{ | |
"4.4": { | |
"4.4": { | |
"CVE-2016-2070": { | |
"cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction", | |
"cmt_id": "8b8a321ff72c785ed5e8b4cf6eda20b35d427390" | |
}, | |
"CVE-2015-8963": { | |
"cmt_msg": "perf: Fix race in swevent hash", | |
"cmt_id": "12ca6ad2e3a896256f086497a7c7406a547ee373" | |
} | |
}, | |
"4.4.1": { | |
"CVE-2016-0728": { | |
"cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", | |
"cmt_id": "e4a46f02b1d0eaadea4e6b00e29922cd00d6de53" | |
}, | |
"CVE-2016-2069": { | |
"cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", | |
"cmt_id": "43a2ba8c1a003c82d9f411af8ebcf0fe1e4cbe3e" | |
}, | |
"CVE-2016-2545": { | |
"cmt_msg": "ALSA: timer: Fix double unlink of active_list", | |
"cmt_id": "3c0e535fee2e67d06220e676cbf7b69099d741ce" | |
}, | |
"CVE-2016-2544": { | |
"cmt_msg": "ALSA: seq: Fix race at timer setup and close", | |
"cmt_id": "0058ede73e1f441c003666f61671dfddfcbd5811" | |
}, | |
"CVE-2016-2547": { | |
"cmt_msg": "ALSA: timer: Harden slave timer list handling", | |
"cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" | |
}, | |
"CVE-2016-2546": { | |
"cmt_msg": "ALSA: timer: Fix race among timer ioctls", | |
"cmt_id": "d87622a1662af5782c94b88a613c09de0bde5288" | |
}, | |
"CVE-2016-2543": { | |
"cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", | |
"cmt_id": "36d3fc15f50c22bbddfceb6c585f851130fb005f" | |
}, | |
"CVE-2013-4312": { | |
"cmt_msg": "unix: properly account for FDs passed over unix sockets", | |
"cmt_id": "5e226f9689d90ad8ab21b4a969ae3058777f0aff" | |
}, | |
"CVE-2016-2549": { | |
"cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", | |
"cmt_id": "dafa57ee81748f6a6950c06f19a160d0a209795e" | |
}, | |
"CVE-2016-2548": { | |
"cmt_msg": "ALSA: timer: Harden slave timer list handling", | |
"cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" | |
} | |
}, | |
"4.4.2": { | |
"CVE-2016-2782": { | |
"cmt_msg": "USB: visor: fix null-deref at probe", | |
"cmt_id": "ee4207bda5e15d0eecb834c4fc39c6069487279d" | |
}, | |
"CVE-2016-2384": { | |
"cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", | |
"cmt_id": "fbb430c51d7ac989b79bf1adb40cce7af581682a" | |
}, | |
"CVE-2016-2085": { | |
"cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", | |
"cmt_id": "8592536bcfcbc717a3bf7cec57d7c1b38f4eec1d" | |
}, | |
"CVE-2016-0723": { | |
"cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", | |
"cmt_id": "d343601a19410f71bf1765df5e2edda66fe5de5f" | |
}, | |
"CVE-2017-13215": { | |
"cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", | |
"cmt_id": "fec8beab63283003b546f83eebbbe32efb9acc53" | |
}, | |
"CVE-2017-13167": { | |
"cmt_msg": "ALSA: timer: Fix race at concurrent reads", | |
"cmt_id": "925249d5172a31d7d430fdf364fc9229223c7942" | |
}, | |
"CVE-2015-7566": { | |
"cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", | |
"cmt_id": "2dc803d0740f0c493a7db8a1baf6514d5b95b6a3" | |
}, | |
"CVE-2015-8970": { | |
"cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", | |
"cmt_id": "b238717c0bb4606e2e36fc0de745306b0c900d83" | |
} | |
}, | |
"4.4.3": { | |
"CVE-2016-0617": { | |
"cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()", | |
"cmt_id": "db33368ca32dd307cdcc191361de34f3937f513a" | |
}, | |
"CVE-2016-1575": { | |
"cmt_msg": "ovl: setattr: check permissions before copy-up", | |
"cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" | |
}, | |
"CVE-2016-1576": { | |
"cmt_msg": "ovl: setattr: check permissions before copy-up", | |
"cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" | |
} | |
}, | |
"4.4.4": { | |
"CVE-2016-2383": { | |
"cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion", | |
"cmt_id": "a34f2f9f2034f7984f9529002c6fffe9cb63189d" | |
}, | |
"CVE-2021-20265": { | |
"cmt_msg": "af_unix: fix struct pid memory leak", | |
"cmt_id": "39770be4d6ad29c5ab1f21edbbf01db067f13b52" | |
}, | |
"CVE-2015-8812": { | |
"cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", | |
"cmt_id": "64fb3e29bf47e5db029b81fc99ac40f6cd2620ac" | |
} | |
}, | |
"4.4.6": { | |
"CVE-2016-2143": { | |
"cmt_msg": "s390/mm: four page table levels vs. fork", | |
"cmt_id": "5833fac3b88d39b39402309399e8b0aaa54e5f75" | |
}, | |
"CVE-2016-3044": { | |
"cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", | |
"cmt_id": "1c463a390a89beb929ed2750c79d6eb6d06c7cdd" | |
} | |
}, | |
"4.4.7": { | |
"CVE-2016-3137": { | |
"cmt_msg": "USB: cypress_m8: add endpoint sanity check", | |
"cmt_id": "ca76906a7753052b00e491ba017393f9071b0406" | |
}, | |
"CVE-2016-3157": { | |
"cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", | |
"cmt_id": "0f63ab5873ed78838afa4b2f8bfd9d18f806cf40" | |
}, | |
"CVE-2016-3689": { | |
"cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", | |
"cmt_id": "af18c4ca4b1728e2149844656bbf1aa8d7382682" | |
}, | |
"CVE-2016-9685": { | |
"cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", | |
"cmt_id": "b34291f71d0fb3d09728fd43d6da350ff6a179d6" | |
}, | |
"CVE-2016-3140": { | |
"cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", | |
"cmt_id": "4f6ad5b0d28c84030693fe21b308c0b711fa66f6" | |
}, | |
"CVE-2016-3136": { | |
"cmt_msg": "USB: mct_u232: add sanity checking in probe", | |
"cmt_id": "9deac9454b7a5643a09829f4731276cea6697b72" | |
}, | |
"CVE-2016-2185": { | |
"cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", | |
"cmt_id": "a1d0a23831ccde9dbd5279a5d45790a96f18ad32" | |
}, | |
"CVE-2016-2184": { | |
"cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", | |
"cmt_id": "57f6ad5f1580a5a06c573fb15ed6dcf701e037f6" | |
}, | |
"CVE-2016-6327": { | |
"cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", | |
"cmt_id": "84512e476ce92fbdb60d4687e3ea230dbf0655c8" | |
}, | |
"CVE-2016-2186": { | |
"cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", | |
"cmt_id": "fbd40d7beef0b17624bc1f838f4d44dfa4b0326b" | |
}, | |
"CVE-2016-3138": { | |
"cmt_msg": "USB: cdc-acm: more sanity checking", | |
"cmt_id": "1ea680abf7640c777396909102bc22915107cb5b" | |
} | |
}, | |
"4.4.8": { | |
"CVE-2016-7117": { | |
"cmt_msg": "net: Fix use after free in the recvmmsg exit path", | |
"cmt_id": "405f10a39443ae9ccacf51f18511dfc827e09108" | |
}, | |
"CVE-2016-3156": { | |
"cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", | |
"cmt_id": "54789759917f127cfadcca730f44ea67d557a9b0" | |
}, | |
"CVE-2016-4805": { | |
"cmt_msg": "ppp: take reference on channels netns", | |
"cmt_id": "046ea8180ecaf5d8b5823e17714a09526ad7d321" | |
} | |
}, | |
"4.4.9": { | |
"CVE-2016-4568": { | |
"cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing", | |
"cmt_id": "19a4e46b4513bab7d6b368175be2e24ad4665e5a" | |
}, | |
"CVE-2016-7914": { | |
"cmt_msg": "assoc_array: don't call compare_object() on a node", | |
"cmt_id": "6905c7a4aa1ef675825bc2ab56fd965a573ffb74" | |
}, | |
"CVE-2016-3955": { | |
"cmt_msg": "USB: usbip: fix potential out-of-bounds write", | |
"cmt_id": "4a1bb501e4b65908b102f0b371b0621ff18ad5c3" | |
}, | |
"CVE-2016-7912": { | |
"cmt_msg": "usb: gadget: f_fs: Fix use-after-free", | |
"cmt_id": "e4c7ab76586146820b394e0176f286f5a2e70cb3" | |
}, | |
"CVE-2016-4565": { | |
"cmt_msg": "IB/security: Restrict use of the write() interface", | |
"cmt_id": "c92003c18feb8159cbf64bc0afa7b048869fe3c6" | |
}, | |
"CVE-2016-2187": { | |
"cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", | |
"cmt_id": "197b6c5f0d976420c3eeacc7589ebc5869d2d70f" | |
}, | |
"CVE-2015-8839": { | |
"cmt_msg": "ext4: fix races between page faults and hole punching", | |
"cmt_id": "0b680de452570274716c2c9990903acea525f0d0" | |
}, | |
"CVE-2016-3961": { | |
"cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", | |
"cmt_id": "27b3cc048a5275c53e26c15ffcab3fcf9a03cda0" | |
} | |
}, | |
"4.4.10": { | |
"CVE-2016-7916": { | |
"cmt_msg": "proc: prevent accessing /proc/<PID>/environ until it's ready", | |
"cmt_id": "898149d10b855a0d0a5a9f8f05e4359970919eb9" | |
}, | |
"CVE-2016-4581": { | |
"cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", | |
"cmt_id": "b17580a3cb901c56e9b9a3dea4d12153f5fc879e" | |
} | |
}, | |
"4.4.11": { | |
"CVE-2016-6198": { | |
"cmt_msg": "vfs: add vfs_select_inode() helper", | |
"cmt_id": "b0dac61d2454b392dbdb4ad565f9dc3dc76fce96" | |
}, | |
"CVE-2016-4557": { | |
"cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()", | |
"cmt_id": "608d2c3c7a046c222cae2e857cf648a9f89e772b" | |
}, | |
"CVE-2016-4580": { | |
"cmt_msg": "net: fix a kernel infoleak in x25 module", | |
"cmt_id": "83857201758ead21e19e36d9ab5b2f87be03dfe2" | |
}, | |
"CVE-2016-4486": { | |
"cmt_msg": "net: fix infoleak in rtnetlink", | |
"cmt_id": "e0c0313681aaa0c4514c6794635aba82691d2154" | |
}, | |
"CVE-2016-2117": { | |
"cmt_msg": "atl2: Disable unimplemented scatter/gather feature", | |
"cmt_id": "b5c9a73c501e8aed86dd578309813c7818ca248c" | |
}, | |
"CVE-2016-4485": { | |
"cmt_msg": "net: fix infoleak in llc", | |
"cmt_id": "52f307b18b1f070f0442fc98515575616b21fa20" | |
}, | |
"CVE-2016-4558": { | |
"cmt_msg": "bpf: fix refcnt overflow", | |
"cmt_id": "3899251bdb9c2b31fc73d4cc132f52d3710101de" | |
}, | |
"CVE-2016-4913": { | |
"cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", | |
"cmt_id": "007796c01f0b293c68585397211af2b390bf126d" | |
} | |
}, | |
"4.4.12": { | |
"CVE-2016-3713": { | |
"cmt_msg": "KVM: MTRR: remove MSR 0x2f8", | |
"cmt_id": "1716643bc4725bb92a1f527f759a93e37a2bc1f0" | |
}, | |
"CVE-2016-9754": { | |
"cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", | |
"cmt_id": "f199023137853eb1d46e8b7ebc274b29ba99028c" | |
}, | |
"CVE-2019-3901": { | |
"cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", | |
"cmt_id": "c5174678e2e5bd691da58a116fbc123c6fbc7b2c" | |
} | |
}, | |
"4.4.13": { | |
"CVE-2016-2847": { | |
"cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", | |
"cmt_id": "fa6d0ba12a8eb6a2e9a1646c5816da307c1f93a7" | |
} | |
}, | |
"4.4.14": { | |
"CVE-2016-4951": { | |
"cmt_msg": "tipc: check nl sock before parsing nested attributes", | |
"cmt_id": "23cdd8c3cbe9d790f23d7f9ae14e9b828f56f69c" | |
}, | |
"CVE-2016-4997": { | |
"cmt_msg": "netfilter: x_tables: check for bogus target offset", | |
"cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" | |
}, | |
"CVE-2016-4998": { | |
"cmt_msg": "netfilter: x_tables: check for bogus target offset", | |
"cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" | |
}, | |
"CVE-2016-3134": { | |
"cmt_msg": "netfilter: x_tables: fix unconditional helper", | |
"cmt_id": "5ebdccd7685f1c0b451c516f99082642d8d49003" | |
}, | |
"CVE-2016-9806": { | |
"cmt_msg": "netlink: Fix dump skb leak/double free", | |
"cmt_id": "49543942beb1b9ca95709d6cfa67708932aa4d11" | |
}, | |
"CVE-2016-1583": { | |
"cmt_msg": "proc: prevent stacking filesystems on top", | |
"cmt_id": "9beb96b344c846779f67d1be1cdafc66562b94ec" | |
} | |
}, | |
"4.4.16": { | |
"CVE-2016-4470": { | |
"cmt_msg": "KEYS: potential uninitialized variable", | |
"cmt_id": "398051f2f66ef4658c89388441d0c697d50c325c" | |
}, | |
"CVE-2016-6197": { | |
"cmt_msg": "ovl: verify upper dentry before unlink and rename", | |
"cmt_id": "dbf72a4d4531e7e5fb28e76d902d66f05c1bfe12" | |
}, | |
"CVE-2016-1237": { | |
"cmt_msg": "posix_acl: Add set_posix_acl", | |
"cmt_id": "c3fa141c1f288ac785c82ead9d06d1b5acd76d60" | |
}, | |
"CVE-2016-4794": { | |
"cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", | |
"cmt_id": "c26ae537f16f653c2541df9e338013653fc3fcc7" | |
}, | |
"CVE-2016-5829": { | |
"cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", | |
"cmt_id": "300851ff55f7777be2780207f1b60ad5e1fd1303" | |
}, | |
"CVE-2016-5828": { | |
"cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", | |
"cmt_id": "5a35d2f92f1011145315f86a481f4f3e3f853095" | |
} | |
}, | |
"4.4.17": { | |
"CVE-2016-6156": { | |
"cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl", | |
"cmt_id": "69ca969a2626dc4b3bb83b953c053a01e3b9f7e6" | |
}, | |
"CVE-2016-7911": { | |
"cmt_msg": "block: fix use-after-free in sys_ioprio_get()", | |
"cmt_id": "5161144c3a9d6ea775b293edbb8523deaeff4442" | |
}, | |
"CVE-2016-4569": { | |
"cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", | |
"cmt_id": "90bed827ea910f82ab17ee154f501b5ae71617e6" | |
}, | |
"CVE-2016-5400": { | |
"cmt_msg": "media: fix airspy usb probe error path", | |
"cmt_id": "d863bec646a590584eabcb40550bff0708c26b0d" | |
}, | |
"CVE-2016-4578": { | |
"cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", | |
"cmt_id": "3e6af33c73fb7ec7be8dedd01047162ef64a26a5" | |
} | |
}, | |
"4.4.18": { | |
"CVE-2016-3672": { | |
"cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", | |
"cmt_id": "979a61a02992e2029fcedcdf32c05050aa652c9c" | |
}, | |
"CVE-2016-5696": { | |
"cmt_msg": "tcp: make challenge acks less predictable", | |
"cmt_id": "72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf" | |
}, | |
"CVE-2016-3951": { | |
"cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", | |
"cmt_id": "66e5d7b47c864f1821041f77752930ec3b8dfc22" | |
}, | |
"CVE-2017-7495": { | |
"cmt_msg": "ext4: fix data exposure after a crash", | |
"cmt_id": "5a7f477c725e866729307ff87011f8dd812a3cdf" | |
}, | |
"CVE-2016-7910": { | |
"cmt_msg": "block: fix use-after-free in seq file", | |
"cmt_id": "9a95c0cfc6f21b9ac66269d4782ea5a0f58cdf91" | |
}, | |
"CVE-2016-3857": { | |
"cmt_msg": "arm: oabi compat: add missing access checks", | |
"cmt_id": "0107ea0e0928c8a077f0f912c809f2b86fa7496c" | |
} | |
}, | |
"4.4.19": { | |
"CVE-2016-5412": { | |
"cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", | |
