008708152ebb229c29e065135599984fa9c4a51c"
},
"CVE-2019-18814": {
"cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init",
"cmt_id": "f1738ae012a106c6c8fa7d33ed47fb478d9d3c75"
}
},
"4.19.126": {
"CVE-2020-10732": {
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()",
"cmt_id": "d16b0abe2687f7f0a2f6343a09797e8aac045c86"
}
},
"4.19.127": {
"CVE-2020-10757": {
"cmt_msg": "mm: Fix mremap not considering huge pmd devmap",
"cmt_id": "78385480fd6572a83e7541e37658d9a7de6dc9b1"
},
"CVE-2019-19462": {
"cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open",
"cmt_id": "8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622"
}
},
"4.19.128": {
"CVE-2020-13974": {
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii",
"cmt_id": "18059925dbb6a7b6be1c0166ecca29d6b7977c9a"
},
"CVE-2020-0543": {
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()",
"cmt_id": "6682fe2fca22e45153e69f5b7ce7282bcba3565f"
}
},
"4.19.129": {
"CVE-2019-20810": {
"cmt_msg": "media: go7007: fix a miss of snd_card_free",
"cmt_id": "95b58c96a28e6174661dcd5bc543618973fc43d3"
},
"CVE-2018-20669": {
"cmt_msg": "make 'user_access_begin()' do 'access_ok()'",
"cmt_id": "216284c4a126b28469eb0bf4994c669e251f47ba"
},
"CVE-2021-0342": {
"cmt_msg": "tun: correct header offsets in napi frags mode",
"cmt_id": "75e36c19ff10836e5d03f87cf17793cf83b59430"
},
"CVE-2020-29368": {
"cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()",
"cmt_id": "453d8a481b127edfa7fb76af1bc7586b7a63bdd2"
},
"CVE-2020-10766": {
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown",
"cmt_id": "5aaf72a0dcb82d5c98f3b7df149baf4c7cf63e19"
},
"CVE-2020-10767": {
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.",
"cmt_id": "5d9d55cf4733c5ced8e1d19ea242a128ab9612d2"
},
"CVE-2019-18885": {
"cmt_msg": "btrfs: merge btrfs_find_device and find_device",
"cmt_id": "8cb9b069fa631b613bbbd6f63887190e55cafa3c"
},
"CVE-2019-19036": {
"cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations",
"cmt_id": "227af79e6cb0ee3faeb8c70be4bc0aec0b09ea25"
},
"CVE-2020-10768": {
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.",
"cmt_id": "52c419ba4c96880abd61b38e6e08e4ecd17350f3"
}
},
"4.19.130": {
"CVE-2020-12771": {
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce",
"cmt_id": "2ee8f6e72269eb06649ebab3da6bbf59aed3eabe"
},
"CVE-2020-15436": {
"cmt_msg": "block: Fix use-after-free in blkdev_get()",
"cmt_id": "49289b1fa5a67011c4010e4e9c801b9d565ce395"
}
},
"4.19.131": {
"CVE-2020-12655": {
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify",
"cmt_id": "135eccd83909e75389a5754577b0336bbd0939ef"
}
},
"4.19.132": {
"CVE-2020-24394": {
"cmt_msg": "nfsd: apply umask on fs without ACL support",
"cmt_id": "2b3faab744b04de198aee4ed8dd74fca7a2a8306"
},
"CVE-2020-15393": {
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect",
"cmt_id": "7b0f1f89a0dd6e257367eddc840179e85195ca18"
}
},
"4.19.134": {
"CVE-2020-14356": {
"cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()",
"cmt_id": "0505cc4c908f46a4d22c4994dbbe7bc489d0c52d"
},
"CVE-2020-10781": {
"cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"",
"cmt_id": "81a91bf266dd7f2dd56fc3472b7bb54348ac62c7"
}
},
"4.19.135": {
"CVE-2020-15437": {
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()",
"cmt_id": "c358255ff1dfa51ddbcbc8dfcc4eaa5719008daa"
}
},
"4.19.137": {
"CVE-2019-19061": {
"cmt_msg": "iio: imu: adis16400: fix memory leak",
"cmt_id": "c57c213538156bff971aa352d9d7749196dfbfd8"
},
"CVE-2019-19067": {
"cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init",
"cmt_id": "e15f8a9b0046418295d09db24c1ec306c80d013b"
},
"CVE-2020-24490": {
"cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report",
"cmt_id": "5df9e5613d1c51e16b1501a4c75e139fbbe0fb6c"
},
"CVE-2019-19816": {
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference",
"cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93"
},
"CVE-2019-3874": {
"cmt_msg": "sctp: implement memory accounting on tx path",
"cmt_id": "9a84bb13816fe3b361a75e10ee9821ab68aa36f5"
},
"CVE-2019-19082": {
"cmt_msg": "drm/amd/display: prevent memory leak",
"cmt_id": "60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e"
},
"CVE-2019-18808": {
"cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid",
"cmt_id": "167edeeb034f65f57790ff70b1af84a501274d15"
},
"CVE-2019-19813": {
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference",
"cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93"
},
"CVE-2019-19054": {
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe",
"cmt_id": "17271f33fd8811b364ae3c54671566434d46d3eb"
},
"CVE-2019-19074": {
"cmt_msg": "ath9k: release allocated buffer if timed out",
"cmt_id": "e0cf3ebfcf93dbce123b8bef00f549712efe1135"
},
"CVE-2019-19073": {
"cmt_msg": "ath9k_htc: release allocated buffer if timed out",
"cmt_id": "5b8464dc9a6e81a16481549c77d0d341041e425e"
},
"CVE-2019-19072": {
"cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory",
"cmt_id": "7deb2dcb8963812742ed08420cfa4e23bbeda074"
}
},
"4.19.138": {
"CVE-2020-16166": {
"cmt_msg": "random32: update the net random state on interrupt and activity",
"cmt_id": "29204c846894d73108f87e78aea4757a8ec52c74"
}
},
"4.19.139": {
"CVE-2020-36386": {
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()",
"cmt_id": "8c4a649c20fec015ebb326f36b47d4e39d9ff5b7"
},
"CVE-2019-0148": {
"cmt_msg": "i40e: Wrong truncation from u16 to u8",
"cmt_id": "48a9be93ff2c5a09e308ef93560ea1f4ecbd22f6"
},
"CVE-2019-0147": {
"cmt_msg": "i40e: add num_vectors checker in iwarp handler",
"cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367"
},
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling",
"cmt_id": "61219546f3036d2b4a1898be7a38da22e97a3b62"
},
"CVE-2019-0145": {
"cmt_msg": "i40e: add num_vectors checker in iwarp handler",
"cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367"
}
},
"4.19.140": {
"CVE-2020-26088": {
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.",
"cmt_id": "b200620cada4eaa63108be32e040ed557a1965fd"
},
"CVE-2021-20292": {
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.",
"cmt_id": "10c8a526b2db1fcdf9e2d59d4885377b91939c55"
}
},
"4.19.141": {
"CVE-2019-19448": {
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space",
"cmt_id": "627fa9d8071daad6aa84316c1fcb114a62db914f"
},
"CVE-2020-25212": {
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow",
"cmt_id": "a906b868953a9c9bba44649a8fe760e818dd7224"
}
},
"4.19.142": {
"CVE-2020-14314": {
"cmt_msg": "ext4: fix potential negative array index in do_split()",
"cmt_id": "b3ddf6ba5e28a57729fff1605ae08e21be5c92e3"
},
"CVE-2020-29371": {
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()",
"cmt_id": "9660983738399465fd0e3b1977a61bbd29b2e5be"
},
"CVE-2020-0466": {
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit",
"cmt_id": "dcb6e6efb3298e59d90ee05c6ed33de810314892"
}
},
"4.19.144": {
"CVE-2020-0465": {
"cmt_msg": "HID: core: Sanitize event code and type when mapping input",
"cmt_id": "a47b8511d90528c77346597e2012100dfc28cd8c"
},
"CVE-2020-25641": {
"cmt_msg": "block: allow for_each_bvec to support zero len bvec",
"cmt_id": "b48bcb664b657ae94b19c0728978c88e012f7a37"
},
"CVE-2021-1048": {
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"",
"cmt_id": "37d933e8b41b83bb8278815e366aec5a542b7e31"
},
"CVE-2020-25285": {
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers",
"cmt_id": "221ea9a3da9169dc3c9a364a5f938e215db6419e"
},
"CVE-2020-14385": {
"cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify",
"cmt_id": "017265f1421529a473c25dc46a0cee98facbb1a3"
},
"CVE-2020-12888": {
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory",
"cmt_id": "da7aea6eb5608695f590dcd72523536b709d0399"
}
},
"4.19.146": {
"CVE-2020-25284": {
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping",
"cmt_id": "0070f9906d7190d4c69e338403db4abfec81fe7f"
},
"CVE-2020-14390": {
"cmt_msg": "fbcon: remove soft scrollback code",
"cmt_id": "770adb5d2b8ebe94a92e4c9510f4f2517f4204eb"
},
"CVE-2020-28097": {
"cmt_msg": "vgacon: remove software scrollback support",
"cmt_id": "f5fa64c8daf7b97280865c73903edc0a3eea819e"
}
},
"4.19.148": {
"CVE-2020-25645": {
"cmt_msg": "geneve: add transport ports in route lookup for geneve",
"cmt_id": "c797110d97c48054d1491251fd713900ff51615c"
},
"CVE-2021-0605": {
"cmt_msg": "af_key: pfkey_dump needs parameter validation",
"cmt_id": "b59a23d596807a5aa88d8dd5655a66c6843729b3"
},
"CVE-2020-25643": {
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()",
"cmt_id": "45676c0bc28eff8f46455b28e2db80a77676488b"
},
"CVE-2020-36312": {
"cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()",
"cmt_id": "19184bd06f488af62924ff1747614a8cb284ad63"
}
},
"4.19.150": {
"CVE-2020-14386": {
"cmt_msg": "net/packet: fix overflow in tpacket_rcv",
"cmt_id": "1c3886dc302329f199cc04f8a56ba44d17a0df16"
},
"CVE-2020-25211": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e"
},
"CVE-2021-0448": {
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum",
"cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e"
},
"CVE-2021-39634": {
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done",
"cmt_id": "3e3bbc4d23eeb90bf282e98c7dfeca7702df3169"
}
},
"4.19.151": {
"CVE-2020-28915": {
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()",
"cmt_id": "43198a5b1c42e3d8aadc6524a73bb3aa3666cd43"
}
},
"4.19.152": {
"CVE-2020-10135": {
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm",
"cmt_id": "0c75831bc108ec23c663d969181a4dd7e4b651bb"
},
"CVE-2020-12352": {
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members",
"cmt_id": "128278f444ab3a0d38759c4935092d256edc77d0"
},
"CVE-2020-12351": {
"cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel",
"cmt_id": "360f80e34292dbe91c23e893f90cd357aff8b68a"
}
},
"4.19.153": {
"CVE-2020-0423": {
"cmt_msg": "binder: fix UAF when releasing todo list",
"cmt_id": "35cc2facc2a5ff52b9aa03f2dc81dcb000d97da3"
},
"CVE-2020-25705": {
"cmt_msg": "icmp: randomize the global rate limiter",
"cmt_id": "d6c552505c0d1719dda42b4af2def0618bd7bf54"
}
},
"4.19.155": {
"CVE-2020-27777": {
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace",
"cmt_id": "94e8f0bbc475228c93d28b2e0f7e37303db80ffe"
},
"CVE-2020-27673": {
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking",
"cmt_id": "25f6b08895d579b461487291d6e48b3953a8bf65"
},
"CVE-2020-25668": {
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed",
"cmt_id": "619e366268e0430687d07b24b48f7382fc088c9f"
},
"CVE-2020-25656": {
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers",
"cmt_id": "7e3ba72e5b9376e12839ea347c49fc4108244b0c"
},
"CVE-2020-27675": {
"cmt_msg": "xen/events: avoid removing an event channel while handling it",
"cmt_id": "61d359d51a1cce8a5913843c8c3601dc878cc519"
}
},
"4.19.156": {
"CVE-2020-28974": {
"cmt_msg": "vt: Disable KD_FONT_OP_COPY",
"cmt_id": "6612b754ac0c85ca8b1181b5d3ea4461a8c1bbcb"
},
"CVE-2020-35508": {
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent",
"cmt_id": "b177d2d915cea2d0a590f0034a20299dd1ee3ef2"
},
"CVE-2020-25704": {
"cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()",
"cmt_id": "29a975bcc107d68e379a55048813ddf3e7b120b8"
},
"CVE-2019-19377": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors",
"cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b"
},
"CVE-2019-19770": {
"cmt_msg": "blktrace: fix debugfs use after free",
"cmt_id": "8a78b4c0d6292d32d76b4268b5a33ae089a5d791"
},
"CVE-2019-19039": {
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors",
"cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b"
}
},
"4.19.157": {
"CVE-2020-8694": {
"cmt_msg": "powercap: restrict energy meter to root access",
"cmt_id": "900281e167f45e0c0e5df6e59fa00334b5e38133"
}
},
"4.19.158": {
"CVE-2020-14351": {
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function",
"cmt_id": "1cbfb60332f4e62224440f6d38a6b3114b2355f0"
}
},
"4.19.159": {
"CVE-2020-4788": {
"cmt_msg": "powerpc/64s: flush L1D on kernel entry",
"cmt_id": "f69bb4e51f41973fb7594be1479fa689831efe1a"
},
"CVE-2020-25669": {
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths",
"cmt_id": "8bf2e8fe8a8e2e05246215697bb55f8901faef44"
}
},
"4.19.160": {
"CVE-2020-28941": {
"cmt_msg": "speakup: Do not let the line discipline be used several times",
"cmt_id": "3560603ef82f11277143a433170bca05bd9288a8"
}
},
"4.19.162": {
"CVE-2020-35519": {
"cmt_msg": "net/x25: prevent a couple of overflows",
"cmt_id": "304c080fc33258e3b177b6f0736b97d54e6fea3b"
}
},
"4.19.163": {
"CVE-2020-29661": {
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()",
"cmt_id": "13f10a78097df2f14d4e1fd390dbaa3e28502ca7"
},
"CVE-2020-29660": {
"cmt_msg": "tty: Fix ->session locking",
"cmt_id": "361e822b7d8a9d06d88f7cea0fdb0fb6e41c4d45"
},
"CVE-2020-27830": {
"cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup",
"cmt_id": "de867367f35237729e285ff6efa3fd4e4b0b9008"
}
},
"4.19.164": {
"CVE-2021-0938": {
"cmt_msg": "compiler.h: fix barrier_data() on clang",
"cmt_id": "b207caff4176e3a6ba273243da2db2e595e4aad2"
},
"CVE-2020-27815": {
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree",
"cmt_id": "c7e31b2fecfe0ebd5bd6a8274b2fbfb9c9401738"
},
"CVE-2020-29568": {
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing",
"cmt_id": "9039eb22f99545fa80a5897496452cf9962e3289"
},
"CVE-2020-29569": {
"cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()",