"cmt_id": "e1a90eb8afa42b02f46897b881b9e19d3594159c" | |
}, | |
"CVE-2016-4482": { | |
"cmt_msg": "USB: usbfs: fix potential infoleak in devio", | |
"cmt_id": "4077ef4797a8ff007a2de091c9befee4882c4790" | |
}, | |
"CVE-2016-6136": { | |
"cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", | |
"cmt_id": "53eaa3910ae67e497fb33188d515c14ed17a7a0e" | |
} | |
}, | |
"4.4.20": { | |
"CVE-2016-6480": { | |
"cmt_msg": "aacraid: Check size values after double-fetch from user", | |
"cmt_id": "e4878ef66e5b8d01d6734b1952f9abb3eeea454c" | |
} | |
}, | |
"4.4.21": { | |
"CVE-2016-10229": { | |
"cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", | |
"cmt_id": "dfe2042d96065f044a794f684e9f7976a4ca6e24" | |
}, | |
"CVE-2016-5244": { | |
"cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", | |
"cmt_id": "ffd5ce2ad5fd140ddd492ab2064e29e86aaa64ea" | |
}, | |
"CVE-2016-5243": { | |
"cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", | |
"cmt_id": "5fb71611925f734f7fe03a45527e14b296fd5167" | |
}, | |
"CVE-2016-7915": { | |
"cmt_msg": "HID: core: prevent out-of-bound readings", | |
"cmt_id": "5349cdd3b49cea2d57dc05bbf3f313979751fed3" | |
}, | |
"CVE-2016-3135": { | |
"cmt_msg": "netfilter: x_tables: check for size overflow", | |
"cmt_id": "cfd6e7fe434a378127e4964fc0b7ccf32ae2baed" | |
}, | |
"CVE-2016-0758": { | |
"cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", | |
"cmt_id": "5afbd223e60a130f66bddf7598165ebe2b51f8db" | |
}, | |
"CVE-2016-6130": { | |
"cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", | |
"cmt_id": "2d29d6cec3bc5473efdad3b143404d9e32817c86" | |
} | |
}, | |
"4.4.22": { | |
"CVE-2016-9178": { | |
"cmt_msg": "fix minor infoleak in get_user_ex()", | |
"cmt_id": "9d25c78ec01c402dc56272693c44ef9d72ecdd2e" | |
}, | |
"CVE-2016-10318": { | |
"cmt_msg": "fscrypto: add authorization check for setting encryption policy", | |
"cmt_id": "8d693a2e67b5793ee58d106fded28902b7fd0f72" | |
} | |
}, | |
"4.4.23": { | |
"CVE-2016-6828": { | |
"cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", | |
"cmt_id": "0f55fa7541d7ff34a6690438bb00b78521b98b54" | |
} | |
}, | |
"4.4.24": { | |
"CVE-2017-15102": { | |
"cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", | |
"cmt_id": "62dd9cf78b280c8cd08162f8c4a490fb76deeb23" | |
}, | |
"CVE-2016-10044": { | |
"cmt_msg": "aio: mark AIO pseudo-fs noexec", | |
"cmt_id": "0d9529e1b881ae80b40270b55dcbf7468be0099c" | |
} | |
}, | |
"4.4.26": { | |
"CVE-2016-5195": { | |
"cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", | |
"cmt_id": "1294d355881cc5c3421d24fee512f16974addb6c" | |
} | |
}, | |
"4.4.27": { | |
"CVE-2016-7425": { | |
"cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", | |
"cmt_id": "24040922827859d1d69597c3bc0c31fad523fd21" | |
} | |
}, | |
"4.4.29": { | |
"CVE-2016-8666": { | |
"cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", | |
"cmt_id": "5699b3431e0b14736867484b8669ead2d40f575e" | |
}, | |
"CVE-2016-8658": { | |
"cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", | |
"cmt_id": "b82a7f93b4e60d8689d8f4e687ef58ed2098739f" | |
}, | |
"CVE-2016-9644": { | |
"cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options", | |
"cmt_id": "fcf5e5198b447969ed2a56ec335dae3c695a6b46" | |
}, | |
"CVE-2016-7097": { | |
"cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", | |
"cmt_id": "57c9cfdb61ea270936fab76da99a742c6ef0b86f" | |
} | |
}, | |
"4.4.31": { | |
"CVE-2016-7042": { | |
"cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", | |
"cmt_id": "940d7ecbc57c94d6cd174d9d3247e07fd1b1467d" | |
}, | |
"CVE-2016-8633": { | |
"cmt_msg": "firewire: net: guard against rx buffer overflows", | |
"cmt_id": "46e14262a063714610b916404a20880fbd4cd0ce" | |
}, | |
"CVE-2016-8630": { | |
"cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)", | |
"cmt_id": "91e1f7b0eb252ce8f88d69227ef5f52f9efb2aae" | |
} | |
}, | |
"4.4.32": { | |
"CVE-2016-7039": { | |
"cmt_msg": "net: add recursion limit to GRO", | |
"cmt_id": "3cb00b90e8b1bd59382f5e1304dd751f9674f027" | |
}, | |
"CVE-2016-9555": { | |
"cmt_msg": "sctp: validate chunk len before actually using it", | |
"cmt_id": "bd891f40f04f8b96d9148ff8a5d538b60171409c" | |
} | |
}, | |
"4.4.34": { | |
"CVE-2015-8964": { | |
"cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", | |
"cmt_id": "4e772c53ab9836b083c21acf9d2d76805e1d133e" | |
}, | |
"CVE-2016-8645": { | |
"cmt_msg": "tcp: take care of truncations done by sk_filter()", | |
"cmt_id": "225a24ae97331f3b9d97c1bb97b1e30b3633bcf4" | |
} | |
}, | |
"4.4.36": { | |
"CVE-2016-9756": { | |
"cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far", | |
"cmt_id": "b7f9404d1b488b6773c7a2e6da92aa6cb5bd125e" | |
}, | |
"CVE-2016-8650": { | |
"cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", | |
"cmt_id": "249090830942565fb0ce7c1e018d927a14282ead" | |
} | |
}, | |
"4.4.37": { | |
"CVE-2016-9794": { | |
"cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", | |
"cmt_id": "58cebd1a08ed114e05cc9d16dee9e5423f564c82" | |
} | |
}, | |
"4.4.38": { | |
"CVE-2016-9793": { | |
"cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", | |
"cmt_id": "77125815f058d587cac9217ac2c468038a7285c4" | |
}, | |
"CVE-2016-10200": { | |
"cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", | |
"cmt_id": "56366fa0ad46a59abe2460b8acb775f7f84fbf16" | |
}, | |
"CVE-2016-8655": { | |
"cmt_msg": "packet: fix race condition in packet_set_ring", | |
"cmt_id": "5a01eaf19858278cc22525be118fe9c6a3c86e83" | |
}, | |
"CVE-2016-8399": { | |
"cmt_msg": "net: ping: check minimum size on ICMP header length", | |
"cmt_id": "06cdad2b6d921dee33c8efc84922533dfb1458c6" | |
} | |
}, | |
"4.4.39": { | |
"CVE-2016-10147": { | |
"cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", | |
"cmt_id": "9a3baed9103bc413a5e98e13e31cd8ae7c0b5563" | |
} | |
}, | |
"4.4.40": { | |
"CVE-2015-8709": { | |
"cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", | |
"cmt_id": "03eed7afbc09e061f66b448daf7863174c3dc3f3" | |
} | |
}, | |
"4.4.41": { | |
"CVE-2016-9588": { | |
"cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", | |
"cmt_id": "19aa9c14989e7a3fe04b444f146a05ff857b058e" | |
}, | |
"CVE-2016-10088": { | |
"cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", | |
"cmt_id": "d85727365859108cbcf832c2b3c38358ddc7638b" | |
} | |
}, | |
"4.4.43": { | |
"CVE-2017-7273": { | |
"cmt_msg": "HID: hid-cypress: validate length of report", | |
"cmt_id": "a2f727149ee4e746da55d209a0179b68d31d3915" | |
} | |
}, | |
"4.4.44": { | |
"CVE-2017-2583": { | |
"cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", | |
"cmt_id": "816307c80d4ddad5414a05ff5861f063d29cda6f" | |
}, | |
"CVE-2016-9191": { | |
"cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", | |
"cmt_id": "b9d6631395a1e25b210ce112b1bc10f3c665ea20" | |
}, | |
"CVE-2017-5549": { | |
"cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", | |
"cmt_id": "3ef5bc0b385f81e88574c29a13edf80f092d515f" | |
}, | |
"CVE-2017-2584": { | |
"cmt_msg": "KVM: x86: Introduce segmented_write_std", | |
"cmt_id": "9d3875c0c462808f4d59dfa18a79d4b5b235acbd" | |
} | |
}, | |
"4.4.45": { | |
"CVE-2017-5547": { | |
"cmt_msg": "HID: corsair: fix DMA buffers on stack", | |
"cmt_id": "0f37d20fdc70ee54f002bd77ce54a2a303ad0437" | |
}, | |
"CVE-2017-5551": { | |
"cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", | |
"cmt_id": "36672b8b99e2cf2ab0587f08a19f394f8f65a861" | |
} | |
}, | |
"4.4.46": { | |
"CVE-2016-8405": { | |
"cmt_msg": "fbdev: color map copying bounds checking", | |
"cmt_id": "63db7c91a3c0ebe0e291feea53e4c63391db9465" | |
} | |
}, | |
"4.4.48": { | |
"CVE-2016-10208": { | |
"cmt_msg": "ext4: validate s_first_meta_bg at mount time", | |
"cmt_id": "e21a3cad35bc2f4c7fff317e2c7d38eed363a430" | |
} | |
}, | |
"4.4.49": { | |
"CVE-2017-2618": { | |
"cmt_msg": "selinux: fix off-by-one in setprocattr", | |
"cmt_id": "e72c13d93e9ed2b131ceb9a290ab056ce0dd41ab" | |
} | |
}, | |
"4.4.50": { | |
"CVE-2017-5986": { | |
"cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", | |
"cmt_id": "a4226c7ebfb5748447f1640c97f0306ed69e44f8" | |
}, | |
"CVE-2017-5897": { | |
"cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", | |
"cmt_id": "eaa3a58f450383aaa8632eea23f2a70d85c55d9d" | |
}, | |
"CVE-2017-6214": { | |
"cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", | |
"cmt_id": "82e9f6b90a0e7fbc017bdce23845c7580db6f657" | |
}, | |
"CVE-2017-5970": { | |
"cmt_msg": "ipv4: keep skb->dst around in presence of IP options", | |
"cmt_id": "2d9c2e011fd3f1be4e5643d6ad186faa5e50d4d1" | |
} | |
}, | |
"4.4.52": { | |
"CVE-2017-6345": { | |
"cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", | |
"cmt_id": "2b3eb43342a00d03e953208f45866925ca255e15" | |
}, | |
"CVE-2017-6346": { | |
"cmt_msg": "packet: fix races in fanout_add()", | |
"cmt_id": "abd672deb170c4443e41173160de0ba2ae1abc08" | |
}, | |
"CVE-2017-6347": { | |
"cmt_msg": "ip: fix IP_CHECKSUM handling", | |
"cmt_id": "ce9ecb8d7f3c698c48b0885936d0b7275dacde9c" | |
}, | |
"CVE-2017-6348": { | |
"cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", | |
"cmt_id": "353dd7290025bc33555282848ab015c1bbf21186" | |
}, | |
"CVE-2017-6074": { | |
"cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", | |
"cmt_id": "a95df078e86624ee330e82aad34cfd3b5fcf21ce" | |
} | |
}, | |
"4.4.53": { | |
"CVE-2017-5669": { | |
"cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", | |
"cmt_id": "f0ae01568e0cf4b00071d1dfd27c90022c2b6d7e" | |
} | |
}, | |
"4.4.54": { | |
"CVE-2017-2636": { | |
"cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", | |
"cmt_id": "999853d941b99ca2ac4a331552c388e2603a9b1d" | |
} | |
}, | |
"4.4.55": { | |
"CVE-2016-2188": { | |
"cmt_msg": "USB: iowarrior: fix NULL-deref at probe", | |
"cmt_id": "179295c38d23874357ca75af104fd6f1fe769cfd" | |
}, | |
"CVE-2017-8924": { | |
"cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", | |
"cmt_id": "72bb2b96b8568a74f28e2a2c39e005583595b2c2" | |
}, | |
"CVE-2017-8925": { | |
"cmt_msg": "USB: serial: omninet: fix reference leaks at open", | |
"cmt_id": "54f11a9662b632defe4d75c7574fddbc5c503c9c" | |
} | |
}, | |
"4.4.59": { | |
"CVE-2017-7184": { | |
"cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", | |
"cmt_id": "cce7e56dd73f75fef0a7f594fb129285a660fec0" | |
}, | |
"CVE-2017-7374": { | |
"cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", | |
"cmt_id": "7a5202190810dde1467718235c1f650fcf57592a" | |
} | |
}, | |
"4.4.60": { | |
"CVE-2017-7187": { | |
"cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", | |
"cmt_id": "a92f411914cad6532e82e4607bc4075a5ffaa366" | |
} | |
}, | |
"4.4.61": { | |
"CVE-2017-7261": { | |
"cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", | |
"cmt_id": "b26629453c7b2a6c82000b36fbd1cfc4d9101808" | |
}, | |
"CVE-2017-7616": { | |
"cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", | |
"cmt_id": "b73d08ce20c5cb2e0cec8c019a27b9574e2c4ec2" | |
}, | |
"CVE-2017-7294": { | |
"cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", | |
"cmt_id": "c21636bd64c511160846bdf87ef4c7ff48680c99" | |
} | |
}, | |
"4.4.62": { | |
"CVE-2017-7308": { | |
"cmt_msg": "net/packet: fix overflow in check for priv area size", | |
"cmt_id": "d35f8fa0b93e61dd95b8f86928a783c4d8a32d3e" | |
} | |
}, | |
"4.4.63": { | |
"CVE-2017-6353": { | |
"cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", | |
"cmt_id": "e2f5fb9207a6bd7101ad94e73264ac8bb9e3b87a" | |
}, | |
"CVE-2017-7618": { | |
"cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", | |
"cmt_id": "2673d1c5122ee2492e24d9a135e230b2d0b2e630" | |
}, | |
"CVE-2017-8064": { | |
"cmt_msg": "dvb-usb-v2: avoid use-after-free", | |
"cmt_id": "0cb03b6e7086e59647cf6eb79fec646cdec69691" | |
}, | |
"CVE-2017-7889": { | |
"cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", | |
"cmt_id": "6739cc12f3dbd7e4b3795f6e809d44ea6b490bb6" | |
}, | |
"CVE-2017-2596": { | |
"cmt_msg": "kvm: fix page struct leak in handle_vmon", | |
"cmt_id": "c1fc1d2f214e33f91565a65ad1b4c09dae618d84" | |
} | |
}, | |
"4.4.64": { | |
"CVE-2017-7472": { | |
"cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", | |
"cmt_id": "c9460fbceb2f3efa1d20050cdbffa51ec025745a" | |
}, | |
"CVE-2016-9604": { | |
"cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", | |
"cmt_id": "b5737b92560efcb956d2def4dcd3f4b6d4118e58" | |
} | |
}, | |
"4.4.65": { | |
"CVE-2016-7913": { | |
"cmt_msg": "xc2028: avoid use after free", | |
"cmt_id": "0d9dac5d7cc31df50757f26bcbdfbcf47277a1b2" | |
}, | |
"CVE-2016-6213": { | |
"cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", | |
"cmt_id": "c50fd34e10897114a7be2120133bd7e0b4184024" | |
}, | |
"CVE-2016-8632": { | |
"cmt_msg": "tipc: check minimum bearer MTU", | |
"cmt_id": "65d30f7545ffdddcf10a59f3e54b032c5ade2e9d" | |
}, | |
"CVE-2017-2671": { | |
"cmt_msg": "ping: implement proper locking", | |
"cmt_id": "b7f47c794bc45eae975bf2a52a4463333111bb2a" | |
}, | |
"CVE-2016-9120": { | |
"cmt_msg": "staging/android/ion : fix a race condition in the ion driver", | |
"cmt_id": "a7544fdd1626b65db635022c9d36007bb32dd6d8" | |
}, | |
"CVE-2016-9084": { | |
"cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", | |
"cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" | |
}, | |
"CVE-2016-7917": { | |
"cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages", | |
"cmt_id": "9540baadb61ba5ed08832bb2a4cbfd876db37ff4" | |
}, | |
"CVE-2016-9083": { | |
"cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", | |
"cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" | |
}, | |
"CVE-2017-6001": { | |
"cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", | |
"cmt_id": "416bd4a366f3b4cd3f6a3246f91bd9f425891547" | |
} | |
}, | |
"4.4.66": { | |
"CVE-2017-0750": { | |
"cmt_msg": "f2fs: do more integrity verification for superblock", | |
"cmt_id": "716bcfeb12b8d55d278af47b927839b382d2837a" | |
}, | |
"CVE-2017-7645": { | |
"cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", | |
"cmt_id": "82a0d8aabe043ac94efa255502754c70363dab0e" | |
} | |
}, | |
"4.4.67": { | |
"CVE-2017-10661": { | |
"cmt_msg": "timerfd: Protect the might cancel mechanism proper", | |
"cmt_id": "911bd54922cdcc259daf73cb1a3a9d0305b9061d" | |
}, | |
"CVE-2017-7895": { | |
"cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", | |
"cmt_id": "da1ce38aaac7f08d319b4b76130aa4fd27c4489f" | |
} | |
}, | |
"4.4.68": { | |
"CVE-2017-10662": { | |
"cmt_msg": "f2fs: sanity check segment count", | |
"cmt_id": "4edbdf57bc26a126aa3cbafd63fae4b00e002e2d" | |
} | |
}, | |
"4.4.70": { | |
"CVE-2017-18360": { | |
"cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", | |
"cmt_id": "1e6e9c4c36f9626d5ad2b63aa7ad5686dde737e7" | |
}, | |
"CVE-2017-7487": { | |
"cmt_msg": "ipx: call ipxitf_put() in ioctl error path", | |
"cmt_id": "8a5b15e198f1701da75a8223cfe72c04bcb15160" | |
}, | |
"CVE-2017-1000363": { | |
"cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", | |
"cmt_id": "cda5c7e625cefed46311cb0b37816fb2ff42a8ee" | |
} | |
}, | |
"4.4.71": { | |
"CVE-2017-9077": { | |
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", | |
"cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" | |
}, | |
"CVE-2017-9076": { | |
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", | |
"cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" | |
}, | |
"CVE-2017-9075": { | |
"cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", | |
"cmt_id": "ffa551def59c9b0e1747955af6a742443ae152fc" | |
}, | |
"CVE-2017-9074": { | |
"cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", | |
"cmt_id": "017fabead5c2aacb36df910bbfbfb1e813517ae3" | |
}, | |
"CVE-2017-18221": { | |
"cmt_msg": "mlock: fix mlock count can not decrease in race condition", | |
"cmt_id": "03489bfc78304a0be057ec827a67c0d87dd97b2e" | |
}, | |
"CVE-2017-8890": { | |
"cmt_msg": "dccp/tcp: do not inherit mc_list from parent", | |
"cmt_id": "5f67a1663c03a73962fb240cf821338f78981a23" | |
}, | |
"CVE-2017-9242": { | |
"cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", | |
"cmt_id": "38f02f2ce0ca58c45d95567a5d64f7dc90aa9c95" | |
} | |
}, | |
"4.4.72": { | |
"CVE-2017-9605": { | |
"cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", | |
"cmt_id": "74276868b45585f77eae2372c95e016aacfd0d3c" | |
}, | |
"CVE-2017-15274": { | |
"cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", | |
"cmt_id": "bc6be3433e694d1ab1d0012b6053ae4e9a3b189e" | |
}, | |
"CVE-2017-7346": { | |
"cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", | |
"cmt_id": "619cc02fd85d69270c95e7db320b305e975aae00" | |
}, | |
"CVE-2017-1000380": { | |
"cmt_msg": "ALSA: timer: Fix race between read and ioctl", | |
"cmt_id": "f5bc918760c8100410847a6a6e4c25f24e358e0c" | |
} | |
}, | |
"4.4.74": { | |
"CVE-2017-1000364": { | |
"cmt_msg": "mm: larger stack guard gap, between vmas", | |
"cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" | |
}, | |
"CVE-2017-1000379": { | |
"cmt_msg": "mm: larger stack guard gap, between vmas", | |
"cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" | |
} | |
}, | |
"4.4.75": { | |
"CVE-2017-1000365": { | |
"cmt_msg": "fs/exec.c: account for argv/envp pointers", | |
"cmt_id": "1d3d0f8b7cf758136ed36b30620442d989601737" | |
}, | |
"CVE-2017-7482": { | |
"cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", | |
"cmt_id": "eab38dfd66d7f13b9eecfae7728ff0d2e49ff16f" | |
} | |
}, | |
"4.4.76": { | |
"CVE-2017-18017": { | |
"cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", | |
"cmt_id": "234e649840d191379cd132d89f4b01a2495cfcc3" | |
} | |
}, | |
"4.4.77": { | |
"CVE-2017-11176": { | |
"cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", | |
"cmt_id": "034e10b4f8348c2c267e491d1e2872023c35f310" | |
}, | |
"CVE-2017-10810": { | |
"cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", | |
"cmt_id": "a080ec466c3412dcf58cff69d6c05d1e670adc0c" | |
}, | |
"CVE-2017-12146": { | |
"cmt_msg": "driver core: platform: fix race condition with driver_override", | |
"cmt_id": "c01ace719ebe6353f0c96e56f6c75c22ad3f67b0" | |
} | |
}, | |
"4.4.78": { | |
"CVE-2019-9457": { | |
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", | |
"cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" | |
}, | |
"CVE-2018-14634": { | |
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", | |
"cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" | |
}, | |
"CVE-2017-11089": { | |
"cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", | |
"cmt_id": "05bf0b6ef9ce7e8967c96fd419ad0ee5d7fe5418" | |
}, | |
"CVE-2017-7541": { | |
"cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", | |
"cmt_id": "4c7021c2fb74047649c03845ce6fd13626a5a418" | |
}, | |
"CVE-2017-1000371": { | |
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", | |
"cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" | |
}, | |
"CVE-2017-1000370": { | |
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", | |
"cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" | |
} | |
}, | |
"4.4.79": { | |
"CVE-2017-11473": { | |
"cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", | |
"cmt_id": "fa7ddee3485f17c28fe4079954c5716036de6152" | |
}, | |
"CVE-2017-18079": { | |
"cmt_msg": "Input: i8042 - fix crash at boot time", | |
"cmt_id": "bba6b69e11777695256619a77f90081ac7f99de7" | |
} | |
}, | |
"4.4.80": { | |
"CVE-2017-7533": { | |
"cmt_msg": "dentry name snapshots", | |
"cmt_id": "407669f2c9fe9f32aeb39f715d748fe456718aac" | |
}, | |
"CVE-2016-10741": { | |
"cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", | |
"cmt_id": "56548b6f505a6df1c43dcb151a18d6190c250ed6" | |
}, | |
"CVE-2017-12762": { | |
"cmt_msg": "isdn/i4l: fix buffer overflow", | |
"cmt_id": "d4b159f14d612132fdb1ade6d5015ee03a263e62" | |
} | |
}, | |
"4.4.81": { | |
"CVE-2017-10663": { | |
"cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", | |
"cmt_id": "76517ed2a7fe059840c1984165984e69cb488568" | |
}, | |
"CVE-2017-8831": { | |
"cmt_msg": "saa7164: fix double fetch PCIe access condition", | |
"cmt_id": "deae9956cfb42f3d480c71f416f934d3ce84c033" | |
}, | |
"CVE-2017-7542": { | |
"cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", | |
"cmt_id": "f09db7559c1faf6f7c2128a92050b978a480681c" | |
} | |
}, | |
"4.4.82": { | |
"CVE-2017-1000": { | |
"cmt_msg": "udp: consistently apply ufo or fragmentation", | |
"cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" | |
}, | |
"CVE-2017-1000112": { | |
"cmt_msg": "udp: consistently apply ufo or fragmentation", | |
"cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" | |
}, | |
"CVE-2017-1000111": { | |
"cmt_msg": "packet: fix tp_reserve race in packet_set_ring", | |
"cmt_id": "63364a508d24944abb0975bd823cb11367c56283" | |
} | |
}, | |
"4.4.84": { | |
"CVE-2017-12134": { | |
"cmt_msg": "xen: fix bio vec merging", | |
"cmt_id": "c0b397fd6b2b8ed7b39a717340b85b4b1add5332" | |
}, | |
"CVE-2017-14140": { | |
"cmt_msg": "Sanitize 'move_pages()' permission checks", | |
"cmt_id": "46d51a26efbc7cbaa2bc1f01628a00a604193856" | |
}, | |
"CVE-2018-10675": { | |
"cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", | |
"cmt_id": "cc971fa12bd2dff6c0432c860d784c6cdaf5a04b" | |
} | |
}, | |
"4.4.87": { | |
"CVE-2017-11600": { | |
"cmt_msg": "xfrm: policy: check policy direction value", | |
"cmt_id": "9b3dcc98d8df16913d260c8dae64ad6e5bfcb953" | |
} | |
}, | |
"4.4.88": { | |
"CVE-2017-14340": { | |
"cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", | |
"cmt_id": "ad3903434142953a03b84ec8719ce80373a62266" | |
}, | |
"CVE-2017-1000251": { | |
"cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", | |
"cmt_id": "f7ec367c8ea7021517c9c04b0022c225d2d0785a" | |
}, | |
"CVE-2017-9985": { | |
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", | |
"cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" | |
}, | |
"CVE-2017-9984": { | |
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", | |
"cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" | |
} | |
}, | |
"4.4.89": { | |
"CVE-2017-14106": { | |
"cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", | |
"cmt_id": "611a98c8eca3098173309642df187056c17e0f65" | |
}, | |
"CVE-2017-14991": { | |
"cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", | |
"cmt_id": "72896ca30a7f6ceb5238714d5761e4ad4521ccc5" | |
}, | |
"CVE-2017-14051": { | |
"cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", | |
"cmt_id": "d8663aa2778965c75b5e75c7948b44f5de601a88" | |
}, | |
"CVE-2017-0627": { | |
"cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", | |
"cmt_id": "4931578fbeb525e717a7aa96f83f4d85cf48d0b2" | |
} | |
}, | |
"4.4.90": { | |
"CVE-2020-14353": { | |
"cmt_msg": "KEYS: prevent creating a different user's keyrings", | |
"cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" | |
}, | |
"CVE-2017-14156": { | |
"cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", | |
"cmt_id": "27323cb81eae618e68e4dea1345090c37dee5485" | |
}, | |
"CVE-2017-12153": { | |
"cmt_msg": "nl80211: check for the required netlink attributes presence", | |
"cmt_id": "9d74367d1a35e87f46e5e0c2e8dd9f5d21f701b0" | |
}, | |
"CVE-2017-1000252": { | |
"cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", | |
"cmt_id": "7520be6a454c28955e711fdb49c81519bc537b39" | |
}, | |
"CVE-2017-12154": { | |
"cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", | |
"cmt_id": "21a638c5efd6ec7a10441bfb94e15e5288920f07" | |
}, | |
"CVE-2017-18270": { | |
"cmt_msg": "KEYS: prevent creating a different user's keyrings", | |
"cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" | |
}, | |
"CVE-2017-14489": { | |
"cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", | |
"cmt_id": "9d2534917c25a58b67864ea1db930670d48dee75" | |
}, | |
"CVE-2017-12192": { | |
"cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", | |
"cmt_id": "638b38505045e1090313ff7ed284911870cd29f8" | |
}, | |
"CVE-2017-15537": { | |
"cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", | |
"cmt_id": "d25fea066a8ed4457a9f8b23eb78204b9b6896cf" | |
} | |
}, | |
"4.4.92": { | |
"CVE-2017-16526": { | |
"cmt_msg": "uwb: properly check kthread_run return value", | |
"cmt_id": "5a21af11c6810b936b17a2c5c69518be0da8f4c3" | |
}, | |
"CVE-2017-16534": { | |
"cmt_msg": "USB: core: harden cdc_parse_cdc_header", | |
"cmt_id": "feab51a916ed07219dee38b898fe22bd2a98193a" | |
}, | |
"CVE-2017-16531": { | |
"cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", | |
"cmt_id": "13713e63bdb306f9a58d359b15edd60f34eac5ee" | |
}, | |
"CVE-2017-16530": { | |
"cmt_msg": "USB: uas: fix bug in handling of alternate settings", | |
"cmt_id": "5d9a9c3dcc1f63215b5a5b877be589974ec4f31d" | |
}, | |
"CVE-2017-16529": { | |
"cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", | |
"cmt_id": "46c7b1fa4911a859a82575e3ffb55b34a89a222d" | |
} | |
}, | |
"4.4.93": { | |
"CVE-2017-0786": { | |
"cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", | |
"cmt_id": "6721969c7b8a35f85a41acaabdad190ed32cf704" | |
}, | |
"CVE-2017-16527": { | |
"cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", | |
"cmt_id": "dc7c3bd09c7d2063c4d1be23d72ee85f1b3bb947" | |
}, | |
"CVE-2017-16525": { | |
"cmt_msg": "USB: serial: console: fix use-after-free after failed setup", | |
"cmt_id": "208563455aac7540755bb9d8e8edaf7c5ef61d8c" | |
}, | |
"CVE-2017-16533": { | |
"cmt_msg": "HID: usbhid: fix out-of-bounds bug", | |
"cmt_id": "2929cb995378205bceda86d6fd3cbc22e522f97f" | |
}, | |
"CVE-2017-15265": { | |
"cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", | |
"cmt_id": "23709ae9b61429502fcd4686e7a97333f3b3544a" | |
}, | |
"CVE-2017-12190": { | |
"cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", | |
"cmt_id": "399c46095eb5d41934c8a99732028a9f1cf0ac50" | |
} | |
}, | |
"4.4.94": { | |
"CVE-2018-9568": { | |
"cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", | |
"cmt_id": "685699703a0a39896ba0af91e6d2a80103fe4966" | |
}, | |
"CVE-2017-15649": { | |
"cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", | |
"cmt_id": "1b6c80e797eeadf643861f8340ed5791d813d80c" | |
} | |
}, | |
"4.4.95": { | |
"CVE-2017-15299": { | |
"cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", | |
"cmt_id": "33dea302f9bc1e2c41392a308cfb50f6c02bb096" | |
}, | |
"CVE-2017-16535": { | |
"cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", | |
"cmt_id": "9dff499d822660c6dbb2a407a7d85be26f87da07" | |
}, | |
"CVE-2017-15951": { | |
"cmt_msg": "KEYS: Fix race between updating and finding a negative key", | |
"cmt_id": "8a004caec12bf241e567e3640401256cc9bc2e45" | |
} | |
}, | |
"4.4.96": { | |
"CVE-2017-16643": { | |
"cmt_msg": "Input: gtco - fix potential out-of-bound access", | |
"cmt_id": "2c99438cf66d585ba939068c8b8562e9104cd5c4" | |
}, | |
"CVE-2017-12193": { | |
"cmt_msg": "assoc_array: Fix a buggy node-splitting case", | |
"cmt_id": "1cbbd99f3bfe27115c05332e7db73e23651b9f8b" | |
} | |
}, | |
"4.4.99": { | |
"CVE-2018-7191": { | |
"cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", | |
"cmt_id": "4b27fe34a226dd9087cb2e93161ffec03952c05a" | |