"cmt_id": "014ee1c7d184acb8986152014a570ba7c69d3616"
}
},
"4.19.166": {
"CVE-2020-36158": {
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start",
"cmt_id": "b35029a1f24fe511af750537e6565dcf68e5c862"
}
},
"4.19.167": {
"CVE-2020-28374": {
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup",
"cmt_id": "fff1180d24e68d697f98642d71444316036a81ff"
},
"CVE-2021-39648": {
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name",
"cmt_id": "83b74059fdf1c4fa6ed261725e6f301552ad23f7"
}
},
"4.19.170": {
"CVE-2021-3178": {
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export",
"cmt_id": "a08c2e586ad047fcea3f75664cca0915c77934fe"
}
},
"4.19.171": {
"CVE-2021-39657": {
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback",
"cmt_id": "b397fcae2207963747c6f947ef4d06575553eaef"
}
},
"4.19.172": {
"CVE-2020-27825": {
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call",
"cmt_id": "acfa7ad7b7f6489e2bed20880ce090fdabdbb841"
},
"CVE-2021-3347": {
"cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()",
"cmt_id": "72f38fffa4758b878f819f8a47761b3f03443f36"
}
},
"4.19.173": {
"CVE-2021-3348": {
"cmt_msg": "nbd: freeze the queue while we're adding connections",
"cmt_id": "424838c0f727f1d11ce2ccaabba96f4346c03906"
}
},
"4.19.177": {
"CVE-2021-26931": {
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()",
"cmt_id": "a01b49a9bf91a723f541139c063c1ff681ac536a"
},
"CVE-2021-26930": {
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()",
"cmt_id": "98f16e171e2849dba76e2e0346e914452c030dc5"
},
"CVE-2021-21781": {
"cmt_msg": "ARM: ensure the signal page contains defined contents",
"cmt_id": "80ef523d2cb719c3de66787e922a96b5099d2fbb"
},
"CVE-2021-26932": {
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()",
"cmt_id": "dfed59ee4b41b0937163dfed36752d29e72d0712"
}
},
"4.19.178": {
"CVE-2021-0512": {
"cmt_msg": "HID: make arrays usage and value to be the same",
"cmt_id": "ffca531f71d078c6caf752d64bc2a592f420f7c6"
},
"CVE-2021-3612": {
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl",
"cmt_id": "88438fdeeffe11dcb05c2dd0ddd22cb6e3f024b4"
}
},
"4.19.179": {
"CVE-2021-30002": {
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy",
"cmt_id": "ff2111a6fab31923685b6ca8ea466ea0576b8a0e"
},
"CVE-2021-27365": {
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE",
"cmt_id": "b2957d7baff77b399c7408dc12bacc7f63765897"
},
"CVE-2021-27364": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3"
},
"CVE-2021-27363": {
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities",
"cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3"
},
"CVE-2021-28038": {
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis",
"cmt_id": "1a999d25ef536a14f6a7c25778836857adfba3f8"
}
},
"4.19.181": {
"CVE-2021-33033": {
"cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts",
"cmt_id": "a44af1c69737f9e64d5134c34eb9d5c4c2e04da1"
},
"CVE-2021-29265": {
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf",
"cmt_id": "c6b0ca71d3cd561decd39c1c4132c2d10a496e1a"
},
"CVE-2021-28660": {
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()",
"cmt_id": "eda4378094de16090d74eacea3d8c10f7719ed25"
}
},
"4.19.183": {
"CVE-2021-28964": {
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root",
"cmt_id": "12dc6889bcff1bc2921a1587afca55ca4091b73e"
},
"CVE-2021-28972": {
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions",
"cmt_id": "f27a00f0d5b0646a52633e98f5fc3ef719004dcd"
},
"CVE-2021-28971": {
"cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status",
"cmt_id": "b35214c541365c7dd7c9d5f44a02b0633a1cc83f"
}
},
"4.19.184": {
"CVE-2021-28688": {
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()",
"cmt_id": "16356ddb587867c2a5ab85407eeb75f2b8818207"
},
"CVE-2021-31916": {
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices",
"cmt_id": "76aa61c55279fdaa8d428236ba8834edf313b372"
},
"CVE-2021-29264": {
"cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash",
"cmt_id": "9943741c2792a7f1d091aad38f496ed6eb7681c4"
},
"CVE-2021-29647": {
"cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()",
"cmt_id": "5f09be2a1a35cb8bd6c178d5f205b7265bd68646"
},
"CVE-2021-29650": {
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.",
"cmt_id": "81bc258370c6eeb1f41d350325e8a2c8e20fafad"
}
},
"4.19.185": {
"CVE-2021-0941": {
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len",
"cmt_id": "8c1a77ae15ce70a72f26f4bb83c50f769011220c"
},
"CVE-2021-3483": {
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()",
"cmt_id": "89a2c28a3b67c7d918218f57e4bb7b591f7e5d0f"
}
},
"4.19.186": {
"CVE-2021-29154": {
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64",
"cmt_id": "5f26f1f838aa960045c712e13dbab8ff451fed74"
}
},
"4.19.187": {
"CVE-2021-3659": {
"cmt_msg": "net: mac802154: Fix general protection fault",
"cmt_id": "c166c0f5311dc9de687b8985574a5ee5166d367e"
},
"CVE-2020-25672": {
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()",
"cmt_id": "301a4264d6ab56d2b9230066b060d7ceaa000d68"
},
"CVE-2020-25673": {
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()",
"cmt_id": "eab391e0766ed88262160b14bb7131f331f6af1a"
},
"CVE-2020-25670": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()",
"cmt_id": "adbb1d218c5f56dbae052765da83c0f57fce2a31"
},
"CVE-2020-25671": {
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()",
"cmt_id": "c14b50185cd0d5ba6d7a5eb8acf9fbcc3663416d"
}
},
"4.19.188": {
"CVE-2021-0937": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "12ec80252edefff00809d473a47e5f89c7485499"
},
"CVE-2021-22555": {
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write",
"cmt_id": "12ec80252edefff00809d473a47e5f89c7485499"
}
},
"4.19.189": {
"CVE-2020-29374": {
"cmt_msg": "gup: document and work around \"COW can break either way\" issue",
"cmt_id": "5e24029791e809d641e9ea46a1f99806484e53fc"
},
"CVE-2021-23133": {
"cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock",
"cmt_id": "301084de76eb5bfedddda41ec33e2913e90c99e7"
}
},
"4.19.191": {
"CVE-2021-4157": {
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()",
"cmt_id": "f27638a92f77d8107efbaf48a0d3bfa24da8cdad"
},
"CVE-2021-33034": {
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy",
"cmt_id": "75e26178e26f910f7f26c79c2824b726eecf0dfb"
},
"CVE-2021-32399": {
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller",
"cmt_id": "35113c4c9fa7c970ff456982e381dc9e9594154a"
},
"CVE-2021-3506": {
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access",
"cmt_id": "bfa08a47cea2a9fab077c7135b9cfdf04e69c67a"
}
},
"4.19.192": {
"CVE-2020-26558": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b"
},
"CVE-2021-0129": {
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical",
"cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b"
}
},
"4.19.193": {
"CVE-2021-33098": {
"cmt_msg": "ixgbe: fix large MTU request from VF",
"cmt_id": "938ffd6d2dd78fb83b9346c9b689e2a3a6fe7174"
},
"CVE-2020-24587": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf"
},
"CVE-2020-24586": {
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks",
"cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf"
},
"CVE-2021-34981": {
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails",
"cmt_id": "f8be26b9950710fe50fb45358df5bd01ad18efb7"
},
"CVE-2020-24588": {
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks",
"cmt_id": "8ea9e997642360ea097710cfa7b1cd750a73fe64"
},
"CVE-2020-26139": {
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames",
"cmt_id": "24347f561816634ab780bf7e03deeb049898b3bc"
},
"CVE-2020-26147": {
"cmt_msg": "mac80211: assure all fragments are encrypted",
"cmt_id": "3c919823e4cad7bdc2c92b0dd3b4dc463c9315bd"
}
},
"4.19.194": {
"CVE-2021-3564": {
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order",
"cmt_id": "64700748e8a7af4883538c72ada57999d9a78e92"
},
"CVE-2021-38208": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f"
},
"CVE-2021-3573": {
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object",
"cmt_id": "2b9e9c2ed0f1910b5201c5d37b355b60201df415"
},
"CVE-2021-3587": {
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect",
"cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f"
}
},
"4.19.196": {
"CVE-2021-34693": {
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head",
"cmt_id": "8899857d7e450805e6410de5004126491f197146"
},
"CVE-2021-45486": {
"cmt_msg": "inet: use bigger hash table for IP ID generation",
"cmt_id": "7f7e23df8509e072593200400a4b094cc44376d2"
},
"CVE-2021-35039": {
"cmt_msg": "module: limit enabling module.sig_enforce",
"cmt_id": "ff660863628fb144badcb3395cde7821c82c13a6"
},
"CVE-2021-3743": {
"cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post",
"cmt_id": "f8111c0d7ed42ede41a3d0d393b104de0730a8a6"
}
},
"4.19.197": {
"CVE-2020-36311": {
"cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy",
"cmt_id": "cadf5bbcefbd9717e51c61d6128b520583ffdf4f"
}
},
"4.19.198": {
"CVE-2021-45485": {
"cmt_msg": "ipv6: use prandom_u32() for ID generation",
"cmt_id": "f0be58ec9931907e980cf21737e51d369808eb95"
},
"CVE-2021-3655": {
"cmt_msg": "sctp: validate from_addr_param return",
"cmt_id": "c7a03ebace4f9cd40d9cd9dd5fb2af558025583c"
},
"CVE-2021-38199": {
"cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()",
"cmt_id": "743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368"
},
"CVE-2021-3609": {
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()",
"cmt_id": "eabe65197876e4a0906eab784f5766c4c76098c7"
},
"CVE-2022-0850": {
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header",
"cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0"
},
"CVE-2021-33909": {
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations",
"cmt_id": "6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d"
},
"CVE-2021-38160": {
"cmt_msg": "virtio_console: Assure used length from device is limited",
"cmt_id": "b5fba782ccd3d12a14f884cd20f255fc9c0eec0c"
}
},
"4.19.199": {
"CVE-2021-38204": {
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory",
"cmt_id": "51fc12f4d37622fa0c481604833f98f11b1cac4f"
},
"CVE-2021-3679": {
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.",
"cmt_id": "6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a"
},
"CVE-2021-37576": {
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow",
"cmt_id": "0493b10c06021796ba80cbe53c961defd5aca6e5"
},
"CVE-2021-22543": {
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages",
"cmt_id": "117777467bc015f0dc5fc079eeba0fa80c965149"
}
},
"4.19.200": {
"CVE-2021-0920": {
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK",
"cmt_id": "1dabafa9f61118b1377fde424d9a94bf8dbf2813"
}
},
"4.19.204": {
"CVE-2021-38198": {
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page",
"cmt_id": "4c07e70141eebd3db64297515a427deea4822957"
},
"CVE-2021-38205": {
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer",
"cmt_id": "9322401477a6d1f9de8f18e5d6eb43a68e0b113a"
},
"CVE-2021-3732": {
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed",
"cmt_id": "963d85d630dabe75a3cfde44a006fec3304d07b8"
},
"CVE-2021-33624": {
"cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data",
"cmt_id": "0abc8c9754c953f5cd0ac7488c668ca8d53ffc90"
}
},
"4.19.205": {
"CVE-2021-42008": {
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data",
"cmt_id": "4e370cc081a78ee23528311ca58fd98a06768ec7"
},
"CVE-2021-3653": {
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)",
"cmt_id": "42f4312c0e8a225b5f1e3ed029509ef514f2157a"
},
"CVE-2021-3656": {
"cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)",
"cmt_id": "119d547cbf7c055ba8100309ad71910478092f24"
},
"CVE-2020-3702": {
"cmt_msg": "ath: Use safer key clearing with key cache entries",
"cmt_id": "dd5815f023b89c9a28325d8a2a5f0779b57b7190"
}
},
"4.19.206": {
"CVE-2021-3444": {
"cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero",
"cmt_id": "39f74b7c81cca139c05757d9c8f9d1e35fbbf56b"
},
"CVE-2021-3600": {
"cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod",
"cmt_id": "8313432df224d926590731ec3ace3e1bd7bc4a1a"
},
"CVE-2021-3753": {
"cmt_msg": "vt_kdsetmode: extend console locking",
"cmt_id": "0776c1a20babb4ad0b7ce7f2f4e0806a97663187"
},
"CVE-2021-39633": {
"cmt_msg": "ip_gre: add validation for csum_start",
"cmt_id": "c33471daf2763c5aee2b7926202c74b75c365119"
}
},
"4.19.207": {
"CVE-2021-42252": {
"cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap",
"cmt_id": "9c8891b638319ddba9cfa330247922cd960c95b0"
},
"CVE-2021-34556": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4",
"cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8"
},
"CVE-2021-35477": {
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4",
"cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8"
},
"CVE-2020-16119": {
"cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock",
"cmt_id": "dfec82f3e5b8bd93ab65b7417a64886ec8c42f14"
},
"CVE-2021-40490": {
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing",
"cmt_id": "c481607ba522e31e6ed01efefc19cc1d0e0a46fa"
}
},
"4.19.208": {
"CVE-2021-20320": {
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions",
"cmt_id": "ddf58efd05b5d16d86ea4638675e8bd397320930"
}
},
"4.19.209": {
"CVE-2021-3764": {
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9"
},
"CVE-2021-4203": {
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses",
"cmt_id": "0512a9aede6e4417c4fa6e0042a7ca8bc7e06b86"