}, | |
"CVE-2017-13080": { | |
"cmt_msg": "mac80211: accept key reinstall without changing anything", | |
"cmt_id": "6440f0ee8a1779f53526bccb9de00914daeb9094" | |
}, | |
"CVE-2017-16645": { | |
"cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", | |
"cmt_id": "b7c625ce6d279bf3e138c25c0cd3f595923825f3" | |
}, | |
"CVE-2017-16528": { | |
"cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", | |
"cmt_id": "1e98fd54c356bb2bcf827a74949c9372c455409f" | |
}, | |
"CVE-2017-16532": { | |
"cmt_msg": "usb: usbtest: fix NULL pointer dereference", | |
"cmt_id": "de46c1adbea694109036d3e7dee1fa6250b72660" | |
} | |
}, | |
"4.4.100": { | |
"CVE-2017-16537": { | |
"cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", | |
"cmt_id": "c344019c48a92e559b7f910e53e0c6f9018680fb" | |
}, | |
"CVE-2017-9150": { | |
"cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", | |
"cmt_id": "49630dd2e10a3b2fee0cec19feb63f08453b876f" | |
}, | |
"CVE-2017-10911": { | |
"cmt_msg": "xen-blkback: don't leak stack data via response ring", | |
"cmt_id": "11e8e55be18cd39c3d54674362aa18695b243e22" | |
}, | |
"CVE-2017-16646": { | |
"cmt_msg": "media: dib0700: fix invalid dvb_detach argument", | |
"cmt_id": "0a418e57717d2d33275e9340c726ded671be7698" | |
}, | |
"CVE-2017-16650": { | |
"cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", | |
"cmt_id": "e455048c7ae95633c8778a0282d1ee86f78c5349" | |
}, | |
"CVE-2017-7518": { | |
"cmt_msg": "KVM: x86: fix singlestepping over syscall", | |
"cmt_id": "07e3aff243cdcb70d1e81e515aea553df3080f43" | |
}, | |
"CVE-2017-16649": { | |
"cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", | |
"cmt_id": "caeeef8438c30e7d0e43293fcb7beb9f953bb2a9" | |
}, | |
"CVE-2017-15115": { | |
"cmt_msg": "sctp: do not peel off an assoc from one netns to another one", | |
"cmt_id": "46bdabbca02ebabd292d0ea3f610aa54e53f0e25" | |
} | |
}, | |
"4.4.101": { | |
"CVE-2017-18204": { | |
"cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", | |
"cmt_id": "c4baa4a5870cb02f713def1620052bfca7a82bbb" | |
}, | |
"CVE-2017-16994": { | |
"cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", | |
"cmt_id": "a3805b10de80953db316985f567453fc18329423" | |
} | |
}, | |
"4.4.103": { | |
"CVE-2017-18203": { | |
"cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", | |
"cmt_id": "4e82464aa4a398207e2ecbc4877c82319ecdbafa" | |
}, | |
"CVE-2017-16536": { | |
"cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", | |
"cmt_id": "0870fb4c3566088dc222e582e43edbc9ececbce4" | |
} | |
}, | |
"4.4.104": { | |
"CVE-2017-16939": { | |
"cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", | |
"cmt_id": "b377c453b3631531679cbe594b7d28c5ecd82cea" | |
}, | |
"CVE-2017-18208": { | |
"cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", | |
"cmt_id": "0d05a5593f6309cb0df0df474a807a3220855703" | |
} | |
}, | |
"4.4.106": { | |
"CVE-2017-0861": { | |
"cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", | |
"cmt_id": "659e7d2588f0fd970044fe00d9edeb482d375288" | |
}, | |
"CVE-2018-7492": { | |
"cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", | |
"cmt_id": "6c154d536d9457bee261d057559e43d3f8ae5fd5" | |
}, | |
"CVE-2017-1000407": { | |
"cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", | |
"cmt_id": "477b837533a2f592702d2affab36b8052691287b" | |
}, | |
"CVE-2018-18559": { | |
"cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", | |
"cmt_id": "b90f87c641bc9af04f0d8a21008880ae032de72c" | |
} | |
}, | |
"4.4.107": { | |
"CVE-2017-17558": { | |
"cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", | |
"cmt_id": "dfdf5fa3e6647c0fc02be8d857b6b8b7098946ff" | |
}, | |
"CVE-2017-17806": { | |
"cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", | |
"cmt_id": "43cd7f38612df31fbd929588c065cfbc42102aab" | |
}, | |
"CVE-2017-17805": { | |
"cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", | |
"cmt_id": "8a311b0462b59d12cb14e82e626d3612d988135b" | |
}, | |
"CVE-2017-17807": { | |
"cmt_msg": "KEYS: add missing permission check for request_key() destination", | |
"cmt_id": "13e86efb2eee6bd1f2d0aae5b0273e8e65683c9d" | |
}, | |
"CVE-2017-16914": { | |
"cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", | |
"cmt_id": "2862cfca39894ac265fbb5cde9a3ff90c02201f3" | |
} | |
}, | |
"4.4.109": { | |
"CVE-2017-17712": { | |
"cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", | |
"cmt_id": "be27b620a861dc2a143b78e81e23f5622d9105da" | |
}, | |
"CVE-2017-18595": { | |
"cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", | |
"cmt_id": "c2a62f84d49ff71cd7ffbe898c706ccc39955218" | |
}, | |
"CVE-2017-15129": { | |
"cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", | |
"cmt_id": "5854ca90c6c6c2ed65355eded45615bf8bcd6fd3" | |
}, | |
"CVE-2018-18386": { | |
"cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", | |
"cmt_id": "2e3883922530aa25ecc23cc27bab1d3fda779f5a" | |
}, | |
"CVE-2017-17449": { | |
"cmt_msg": "netlink: Add netns check on taps", | |
"cmt_id": "f778ce6faa0d4c8d7a90b7bd11c3db7fb687c8cc" | |
} | |
}, | |
"4.4.111": { | |
"CVE-2017-18075": { | |
"cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", | |
"cmt_id": "3ad85176e78d6671ede52eed588c3588d087b587" | |
} | |
}, | |
"4.4.112": { | |
"CVE-2017-13216": { | |
"cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", | |
"cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392" | |
}, | |
"CVE-2017-17741": { | |
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", | |
"cmt_id": "eb91461daa77eb0ddb4c24aa427051f3669ba1f3" | |
}, | |
"CVE-2018-5333": { | |
"cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", | |
"cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b" | |
}, | |
"CVE-2017-1000410": { | |
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", | |
"cmt_id": "0ae86454c435e554d01c51535c3cd4312577cc74" | |
}, | |
"CVE-2018-5332": { | |
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", | |
"cmt_id": "10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c" | |
} | |
}, | |
"4.4.113": { | |
"CVE-2018-6927": { | |
"cmt_msg": "futex: Prevent overflow by strengthen input validation", | |
"cmt_id": "58c82be944f58561e77eb9db5039a4b0eca96ac5" | |
} | |
}, | |
"4.4.114": { | |
"CVE-2017-16913": { | |
"cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", | |
"cmt_id": "b6f826ba10dce86f74efd3c0953cb9982a3c51e2" | |
}, | |
"CVE-2017-16912": { | |
"cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", | |
"cmt_id": "80e733a9b37fb6b40351bf1924d5a90d89c375ae" | |
}, | |
"CVE-2017-16911": { | |
"cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", | |
"cmt_id": "28f467e0bdda754aa36390fd90b01823f0d3b18d" | |
}, | |
"CVE-2017-11472": { | |
"cmt_msg": "ACPICA: Namespace: fix operand cache leak", | |
"cmt_id": "4c19b00e5588828f0d3198b926efade766dcf2c8" | |
}, | |
"CVE-2018-1000028": { | |
"cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", | |
"cmt_id": "3f84339bd344b2cf0afe64b78d3964bb6422d0f3" | |
}, | |
"CVE-2017-17448": { | |
"cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", | |
"cmt_id": "a359a437fbc6bb08aa9cc8e25ef4ac3b77ca727b" | |
}, | |
"CVE-2017-17450": { | |
"cmt_msg": "netfilter: xt_osf: Add missing permission checks", | |
"cmt_id": "d01ceb4722cd8d64176272434fe332b596750d9c" | |
} | |
}, | |
"4.4.115": { | |
"CVE-2018-5344": { | |
"cmt_msg": "loop: fix concurrent lo_open/lo_release", | |
"cmt_id": "b392225467b8066538dfa200dc925c844b76880b" | |
}, | |
"CVE-2018-1000004": { | |
"cmt_msg": "ALSA: seq: Make ioctls race-free", | |
"cmt_id": "623e5c8ae32b39cc8baea83478695dc624935318" | |
}, | |
"CVE-2017-17862": { | |
"cmt_msg": "bpf: fix branch pruning logic", | |
"cmt_id": "1367d854b97493bfb1f3d24cf89ba60cb7f059ea" | |
} | |
}, | |
"4.4.116": { | |
"CVE-2018-5873": { | |
"cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", | |
"cmt_id": "49ffe04fcdf29c8925344bce314d9398b2d7743d" | |
}, | |
"CVE-2017-8824": { | |
"cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", | |
"cmt_id": "3196c1515ea683bb6f95673feb2998f605ab581d" | |
}, | |
"CVE-2017-16538": { | |
"cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", | |
"cmt_id": "ca48c81cff0e5b56e525414b75990bcb64b7cbb9" | |
}, | |
"CVE-2018-5750": { | |
"cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", | |
"cmt_id": "591060a7a0a09cbaa5b6c04bd309966586aa9d2e" | |
}, | |
"CVE-2017-13305": { | |
"cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", | |
"cmt_id": "33813d43dd593e1c32c567c75483233212b825ae" | |
}, | |
"CVE-2017-18344": { | |
"cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", | |
"cmt_id": "77f56f5d39e95a152a755d53b0d870b92fbf466b" | |
} | |
}, | |
"4.4.117": { | |
"CVE-2018-7566": { | |
"cmt_msg": "ALSA: seq: Fix racy pool initializations", | |
"cmt_id": "b374197df2deb08fec55d48763711ea1df8efde7" | |
} | |
}, | |
"4.4.120": { | |
"CVE-2017-18193": { | |
"cmt_msg": "f2fs: fix a bug caused by NULL extent tree", | |
"cmt_id": "023ca5b884d2759b56dc8d480942835881853513" | |
} | |
}, | |
"4.4.121": { | |
"CVE-2018-5803": { | |
"cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", | |
"cmt_id": "54b183ea4fe96c7b80439971ee04cf634a6e0459" | |
} | |
}, | |
"4.4.122": { | |
"CVE-2018-1068": { | |
"cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", | |
"cmt_id": "6d31b2ef34fd718386a73c983877461bca58d3db" | |
}, | |
"CVE-2018-7995": { | |
"cmt_msg": "x86/MCE: Serialize sysfs changes", | |
"cmt_id": "e882c0baab3325c409d21edc24254c515d90d160" | |
}, | |
"CVE-2018-1065": { | |
"cmt_msg": "netfilter: add back stackpointer size checks", | |
"cmt_id": "48db3004d40d97d3ac205d2d64ab580a8cfcfe63" | |
}, | |
"CVE-2019-9456": { | |
"cmt_msg": "usb: usbmon: Read text within supplied buffer size", | |
"cmt_id": "abe0ecd5597c31c6b70dc347145789000f4cf68f" | |
} | |
}, | |
"4.4.123": { | |
"CVE-2018-7480": { | |
"cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", | |
"cmt_id": "633a5a5235d697b145171ca1e702d3a4f6778131" | |
}, | |
"CVE-2017-16995": { | |
"cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", | |
"cmt_id": "a6132276ab5dcc38b3299082efeb25b948263adb" | |
} | |
}, | |
"4.4.124": { | |
"CVE-2017-18222": { | |
"cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", | |
"cmt_id": "7d7100094cd83e84ce53c51155ee9f507e2e9028" | |
}, | |
"CVE-2018-1066": { | |
"cmt_msg": "CIFS: Enable encryption during session setup phase", | |
"cmt_id": "26dc7476efad2151aadb7f72c0c8a253823ef289" | |
} | |
}, | |
"4.4.125": { | |
"CVE-2018-8822": { | |
"cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", | |
"cmt_id": "badf74b65fc27112f5fee871c7ade9199c74b2e1" | |
}, | |
"CVE-2018-8781": { | |
"cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", | |
"cmt_id": "224eaa8a8e644e0d3df35fe232b08fd8fead8864" | |
}, | |
"CVE-2018-1087": { | |
"cmt_msg": "kvm/x86: fix icebp instruction handling", | |
"cmt_id": "5e4e65a940c91b61bfaf8d6e4448522577beb5ef" | |
}, | |
"CVE-2018-8897": { | |
"cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", | |
"cmt_id": "c6fe55e30bb6d431ee56cd4bbb582e30766c5e0e" | |
} | |
}, | |
"4.4.126": { | |
"CVE-2018-1130": { | |
"cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", | |
"cmt_id": "de31c391673aeb2c1d09552ac75a6b7ee96d65ac" | |
} | |
}, | |
"4.4.127": { | |
"CVE-2018-1000199": { | |
"cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", | |
"cmt_id": "d60017da67463bd7a11a7f7e08115be324afe216" | |
}, | |
"CVE-2017-17975": { | |
"cmt_msg": "media: usbtv: prevent double free in error case", | |
"cmt_id": "607a6b7b6a7ad995c4c9cf3c2df66dc3f4febb52" | |
} | |
}, | |
"4.4.128": { | |
"CVE-2018-9422": { | |
"cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", | |
"cmt_id": "93dcb09e29bb24a86aa7b7eff65e424f7dc98af2" | |
}, | |
"CVE-2018-7757": { | |
"cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", | |
"cmt_id": "92b72d2f84389e27d81c93beaf9093f8cf1ef449" | |
} | |
}, | |
"4.4.129": { | |
"CVE-2018-1092": { | |
"cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", | |
"cmt_id": "990251318b97ed7153d9adbf633035536c7d685b" | |
} | |
}, | |
"4.4.130": { | |
"CVE-2018-10940": { | |
"cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", | |
"cmt_id": "e47611257d7b46bfdc70726a8a236881180cf990" | |
} | |
}, | |
"4.4.131": { | |
"CVE-2018-9415": { | |
"cmt_msg": "ARM: amba: Fix race condition with driver_override", | |
"cmt_id": "7488404d3bab4eccb590c80c8827520394444630" | |
}, | |
"CVE-2018-9385": { | |
"cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", | |
"cmt_id": "30a80ca6dbbda67b0c902448993ed6a35b52612a" | |
}, | |
"CVE-2018-1093": { | |
"cmt_msg": "ext4: add validity checks for bitmap block numbers", | |
"cmt_id": "ea057aed06d8f13d931652bc4faa604ac0c50aa2" | |
} | |
}, | |
"4.4.132": { | |
"CVE-2017-18257": { | |
"cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", | |
"cmt_id": "0678adf8f8a99c66c48c608ea9a79588743bc615" | |
}, | |
"CVE-2017-18255": { | |
"cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", | |
"cmt_id": "609124d60341bf8870318c201cec50548824f2e2" | |
} | |
}, | |
"4.4.133": { | |
"CVE-2018-5814": { | |
"cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", | |
"cmt_id": "02995a5882371a9fca3033fd356598a805d46040" | |
}, | |
"CVE-2018-10087": { | |
"cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", | |
"cmt_id": "ea00b22b02f228cb58ee6c6707c86ec270e37fba" | |
}, | |
"CVE-2018-10021": { | |
"cmt_msg": "scsi: libsas: defer ata device eh commands to libata", | |
"cmt_id": "6efcc74e1b0c16aebf5d8107543ce63475af35c1" | |