},
"CVE-2021-3744": {
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9"
},
"CVE-2021-37159": {
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device",
"cmt_id": "f6cf22a1ef49f8e131f99c3f5fd80ab6b23a2d21"
}
},
"4.19.210": {
"CVE-2021-20317": {
"cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer",
"cmt_id": "b9a1ac8e7c03fd09992352c7fb1a61cbbb9ad52b"
}
},
"4.19.211": {
"CVE-2021-20321": {
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()",
"cmt_id": "9d4969d8b5073d02059bae3f1b8d9a20cf023c55"
},
"CVE-2021-41864": {
"cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()",
"cmt_id": "078cdd572408176a3900a6eb5a403db0da22f8e0"
},
"CVE-2021-38300": {
"cmt_msg": "bpf, mips: Validate conditional branch offsets",
"cmt_id": "79f3a086dfc34887f9bbb0801768608b9470e942"
}
},
"4.19.213": {
"CVE-2021-3894": {
"cmt_msg": "sctp: account stream padding length for reconf chunk",
"cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda"
},
"CVE-2022-0322": {
"cmt_msg": "sctp: account stream padding length for reconf chunk",
"cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda"
}
},
"4.19.214": {
"CVE-2021-3896": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a"
},
"CVE-2022-0644": {
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()",
"cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735"
},
"CVE-2021-3760": {
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object",
"cmt_id": "1ac0d736c8ae9b59ab44e4e80ad73c8fba5c6132"
},
"CVE-2021-43389": {
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound",
"cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a"
}
},
"4.19.215": {
"CVE-2021-20322": {
"cmt_msg": "ipv6: make exception cache less predictible",
"cmt_id": "c6d0d68d6da68159948cad3d808d61bb291a0283"
},
"CVE-2021-3772": {
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk",
"cmt_id": "1f52dfacca7bb315d89f5ece5660b0337809798e"
}
},
"4.19.216": {
"CVE-2021-42739": {
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()",
"cmt_id": "53ec9dab4eb0a8140fc85760fb50effb526fe219"
}
},
"4.19.218": {
"CVE-2021-4202": {
"cmt_msg": "NFC: reorganize the functions in nci_request",
"cmt_id": "62be2b1e7914b7340281f09412a7bbb62e6c8b67"
},
"CVE-2021-3752": {
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()",
"cmt_id": "72bb30165337b7bce77578ad151fbfab6c8e693c"
},
"CVE-2021-45868": {
"cmt_msg": "quota: check block number when reading the block in quota file",
"cmt_id": "e5222c87dc441dcc8a66e93cb3fd34dfff03d3ec"
},
"CVE-2021-39686": {
"cmt_msg": "binder: use euid from cred instead of using task",
"cmt_id": "5d40061285b81a7e213dc9b37acc4a0545eedf32"
},
"CVE-2021-3640": {
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()",
"cmt_id": "c1c913f797f3d2441310182ad75b7bd855a327ff"
}
},
"4.19.219": {
"CVE-2021-4002": {
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare",
"cmt_id": "b0313bc7f5fbb6beee327af39d818ffdc921821a"
}
},
"4.19.220": {
"CVE-2021-43975": {
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait",
"cmt_id": "0275fcd9b54f0364f66f2f3f6a0f3748648f3d35"
},
"CVE-2021-4083": {
"cmt_msg": "fget: check that the fd still exists after getting a ref to it",
"cmt_id": "8bf31f9d9395b71af3ed33166a057cd3ec0c59da"
}
},
"4.19.221": {
"CVE-2021-39713": {
"cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock",
"cmt_id": "ae214e04b95ff64a4b0e9aab6742520bfde6ff0c"
},
"CVE-2021-39698": {
"cmt_msg": "wait: add wake_up_pollfree()",
"cmt_id": "8dd7c46a59756bdc29cb9783338b899cd3fb4b83"
},
"CVE-2021-39685": {
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests",
"cmt_id": "13e45e7a262dd96e8161823314679543048709b9"
}
},
"4.19.222": {
"CVE-2021-28715": {
"cmt_msg": "xen/netback: don't queue unlimited number of packages",
"cmt_id": "c9f17e92917fd5786be872626a3928979ecc4c39"
},
"CVE-2021-28714": {
"cmt_msg": "xen/netback: fix rx queue stall detection",
"cmt_id": "1de7644eac41981817fb66b74e0f82ca4477dc9d"
},
"CVE-2021-28713": {
"cmt_msg": "xen/console: harden hvc_xen against event channel storms",
"cmt_id": "57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2"
},
"CVE-2021-28712": {
"cmt_msg": "xen/netfront: harden netfront against event channel storms",
"cmt_id": "3559ca594f15fcd23ed10c0056d40d71e5dab8e5"
},
"CVE-2021-28711": {
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms",
"cmt_id": "269d7124bcfad2558d2329d0fe603ca20b20d3f4"
},
"CVE-2021-4135": {
"cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc",
"cmt_id": "d861443c4dc88650eed113310d933bd593d37b23"
}
},
"4.19.223": {
"CVE-2021-45469": {
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()",
"cmt_id": "f9dfa44be0fb5e8426183a70f69a246cf5827f49"
},
"CVE-2022-1195": {
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD",
"cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59"
}
},
"4.19.224": {
"CVE-2021-44733": {
"cmt_msg": "tee: handle lookup of shm with reference count 0",
"cmt_id": "b4a661b4212b8fac8853ec3b68e4a909dccc88a1"
}
},
"4.19.225": {
"CVE-2021-45095": {
"cmt_msg": "phonet: refcount leak in pep_sock_accep",
"cmt_id": "4dece2760af408ad91d6e43afc485d20386c2885"
},
"CVE-2021-4155": {
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate",
"cmt_id": "1c3564fca0e7b8c9e96245a2cb35e198b036ee9a"
}
},
"4.19.226": {
"CVE-2020-36322": {
"cmt_msg": "fuse: fix bad inode",
"cmt_id": "1e1bb4933f1faafc68db8e0ecd5838a65dd1aae9"
},
"CVE-2021-43976": {
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()",
"cmt_id": "2f4b037bf6e8c663a593b8149263c5b6940c7afd"
}
},
"4.19.227": {
"CVE-2022-0330": {
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store",
"cmt_id": "b188780649081782e341e52223db47c49f172712"
},
"CVE-2022-22942": {
"cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy",
"cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d"
}
},
"4.19.228": {
"CVE-2022-24448": {
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails",
"cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de"
},
"CVE-2022-0617": {
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format",
"cmt_id": "a23a59717f9f01a49394488f515550f9382fbada"
},
"CVE-2022-24959": {
"cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()",
"cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7"
}
},
"4.19.229": {
"CVE-2022-0492": {
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent",
"cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3"
},
"CVE-2022-0435": {
"cmt_msg": "tipc: improve size validations for received domain records",
"cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d"
},
"CVE-2022-0487": {
"cmt_msg": "moxart: fix potential use-after-free on remove path",
"cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552"
}
},
"4.19.230": {
"CVE-2022-25375": {
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command",
"cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda"
},
"CVE-2022-25258": {
"cmt_msg": "USB: gadget: validate interface OS descriptor requests",
"cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164"
}
},
"4.19.232": {
"CVE-2022-27223": {
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc",
"cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1"
},
"CVE-2022-26966": {
"cmt_msg": "sr9700: sanity check for packet length",
"cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337"
}
},
"4.19.233": {
"CVE-2022-24958": {
"cmt_msg": "usb: gadget: don't release an existing dev->buf",
"cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52"
}
},
"4.19.234": {
"CVE-2022-23038": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()",
"cmt_id": "17659846fe336366b1663194f5669d10f5947f53"
},
"CVE-2022-23039": {
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()",
"cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce"
},
"CVE-2022-23960": {
"cmt_msg": "ARM: report Spectre v2 status through sysfs",
"cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a"
},
"CVE-2022-23036": {
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()",
"cmt_id": "17659846fe336366b1663194f5669d10f5947f53"
},
"CVE-2022-23037": {
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status",
"cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72"
},
"CVE-2022-0001": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE",
"cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e"
},
"CVE-2022-0002": {
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE",
"cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e"
},
"CVE-2022-23041": {
"cmt_msg": "xen/9p: use alloc/free_pages_exact()",
"cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea"
},
"CVE-2022-23040": {
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case",
"cmt_id": "8d521d960aef22781ff499e16899c30af899de8d"
},
"CVE-2022-23042": {
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()",
"cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5"
}
},
"4.19.235": {
"CVE-2022-1199": {
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device",
"cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c"
},
"CVE-2021-4149": {
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error",
"cmt_id": "73d55fa1b9310573f623195a4f7ab3170bbaf248"
}
},
"4.19.237": {
"CVE-2022-26490": {
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION",
"cmt_id": "0043b74987acb44f1ade537aad901695511cfebe"
},
"CVE-2022-28356": {
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()",
"cmt_id": "d14193111c436fc5de33206c67c7afd45c730099"
},
"CVE-2022-1016": {
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()",
"cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b"
},
"CVE-2022-27666": {
"cmt_msg": "esp: Fix possible buffer overflow in ESP transformation",
"cmt_id": "ce89087966651ad41e103770efc5ce2742046284"
}
},
"4.19.238": {
"CVE-2022-28390": {
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path",
"cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba"
},
"CVE-2022-1353": {
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register",
"cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795"
},
"CVE-2022-1198": {
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()",
"cmt_id": "79e2f40c210a47f283bca352745068207798fbb9"
},
"CVE-2021-4197": {
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks",
"cmt_id": "0bd407959f7d6671ba0617e2dbda3e89d8a0419f"
},
"CVE-2022-28389": {
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path",
"cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59"
},
"CVE-2022-1516": {
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect",
"cmt_id": "4c240c5a105557e4546d0836e694868f22fd09b0"
},
"CVE-2022-1011": {
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io",
"cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9"
}
},
"4.19.240": {
"CVE-2022-1204": {
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()",
"cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b"
},
"CVE-2022-1205": {
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers",
"cmt_id": "512f09df261b51b088f17d86dbdf300a3492523d"
},
"CVE-2022-28388": {
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path",
"cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe"
}
},
"outstanding": {
"CVE-2021-0929": {
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation"
},
"CVE-2020-26556": {
"cmt_msg": ""
},
"CVE-2020-26557": {
"cmt_msg": ""
},
"CVE-2020-26555": {
"cmt_msg": ""
},
"CVE-2019-20794": {
"cmt_msg": ""
},
"CVE-2020-26559": {
"cmt_msg": ""
},
"CVE-2020-35501": {
"cmt_msg": ""
},
"CVE-2022-0168": {
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()"
},
"CVE-2018-20854": {
"cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read"
},
"CVE-2018-1121": {
"cmt_msg": ""
},
"CVE-2019-19378": {
"cmt_msg": ""
},
"CVE-2022-1419": {
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create"
},
"CVE-2022-0995": {
"cmt_msg": "watch_queue: Fix filter limit check"
},
"CVE-2022-0998": {
"cmt_msg": "vdpa: clean up get_config_size ret value handling"
},
"CVE-2019-15794": {
"cmt_msg": "ovl: fix reference counting in ovl_mmap error path"
},
"CVE-2019-2181": {
"cmt_msg": "binder: check for overflow when alloc for security context"
},
"CVE-2021-3759": {
"cmt_msg": "memcg: enable accounting of ipc resources"
},
"CVE-2020-27820": {
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal"
},
"CVE-2022-0854": {
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\""
},
"CVE-2020-24503": {
"cmt_msg": ""
},
"CVE-2020-24502": {
"cmt_msg": ""
},
"CVE-2019-19449": {
"cmt_msg": "f2fs: fix to do sanity check on segment/section count"
},
"CVE-2020-24504": {
"cmt_msg": "ice: create scheduler aggregator node config and move VSIs"
},
"CVE-2020-26541": {
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries"
},
"CVE-2020-11725": {
"cmt_msg": ""
},
"CVE-2022-0382": {
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()"
},
"CVE-2021-33061": {
"cmt_msg": "ixgbe: add improvement for MDD response functionality"
},
"CVE-2022-1263": {
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push"
},
"CVE-2019-15222": {
"cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check"
},
"CVE-2021-3864": {
"cmt_msg": ""
},
"CVE-2019-19815": {
"cmt_msg": "f2fs: support swap file w/ DIO"
},
"CVE-2019-19814": {
"cmt_msg": ""
},
"CVE-2022-27950": {
"cmt_msg": "HID: elo: fix memory leak in elo_probe"
},
"CVE-2022-1015": {
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace."
},
"CVE-2019-19241": {
"cmt_msg": "io_uring: async workers should inherit the user creds"
},
"CVE-2021-26934": {
"cmt_msg": ""
},
"CVE-2022-25636": {
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size"
},
"CVE-2016-8660": {
"cmt_msg": ""
},
"CVE-2019-12379": {
"cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c"
},
"CVE-2019-12378": {
"cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()"
},
"CVE-2022-0494": {
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern"
},
"CVE-2018-12929": {
"cmt_msg": ""
},
"CVE-2020-15802": {
"cmt_msg": ""
},
"CVE-2008-2544": {
"cmt_msg": ""
},
"CVE-2022-28796": {
"cmt_msg": "jbd2: fix use-after-free of transaction_t race"
},
"CVE-2019-20908": {
"cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down"
},
"CVE-2019-15239": {
"cmt_msg": "unknown"
},
"CVE-2007-3719": {
"cmt_msg": ""
},
"CVE-2021-4037": {
"cmt_msg": "xfs: fix up non-directory creation in SGID directories"
},
"CVE-2020-26145": {
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe"
},
"CVE-2010-4563": {
"cmt_msg": ""
},
"CVE-2020-26140": {
"cmt_msg": ""
},
"CVE-2020-26143": {
"cmt_msg": ""
},
"CVE-2020-26142": {
"cmt_msg": ""
},
"CVE-2022-28893": {
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()"
},
"CVE-2022-29156": {
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case"
},
"CVE-2021-20177": {
"cmt_msg": "netfilter: add and use nf_hook_slow_list()"
},
"CVE-2021-3669": {
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()"
},
"CVE-2020-10708": {
"cmt_msg": ""
},
"CVE-2021-4023": {
"cmt_msg": "io-wq: fix cancellation on create-worker failure"
},
"CVE-2019-19070": {
"cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe"
},
"CVE-2017-13693": {
"cmt_msg": ""
},
"CVE-2021-0399": {
"cmt_msg": ""
},
"CVE-2017-13694": {
"cmt_msg": ""
},
"CVE-2020-36516": {
"cmt_msg": ""
},
"CVE-2012-4542": {
"cmt_msg": ""
},
"CVE-2022-0812": {
"cmt_msg": "xprtrdma: fix incorrect header size calculations"
},
"CVE-2013-7445": {
"cmt_msg": ""
},
"CVE-2005-3660": {
"cmt_msg": ""
},
"CVE-2022-1508": {
"cmt_msg": "io_uring: reexpand under-reexpanded iters"
},
"CVE-2022-1158": {
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address"
},
"CVE-2021-4159": {
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()"
},
"CVE-2021-0695": {
"cmt_msg": ""
},
"CVE-2008-4609": {
"cmt_msg": ""
},
"CVE-2021-4150": {
"cmt_msg": "block: fix incorrect references to disk objects"
},
"CVE-2021-28951": {
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit"
},
"CVE-2020-14304": {
"cmt_msg": ""
},
"CVE-2020-0347": {
"cmt_msg": ""
},
"CVE-2021-29155": {
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic"
},
"CVE-2021-3714": {
"cmt_msg": ""
},
"CVE-2019-12455": {
"cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()"
},
"CVE-2019-12456": {
"cmt_msg": ""
},
"CVE-2020-26560": {
"cmt_msg": ""
},
"CVE-2021-3892": {
"cmt_msg": ""
},
"CVE-2020-12362": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2020-12363": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2022-0742": {
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()"
},
"CVE-2020-12364": {
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1"
},
"CVE-2022-0500": {
"cmt_msg": "bpf: Introduce MEM_RDONLY flag"
},
"CVE-2022-1055": {
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()"
},
"CVE-2022-0480": {
"cmt_msg": "memcg: enable accounting for file lock caches"
},
"CVE-2022-1184": {
"cmt_msg": ""
},
"CVE-2020-26141": {
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe"
},
"CVE-2022-25265": {
"cmt_msg": ""
},
"CVE-2021-4218": {
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler"
},
"CVE-2022-23222": {
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL"
},
"CVE-2019-15290": {
"cmt_msg": ""
},
"CVE-2020-15780": {
"cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down"
},
"CVE-2018-17977": {
"cmt_msg": ""
},
"CVE-2022-26878": {
"cmt_msg": ""
},
"CVE-2022-29582": {
"cmt_msg": "io_uring: fix race between timeout flush and removal"
},
"CVE-2010-5321": {
"cmt_msg": ""
},
"CVE-2018-12930": {
"cmt_msg": ""
},
"CVE-2018-12931": {
"cmt_msg": ""
},
"CVE-2021-4148": {
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files"
},
"CVE-2022-1043": {
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check"
},
"CVE-2021-39801": {
"cmt_msg": ""
},
"CVE-2021-39800": {
"cmt_msg": ""
},
"CVE-2021-39802": {
"cmt_msg": ""
},
"CVE-2022-1048": {
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls"
},
"CVE-2020-36385": {
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy"
},
"CVE-2019-12380": {
"cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code"
},
"CVE-2019-12381": {
"cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()"
},
"CVE-2020-7053": {
"cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr"
},
"CVE-2021-3542": {
"cmt_msg": ""
},
"CVE-2021-44879": {
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection"
},
"CVE-2020-12656": {
"cmt_msg": "sunrpc: check that domain table is empty at module unload."
},
"CVE-2020-16120": {
"cmt_msg": "ovl: switch to mounter creds in readdir"
},
"CVE-2018-12928": {
"cmt_msg": ""
},
"CVE-2019-0149": {
"cmt_msg": "i40e: Add bounds check for ch[] array"
},
"CVE-2020-36310": {
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address"
},
"CVE-2020-36313": {
"cmt_msg": "KVM: Fix out of range accesses to memslots"
},
"CVE-2015-2877": {
"cmt_msg": ""
},
"CVE-2019-0146": {
"cmt_msg": ""
},
"CVE-2019-16089": {
"cmt_msg": ""
},
"CVE-2022-0400": {
"cmt_msg": ""
},
"CVE-2021-0707": {
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode"
},
"CVE-2019-11191": {
"cmt_msg": "x86: Deprecate a.out support"
},
"CVE-2021-3847": {
"cmt_msg": ""
},
"CVE-2022-1280": {
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector"
},
"CVE-2011-4917": {
"cmt_msg": ""
},
"CVE-2019-18680": {
"cmt_msg": ""
},
"CVE-2021-32078": {
"cmt_msg": "ARM: footbridge: remove personal server platform"
},
"CVE-2019-10220": {
"cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()"
},
"CVE-2020-27835": {
"cmt_msg": "IB/hfi1: Ensure correct mm is used at all times"
},
"CVE-2019-5489": {
"cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages"
}
}
},
"4.9": {
"4.9": {
"CVE-2016-9576": {
"cmt_msg": "Don't feed anything but regular iovec's to blk_rq_map_user_iov",
"cmt_id": "a0ac402cfcdc904f9772e1762b3fda112dcc56a0"
},
"CVE-2016-10147": {
"cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility",
"cmt_id": "48a992727d82cb7db076fa15d372178743b1f4cd"
},
"CVE-2016-8399": {
"cmt_msg": "net: ping: check minimum size on ICMP header length",
"cmt_id": "0eab121ef8750a5c8637d51534d5e9143fb0633f"
}
},
"4.9.1": {
"CVE-2016-10154": {
"cmt_msg": "cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack",
"cmt_id": "7aa58e7ad53bd9536aa49a18ccd0778c728bf57d"
},
"CVE-2015-8709": {
"cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks",
"cmt_id": "694a95fa6dae4991f16cda333d897ea063021fed"
}
},
"4.9.2": {
"CVE-2016-9588": {
"cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)",
"cmt_id": "3f618a0b872fea38c7d1d1f79eda40f88c6466c2"
},
"CVE-2016-10088": {
"cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS",
"cmt_id": "3f3a6bbe6f9f5e895d8945494173594ee51632da"
}
},
"4.9.3": {
"CVE-2016-10741": {
"cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O",
"cmt_id": "3978c5bb004312fd267aed7279fe64b119e126b0"
}
},
"4.9.4": {
"CVE-2017-7273": {
"cmt_msg": "HID: hid-cypress: validate length of report",
"cmt_id": "2c867216c555f5897b327daed6240bfb9e489c97"
}
},
"4.9.5": {
"CVE-2016-9191": {
"cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir",
"cmt_id": "00cf64fbaa1e99d0420f2934f301c671ba298342"
},
"CVE-2017-5549": {
"cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling",
"cmt_id": "58ede4beda662c4e1681fee4fae2174028a1a841"
},
"CVE-2017-5546": {
"cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries",
"cmt_id": "8315c22ea879082bba365d46dd2cc7881fbfb49a"
},
"CVE-2017-5550": {
"cmt_msg": "fix a fencepost error in pipe_advance()",
"cmt_id": "d06367ac1730ded79aa78307126236bf83af95a3"
},
"CVE-2017-2583": {
"cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"",
"cmt_id": "7718ffcf9a64830bbae148432f625346cde2f2d6"
},
"CVE-2017-2584": {
"cmt_msg": "KVM: x86: Introduce segmented_write_std",
"cmt_id": "736e77c07fba8b49cead504b885a82ce52c0ff10"
}
},
"4.9.6": {
"CVE-2017-5547": {
"cmt_msg": "HID: corsair: fix DMA buffers on stack",
"cmt_id": "63df1ccb937f67fbefa0a77415b3a4d10434a09b"
},
"CVE-2017-5551": {
"cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs",
"cmt_id": "782b361c93062f083bbc9a78928498218f950399"
},
"CVE-2017-5548": {
"cmt_msg": "ieee802154: atusb: do not use the stack for buffers to make them DMA able",
"cmt_id": "86249aef233e6e05ba84f6c9aab9e6b890fc6ba7"
},
"CVE-2016-10764": {
"cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()",
"cmt_id": "e55e6c026b7c49c4dcc33f4ebc330e660ecf3963"
},
"CVE-2016-10153": {
"cmt_msg": "libceph: introduce ceph_crypt() for in-place en/decryption",
"cmt_id": "ecf7ced8562811576cd02158d6ae8e44c1fb4671"
}
},
"4.9.7": {
"CVE-2017-6001": {
"cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race",
"cmt_id": "922813f4d66fb317e8602d058d03a1619af1ffd0"
},
"CVE-2017-5576": {
"cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout.",
"cmt_id": "b9edac54cb85da589ca809bf8dcf86e5cd3f41c0"
},
"CVE-2017-5577": {
"cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing.",
"cmt_id": "cfba2a001d0e36905016bb4f87fc47245c944c36"
},
"CVE-2016-8405": {
"cmt_msg": "fbdev: color map copying bounds checking",
"cmt_id": "544160b6ea18670196d1173c099f2cced5075132"
}
},
"4.9.9": {
"CVE-2016-10208": {
"cmt_msg": "ext4: validate s_first_meta_bg at mount time",
"cmt_id": "13e6ef99d23b05807e7f8a72f45e3d8260b61570"
},
"CVE-2017-8071": {
"cmt_msg": "HID: cp2112: fix sleep-while-atomic",
"cmt_id": "a18c4584a48931e8048508469bcdb53c6082221a"
},
"CVE-2017-8072": {
"cmt_msg": "HID: cp2112: fix gpio-callback error handling",
"cmt_id": "7396685a1bca323b96fd79b836ae22b7569d7068"
}
},
"4.9.10": {
"CVE-2017-2618": {
"cmt_msg": "selinux: fix off-by-one in setprocattr",
"cmt_id": "6cbaf7b94373743deb42fd410173aab81f8945fe"
},
"CVE-2016-8636": {
"cmt_msg": "IB/rxe: Fix mem_check_range integer overflow",
"cmt_id": "b7dd5edc3dd9191f2cb1bd508279b0ff7274c5aa"
}
},
"4.9.11": {
"CVE-2017-5897": {
"cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads",