}, | |
"CVE-2018-1000204": { | |
"cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", | |
"cmt_id": "93314640426ddb6af618d0802e622f6fa771792c" | |
} | |
}, | |
"4.4.134": { | |
"CVE-2018-10124": { | |
"cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", | |
"cmt_id": "cb1c92e55420dad73ce717ef4029dd6e984dcbd0" | |
}, | |
"CVE-2018-9518": { | |
"cmt_msg": "NFC: llcp: Limit size of SDP URI", | |
"cmt_id": "50e54d56744cda70a1c3bc980c56e461ecde3a6d" | |
}, | |
"CVE-2017-13695": { | |
"cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", | |
"cmt_id": "dfcb739c20d88461fbd0dc007670f63ad82db881" | |
}, | |
"CVE-2018-6412": { | |
"cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", | |
"cmt_id": "bfffc2c3f56b462cdf5eeea639d898a69b323001" | |
} | |
}, | |
"4.4.137": { | |
"CVE-2019-18675": { | |
"cmt_msg": "mmap: introduce sane default mmap limits", | |
"cmt_id": "bd2f9ce5bacb15ad54fc6c345480c4df0c76c3ee" | |
} | |
}, | |
"4.4.139": { | |
"CVE-2018-13406": { | |
"cmt_msg": "video: uvesafb: Fix integer overflow in allocation", | |
"cmt_id": "842803e4a66bd2a0b663dae18b80535a575d427f" | |
} | |
}, | |
"4.4.140": { | |
"CVE-2018-10878": { | |
"cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", | |
"cmt_id": "afa9c75025bd1e24ccdc56fa331e865b626769e6" | |
}, | |
"CVE-2018-9516": { | |
"cmt_msg": "HID: debug: check length before copy_to_user()", | |
"cmt_id": "ef111ea31575bdc50c0c914fe036a1d0ad0cae4e" | |
}, | |
"CVE-2017-13168": { | |
"cmt_msg": "scsi: sg: mitigate read/write abuse", | |
"cmt_id": "9a737329c7c4a341009b7398164db8fa8e5358f0" | |
}, | |
"CVE-2018-10877": { | |
"cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", | |
"cmt_id": "353ebd3e98869b50ed47364d05acdf679c2c05c6" | |
}, | |
"CVE-2018-10876": { | |
"cmt_msg": "ext4: only look at the bg_flags field if it is valid", | |
"cmt_id": "db3b00e3f392e9f879f7fd202437e68f90f35765" | |
}, | |
"CVE-2018-10879": { | |
"cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", | |
"cmt_id": "b7d29dc8fe8d23243d3d87109099bdc34a684712" | |
}, | |
"CVE-2018-10881": { | |
"cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", | |
"cmt_id": "b88fc699a023e0ef86f647c3d48a17d7cfff1f2a" | |
}, | |
"CVE-2018-10882": { | |
"cmt_msg": "ext4: add more inode number paranoia checks", | |
"cmt_id": "ff6c96461be35381399466ad58f02b8d78ab480a" | |
}, | |
"CVE-2018-10883": { | |
"cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", | |
"cmt_id": "2cd33a53177ce739fe5f68052b2a737f1c40b425" | |
} | |
}, | |
"4.4.141": { | |
"CVE-2018-13405": { | |
"cmt_msg": "Fix up non-directory creation in SGID directories", | |
"cmt_id": "e71dbad7563db674f91af9e12ef592c107d0c2cd" | |
}, | |
"CVE-2018-16276": { | |
"cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", | |
"cmt_id": "2638a67a0c50a97e0564491325c24c2c12083dbb" | |
} | |
}, | |
"4.4.143": { | |
"CVE-2017-18216": { | |
"cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", | |
"cmt_id": "b9e22bd82856a794986d75bb3bb585b8bfbf4d99" | |
} | |
}, | |
"4.4.144": { | |
"CVE-2017-5754": { | |
"cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", | |
"cmt_id": "7169b43e7c68edd550efa812c295685947ffa8a0" | |
}, | |
"CVE-2018-3639": { | |
"cmt_msg": "x86/nospec: Simplify alternative_msr_write()", | |
"cmt_id": "b2dab2dc776cea8e1f190523456b32b850506ce3" | |
}, | |
"CVE-2018-10902": { | |
"cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", | |
"cmt_id": "01b6ca65e10f2669965fbc62440cb9b09a25d086" | |
} | |
}, | |
"4.4.146": { | |
"CVE-2018-14734": { | |
"cmt_msg": "infiniband: fix a possible use-after-free bug", | |
"cmt_id": "52175c849bd4c01dd14038b4401d5044d99a6b0a" | |
} | |
}, | |
"4.4.147": { | |
"CVE-2018-12233": { | |
"cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", | |
"cmt_id": "0749d5b3ec62310b747751ea7d4d5ccca51bc80f" | |
} | |
}, | |
"4.4.148": { | |
"CVE-2018-15572": { | |
"cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", | |
"cmt_id": "7744abbe29a59db367f59b0c9890356732f25a3b" | |
} | |
}, | |
"4.4.149": { | |
"CVE-2018-9363": { | |
"cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", | |
"cmt_id": "17c1e0b1f6a161cc4f533d4869ff574273dbfe8d" | |
} | |
}, | |
"4.4.152": { | |
"CVE-2018-3693": { | |
"cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", | |
"cmt_id": "a89f83823b97b6da1ecf7a51184b28822e78cc07" | |
} | |
}, | |
"4.4.154": { | |
"CVE-2018-10938": { | |
"cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", | |
"cmt_id": "8ed0ff83f5fd0ca412a52bd71af332598c01ca46" | |
}, | |
"CVE-2018-16658": { | |
"cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", | |
"cmt_id": "eb08a285899df82056f712421988c6ccd0b58ba6" | |
} | |
}, | |
"4.4.155": { | |
"CVE-2019-12881": { | |
"cmt_msg": "drm/i915/userptr: reject zero user_size", | |
"cmt_id": "182e963432d867384f2e55487ec60ca7a9f99cd1" | |
} | |
}, | |
"4.4.156": { | |
"CVE-2018-6554": { | |
"cmt_msg": "staging: irda: remove the irda network stack and drivers", | |
"cmt_id": "4a7811bb3ae10d76d9e76c2b0ce7b27bc02a9370" | |
}, | |
"CVE-2018-6555": { | |
"cmt_msg": "staging: irda: remove the irda network stack and drivers", | |
"cmt_id": "131a3b82c853483b1809cad06f8997421dd49500" | |
}, | |
"CVE-2018-14617": { | |
"cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", | |
"cmt_id": "fed5bd3352a3fbf9494449ffee3b4bab5e8cc3a6" | |
}, | |
"CVE-2018-14609": { | |
"cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", | |
"cmt_id": "510825b3f8c1f5dc29b81660e1eb68e7fb0b8d50" | |
} | |
}, | |
"4.4.157": { | |
"CVE-2018-17182": { | |
"cmt_msg": "mm: get rid of vmacache_flush_all() entirely", | |
"cmt_id": "88d6918401a4ecdc50fe77df3e1e77c1e49d8579" | |
} | |
}, | |
"4.4.159": { | |
"CVE-2018-20511": { | |
"cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", | |
"cmt_id": "fee0d234419708192925c9e25a461f1f43dab24f" | |
}, | |
"CVE-2018-14633": { | |
"cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", | |
"cmt_id": "afba6121b3b7e1737b7e7dafbf6b7eafbcdc659c" | |
} | |
}, | |
"4.4.160": { | |
"CVE-2018-17972": { | |
"cmt_msg": "proc: restrict kernel stack dumps to root", | |
"cmt_id": "574757073482f77ec10caea5e57726190a2837fa" | |
}, | |
"CVE-2019-9458": { | |
"cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", | |
"cmt_id": "bbbc4dabca5d51c608b0fd608eb3cd8659266653" | |
}, | |
"CVE-2018-7755": { | |
"cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", | |
"cmt_id": "ef0a9f76fda4a7ffce6ceee5abdd554a719e8bd8" | |
}, | |
"CVE-2018-13053": { | |
"cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", | |
"cmt_id": "2e17841715313cab2464b3b6360a289a1cb2744b" | |
}, | |
"CVE-2018-18021": { | |
"cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", | |
"cmt_id": "14a65511bc7c1eec560764fe53018b0765fb8d2d" | |
}, | |
"CVE-2018-10880": { | |
"cmt_msg": "ext4: never move the system.data xattr out of the inode body", | |
"cmt_id": "cd3d6463759d21f4093d3434effacc358dd0caf8" | |
} | |
}, | |
"4.4.163": { | |
"CVE-2018-18281": { | |
"cmt_msg": "mremap: properly flush TLB before releasing the page", | |
"cmt_id": "2e3ae534fb98c7a6a5cf3e80a190181154328f80" | |
} | |
}, | |
"4.4.164": { | |
"CVE-2018-18710": { | |
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", | |
"cmt_id": "661aa0b46dfb23700b569ac319b95e0b0154832f" | |
} | |
}, | |
"4.4.167": { | |
"CVE-2019-2024": { | |
"cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", | |
"cmt_id": "4de120cba4ed4ef009edb2b17b2fa21b679b00b2" | |
}, | |
"CVE-2018-19824": { | |
"cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", | |
"cmt_id": "82fa3e95432f95254fd07556c55b1018145e1439" | |
}, | |
"CVE-2018-16862": { | |
"cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", | |
"cmt_id": "78b572c9e3a1b7edf46da17ad96a86110dd65fe8" | |
}, | |
"CVE-2018-20169": { | |
"cmt_msg": "USB: check usb_get_extra_descriptor for proper size", | |
"cmt_id": "c380600bf71c35dc23aa0c3628a1013ec10cb349" | |
} | |
}, | |
"4.4.168": { | |
"CVE-2018-1120": { | |
"cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", | |
"cmt_id": "adc143b97d06a3305707726e69b4247db050cb88" | |
}, | |
"CVE-2018-5953": { | |
"cmt_msg": "printk: hash addresses printed with %p", | |
"cmt_id": "c873dfa0ccbdb08e9fb42f497503e148f79cdebb" | |
}, | |
"CVE-2018-5848": { | |
"cmt_msg": "wil6210: missing length check in wmi_set_ie", | |
"cmt_id": "e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a" | |
}, | |
"CVE-2018-12896": { | |
"cmt_msg": "posix-timers: Sanitize overrun handling", | |
"cmt_id": "954648ebf8e27fcbf23b7954b79a22a5cacc83b1" | |
} | |
}, | |
"4.4.169": { | |
"CVE-2017-18241": { | |
"cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", | |
"cmt_id": "0fd7726d69afb0b61817f8d51e80f385cbfb2b10" | |
} | |
}, | |
"4.4.170": { | |
"CVE-2019-15927": { | |
"cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", | |
"cmt_id": "a5e09a908ea3c64bf522822b7923d2d8fc1a7af2" | |
}, | |
"CVE-2019-6133": { | |
"cmt_msg": "fork: record start_time late", | |
"cmt_id": "d447cf0ceefa01ee9203145d011eedca6e1194e6" | |
}, | |
"CVE-2018-19985": { | |
"cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", | |
"cmt_id": "8846b1dbfd2146b145d73ba31a4caa4a4789aefb" | |
} | |
}, | |
"4.4.171": { | |
"CVE-2018-16884": { | |
"cmt_msg": "sunrpc: use-after-free in svc_process_common()", | |
"cmt_id": "9615b6aeccbfb233fd672107aa6885bf039c3de3" | |
}, | |
"CVE-2018-14611": { | |
"cmt_msg": "btrfs: validate type when reading a chunk", | |
"cmt_id": "50962a7b4877f26d1f3f49cd77ad1814a9e81bac" | |
}, | |
"CVE-2018-14610": { | |
"cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", | |
"cmt_id": "ee5e37a26791f9c842b3298e594c6e3c93bb1355" | |
}, | |
"CVE-2018-14613": { | |
"cmt_msg": "btrfs: tree-checker: Verify block_group_item", | |
"cmt_id": "ae94efaf2b609e811bce6280d5c88cf557cd1238" | |
}, | |
"CVE-2018-14612": { | |
"cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", | |
"cmt_id": "42d263820480ab1f7eba54590f2c7283b3428723" | |
} | |
}, | |
"4.4.172": { | |
"CVE-2018-14616": { | |
"cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", | |
"cmt_id": "4901e126b6e1677c90d3c0a668193e52ecdd4971" | |
}, | |
"CVE-2018-13096": { | |
"cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", | |
"cmt_id": "cbe5e5cd70c0f6fd187114e7f146f29830fedf9c" | |
}, | |
"CVE-2018-13097": { | |
"cmt_msg": "f2fs: fix to do sanity check with user_block_count", | |
"cmt_id": "b31ccde086671b372957e1fe1c60968e6d7464d7" | |
}, | |
"CVE-2018-14614": { | |
"cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", | |
"cmt_id": "98beb84af7212a2ba50370497e569ae3f61b1c8b" | |
}, | |
"CVE-2018-13099": { | |
"cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", | |
"cmt_id": "3bfe2049c222b23342ff2a216cd5a869e8a14897" | |
}, | |
"CVE-2018-13100": { | |
"cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", | |
"cmt_id": "056120a8c192871c558e742f83ae18bf8721d97c" | |
}, | |
"CVE-2019-3701": { | |
"cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", | |
"cmt_id": "693ae291197429f404e7d9c191e1541f61925278" | |
}, | |
"CVE-2018-18690": { | |
"cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", | |
"cmt_id": "f00ebf4f84ed2e9344743d86e274ff77269df02a" | |
}, | |
"CVE-2017-18249": { | |
"cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", | |
"cmt_id": "a4f4f97573bfb057bbc30696d803cc37ed629d02" | |
}, | |
"CVE-2020-10769": { | |
"cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", | |
"cmt_id": "461652efc1545a1a074bf0df826dcd3bce520db4" | |
} | |
}, | |
"4.4.174": { | |
"CVE-2018-5391": { | |
"cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", | |
"cmt_id": "ef0f963de1d2c5bc99d3d6ace3dd44a7d6002717" | |
} | |
}, | |
"4.4.175": { | |
"CVE-2019-7222": { | |
"cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", | |
"cmt_id": "1b5fd913a4eb07cb13e969bb8e3b1633a40e683f" | |
}, | |
"CVE-2019-7221": { | |
"cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", | |
"cmt_id": "9872ddae1949b46d5310e0e71ca26bb5c4e52a70" | |
} | |
}, | |
"4.4.176": { | |
"CVE-2019-6974": { | |
"cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", | |
"cmt_id": "bc4db52485cc6edfd6861417d178bb71f743ced7" | |
} | |
}, | |
"4.4.177": { | |
"CVE-2019-16995": { | |
"cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", | |
"cmt_id": "453e3b319d28f2023d45073e6eb30c5efa2fd06b" | |
}, | |
"CVE-2019-9455": { | |
"cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", | |
"cmt_id": "7b5115689bf9dafc5127b28ace4589f698d4adfa" | |
}, | |
"CVE-2019-2101": { | |
"cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", | |
"cmt_id": "bba078c9fc3c7e44370f870d97c5eed64f6c5d1f" | |
}, | |
"CVE-2019-16413": { | |
"cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", | |
"cmt_id": "f289ac1f6eb2d024793732ddb629595ab85674b7" | |
}, | |
"CVE-2019-12818": { | |
"cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", | |
"cmt_id": "6e7339d5ee302fcbfe8ef29c058cc85c360849b9" | |
}, | |
"CVE-2019-12819": { | |
"cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", | |
"cmt_id": "a1b4ace43842791d908a8837304031e439c2ea39" | |
}, | |
"CVE-2019-15916": { | |
"cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", | |
"cmt_id": "d28a029290fd80e9fb40850eb6eb2b7281f1f007" | |
}, | |
"CVE-2019-9213": { | |
"cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", | |
"cmt_id": "40952b6a649b9bfad11ae4fa2862fa0108c9ec24" | |
} | |
}, | |
"4.4.178": { | |
"CVE-2019-3459": { | |
"cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", | |
"cmt_id": "ade4560e4fea198866e033fe1c02f063d6d7db2e" | |
}, | |
"CVE-2019-20054": { | |
"cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", | |
"cmt_id": "6271fa6fc366827c0249864157e8fd18c4eac68a" | |
}, | |
"CVE-2019-3460": { | |
"cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", | |
"cmt_id": "d22036003893cbe479404e20fdae10addc6c18dd" | |
} | |
}, | |
"4.4.179": { | |
"CVE-2019-9454": { | |
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", | |
"cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" | |
}, | |
"CVE-2019-11486": { | |
"cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", | |
"cmt_id": "c3e76f072adbcc426fbeef5d7469f847a2f700d6" | |
}, | |
"CVE-2019-15214": { | |
"cmt_msg": "ALSA: core: Fix card races between register and disconnect", | |
"cmt_id": "f94135f92d97d85444691bcc4f79784d995a5458" | |
}, | |
"CVE-2017-18551": { | |
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", | |
"cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" | |
}, | |
"CVE-2019-15292": { | |
"cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", | |
"cmt_id": "d49a75f5add4543eb138fb0a8fe0560fb276352e" | |
}, | |
"CVE-2019-11190": { | |
"cmt_msg": "binfmt_elf: switch to new creds when switching to new mm", | |
"cmt_id": "1eb40df35d99f353e7bdfcbb21f249428ec0f4b6" | |
}, | |
"CVE-2019-11810": { | |
"cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", | |
"cmt_id": "09a6db51dcb41990fe020e45af8b2e44010fc1e7" | |
}, | |
"CVE-2019-11815": { | |
"cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", | |
"cmt_id": "c4e97b06cfdc5213494c22dd5c2b41ff8b15e0ee" | |
}, | |
"CVE-2019-10639": { | |
"cmt_msg": "netns: provide pure entropy for net_hash_mix()", | |
"cmt_id": "0ede14314f6d9e6a172eb4c4b6b9fe5477aa70bc" | |
} | |
}, | |
"4.4.180": { | |
"CVE-2018-20836": { | |
"cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", | |
"cmt_id": "fe3f6511c9af47847e3547c1525de290a3d908eb" | |
}, | |
"CVE-2019-3882": { | |
"cmt_msg": "vfio/type1: Limit DMA mappings per container", | |
"cmt_id": "e1a5cdbf7cb32a168d37a4804379b9b70d31b39b" | |
}, | |
"CVE-2019-11884": { | |
"cmt_msg": "Bluetooth: hidp: fix buffer overflow", | |
"cmt_id": "dd150bcc93ffaa80ca67d5a71d7850fffe5eb549" | |
}, | |
"CVE-2019-10142": { | |
"cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", | |
"cmt_id": "9db489ed49711d1575f631b68aaa911d3b6198f9" | |
}, | |
"CVE-2019-15216": { | |
"cmt_msg": "USB: yurex: Fix protection fault after device removal", | |
"cmt_id": "438b075fc77d63472892df735fe2a27d3f23dcbf" | |
} | |
}, | |
"4.4.181": { | |
"CVE-2020-10720": { | |
"cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", | |
"cmt_id": "4f9c73aa293051359ef1f2f6d816895ab50c9f3e" | |
}, | |
"CVE-2018-20510": { | |
"cmt_msg": "binder: replace \"%p\" with \"%pK\"", | |
"cmt_id": "c53c1a821d62eb8476425ebe79c0c0054ab45315" | |
}, | |
"CVE-2019-15219": { | |
"cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", | |
"cmt_id": "30e66d7d2fb978f7b59fbf6106bdc1092acbb7ef" | |
}, | |
"CVE-2019-15218": { | |
"cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", | |
"cmt_id": "b1782be70e1e281216f58ba283a0e55ad6364aaf" | |
}, | |
"CVE-2019-15666": { | |
"cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", | |
"cmt_id": "86040d722b29976dfef0ef2b68eab832c358d04b" | |
}, | |
"CVE-2019-15212": { | |
"cmt_msg": "USB: rio500: refuse more than one device at a time", | |
"cmt_id": "b92be99a0c8b2c1c66fe37f1fb21ef069c7732f1" | |
}, | |
"CVE-2019-9466": { | |
"cmt_msg": "brcmfmac: add subtype check for event handling in data path", | |
"cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" | |
}, | |
"CVE-2019-11833": { | |
"cmt_msg": "ext4: zero out the unused memory region in the extent tree block", | |
"cmt_id": "98529ecd313bbeff006930056dad26529510054f" | |
}, | |
"CVE-2019-9503": { | |
"cmt_msg": "brcmfmac: add subtype check for event handling in data path", | |
"cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" | |
}, | |
"CVE-2018-1000026": { | |
"cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", | |
"cmt_id": "c55a2cffa5caaf72db415558f8058f995578a773" | |
}, | |
"CVE-2019-19966": { | |
"cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", | |
"cmt_id": "a04e71a0dbc62083bd31ae4d252d2c07a0035e4a" | |
} | |
}, | |
"4.4.182": { | |
"CVE-2019-11479": { | |
"cmt_msg": "tcp: add tcp_min_snd_mss sysctl", | |
"cmt_id": "e757d052f3b8ce739d068a1e890643376c16b7a9" | |
}, | |
"CVE-2019-11478": { | |
"cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", | |
"cmt_id": "ad472d3a9483abc155e1644ad740cd8c039b5170" | |
}, | |
"CVE-2019-11477": { | |
"cmt_msg": "tcp: limit payload size of sacked skbs", | |
"cmt_id": "4657ee0fe05e15ab572b157f13a82e080d4b7d73" | |
} | |
}, | |
"4.4.183": { | |
"CVE-2019-11599": { | |
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", | |
"cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" | |
}, | |
"CVE-2019-3892": { | |
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", | |
"cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" | |
}, | |
"CVE-2019-15807": { | |
"cmt_msg": "scsi: libsas: delete sas port if expander discover failed", | |
"cmt_id": "39c7c903c63db10c99b1083ea9a688f63fb2c4a7" | |
} | |
}, | |
"4.4.185": { | |
"CVE-2019-13272": { | |
"cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", | |
"cmt_id": "54562d2b0be5c120b01c8bb94baef1aca37fd329" | |
}, | |
"CVE-2018-16597": { | |
"cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes", | |
"cmt_id": "b24be4acd17a8963a29b2a92e1d80b9ddf759c95" | |
}, | |
"CVE-2019-0136": { | |
"cmt_msg": "mac80211: drop robust management frames from unknown TA", | |
"cmt_id": "c7c680979b503a1bb64ee26ffa34207f886090ab" | |
}, | |
"CVE-2019-9506": { | |
"cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", | |
"cmt_id": "993699d9de09097e2bfd49100b8904774e5304fb" | |
} | |
}, | |
"4.4.186": { | |
"CVE-2019-10126": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", | |
"cmt_id": "3a611df229a90247c9a5159d136c60f4008c29a2" | |
}, | |
"CVE-2019-3846": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", | |
"cmt_id": "5d43b417e60ab25984fc7c41175f3ce8cee992bd" | |
} | |
}, | |
"4.4.187": { | |
"CVE-2019-13631": { | |
"cmt_msg": "Input: gtco - bounds check collection indent level", | |
"cmt_id": "3ca20e950203a6c7759186ec4e89cbd33ee2bf81" | |
}, | |
"CVE-2019-20934": { | |
"cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", | |
"cmt_id": "da358f365dab8fea00c6254621e2cfb2fd817d01" | |
}, | |
"CVE-2019-15211": { | |
"cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", | |
"cmt_id": "56ea214b175643476a7f2979118c2ac560f29b3f" | |
}, | |
"CVE-2019-10207": { | |
"cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", | |
"cmt_id": "37fb924139954a28a1f04959070c3cc762b0de4c" | |
}, | |
"CVE-2019-15215": { | |
"cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", | |
"cmt_id": "63a80df0ea2b94813f60e8372f9ee93856bcfd5b" | |
}, | |
"CVE-2019-15926": { | |
"cmt_msg": "ath6kl: add some bounds checking", | |
"cmt_id": "c1e1288d2e61727c1a9b9f28d0cf61da592a76bc" | |
}, | |
"CVE-2017-18509": { | |
"cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", | |
"cmt_id": "ee2f25641633ffb03fb88e4fa8a6424d24d3f295" | |
}, | |
"CVE-2019-15239": { | |
"cmt_msg": "unknown", | |
"cmt_id": "8f0b77b71f3fec09f86f80cd98c36a1a35109499" | |
}, | |
"CVE-2019-14284": { | |
"cmt_msg": "floppy: fix div-by-zero in setup_format_params", | |
"cmt_id": "26d6284d5d392bd96c414f745bcbf3620e93c8fd" | |
}, | |
"CVE-2019-14283": { | |
"cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", | |
"cmt_id": "d105eaf5fb67a193df8fe72e64690c43e343a560" | |
}, | |
"CVE-2019-13648": { | |
"cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", | |
"cmt_id": "e67fd28f9ed887d0c8124bda96b66dab87823eac" | |
} | |
}, | |
"4.4.189": { | |
"CVE-2018-20856": { | |
"cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", | |
"cmt_id": "e6ea77dd5a6a72583453e8703583ce0ef538aea4" | |
}, | |
"CVE-2019-1125": { | |
"cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", | |
"cmt_id": "e3d8c979c49d6113566acf4b3002073979cd35c3" | |
} | |
}, | |
"4.4.190": { | |
"CVE-2019-19536": { | |
"cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", | |
"cmt_id": "abea9fa28b64d0a875cc3659002dc87b64836265" | |
}, | |
"CVE-2019-19537": { | |
"cmt_msg": "USB: core: Fix races in character device registration and deregistraion", | |
"cmt_id": "8f67bc7c8da8622fddf4d29a2f422678dfbadf77" | |
}, | |
"CVE-2019-19527": { | |
"cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", | |
"cmt_id": "8e73f43b6772a262d1884511f694e0f90c3dfa68" | |
}, | |
"CVE-2019-19535": { | |
"cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", | |
"cmt_id": "67112944e756484c5d62529597a0181f846340d0" | |
}, | |
"CVE-2018-20961": { | |
"cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", | |
"cmt_id": "3dae85a803a265c65e6032cd68a13fb717d766d9" | |
}, | |
"CVE-2019-19530": { | |
"cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", | |
"cmt_id": "8fed007578dba671e131781360dd87c4683672e7" | |
}, | |
"CVE-2019-19531": { | |
"cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", | |
"cmt_id": "2ef494ad6274e963dc0fe64a8b405d22e0700e9b" | |
} | |
}, | |
"4.4.191": { | |
"CVE-2019-3900": { | |
"cmt_msg": "vhost_net: fix possible infinite loop", | |
"cmt_id": "bb85b4cbd8f69cdea3a0caa9aa4edb1d4d7bc24f" | |
}, | |
"CVE-2019-15902": { | |
"cmt_msg": "unknown", | |
"cmt_id": "61263fbe574b0b74c50552983bdcc2bb9a409b1e" | |
}, | |
"CVE-2019-15118": { | |
"cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", | |
"cmt_id": "735a16d1afc01320392669f4ea64c84d435faf1c" | |
}, | |
"CVE-2016-10906": { | |
"cmt_msg": "net: arc_emac: fix koops caused by sk_buff free", | |
"cmt_id": "b31c9932f84ce06b08735884ae7e19eca2b6c80a" | |
}, | |
"CVE-2016-10905": { | |
"cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree", | |
"cmt_id": "d61e517e39149bff6be936c922f47af99d54509a" | |
}, | |
"CVE-2019-10638": { | |
"cmt_msg": "inet: switch IP ID generator to siphash", | |
"cmt_id": "66f8c5ff8ed3d99dd21d8f24aac89410de7a4a05" | |
}, | |
"CVE-2019-15117": { | |
"cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", | |
"cmt_id": "a485888b5189845f0b6c58ae89661a402a80402a" | |
} | |
}, | |
"4.4.193": { | |
"CVE-2019-14835": { | |
"cmt_msg": "vhost: make sure log_num < in_num", | |
"cmt_id": "35b29a78cc9b2523f6b0c080e6b44d2eeb367023" | |
} | |
}, | |
"4.4.194": { | |
"CVE-2019-14816": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" | |
}, | |
"CVE-2019-14814": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" | |
}, | |
"CVE-2019-15505": { | |
"cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", | |
"cmt_id": "db38be77199f16dd23d1504a9dfddf7e4479652a" | |
}, | |
"CVE-2019-14821": { | |
"cmt_msg": "KVM: coalesced_mmio: add bounds checking", | |
"cmt_id": "ae41539657ce0a4e9f4588e89e5e19a8b8f11928" | |
} | |
}, | |
"4.4.195": { | |
"CVE-2019-19533": { | |
"cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", | |
"cmt_id": "b54d1e51bba72256f977912b6b4197bd1494c72e" | |
}, | |
"CVE-2019-17053": { | |
"cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "a279cd311c1e3870de25fe48e948487b4785e9cd" | |
}, | |
"CVE-2019-17052": { | |
"cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "c15d89b5cb86dfcdee536d093ece512091ed6e5c" | |
}, | |
"CVE-2019-17054": { | |
"cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "ec1e04b8979464990e000850d14d3e562999a82d" | |
}, | |
"CVE-2019-17056": { | |
"cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "001ff467264f3e51c8bb18de5cbe62e91d05cfc5" | |
}, | |
"CVE-2019-17055": { | |
"cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "a03818269bfbc2ff6d25e3e44eb2247df53648ca" | |
}, | |
"CVE-2019-18680": { | |
"cmt_msg": "unknown", | |
"cmt_id": "91573ae4aed0a49660abdad4d42f2a0db995ee5e" | |
} | |
}, | |
"4.4.196": { | |
"CVE-2019-2215": { | |
"cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", | |
"cmt_id": "80eb98a4ee70428d5b4b7202195a916385a76809" | |
}, | |
"CVE-2020-0030": { | |
"cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", | |
"cmt_id": "fcf46dcedbc419633771e16bfdf97a528f4d7dab" | |
}, | |
"CVE-2019-18806": { | |
"cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", | |
"cmt_id": "a35f1bb8c300a46c194bb5154ee8fc040c5ae392" | |
} | |
}, | |
"4.4.197": { | |
"CVE-2019-19525": { | |
"cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", | |
"cmt_id": "1fb673245b24832acb411db7ffe207fb470559ab" | |
}, | |
"CVE-2019-16746": { | |
"cmt_msg": "nl80211: validate beacon head", | |
"cmt_id": "fd27e0779cf62f72bd8242d003d30742d11e451e" | |
}, | |
"CVE-2018-20976": { | |
"cmt_msg": "xfs: clear sb->s_fs_info on mount failure", | |
"cmt_id": "748edae843c30f41fdcb320f1a8335bc2238b961" | |
}, | |
"CVE-2019-19523": { | |
"cmt_msg": "USB: adutux: fix use-after-free on disconnect", | |
"cmt_id": "cd3cfbafe8eb9761950873c04c0147b40a85d29f" | |
}, | |
"CVE-2019-19528": { | |
"cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", | |
"cmt_id": "f723d7ea08e2c69ac9ecd87828c650745270fb98" | |
} | |
}, | |
"4.4.198": { | |
"CVE-2019-17075": { | |
"cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", | |
"cmt_id": "3cd0698561d3e9dcb7c969077932e072fbb4689e" | |
}, | |
"CVE-2019-17133": { | |
"cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", | |
"cmt_id": "3ca40f2f6015580caf11a4fd23503ea7529ed861" | |