"cmt_id": "ae1768bbbc469b75662c6714957fe5886cc960c4"
},
"CVE-2017-8069": {
"cmt_msg": "rtl8150: Use heap buffers for all register access",
"cmt_id": "e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec"
},
"CVE-2017-8068": {
"cmt_msg": "pegasus: Use heap buffers for all register access",
"cmt_id": "878b015bcc726560b13be2d906caf6923428f05d"
},
"CVE-2017-5970": {
"cmt_msg": "ipv4: keep skb->dst around in presence of IP options",
"cmt_id": "f5b54446630a973e1f27b68599366bbd0ac53066"
},
"CVE-2017-5986": {
"cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf",
"cmt_id": "00eff2ebbd229758e90659907724c14dd5a18339"
},
"CVE-2017-8070": {
"cmt_msg": "catc: Use heap buffer for memory size test",
"cmt_id": "970390fd5d53de0817b538350131edd2514a8321"
},
"CVE-2017-6214": {
"cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()",
"cmt_id": "0f895f51a831d73ce24158534784aba5b2a72a9e"
}
},
"4.9.13": {
"CVE-2017-6345": {
"cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()",
"cmt_id": "42b52783a59cc706c71cdc7096edce4a6f086fd3"
},
"CVE-2017-6346": {
"cmt_msg": "packet: fix races in fanout_add()",
"cmt_id": "722737f27774b14be5a1d2d3b9281dcded7c48b2"
},
"CVE-2017-6347": {
"cmt_msg": "ip: fix IP_CHECKSUM handling",
"cmt_id": "481aedf869fbf2d4503ca0005dbd68b78422955a"
},
"CVE-2017-6348": {
"cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().",
"cmt_id": "c2219da51664451149350e47321aa0fcf72a8b8f"
},
"CVE-2017-6074": {
"cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO",
"cmt_id": "171d92a9d915d238e05285ca67faf30f554d7df7"
}
},
"4.9.14": {
"CVE-2017-8066": {
"cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers",
"cmt_id": "cec7abd27e878e3c83dc9af41ee87a2e9d483ac0"
},
"CVE-2017-5669": {
"cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection",
"cmt_id": "270e84a1e6effd6c0c6e9b13b196b5fdaa392954"
}
},
"4.9.15": {
"CVE-2017-2636": {
"cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf",
"cmt_id": "e5b9778761558ff3d239ed76925a1a7a734918ea"
}
},
"4.9.16": {
"CVE-2017-8062": {
"cmt_msg": "dw2102: don't do DMA on stack",
"cmt_id": "06996254a605913cd7c1927d0e8a89b5138e110d"
},
"CVE-2017-8924": {
"cmt_msg": "USB: serial: io_ti: fix information leak in completion handler",
"cmt_id": "d0ef6ecee85e17742d8bce1559872cb542d6ccac"
},
"CVE-2016-2188": {
"cmt_msg": "USB: iowarrior: fix NULL-deref at probe",
"cmt_id": "653418adaf1026a10e0c2e4e29b7319610117b33"
},
"CVE-2017-6874": {
"cmt_msg": "ucount: Remove the atomicity from ucount->count",
"cmt_id": "ee6f7ee1e4cdb0098fee4593ddf11ca6028abef2"
},
"CVE-2017-8925": {
"cmt_msg": "USB: serial: omninet: fix reference leaks at open",
"cmt_id": "6d6c5895f45431579c20f4183b25183f0e3afc92"
}
},
"4.9.20": {
"CVE-2017-7184": {
"cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window",
"cmt_id": "64a5465799ee40e3d54d9da3037934cd4b7b502f"
},
"CVE-2017-7374": {
"cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation",
"cmt_id": "2984e52c75c657db7901f6189f02e0251ca963c2"
}
},
"4.9.21": {
"CVE-2017-7187": {
"cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN",
"cmt_id": "c2a869527865c35b605877f966cb5d514fdc5fbb"
}
},
"4.9.22": {
"CVE-2017-7261": {
"cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()",
"cmt_id": "73ab72517b61ce4b27ceddec47dd5d6edafb556a"
},
"CVE-2017-7616": {
"cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.",
"cmt_id": "cddab768d13469d1e254fb8c0e1629f93c8dfaca"
},
"CVE-2017-7294": {
"cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()",
"cmt_id": "4ddd24d54fedff301e8f020d7b9f70116383af31"
}
},
"4.9.23": {
"CVE-2017-7308": {
"cmt_msg": "net/packet: fix overflow in check for priv area size",
"cmt_id": "16fc98c2479f5477f2df220acd9cb53686e33f4c"
}
},
"4.9.24": {
"CVE-2017-6353": {
"cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it",
"cmt_id": "35b9d61ea910c1ebd4652b32cc7d713f6689b4f4"
},
"CVE-2017-8063": {
"cmt_msg": "cxusb: Use a dma capable buffer also for reading",
"cmt_id": "fb00319317c152bf3528df13a54c28bf8c5daa55"
},
"CVE-2017-8061": {
"cmt_msg": "dvb-usb-firmware: don't do DMA on stack",
"cmt_id": "28d1e8b7ef81d254583f68627095f8a85e39597d"
},
"CVE-2017-8067": {
"cmt_msg": "virtio-console: avoid DMA from stack",
"cmt_id": "86c6667f6a5f6bdb392d8ffbe58fbcbcf6db2704"
},
"CVE-2017-8064": {
"cmt_msg": "dvb-usb-v2: avoid use-after-free",
"cmt_id": "1992564156b5dc4ac73418e5b95e1a43f12f3cb1"
},
"CVE-2017-7618": {
"cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback",
"cmt_id": "c10479591869177ae7ac0570b54ace6fbdeb57c2"
},
"CVE-2017-7889": {
"cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads",
"cmt_id": "2c0ad235ac77f2fc2eee593bf06822cad772e0e2"
},
"CVE-2017-2596": {
"cmt_msg": "kvm: fix page struct leak in handle_vmon",
"cmt_id": "75465e71ec3139b958d06d48dfc85720aed69b6a"
}
},
"4.9.25": {
"CVE-2017-7472": {
"cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings",
"cmt_id": "174a74dbca2ddc7269c265598399c000e5b9b870"
},
"CVE-2016-9604": {
"cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings",
"cmt_id": "a5c6e0a76817a3751f58d761aaff7c0b0c4001ff"
}
},
"4.9.26": {
"CVE-2017-7477": {
"cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec",
"cmt_id": "07389a140f48a3d5d223881bb01cef9f389e2844"
},
"CVE-2017-7645": {
"cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments",
"cmt_id": "fc6445df466f37291a70937642068bda78802a5b"
},
"CVE-2017-2671": {
"cmt_msg": "ping: implement proper locking",
"cmt_id": "e88a8e0a23c23e09858a4f5caeb106da972e7934"
},
"CVE-2017-7895": {
"cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops",
"cmt_id": "d7809b9e99bb75e83bdd13dc70ce27df61faf5de"
}
},
"4.9.27": {
"CVE-2017-10661": {
"cmt_msg": "timerfd: Protect the might cancel mechanism proper",
"cmt_id": "00cca9768ebe1ac4ac16366662dd9087b6e5f4e7"
}
},
"4.9.28": {
"CVE-2017-9150": {
"cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged",
"cmt_id": "ced0a31e667fbf618591f0a76a8213018407cde0"
},
"CVE-2017-10662": {
"cmt_msg": "f2fs: sanity check segment count",
"cmt_id": "93862955cbf485215f0677229292d0f358af55fc"
}
},
"4.9.30": {
"CVE-2017-18360": {
"cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios",
"cmt_id": "f9cd79e0ad1fa620ff34715d24ae1b671c97bc91"
},
"CVE-2017-7487": {
"cmt_msg": "ipx: call ipxitf_put() in ioctl error path",
"cmt_id": "820adccd0e3be9bdd2384ca8fc4712108cfdf28b"
},
"CVE-2017-8797": {
"cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify",
"cmt_id": "ea465551af30146efea215da58786ff732da70fb"
},
"CVE-2017-1000363": {
"cmt_msg": "char: lp: fix possible integer overflow in lp_setup()",
"cmt_id": "5d263d94a870a774a24acb2a2cc1e79ef39c2416"
}
},
"4.9.31": {
"CVE-2017-9077": {
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent",
"cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8"
},
"CVE-2017-9076": {
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent",
"cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8"
},
"CVE-2017-9075": {
"cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent",
"cmt_id": "5e7d9f0b3f729a64b99e58047f7bb0ff36acb759"
},
"CVE-2017-9074": {
"cmt_msg": "ipv6: Prevent overrun when parsing v6 header options",
"cmt_id": "a2c845e51a820549a6df5a1e8907ee754422119e"
},
"CVE-2017-9211": {
"cmt_msg": "crypto: skcipher - Add missing API setkey checks",
"cmt_id": "4472887cbd1373d7781bea9d8935f2d4968dd580"
},
"CVE-2017-18221": {
"cmt_msg": "mlock: fix mlock count can not decrease in race condition",
"cmt_id": "1163e785b1506a4f46dbdee89bbab161dd742186"
},
"CVE-2017-8890": {
"cmt_msg": "dccp/tcp: do not inherit mc_list from parent",
"cmt_id": "4eed44029507acc666ac7afe9c6a8ea0abf857b7"
},
"CVE-2017-9242": {
"cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()",
"cmt_id": "304b41014acbdc5fa5126c86bac31dc41a245f9f"
}
},
"4.9.32": {
"CVE-2017-9605": {
"cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid",
"cmt_id": "7860d0e5e2bf986d4bd06e7b029786747b5dc766"
},
"CVE-2017-15274": {
"cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length",
"cmt_id": "1b253e023f8f75b109564a61d2050d818f75b4f3"
},
"CVE-2017-7346": {
"cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()",
"cmt_id": "a76ff847013a7f6b1cd328381ca263ddcca12061"
},
"CVE-2017-1000380": {
"cmt_msg": "ALSA: timer: Fix race between read and ioctl",
"cmt_id": "66e982d8f1a1f5e151377fe37612e9151e552dc9"
}
},
"4.9.34": {
"CVE-2017-1000364": {
"cmt_msg": "mm: larger stack guard gap, between vmas",
"cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e"
},
"CVE-2017-1000379": {
"cmt_msg": "mm: larger stack guard gap, between vmas",
"cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e"
}
},
"4.9.35": {
"CVE-2017-10911": {
"cmt_msg": "xen-blkback: don't leak stack data via response ring",
"cmt_id": "4ae2cb91a6365a6472fad7f04785cc0420ea5ada"
},
"CVE-2017-1000365": {
"cmt_msg": "fs/exec.c: account for argv/envp pointers",
"cmt_id": "3d6848e491df6abbf5fb5b1fabb7a5df2e2b8f4f"
},
"CVE-2017-7482": {
"cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode",
"cmt_id": "f2060387421109ac389dd209355918b566fc6f84"
}
},
"4.9.36": {
"CVE-2017-18017": {
"cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff",
"cmt_id": "ced7689be60ddcac4b1746212c547e8817c5ae5e"
}
},
"4.9.37": {
"CVE-2017-12146": {
"cmt_msg": "driver core: platform: fix race condition with driver_override",
"cmt_id": "c4c592b2c137e4451b7fdf76700ae9c98db133f5"
},
"CVE-2017-10810": {
"cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure",
"cmt_id": "366d9207d9e002bf1a6d9da13a7f8f85b8a40c0b"
}
},
"4.9.38": {
"CVE-2017-11176": {
"cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()",
"cmt_id": "e6952841ade0f937750c7748a812cb403bd744b0"
}
},
"4.9.39": {
"CVE-2019-9457": {
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM",
"cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958"
},
"CVE-2018-14634": {
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM",
"cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958"
},
"CVE-2017-11089": {
"cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE",
"cmt_id": "b68aa7dff96efc59fee40e25b8044017de21161a"
},
"CVE-2017-7541": {
"cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()",
"cmt_id": "414848bba6ab91fe12ca8105b4652c4aa6f4b574"
},
"CVE-2017-1000371": {
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE",
"cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a"
},
"CVE-2017-1000370": {
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE",
"cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a"
}
},
"4.9.40": {
"CVE-2017-11473": {
"cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables",
"cmt_id": "036d59f40ac94964a1bbc8959f78f34efac71fd5"
},
"CVE-2017-18079": {
"cmt_msg": "Input: i8042 - fix crash at boot time",
"cmt_id": "5b50e0e74e2e5f084d18a03f6dedc67cfdb8db49"
}
},
"4.9.41": {
"CVE-2017-7533": {
"cmt_msg": "dentry name snapshots",
"cmt_id": "ad25f11ed216d5ce3b5566b2f187b59fa3061b40"
},
"CVE-2017-12762": {
"cmt_msg": "isdn/i4l: fix buffer overflow",
"cmt_id": "7b3a66739ff01fcd9b8007a18ddd29edd2cb74f7"
}
},
"4.9.42": {
"CVE-2017-10663": {
"cmt_msg": "f2fs: sanity check checkpoint segno and blkoff",
"cmt_id": "0f442c5b2e4ac0b65027ed3374462f1c38675f7e"
},
"CVE-2017-8831": {
"cmt_msg": "saa7164: fix double fetch PCIe access condition",
"cmt_id": "12d17d78e3f74b5022f61eee7d6de082e472a401"
},
"CVE-2017-7542": {
"cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt",
"cmt_id": "4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad"
}
},
"4.9.43": {
"CVE-2017-1000": {
"cmt_msg": "udp: consistently apply ufo or fragmentation",
"cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70"
},
"CVE-2017-1000112": {
"cmt_msg": "udp: consistently apply ufo or fragmentation",
"cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70"
},
"CVE-2017-1000111": {
"cmt_msg": "packet: fix tp_reserve race in packet_set_ring",
"cmt_id": "e5841355061332f8b326e098949490345dba776b"
}
},
"4.9.45": {
"CVE-2017-12134": {
"cmt_msg": "xen: fix bio vec merging",
"cmt_id": "6c7f3756d072050d612e5c5c04108f90f1985435"
},
"CVE-2017-14140": {
"cmt_msg": "Sanitize 'move_pages()' permission checks",
"cmt_id": "61332dc598c3f223678b2d7192ccf3472c544799"
},
"CVE-2018-10675": {
"cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy",
"cmt_id": "91105f2c621ef0b3c40d6725475b6896eb06f954"
}
},
"4.9.46": {
"CVE-2017-17053": {
"cmt_msg": "x86/mm: Fix use-after-free of ldt_struct",
"cmt_id": "3559de45c99a68c0b8c4956fc35367837df9161c"
},
"CVE-2017-17052": {
"cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free",
"cmt_id": "b65b6ac52e0f8694aa3a4402d5f766b2bb9e94ef"
}
},
"4.9.48": {
"CVE-2017-11600": {
"cmt_msg": "xfrm: policy: check policy direction value",
"cmt_id": "12a70ccaa6868163487f9a5ad97e1a91a397b453"
}
},
"4.9.50": {
"CVE-2017-14340": {
"cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present",
"cmt_id": "5b82e0e938af5d9dfb038e2483cb2a84e24584fd"
},
"CVE-2017-1000251": {
"cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length",
"cmt_id": "6300c8bfafe032187f3cbaa43dbf7d306650c5ed"
},
"CVE-2017-9985": {
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops",
"cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af"
},
"CVE-2017-9984": {
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops",
"cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af"
}
},
"4.9.51": {
"CVE-2017-14106": {
"cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0",
"cmt_id": "a10c510179b369f7d1e8cf77f43ee2db900c1ac9"
},
"CVE-2017-14497": {
"cmt_msg": "packet: Don't write vnet header beyond end of buffer",
"cmt_id": "8c623e5d03692dc478277185a0b907d53aea1b43"
},
"CVE-2017-7558": {
"cmt_msg": "sctp: Avoid out-of-bounds reads from address storage",
"cmt_id": "08d56d8a99bb82e134ba7704e4cfdabbcc16fc4f"
}
},
"4.9.52": {
"CVE-2017-9059": {
"cmt_msg": "NFSv4: Fix callback server shutdown",
"cmt_id": "f609266b12d214437cf9d68245dc27f8d4f69836"
},
"CVE-2017-14991": {
"cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE",
"cmt_id": "90cb12f6dc5ac45c51082721ec5bbe18850cf80f"
},
"CVE-2017-14051": {
"cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code",
"cmt_id": "2a913aecc4f746ce15eb1bec98b134aff4190ae2"
},
"CVE-2017-0627": {
"cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls",
"cmt_id": "38993f320506d7ead26695218ba1481f250469d5"
}
},
"4.9.53": {
"CVE-2020-14353": {
"cmt_msg": "KEYS: prevent creating a different user's keyrings",
"cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0"
},
"CVE-2017-14156": {
"cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace",
"cmt_id": "64afde6f956dfcb719e329a9d2098b53e68d2755"
},
"CVE-2017-12153": {
"cmt_msg": "nl80211: check for the required netlink attributes presence",
"cmt_id": "c820441a7a52e3626aede8df94069a50a9e4efdb"
},
"CVE-2017-1000252": {
"cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ",
"cmt_id": "3d4213fac7d10e72859112c9100d8015ce442a3a"
},
"CVE-2017-12154": {
"cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8",
"cmt_id": "86ef97b2dfd504fbc65f6b244a422db0c1b15797"
},
"CVE-2017-18270": {
"cmt_msg": "KEYS: prevent creating a different user's keyrings",
"cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0"
},
"CVE-2017-14489": {
"cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly",
"cmt_id": "b42bf0f15cf70926f3a460e7517703fda6191ba7"
},
"CVE-2017-12192": {
"cmt_msg": "KEYS: prevent KEYCTL_READ on negative key",
"cmt_id": "dda70d28c0ac191f128bfd3acfd800667ed86bdf"
},
"CVE-2017-15537": {
"cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv",
"cmt_id": "5e9b07f30d21295b83f2024ffb5a349d3af6f749"
}
},
"4.9.55": {
"CVE-2017-0786": {
"cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()",
"cmt_id": "4d3132d97aa753104ee35722352a895750a0fca5"
},
"CVE-2017-16526": {
"cmt_msg": "uwb: properly check kthread_run return value",
"cmt_id": "8ff7adb930d4a62f43dfc76220a988a043c510ff"
},
"CVE-2017-15649": {
"cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held",
"cmt_id": "0f22167d3321a028c0b6edc2d5b2ab0e37a2ac53"
},
"CVE-2017-16531": {
"cmt_msg": "USB: fix out-of-bounds in usb_set_configuration",
"cmt_id": "a6d4ce2e8b653ff7facde0d0051663fa4cf57b78"
},
"CVE-2017-16530": {
"cmt_msg": "USB: uas: fix bug in handling of alternate settings",
"cmt_id": "d77606e93d819ad4b8f57511ff61a629ced49750"
},
"CVE-2017-16534": {
"cmt_msg": "USB: core: harden cdc_parse_cdc_header",
"cmt_id": "767f7a2cf33a135fe3f57010b51c3f6e92d7677d"
},
"CVE-2017-16529": {
"cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor",
"cmt_id": "37b6d898388e78d92a13a8ab50c960d507c968d1"
},
"CVE-2018-9568": {
"cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto",
"cmt_id": "cf2eaf16ab284e3c5b057dff4c68516cfeae62ba"
},
"CVE-2017-1000255": {
"cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks",
"cmt_id": "afebf5ef60da6d15e75398e41ea2817c7a2bb283"
},
"CVE-2017-7518": {
"cmt_msg": "KVM: x86: fix singlestepping over syscall",
"cmt_id": "922e562b2613ae713d661c4fc0f92662f4fe6c41"
}
},
"4.9.57": {
"CVE-2017-16527": {
"cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting",
"cmt_id": "e0c70289a1e334a60b54b54688f18e2ee38396a9"
},
"CVE-2017-16525": {
"cmt_msg": "USB: serial: console: fix use-after-free after failed setup",
"cmt_id": "063b57d556181c796294b1cdf4d649cebc12678a"
},
"CVE-2017-16533": {
"cmt_msg": "HID: usbhid: fix out-of-bounds bug",
"cmt_id": "57265cddde308292af881ce634a5378dd4e25900"
},
"CVE-2017-12188": {
"cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT",
"cmt_id": "28955b03fac36829831e185e3ec2793f8eb18689"
},
"CVE-2017-15265": {
"cmt_msg": "ALSA: seq: Fix use-after-free at creating a port",
"cmt_id": "35b84860667ff081eee56b62f3db2a28ca8a3823"
},
"CVE-2017-12190": {
"cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov",
"cmt_id": "5444d8ab9a1406af9f1bc2f00c26838637542480"
}
},
"4.9.59": {
"CVE-2017-15299": {
"cmt_msg": "KEYS: don't let add_key() update an uninstantiated key",
"cmt_id": "da0c7503c0b886784bf8bcb279c7d71c1e50c438"
},
"CVE-2017-16535": {
"cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()",
"cmt_id": "9d13d3e05be29056eeab610d9ad26b04c9231a04"
},
"CVE-2017-15951": {
"cmt_msg": "KEYS: Fix race between updating and finding a negative key",
"cmt_id": "63c8e452554962f88c0952212c8a4202469d4914"
}
},
"4.9.60": {
"CVE-2017-16939": {
"cmt_msg": "ipsec: Fix aborted xfrm policy dump crash",
"cmt_id": "543aabb7d14b2414f40b632e37b0921bd0af3a96"
},
"CVE-2017-16643": {
"cmt_msg": "Input: gtco - fix potential out-of-bound access",
"cmt_id": "52f65e35c2b85908fa66cfc265be4e3fd88744a3"
},
"CVE-2017-12193": {
"cmt_msg": "assoc_array: Fix a buggy node-splitting case",
"cmt_id": "67bcc5e530d55e646b7324038c926c2bde735a7e"
},
"CVE-2017-15306": {
"cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM",
"cmt_id": "474cb9e0f02fdabadfc5ecc17b9afbb0ca6aa15a"
}
},
"4.9.63": {
"CVE-2018-7191": {
"cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()",
"cmt_id": "3e2ab0ceef68ab995bc9f7c699e62b95c0edcdc4"
},
"CVE-2017-13080": {
"cmt_msg": "mac80211: accept key reinstall without changing anything",
"cmt_id": "2586fa0007dc6b7745da14250be7e3aae706b128"
},
"CVE-2017-16645": {
"cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane",
"cmt_id": "9d65d0ea55dcb813cea7df05602f233ad4843baf"
},
"CVE-2017-16528": {
"cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device",
"cmt_id": "1862eca99e2732da2594e05406c9f78b4265bf5b"
},
"CVE-2017-16532": {
"cmt_msg": "usb: usbtest: fix NULL pointer dereference",
"cmt_id": "8cf061d919e2102d0de0379bafea6cce1405d786"
}
},
"4.9.64": {
"CVE-2017-16646": {
"cmt_msg": "media: dib0700: fix invalid dvb_detach argument",
"cmt_id": "49c1e5f032382713933a86fa1077c438b430f6fc"
},
"CVE-2017-16537": {
"cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe",
"cmt_id": "ca98a5c721703de77f7fb8bbafd0673e4a60a841"
}
},
"4.9.65": {
"CVE-2017-18204": {
"cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()",
"cmt_id": "8af777385f7a3e693f5e79fb4655aebf881156e6"
},
"CVE-2017-16647": {
"cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend",
"cmt_id": "58baa36d3728eea14884f74817d5749b32b0cdeb"
},
"CVE-2017-16994": {
"cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges",
"cmt_id": "ceaec6e8cd98c8fd87701ddfb7468a13d989d79d"
},
"CVE-2017-16650": {
"cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors",
"cmt_id": "02a0c0639ae07beab982bbad4527b40da96d33ff"
},
"CVE-2017-16649": {
"cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors",
"cmt_id": "f376621861e3d8a713d6931f4363c4137912330b"
},
"CVE-2017-15115": {
"cmt_msg": "sctp: do not peel off an assoc from one netns to another one",
"cmt_id": "362d2ce0f851653d2eed87fdb8891ab4cfb0c2bf"
}
},
"4.9.66": {
"CVE-2017-18203": {
"cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()",
"cmt_id": "1cd9686e0a3b5b5a09a2025c21cd4d92e8db0e1f"