} | |
}, | |
"4.4.199": { | |
"CVE-2020-10773": { | |
"cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", | |
"cmt_id": "1cdb53607683a4fa8625a3f3eb65e5d9f4572166" | |
}, | |
"CVE-2019-17666": { | |
"cmt_msg": "rtlwifi: Fix potential overflow on P2P code", | |
"cmt_id": "3da8d0e777fa8a0934a288b115373cf12d7800f8" | |
}, | |
"CVE-2019-19532": { | |
"cmt_msg": "HID: Fix assumption that devices have inputs", | |
"cmt_id": "2be873faad369e0b6b70761506995fd2d4cb0257" | |
}, | |
"CVE-2019-15098": { | |
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", | |
"cmt_id": "d7619be74f341630989c7edfd21a9ed8f51ab2d1" | |
} | |
}, | |
"4.4.200": { | |
"CVE-2019-18282": { | |
"cmt_msg": "net/flow_dissector: switch to siphash", | |
"cmt_id": "491cd03f3b44f58f346ec15e2fc958d0def7b5a7" | |
}, | |
"CVE-2019-19049": { | |
"cmt_msg": "of: unittest: fix memory leak in unittest_data_add", | |
"cmt_id": "265c6b8ab54cf46ac4e3c768f2be1489dc13a494" | |
} | |
}, | |
"4.4.201": { | |
"CVE-2019-19534": { | |
"cmt_msg": "can: peak_usb: fix slab info leak", | |
"cmt_id": "1afef2b7a5d8d97cee332aee1c4d5a96597c223d" | |
}, | |
"CVE-2019-0155": { | |
"cmt_msg": "drm/i915: Rename gen7 cmdparser tables", | |
"cmt_id": "e5e3c0154c19f2d8213e0af88b7a10d9de7fbafd" | |
}, | |
"CVE-2019-0154": { | |
"cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", | |
"cmt_id": "1433b8d41b1aa346e100b839c19fc033871ac5a6" | |
}, | |
"CVE-2019-19052": { | |
"cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", | |
"cmt_id": "7f18860337d74fdf79e7152bee7117d945ff6945" | |
} | |
}, | |
"4.4.202": { | |
"CVE-2019-11135": { | |
"cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", | |
"cmt_id": "124635392ef394772850172bd5370e62cfe781b4" | |
} | |
}, | |
"4.4.203": { | |
"CVE-2019-19524": { | |
"cmt_msg": "Input: ff-memless - kill timer in destroy()", | |
"cmt_id": "af618124c69794bf215bf8cefb67890f95246ef8" | |
}, | |
"CVE-2019-15917": { | |
"cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", | |
"cmt_id": "29d9c5714096a47ed8d2a1632e382c949b089563" | |
} | |
}, | |
"4.4.204": { | |
"CVE-2019-18660": { | |
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", | |
"cmt_id": "3a79351beb549634c217570a5a8e500b8f466ad0" | |
}, | |
"CVE-2019-15291": { | |
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", | |
"cmt_id": "89660684ceca03bcaf5d1637709a4875e98387c6" | |
}, | |
"CVE-2019-18683": { | |
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", | |
"cmt_id": "7f8286d2b526a86d9bbdf20690b4245d0ea1fac3" | |
} | |
}, | |
"4.4.206": { | |
"CVE-2019-12614": { | |
"cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", | |
"cmt_id": "27cb5fbc84ed4d97a4bbcab04fb186705bac303e" | |
} | |
}, | |
"4.4.207": { | |
"CVE-2019-19227": { | |
"cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", | |
"cmt_id": "7ae3525ee708f867a2d2321c246b285136cdbed8" | |
}, | |
"CVE-2019-19062": { | |
"cmt_msg": "crypto: user - fix memory leak in crypto_report", | |
"cmt_id": "5020350fb0012816ee35f7b744ded18bb75ecc1e" | |
}, | |
"CVE-2019-19332": { | |
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", | |
"cmt_id": "385bddaf5ee11acdf8d823ecc429c675b5416ac2" | |
} | |
}, | |
"4.4.208": { | |
"CVE-2019-19057": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", | |
"cmt_id": "4a6cf20ca09434486bfbfc742c960157c23c931d" | |
}, | |
"CVE-2019-19063": { | |
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", | |
"cmt_id": "ca4fb6974bb645ebf3352f5bba7699db4b44b75f" | |
}, | |
"CVE-2019-20812": { | |
"cmt_msg": "af_packet: set defaule value for tmo", | |
"cmt_id": "b424ed744453c1b0ce0e67f2e64e7719725f65a3" | |
}, | |
"CVE-2019-19447": { | |
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", | |
"cmt_id": "0a5a9d02428d4e8c181413a51f7bcf0d7080dbf3" | |
} | |
}, | |
"4.4.209": { | |
"CVE-2019-19965": { | |
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", | |
"cmt_id": "8febe765539fbcc7d47e4e2ad44a0bcb2adbf02b" | |
} | |
}, | |
"4.4.210": { | |
"CVE-2019-14895": { | |
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", | |
"cmt_id": "d1bd8bd7e5ebda57580372d2b8b69182f9d8d113" | |
}, | |
"CVE-2020-0305": { | |
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", | |
"cmt_id": "3cce9309df73def742692ffddde05638b6eda6d9" | |
}, | |
"CVE-2019-19066": { | |
"cmt_msg": "scsi: bfa: release allocated memory in case of error", | |
"cmt_id": "8c67bbd0754f8b35f28d8b5626c16d5721e9a8f7" | |
}, | |
"CVE-2019-20636": { | |
"cmt_msg": "Input: add safety guards to input_set_keycode()", | |
"cmt_id": "68442780f2c223531de9d25104fd04e1bfdb583b" | |
}, | |
"CVE-2019-19068": { | |
"cmt_msg": "rtl8xxxu: prevent leaking urb", | |
"cmt_id": "57d09152eef9e1afca04b2f7bebccd07e0efa881" | |
}, | |
"CVE-2020-0431": { | |
"cmt_msg": "HID: hid-input: clear unmapped usages", | |
"cmt_id": "3be648c80db794a3bc1b22a1115071402a1f9803" | |
}, | |
"CVE-2019-14615": { | |
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", | |
"cmt_id": "e2546a83a7e291f412978cf6a580e43698c308bc" | |
}, | |
"CVE-2019-19056": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", | |
"cmt_id": "c858dc3c047e2962994d28acaccd52272558c9ff" | |
} | |
}, | |
"4.4.211": { | |
"CVE-2019-17351": { | |
"cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", | |
"cmt_id": "b39b4801d50956256711db83be28b9cff2620fda" | |
}, | |
"CVE-2019-20096": { | |
"cmt_msg": "dccp: Fix memleak in __feat_register_sp", | |
"cmt_id": "a5c290ebb46d33f8700aab2edb996c9a0478b3b8" | |
}, | |
"CVE-2019-15217": { | |
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", | |
"cmt_id": "e6c986b15703eb2e0d59a3f79e99fd2aa6221b51" | |
}, | |
"CVE-2018-21008": { | |
"cmt_msg": "rsi: add fix for crash during assertions", | |
"cmt_id": "80427a7b1195e7946992baffeb112b2635245198" | |
}, | |
"CVE-2019-15220": { | |
"cmt_msg": "p54usb: Fix race between disconnect and firmware loading", | |
"cmt_id": "e2c48c1e6ef5e806b68ca685216dda05e5267be2" | |
}, | |
"CVE-2019-15221": { | |
"cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", | |
"cmt_id": "81b83ca3e45b83e632b8063cd27bdb072ecfc135" | |
}, | |
"CVE-2020-12652": { | |
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", | |
"cmt_id": "952fc03b38b8dca3923f3c61e3273c8f8ed2bd86" | |
}, | |
"CVE-2019-5108": { | |
"cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", | |
"cmt_id": "622c77a3addefa54d61205177635409de87a8a7c" | |
} | |
}, | |
"4.4.212": { | |
"CVE-2019-14896": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" | |
}, | |
"CVE-2019-14897": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" | |
}, | |
"CVE-2020-14416": { | |
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", | |
"cmt_id": "6169e11e1f14dd272ec9c746050820e5cc2cf853" | |
} | |
}, | |
"4.4.213": { | |
"CVE-2020-0432": { | |
"cmt_msg": "staging: most: net: fix buffer overflow", | |
"cmt_id": "917c8fe39f4d42c3850b22d6a0bf3ffab1466d19" | |
} | |
}, | |
"4.4.214": { | |
"CVE-2020-12653": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", | |
"cmt_id": "4dd90d14f902074f18238dc104868debbd3cd250" | |
}, | |
"CVE-2020-12654": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", | |
"cmt_id": "91b836b01c788932d86a448d26561740d22e7c9b" | |
}, | |
"CVE-2020-0404": { | |
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", | |
"cmt_id": "f941047b5e5abd73be6c058a67a06533728c3422" | |
} | |
}, | |
"4.4.215": { | |
"CVE-2020-9383": { | |
"cmt_msg": "floppy: check FDC index for errors before assigning it", | |
"cmt_id": "3dd989efdd97a42dc18e9bd653b16f0d84f45fc2" | |
}, | |
"CVE-2020-2732": { | |
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", | |
"cmt_id": "27021607e18ee2946cbbc74c19031ad966b9c883" | |
}, | |
"CVE-2019-16233": { | |
"cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", | |
"cmt_id": "d50a2a486d941417ca7abaebfe433a3af3c773fb" | |
}, | |
"CVE-2020-0009": { | |
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", | |
"cmt_id": "a349db843c640ad1fbab6625a7a4e9d4dd45f26a" | |
} | |
}, | |
"4.4.216": { | |
"CVE-2020-8649": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" | |
}, | |
"CVE-2020-8648": { | |
"cmt_msg": "vt: selection, close sel_buffer race", | |
"cmt_id": "63f529ab35671d1c7433cb8283980289c8832bad" | |
}, | |
"CVE-2019-11487": { | |
"cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", | |
"cmt_id": "c326585619b99cce3240403faa56f599e06893cb" | |
}, | |
"CVE-2020-8647": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" | |
}, | |
"CVE-2020-27068": { | |
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", | |
"cmt_id": "bfb70b52540845bd1574de6f0e58fcc7907d8a07" | |
}, | |
"CVE-2020-0444": { | |
"cmt_msg": "audit: fix error handling in audit_data_to_entry()", | |
"cmt_id": "c99bc56eba9e90c28d8bb42712b9b262d99df630" | |
}, | |
"CVE-2019-16234": { | |
"cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", | |
"cmt_id": "32b63f22e4c16aee095b2c116f0c7526b7fd3e66" | |
} | |
}, | |
"4.4.217": { | |
"CVE-2019-14901": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", | |
"cmt_id": "4ca9ed6965cc0b9ace3758355ff13d71b97bf008" | |
}, | |
"CVE-2020-29370": { | |
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", | |
"cmt_id": "3698fe758684cf3600a0aa91a5af3eba27722cfd" | |
} | |
}, | |
"4.4.218": { | |
"CVE-2020-14381": { | |
"cmt_msg": "futex: Fix inode life-time issue", | |
"cmt_id": "24bbfe34bb44c036c3a0874bf74fc2387d5557bf" | |
}, | |
"CVE-2020-11668": { | |
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", | |
"cmt_id": "89fb5aa765cf8e47ac168810dd76afe37312dff2" | |
}, | |
"CVE-2021-3715": { | |
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", | |
"cmt_id": "7518af6464b47a0d775173570c3d25f699da2a5e" | |
}, | |
"CVE-2020-10942": { | |
"cmt_msg": "vhost: Check docket sk_family instead of call getname", | |
"cmt_id": "79152052fbb703ff5f66778b3e585c69b95d83d2" | |
}, | |
"CVE-2020-27066": { | |
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", | |
"cmt_id": "0ac1dd7bb8f1b40f1bf494f6a27235a7a3b36350" | |
}, | |
"CVE-2020-11608": { | |
"cmt_msg": "media: ov519: add missing endpoint sanity checks", | |
"cmt_id": "3de5ed1a64b96f0a482e2a325bcea38d51a2a1fd" | |
}, | |
"CVE-2020-11609": { | |
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks", | |
"cmt_id": "eca73facbd01d15bd6f8c08c9c39d255a752e4b6" | |
} | |
}, | |
"4.4.219": { | |
"CVE-2020-11494": { | |
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", | |
"cmt_id": "f7dd0134a169df7dd9b68b6c135fe10629e66599" | |
}, | |
"CVE-2020-0429": { | |
"cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", | |
"cmt_id": "d845bf594d68d309a39ce8df72942e2b3fbbb176" | |
}, | |
"CVE-2020-11565": { | |
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", | |
"cmt_id": "4489253d0625c4841620160b2461925b695c651c" | |
} | |
}, | |
"4.4.220": { | |
"CVE-2020-12826": { | |
"cmt_msg": "signal: Extend exec_id to 64bits", | |
"cmt_id": "6b9e27da8fc595e8abd4374c230d5b9404efac83" | |
} | |
}, | |
"4.4.221": { | |
"CVE-2019-19319": { | |
"cmt_msg": "ext4: protect journal inode's blocks using block_validity", | |
"cmt_id": "7eff961ca9f364be255d279346517ba0158ec8e3" | |
}, | |
"CVE-2020-12114": { | |
"cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", | |
"cmt_id": "83354adbd7a967230bd23a547c5b695567ddba2c" | |
}, | |
"CVE-2020-12464": { | |
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", | |
"cmt_id": "f613d830fae7cbf8799378338d4df977f8667d5c" | |
} | |
}, | |
"4.4.222": { | |
"CVE-2020-10751": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" | |
}, | |
"CVE-2020-0255": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" | |
} | |
}, | |
"4.4.224": { | |
"CVE-2020-10711": { | |
"cmt_msg": "netlabel: cope with NULL catmap", | |
"cmt_id": "b8ff52e4bdaabfee050ae4e8c721305a924a8633" | |
}, | |
"CVE-2020-0433": { | |
"cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", | |
"cmt_id": "fa9355afd5b07707e15a5f75b854f04a9c14a798" | |
}, | |
"CVE-2020-1749": { | |
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", | |
"cmt_id": "7c9d04e1c3ed58f60592329459d9ca7789442ff7" | |
}, | |
"CVE-2020-27786": { | |
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", | |
"cmt_id": "718eede1eeb602531e09191d3107eb849bbe64eb" | |
}, | |
"CVE-2020-12769": { | |
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", | |
"cmt_id": "3549e7aaa20947df2338305509c534c79c43e765" | |
}, | |
"CVE-2020-10690": { | |
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", | |
"cmt_id": "6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57" | |
}, | |
"CVE-2020-13143": { | |
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", | |
"cmt_id": "c18a8b0d7b8fdb299bcfab2feb9c0f410580794a" | |
}, | |
"CVE-2019-19768": { | |
"cmt_msg": "blktrace: Protect q->blk_trace with RCU", | |
"cmt_id": "3d5d64aea941a45efda1bd02c0ec8dd57e8ce4ca" | |
}, | |
"CVE-2020-12770": { | |
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write", | |
"cmt_id": "af9a86cc9f1acfc380e96a9beb59462f32a4b6c4" | |
} | |
}, | |
"4.4.225": { | |
"CVE-2018-9517": { | |
"cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", | |
"cmt_id": "3ca51032627e9bfea7d609f008461efdfdba1a5c" | |
}, | |
"CVE-2021-0447": { | |
"cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", | |
"cmt_id": "c2984681fe15cfb803a9132aaaf1140ab20a72c1" | |
}, | |
"CVE-2020-27067": { | |
"cmt_msg": "l2tp: fix l2tp_eth module loading", | |
"cmt_id": "c30b34ce7944ec7026d4803cd51da2521df992a3" | |
} | |
}, | |
"4.4.226": { | |
"CVE-2020-10732": { | |