},
"CVE-2017-16536": {
"cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor",
"cmt_id": "38c043d26c97a04332df960200a389bc4141ff21"
}
},
"4.9.67": {
"CVE-2017-18208": {
"cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances",
"cmt_id": "ba32d7dce43f14ef1a1cb0540959431526cf7fe0"
}
},
"4.9.68": {
"CVE-2017-18202": {
"cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry",
"cmt_id": "ee23ae915fa74956503507c1e55cbb2102f349ec"
}
},
"4.9.69": {
"CVE-2017-17807": {
"cmt_msg": "KEYS: add missing permission check for request_key() destination",
"cmt_id": "982707eb4ff84d4ae21618c02dd8926801b10a07"
},
"CVE-2017-0861": {
"cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info",
"cmt_id": "45ddff3ce4e9a3d7e935d5b596686d9e176ed4a9"
},
"CVE-2017-1000407": {
"cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts",
"cmt_id": "6ead44d4b5b8b1ecfcbd2302f15028dab7774da3"
}
},
"4.9.70": {
"CVE-2018-7492": {
"cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map",
"cmt_id": "3259862dd73bfb9d9b7a647ea77cb20ba8b179a4"
},
"CVE-2018-18559": {
"cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()",
"cmt_id": "5471afeef41388ec08e6cf610640aaf89805d6db"
}
},
"4.9.71": {
"CVE-2017-16913": {
"cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input",
"cmt_id": "f3e957266ae56c200fb13a42309c50f84576c64a"
},
"CVE-2017-16912": {
"cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number",
"cmt_id": "20e825cdf7a1627f92371d45a5322ccecdebcb3b"
},
"CVE-2017-16914": {
"cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer",
"cmt_id": "14513e49c43cd3149a03ff9e1c223c3d5803ad09"
},
"CVE-2017-17558": {
"cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow",
"cmt_id": "99542e468b76ae180675566692e0528c4c712661"
},
"CVE-2017-17806": {
"cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed",
"cmt_id": "43259d07fceb8cc1f5ba7e8003ae19023e0620f5"
},
"CVE-2017-17805": {
"cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage",
"cmt_id": "c32e053a11f231376f0899ef906fd43f8fc8dbd0"
}
},
"4.9.72": {
"CVE-2017-17862": {
"cmt_msg": "bpf: fix branch pruning logic",
"cmt_id": "7b5b73ea87a06236fa124bdebed1390d362d3439"
},
"CVE-2017-16995": {
"cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()",
"cmt_id": "3695b3b18519099224efbc5875569d2cb6da256d"
}
},
"4.9.73": {
"CVE-2017-17863": {
"cmt_msg": "bpf: fix integer overflows",
"cmt_id": "37435f7e80ef9adc32a69013c18f135e3f434244"
}
},
"4.9.74": {
"CVE-2017-17712": {
"cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg",
"cmt_id": "f75f910ffa90af17eeca18714847eaa0f16cb4ad"
},
"CVE-2017-18595": {
"cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer",
"cmt_id": "5dc4cd2688e39b0286e9a4b815c9bf5e71b5a685"
},
"CVE-2017-15129": {
"cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()",
"cmt_id": "03c93293a83a603fc5b87fc15321f392d3cf0043"
},
"CVE-2018-18386": {
"cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)",
"cmt_id": "00fc57ae06c3519a5e32e39882549e4e1f6328fb"
},
"CVE-2017-17449": {
"cmt_msg": "netlink: Add netns check on taps",
"cmt_id": "0b18782288a2f1c2a25e85d2553c15ea83bb5802"
}
},
"4.9.76": {
"CVE-2017-18075": {
"cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances",
"cmt_id": "c195a4c0230d7a1dafb53cdbd5eed4dea4493504"
}
},
"4.9.77": {
"CVE-2017-13216": {
"cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl",
"cmt_id": "c51d23dffc2e9ca05d611c86c440f9055541c62d"
},
"CVE-2017-17741": {
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio",
"cmt_id": "c781e3be97a1cbeef8c853101e8f266db556b0a3"
},
"CVE-2018-5333": {
"cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op",
"cmt_id": "ce31b6ac1111096ae9bb0b45f4ba564a909bb366"
},
"CVE-2017-1000410": {
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.",
"cmt_id": "6aebc2670ebfdda0762a6b471fbf8ca18dcf44f2"
},
"CVE-2018-5332": {
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()",
"cmt_id": "cebb382931c4fb341162eae80b696650260e4a2b"
}
},
"4.9.78": {
"CVE-2018-6927": {
"cmt_msg": "futex: Prevent overflow by strengthen input validation",
"cmt_id": "d8a3170db0deca6bfee32ad77f492caba9f6791d"
},
"CVE-2018-1000004": {
"cmt_msg": "ALSA: seq: Make ioctls race-free",
"cmt_id": "e4ff9f294629b65df3f7982cd4faf86b2856b9d7"
}
},
"4.9.79": {
"CVE-2017-16911": {
"cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address",
"cmt_id": "ce601a07bc504b4748f8e7a34896684f79514e51"
},
"CVE-2017-11472": {
"cmt_msg": "ACPICA: Namespace: fix operand cache leak",
"cmt_id": "2915f16bdce204621695e7a0dfcd5f73b120cccb"
},
"CVE-2018-1000028": {
"cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled",
"cmt_id": "f12d0602633decf073796f3aaa59eec7ff2da9e2"
},
"CVE-2017-17450": {
"cmt_msg": "netfilter: xt_osf: Add missing permission checks",
"cmt_id": "898eeca02a55e354c42a7aa5cdfebf16c3742f44"
},
"CVE-2017-17448": {
"cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks",
"cmt_id": "2c3184ea80322347287bc7e57f782d77f478e73c"
}
},
"4.9.80": {
"CVE-2018-5344": {
"cmt_msg": "loop: fix concurrent lo_open/lo_release",
"cmt_id": "56bc086358cac1a2949783646eabd57447b9d672"
}
},
"4.9.81": {
"CVE-2017-5754": {
"cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control",
"cmt_id": "40532f65cccc5056b50cf1ab07a9a41445b24aa8"
},
"CVE-2017-13305": {
"cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()",
"cmt_id": "9692602ab850eec484d8cc5a740803d34f00016c"
}
},
"4.9.82": {
"CVE-2018-5873": {
"cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS",
"cmt_id": "daaa81c48402da28cc9e32ad55c48fb05e61b005"
},
"CVE-2017-8824": {
"cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code",
"cmt_id": "7e2fb808d3c7c52f88ebc670949dbf1bae48f2a2"
},
"CVE-2017-16538": {
"cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start",
"cmt_id": "1ff1353a03c6cde5334a94cb67f8632141b0589b"
},
"CVE-2017-16644": {
"cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()",
"cmt_id": "198a7ddaf5d2c76130b28f19ed6d768860ea2b8e"
},
"CVE-2017-18344": {
"cmt_msg": "posix-timer: Properly check sigevent->sigev_notify",
"cmt_id": "0b376535ad5493d2fcf70ab5f6539551aadb493e"
},
"CVE-2018-5750": {
"cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message",
"cmt_id": "623c28ee02b36a9f45780be0ded6d13ad74e2d0e"
}
},
"4.9.83": {
"CVE-2018-7566": {
"cmt_msg": "ALSA: seq: Fix racy pool initializations",
"cmt_id": "869182f45e38e4c62722b20a5c6f4bc48b2e60c3"
}
},
"4.9.86": {
"CVE-2017-18193": {
"cmt_msg": "f2fs: fix a bug caused by NULL extent tree",
"cmt_id": "4a97b2d09d332c43612f489c99b97d691002b6d4"
}
},
"4.9.87": {
"CVE-2018-5803": {
"cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()",
"cmt_id": "9b7d723439a444ea578462f50054641a09c45023"
}
},
"4.9.88": {
"CVE-2018-1068": {
"cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets",
"cmt_id": "21ff147189ff0692d203282c1dced02f83dcf785"
},
"CVE-2018-7995": {
"cmt_msg": "x86/MCE: Serialize sysfs changes",
"cmt_id": "2cc98fddf0f4a746071e098075a832fbec4bbfff"
},
"CVE-2018-1065": {
"cmt_msg": "netfilter: add back stackpointer size checks",
"cmt_id": "f506da51bdf6602ec942f25d682a4de9b59760da"
},
"CVE-2019-9456": {
"cmt_msg": "usb: usbmon: Read text within supplied buffer size",
"cmt_id": "63f3bac3bedcf415d789ff3ae8fb1361e4ab104e"
}
},
"4.9.89": {
"CVE-2018-7480": {
"cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue",
"cmt_id": "7bd2d0c746f1fac2fb7f2ee972767cbc8be60962"
}
},
"4.9.90": {
"CVE-2017-18222": {
"cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver",
"cmt_id": "b2a863dba3defce5f37af95007999ce9f48f8af6"
},
"CVE-2018-1066": {
"cmt_msg": "CIFS: Enable encryption during session setup phase",
"cmt_id": "df09b6f7b54adba78693997096d0bcb1bd80537c"
}
},
"4.9.91": {
"CVE-2018-8822": {
"cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()",
"cmt_id": "5e7124c4d6786488198b192f90491e5a5ba51230"
},
"CVE-2018-8781": {
"cmt_msg": "drm: udl: Properly check framebuffer mmap offsets",
"cmt_id": "4ac9ab4f5f45d1ad0585c7bfa9ccff43b9984045"
},
"CVE-2018-1087": {
"cmt_msg": "kvm/x86: fix icebp instruction handling",
"cmt_id": "587da2b6282302325bd4bcc28a7615e822184ff1"
},
"CVE-2018-8897": {
"cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack",
"cmt_id": "3681c24a7d096b092cf05c8338adbb9019bb1536"
}
},
"4.9.92": {
"CVE-2017-18218": {
"cmt_msg": "net: hns: Fix a skb used after free bug",
"cmt_id": "a8f4be0168d5bf0c8838ca08301ae5341208dfba"
},
"CVE-2018-1130": {
"cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()",
"cmt_id": "1fdc00c1503f2164893454958cf62c3bf4eff8d6"
}
},
"4.9.93": {
"CVE-2018-1000199": {
"cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation",
"cmt_id": "7614f7db9bee160c5e8d298919af3f28941fc703"
},
"CVE-2017-17975": {
"cmt_msg": "media: usbtv: prevent double free in error case",
"cmt_id": "50cd7759a34104c3acb510e644355d4ae8010851"
}
},
"4.9.94": {
"CVE-2018-7757": {
"cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()",
"cmt_id": "0ef71347d2e8db15ab0f8c7b79cf2c38d34d1870"
}
},
"4.9.96": {
"CVE-2018-1108": {
"cmt_msg": "random: fix crng_ready() test",
"cmt_id": "4dfb3442bb7e1fb80515df4a199ca5a7a8edf900"
},
"CVE-2018-20961": {
"cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi",
"cmt_id": "b3b0809ac25c3ffedc58e7f83bc01a03193e7834"
},
"CVE-2018-1092": {
"cmt_msg": "ext4: fail ext4_iget for root directory if unallocated",
"cmt_id": "6b289a7c34d72212bcd5a8ab9b6a657f2f44f0ee"
}
},
"4.9.97": {
"CVE-2018-10940": {
"cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()",
"cmt_id": "4bd744b86114a406efb563c8717e5bea7672d427"
}
},
"4.9.98": {
"CVE-2018-9415": {
"cmt_msg": "ARM: amba: Fix race condition with driver_override",
"cmt_id": "272c99cf85a371401b78f3c56a18745bf07817a3"
},
"CVE-2018-9385": {
"cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer",
"cmt_id": "8970c12ac9b917b27e42c0537ab7fce0357f0cf3"
},
"CVE-2018-1093": {
"cmt_msg": "ext4: add validity checks for bitmap block numbers",
"cmt_id": "76964816c83d3e4e8a6a393777b30f22a6f9cd51"
}
},
"4.9.99": {
"CVE-2017-18255": {
"cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check",
"cmt_id": "0f8a75e90963019cef486565f2b088bb570a7ddb"
}
},
"4.9.100": {
"CVE-2017-18257": {
"cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()",
"cmt_id": "b8bf4b886b82585202ab4ee169718656661cb89e"
}
},
"4.9.101": {
"CVE-2018-1120": {
"cmt_msg": "proc: do not access cmdline nor environ from file-backed areas",
"cmt_id": "6f1abf8628b750905606996fd5ff5ea22d149238"
},
"CVE-2018-10087": {
"cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()",
"cmt_id": "04103c29b6cc1ffcf9efe167a07e882be68f8367"
}
},
"4.9.102": {
"CVE-2018-5814": {
"cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors",
"cmt_id": "f2a6d5f19450086e5cbdac7168d3fc75af32becf"
},
"CVE-2018-3639": {
"cmt_msg": "x86/nospec: Simplify alternative_msr_write()",
"cmt_id": "741c026d1a0c594f7ad509f44488ef29582fed74"
}
},
"4.9.103": {
"CVE-2018-10021": {
"cmt_msg": "scsi: libsas: defer ata device eh commands to libata",
"cmt_id": "e420d98384760f55ffac9951b9b5cccbf2edd752"
},
"CVE-2018-1000204": {
"cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()",
"cmt_id": "ad2518320bc440ed3db072e2444a1bb226a9cf7a"
}
},
"4.9.104": {
"CVE-2018-10124": {
"cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info",
"cmt_id": "ec1975ac988686eba0f105f87ed0b587da43d384"
},
"CVE-2018-9518": {
"cmt_msg": "NFC: llcp: Limit size of SDP URI",
"cmt_id": "69b28c18f7c8b3bbdc037f1cc029acc21723b997"
},
"CVE-2017-13695": {
"cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c",
"cmt_id": "9c6d844357a30e5dfcbb015c0d07a8175464b9c6"
},
"CVE-2018-6412": {
"cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().",
"cmt_id": "05b4268070b14dbd77ac6f5986b77a80a458fffa"
}
},
"4.9.108": {
"CVE-2019-18675": {
"cmt_msg": "mmap: introduce sane default mmap limits",
"cmt_id": "7a40374c34e8c25062b0d7e2d2152ff8b7af1274"
}
},
"4.9.110": {
"CVE-2018-1118": {
"cmt_msg": "vhost: fix info leak due to uninitialized memory",
"cmt_id": "9681c3bdb098f6c87a0422b6b63912c1b90ad197"
}
},
"4.9.111": {
"CVE-2018-13406": {
"cmt_msg": "video: uvesafb: Fix integer overflow in allocation",
"cmt_id": "7673ca3c93414faf90fa2a3c339f1f625415fecb"
}
},
"4.9.112": {
"CVE-2018-10878": {
"cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()",
"cmt_id": "cdde876fce2501828af33d5e4faa36c8919fc96a"
},
"CVE-2018-9516": {
"cmt_msg": "HID: debug: check length before copy_to_user()",
"cmt_id": "4a30c12542290f1def08b9ef0d677c024c500589"
},
"CVE-2017-13168": {
"cmt_msg": "scsi: sg: mitigate read/write abuse",
"cmt_id": "b6db8af7e34edfa1bf1d7b0797da15c3811a2a98"
},
"CVE-2018-10877": {
"cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()",
"cmt_id": "87dad44faabd45683fba94443471298f8809e8a8"
},
"CVE-2018-10876": {
"cmt_msg": "ext4: only look at the bg_flags field if it is valid",
"cmt_id": "5ae57329580d6ceca97559ff030a5f0e91fa66fe"
},
"CVE-2018-10879": {
"cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors",
"cmt_id": "9e4842f2aa6c4b4340669730c90cb6fbf630ee42"
},
"CVE-2018-10881": {
"cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data",
"cmt_id": "a5e063d348bd2ef14fff96b129749409a8991ea5"
},
"CVE-2018-10882": {
"cmt_msg": "ext4: add more inode number paranoia checks",
"cmt_id": "425dc465de3725210162da9b1e9062e86cc2de27"
},
"CVE-2018-10883": {
"cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits",
"cmt_id": "8ef97ef67ce0f8fc3d32c7218e6b412e479ee2ab"
}
},
"4.9.113": {
"CVE-2018-13405": {
"cmt_msg": "Fix up non-directory creation in SGID directories",
"cmt_id": "d2c7c52431819aa05d76fae77bb3f95dd0955da1"
},
"CVE-2018-16276": {
"cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler",
"cmt_id": "0fdef3142f99430b94f5d394ca2b181d20d87e77"
}
},
"4.9.114": {
"CVE-2017-18216": {
"cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent",
"cmt_id": "32a1733cf823011266dac0ea34c13555ff35dde5"
},
"CVE-2017-18224": {
"cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()",
"cmt_id": "78a65505cdf7b7392c963d3715269516bc812ef2"
}
},
"4.9.115": {
"CVE-2018-10902": {
"cmt_msg": "ALSA: rawmidi: Change resized buffers atomically",
"cmt_id": "c4f094deb3d69dcc8b4e3dc6c056c1e62a72c33e"
}
},
"4.9.116": {
"CVE-2018-5390": {
"cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()",
"cmt_id": "2d08921c8da26bdce3d8848ef6f32068f594d7d4"
}
},
"4.9.117": {
"CVE-2018-14734": {
"cmt_msg": "infiniband: fix a possible use-after-free bug",
"cmt_id": "73298a828c90398d582ec0e204b637e9bbee2dd5"
}
},
"4.9.119": {
"CVE-2018-12233": {
"cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size",
"cmt_id": "240d46556d5961c7100febbee0e058185b3c8d4f"
}
},
"4.9.120": {
"CVE-2018-3646": {
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled",
"cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481"
},
"CVE-2018-15572": {
"cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB",
"cmt_id": "6455f41db5206cf46b623be071a0aa308c183642"
},
"CVE-2018-3620": {
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled",
"cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481"
}
},
"4.9.121": {
"CVE-2018-9363": {
"cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report",
"cmt_id": "7c7940ffbaefdbb189f78a48b4e64b6f268b1dbf"
}
},
"4.9.124": {
"CVE-2018-3693": {
"cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()",
"cmt_id": "51ada11083605de581b3c29212b5641d18cc8fcb"
}
},
"4.9.125": {
"CVE-2018-10938": {
"cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop",
"cmt_id": "e8e519f8ec33ce670abef2cfc0613ec26319841e"
},
"CVE-2018-16658": {
"cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status",
"cmt_id": "b8c0e15469bab732065e64f7dffadab0b7103990"
}
},
"4.9.126": {
"CVE-2019-12881": {
"cmt_msg": "drm/i915/userptr: reject zero user_size",
"cmt_id": "f916daa615e1c0d67fb3b7a65572fbc56c6aaea6"
}
},
"4.9.127": {
"CVE-2018-6554": {
"cmt_msg": "staging: irda: remove the irda network stack and drivers",
"cmt_id": "ce54bf4aec595c479b462180d682783b3776fb80"
},
"CVE-2018-6555": {
"cmt_msg": "staging: irda: remove the irda network stack and drivers",
"cmt_id": "18d94895f505d6eef2da8868e87a403cde1d9ef0"
},
"CVE-2018-14617": {
"cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()",
"cmt_id": "1cedd72d0f688b9c169836649ac9ec07a3c601d6"
},
"CVE-2018-14609": {
"cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized",
"cmt_id": "93d960de56cef4582088dfc0ba9494143351772f"
}
},
"4.9.128": {
"CVE-2018-13099": {
"cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode",
"cmt_id": "7e0782ceebaaed70b0c4b775c27b81e8f8cf6ddb"
},
"CVE-2018-17182": {
"cmt_msg": "mm: get rid of vmacache_flush_all() entirely",
"cmt_id": "84580567f1f856d2c7a610273315852e345bc3ac"
}
},
"4.9.130": {
"CVE-2018-20511": {
"cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT",
"cmt_id": "11f734283a987ac26365aefafdd012a3f37e05a3"
},
"CVE-2018-14633": {
"cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation",
"cmt_id": "5eeb39743ba17bd36db8d86d0047181ee0b9ff71"
}
},
"4.9.131": {
"CVE-2018-7755": {
"cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl",
"cmt_id": "3da4db1dfc217c6f330be87baf5759ef4a4b8d93"
},
"CVE-2018-18021": {
"cmt_msg": "arm64: KVM: Tighten guest core register access from userspace",
"cmt_id": "bc769c0148cd9820c8db785a2a1298a6489125ae"
},
"CVE-2018-10880": {
"cmt_msg": "ext4: never move the system.data xattr out of the inode body",
"cmt_id": "3a282476161c54df1a2ef1ba664c8a3514ef49f4"
},
"CVE-2018-13053": {
"cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep",
"cmt_id": "747128e772dc2c413763050c52c55edcacf7f60c"
},
"CVE-2019-9458": {
"cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed",
"cmt_id": "ec964c3c00457e7ce6b633a33d1c6b61e0091557"
}
},
"4.9.132": {
"CVE-2018-17972": {
"cmt_msg": "proc: restrict kernel stack dumps to root",
"cmt_id": "3c5dc3f313cf1cb1645a0e832f51c1ba79aee934"
}
},
"4.9.133": {
"CVE-2018-15471": {
"cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()",
"cmt_id": "2962761863cb161d419c94f3dde7443af0e63c31"
}
},
"4.9.134": {
"CVE-2018-5391": {
"cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.",
"cmt_id": "82f36cbc74595f06900f478d4eaf7217a4f06e13"
}
},
"4.9.135": {
"CVE-2018-18281": {
"cmt_msg": "mremap: properly flush TLB before releasing the page",
"cmt_id": "e34bd9a96704f7089ccad61b6e01ea985fa54dd6"
}
},
"4.9.136": {
"CVE-2018-12896": {
"cmt_msg": "posix-timers: Sanitize overrun handling",
"cmt_id": "65cb24de03f1c8e00a4fedf416b80a4e8f8a6ef2"
}
},
"4.9.138": {
"CVE-2018-16871": {
"cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set",
"cmt_id": "7291d95a97fc89044301b197c760555e894e82c7"
},
"CVE-2018-18710": {
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.",
"cmt_id": "8dd745a8799ee01fc67b64fd33cdb44d04eb7e4c"
}
},
"4.9.143": {
"CVE-2018-19407": {
"cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization",
"cmt_id": "3a468e8e5a6124523e2e94c33866c609cc914876"
},
"CVE-2019-2024": {
"cmt_msg": "media: em28xx: Fix use-after-free when disconnecting",
"cmt_id": "6fc74d9f9b412b295f9ad01af7a7e62a662aa5bd"
}
},
"4.9.144": {
"CVE-2018-9465": {
"cmt_msg": "binder: fix proc->files use-after-free",
"cmt_id": "c0d75dacffb9cf3c0e3812ba0c7607c063cd7e9d"
},
"CVE-2018-13100": {
"cmt_msg": "f2fs: fix to do sanity check with secs_per_zone",
"cmt_id": "a3dccfacd3a574365ab6c5118f8a944a4ba691fa"
},
"CVE-2018-5848": {
"cmt_msg": "wil6210: missing length check in wmi_set_ie",
"cmt_id": "35db4d1ed8a344899a87887fa7bf11be5b057bec"
},
"CVE-2017-18249": {
"cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer",
"cmt_id": "cb9b1d4ec206702a4df1cb42ba8142f39acfdd91"
},
"CVE-2018-13097": {
"cmt_msg": "f2fs: fix to do sanity check with user_block_count",
"cmt_id": "06e606acedaf8bb00c83c4cee43acdd264287a92"
},
"CVE-2018-14611": {
"cmt_msg": "btrfs: validate type when reading a chunk",
"cmt_id": "3c77b07dc365a7ed2644ca0dd38e6e40a9652d57"
},
"CVE-2018-14616": {
"cmt_msg": "f2fs: fix to do sanity check with block address in main area v2",
"cmt_id": "b10a6ac262f8c1c0c70a90e992137a5590325f0b"
},
"CVE-2017-18241": {
"cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control",
"cmt_id": "3b19f961d260d1ae12b497e5eb77e5ecc1039fac"
},
"CVE-2018-14610": {
"cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time",
"cmt_id": "7a72f918825ddece7a4ed79583836f6f1e06e478"
},
"CVE-2018-14613": {
"cmt_msg": "btrfs: tree-checker: Verify block_group_item",
"cmt_id": "058e388e42c8dc5b6ce6248990c75a0459e20197"
},
"CVE-2018-14612": {
"cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees",
"cmt_id": "6f33d3d8dca8683a4df94e9944296a1a1a2a6f10"
},
"CVE-2018-1128": {
"cmt_msg": "libceph: add authorizer challenge",
"cmt_id": "06e925920d4de3da2114876bc607447e929604af"
},
"CVE-2018-1129": {
"cmt_msg": "libceph: implement CEPHX_V2 calculation mode",
"cmt_id": "18a23fb2632030888fc56a7df73a80f57445718f"