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", | |
"cmt_id": "2673a0cb646affc7ff66970cfc884d9e2223bc60" | |
} | |
}, | |
"4.4.227": { | |
"CVE-2020-13974": { | |
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", | |
"cmt_id": "dad0bf9ce93fa40b667eccd3306783f4db4b932b" | |
}, | |
"CVE-2020-0543": { | |
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", | |
"cmt_id": "4ebffa4b0a198d8671ee68742ba6d3f56164301f" | |
} | |
}, | |
"4.4.228": { | |
"CVE-2019-20810": { | |
"cmt_msg": "media: go7007: fix a miss of snd_card_free", | |
"cmt_id": "ce7fcdd544fbc07a2c327d18b0712754cf1557d2" | |
}, | |
"CVE-2020-10766": { | |
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", | |
"cmt_id": "37368554eaf7815a3ef3c2cbbd242fc19d3cb32b" | |
}, | |
"CVE-2020-10767": { | |
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", | |
"cmt_id": "317b9c418ea38089a6d5c42fcaa9a545334838c3" | |
}, | |
"CVE-2020-10768": { | |
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", | |
"cmt_id": "7a5764e8990096fd08e8566b87df3c111bf5a736" | |
} | |
}, | |
"4.4.229": { | |
"CVE-2020-12771": { | |
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", | |
"cmt_id": "9517bec2c1ff8f223f8f2d28c743731e8f216bbe" | |
}, | |
"CVE-2020-15436": { | |
"cmt_msg": "block: Fix use-after-free in blkdev_get()", | |
"cmt_id": "f9aa90e1b8aa2a133d4046223248ab61688445f5" | |
} | |
}, | |
"4.4.230": { | |
"CVE-2020-15393": { | |
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", | |
"cmt_id": "831eebad70a25f55b5745453ac252d4afe997187" | |
} | |
}, | |
"4.4.232": { | |
"CVE-2020-15437": { | |
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", | |
"cmt_id": "f5e7de4f4232154835f4c3d87e01350457340c16" | |
}, | |
"CVE-2018-10323": { | |
"cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", | |
"cmt_id": "f88efa4d6cb1fcacb9591979bacc6c57ec9d7c53" | |
} | |
}, | |
"4.4.233": { | |
"CVE-2020-26088": { | |
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", | |
"cmt_id": "de7c8ab8cb412d21ffdac94a99ef2f29f7802fd1" | |
}, | |
"CVE-2019-19054": { | |
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", | |
"cmt_id": "84c9c409286617385e71d4d0d0c9dd940b574469" | |
}, | |
"CVE-2020-25212": { | |
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", | |
"cmt_id": "db61fb8278925f54ccb0172471164aeb56ec6537" | |
}, | |
"CVE-2019-9445": { | |
"cmt_msg": "f2fs: check if file namelen exceeds max value", | |
"cmt_id": "559eff3dca325947bc3d88d17f4c454111884be5" | |
}, | |
"CVE-2018-13094": { | |
"cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", | |
"cmt_id": "3d5eb8428488648c544e82e6b8b9fd391b107ed9" | |
}, | |
"CVE-2018-8043": { | |
"cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", | |
"cmt_id": "52e4b929c3bd6fac2a8cf4c2609d71486bde072c" | |
}, | |
"CVE-2020-16166": { | |
"cmt_msg": "random32: update the net random state on interrupt and activity", | |
"cmt_id": "40713057d1d11fc86f0ed02383373281d87841a3" | |
}, | |
"CVE-2020-36386": { | |
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", | |
"cmt_id": "491602ede684bb8554254f12f4b1bd242dd15c61" | |
}, | |
"CVE-2020-14331": { | |
"cmt_msg": "vgacon: Fix for missing check in scrollback handling", | |
"cmt_id": "cd44c411a441d994b234605f51f0d1ee5740e353" | |
}, | |
"CVE-2019-19448": { | |
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", | |
"cmt_id": "b086fe8442d20dbd660812337f152ec868c64c0e" | |
}, | |
"CVE-2019-19074": { | |
"cmt_msg": "ath9k: release allocated buffer if timed out", | |
"cmt_id": "94e3650b2568ae7a06e10c282f588ddede5df1d6" | |
}, | |
"CVE-2019-19073": { | |
"cmt_msg": "ath9k_htc: release allocated buffer if timed out", | |
"cmt_id": "60fa3632210b1dc99296100227ae2d79ebbb4780" | |
} | |
}, | |
"4.4.234": { | |
"CVE-2020-14314": { | |
"cmt_msg": "ext4: fix potential negative array index in do_split()", | |
"cmt_id": "059b1480105478c5f68cf664301545b8cad6a7cf" | |
}, | |
"CVE-2020-29371": { | |
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", | |
"cmt_id": "2935e0a3cec1ffa558eea90db6279cff83aa3592" | |
}, | |
"CVE-2020-0466": { | |
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", | |
"cmt_id": "d85e2b06662e7f46d0f174ecc603fc1c3554d5cf" | |
} | |
}, | |
"4.4.236": { | |
"CVE-2020-25285": { | |
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", | |
"cmt_id": "9c9757b4a2cd8039dddc01e8b589d9157f5d756a" | |
}, | |
"CVE-2020-0465": { | |
"cmt_msg": "HID: core: Sanitize event code and type when mapping input", | |
"cmt_id": "de801a7d3228aed8ea2bbfe36ccf3af7f9ef6f39" | |
}, | |
"CVE-2021-1048": { | |
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", | |
"cmt_id": "6504c100804870911f074fd67f280756b6805958" | |
} | |
}, | |
"4.4.237": { | |
"CVE-2020-25284": { | |
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", | |
"cmt_id": "e349a5786f4c23eb11d1e7385703ddbf94f3f061" | |
}, | |
"CVE-2020-14390": { | |
"cmt_msg": "fbcon: remove soft scrollback code", | |
"cmt_id": "1f08e80ec5751b8f565139cd7a921fbee46f8a22" | |
}, | |
"CVE-2020-28097": { | |
"cmt_msg": "vgacon: remove software scrollback support", | |
"cmt_id": "5f76b4c6ac297ce836abe17f495123f45bfc4fb3" | |
} | |
}, | |
"4.4.238": { | |
"CVE-2020-25643": { | |
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", | |
"cmt_id": "a49ef91286776c3f095460112846cd85a063c29a" | |
}, | |
"CVE-2021-0605": { | |
"cmt_msg": "af_key: pfkey_dump needs parameter validation", | |
"cmt_id": "831587619afe78cd72651b34a0f6ccb2acf3c503" | |
} | |
}, | |
"4.4.239": { | |
"CVE-2020-25211": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" | |
}, | |
"CVE-2021-0448": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" | |
}, | |
"CVE-2021-39634": { | |
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", | |
"cmt_id": "ea984dfe0e7978cd294eb6a640ac27fa1834ac8d" | |
}, | |
"CVE-2020-28915": { | |
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", | |
"cmt_id": "0e3e69e0a8bc516e37ee3b496779b60e660b5ea5" | |
} | |
}, | |
"4.4.240": { | |
"CVE-2020-10135": { | |
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", | |
"cmt_id": "554ab8c6e143606bb205c7d694656fac3d6e3cc2" | |
}, | |
"CVE-2020-12352": { | |
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", | |
"cmt_id": "e7b465bda9b90bec5427775bcbbfc47fe7a6012b" | |
} | |
}, | |
"4.4.241": { | |
"CVE-2020-25705": { | |
"cmt_msg": "icmp: randomize the global rate limiter", | |
"cmt_id": "a9d0ba6aa7485aabed7b8f2ed5a3975684847e0b" | |
} | |
}, | |
"4.4.242": { | |
"CVE-2020-28974": { | |
"cmt_msg": "vt: Disable KD_FONT_OP_COPY", | |
"cmt_id": "81f26642406c16bf52015683511c814ecbe2abc3" | |
}, | |
"CVE-2020-25668": { | |
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", | |
"cmt_id": "e847c4e2ccc80295338cc96136aec2877be82359" | |
}, | |
"CVE-2020-25656": { | |
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers", | |
"cmt_id": "f4cfdf9b1487d3512da27a1a542b4c33a4737bca" | |
}, | |
"CVE-2020-35508": { | |
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", | |
"cmt_id": "33175e2d8fdf7b07be9691ee7747a3982dcf52cd" | |
} | |
}, | |
"4.4.243": { | |
"CVE-2020-8694": { | |
"cmt_msg": "powercap: restrict energy meter to root access", | |
"cmt_id": "ed3691aa7e4ad0a987da49b9165a22255b39e9b7" | |
} | |
}, | |
"4.4.244": { | |
"CVE-2020-14351": { | |
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", | |
"cmt_id": "17b235e6cc9d701a2eece74a64f89062072b81b1" | |
}, | |
"CVE-2020-25645": { | |
"cmt_msg": "geneve: add transport ports in route lookup for geneve", | |
"cmt_id": "e98bcb65299870dfa98d2067d423da80555188c4" | |
}, | |
"CVE-2020-0427": { | |
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", | |
"cmt_id": "03f69244302d7954f42f528ea2d45903ebbf59f3" | |
}, | |
"CVE-2020-27673": { | |
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", | |
"cmt_id": "33f38ccfe479fdb53bf0409e9b74e993e30d4d1f" | |
}, | |
"CVE-2019-0148": { | |
"cmt_msg": "i40e: Wrong truncation from u16 to u8", | |
"cmt_id": "0f60ed1afff42f84dcba5a7950ee8712da8363d5" | |
}, | |
"CVE-2020-27675": { | |
"cmt_msg": "xen/events: avoid removing an event channel while handling it", | |
"cmt_id": "c0e77192829a1a02983d672ac144e6196098cad7" | |
} | |
}, | |
"4.4.245": { | |
"CVE-2018-13093": { | |
"cmt_msg": "xfs: validate cached inodes are free when allocated", | |
"cmt_id": "f17ef9beebc7c55c5a791aacdc5992880ea15d8c" | |
}, | |
"CVE-2020-25669": { | |
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", | |
"cmt_id": "640ede0a21a0b9bd68e47ccbca87fd747e38ea0a" | |
}, | |
"CVE-2020-4788": { | |
"cmt_msg": "powerpc/64s: flush L1D on kernel entry", | |
"cmt_id": "4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6" | |
} | |
}, | |
"4.4.247": { | |
"CVE-2019-19813": { | |
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", | |
"cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" | |
}, | |
"CVE-2019-19816": { | |
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", | |
"cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" | |
} | |
}, | |
"4.4.248": { | |
"CVE-2020-29661": { | |
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", | |
"cmt_id": "30f7752609a8030862f4c7faed5c845e2aa300be" | |
}, | |
"CVE-2020-29660": { | |
"cmt_msg": "tty: Fix ->session locking", | |
"cmt_id": "7b4a4b9403c52343d00901babc3987588bc0b085" | |
}, | |
"CVE-2020-35519": { | |
"cmt_msg": "net/x25: prevent a couple of overflows", | |
"cmt_id": "3cb72fe7ac64d5f647dbefd94ce7b54f6b92ede9" | |
} | |
}, | |
"4.4.249": { | |
"CVE-2020-27815": { | |
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", | |
"cmt_id": "b01bec9ec3b196a8a33d0d68991c8a45c8c24551" | |
}, | |
"CVE-2020-29568": { | |
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing", | |
"cmt_id": "de66402f45c0cae9566b1568cc1b2df2b5ccbbf8" | |
} | |
}, | |
"4.4.250": { | |
"CVE-2020-36158": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", | |
"cmt_id": "878ba6234c5827722d79767d39450340e228ce86" | |
} | |
}, | |
"4.4.252": { | |
"CVE-2020-28374": { | |
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", | |
"cmt_id": "87be50177ddb789330e6c5ddcc2f301cec0017dc" | |
} | |
}, | |
"4.4.253": { | |
"CVE-2021-3178": { | |
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", | |
"cmt_id": "c89b2b56fc536d4fd41745bcbf394aa21162e277" | |
} | |
}, | |
"4.4.254": { | |
"CVE-2020-27825": { | |
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call", | |
"cmt_id": "a7c2dd4438056fb665a376860242463a30f2d2e8" | |
}, | |
"CVE-2021-39657": { | |
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", | |
"cmt_id": "a4cdbf4805bfed8f39e6b25f113588064d9a6ac5" | |
} | |
}, | |
"4.4.258": { | |
"CVE-2021-26931": { | |
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", | |
"cmt_id": "74e38b7a6972fd6983e6fbd929b65746ce975aed" | |
}, | |
"CVE-2021-26930": { | |
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", | |
"cmt_id": "2e6cc64b7b56e5c2d2c01de8ff1b3986342c2b18" | |
}, | |
"CVE-2021-26932": { | |
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", | |
"cmt_id": "15b6ca2cef13f06ef41d9ebc094ef7770fd98ab3" | |
} | |
}, | |
"4.4.259": { | |
"CVE-2021-0512": { | |
"cmt_msg": "HID: make arrays usage and value to be the same", | |
"cmt_id": "795a8c31cabf1a452b0b63bb3f8d9159b353e5ce" | |
}, | |
"CVE-2021-3612": { | |
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", | |
"cmt_id": "ade5180681d778d36b569ad35cc175ab22196c5f" | |
} | |
}, | |
"4.4.260": { | |
"CVE-2021-30002": { | |
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", | |
"cmt_id": "432b08869893ebd751e815465b822bb99cf710e7" | |
}, | |
"CVE-2021-27365": { | |
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", | |
"cmt_id": "b8a757b57ba3e27d6399106a78350af513fb0bb5" | |
}, | |
"CVE-2021-27364": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" | |
}, | |
"CVE-2021-27363": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" | |
}, | |
"CVE-2021-28038": { | |
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", | |
"cmt_id": "f2c9673ce689801ef3bee517013b0c9b94dd14fa" | |
} | |
}, | |
"4.4.262": { | |
"CVE-2019-19060": { | |
"cmt_msg": "iio: imu: adis16400: release allocated memory on failure", | |
"cmt_id": "00552ca5cae5e86311df6cfd5911213c89ece4e2" | |
}, | |
"CVE-2019-19061": { | |
"cmt_msg": "iio: imu: adis16400: fix memory leak", | |
"cmt_id": "7671c44edfd0411c7411266f0c90dd21b535c3d4" | |
}, | |
"CVE-2021-28660": { | |
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", | |
"cmt_id": "36f8d0af46daf6eb4c7c5edf6adbfa02e9c70f92" | |
}, | |
"CVE-2021-20261": { | |
"cmt_msg": "floppy: fix lock_fdc() signal handling", | |
"cmt_id": "b93c6b400ed51e526e724b430a115293fd147466" | |
}, | |
"CVE-2021-29265": { | |
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", | |
"cmt_id": "9ee196f307ec006cac386a0d8b7935dd2ccd0083" | |
}, | |
"CVE-2019-16232": { | |
"cmt_msg": "libertas: fix a potential NULL pointer dereference", | |
"cmt_id": "3b431b60940fa2cda06d6b4906e11acd222d471a" | |
} | |
}, | |
"4.4.263": { | |
"CVE-2021-28964": { | |
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", | |
"cmt_id": "2922e2e894781c36ce014935f05163287635609c" | |
}, | |
"CVE-2021-28972": { | |
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", | |
"cmt_id": "4639466722c2ea832bc145c06cd5aa2012db9102" | |
} | |
}, | |
"4.4.264": { | |
"CVE-2021-28688": { | |
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", | |
"cmt_id": "47b6b2742ee60334c40d75bfaab49028688f1510" | |
} | |
}, | |
"4.4.265": { | |
"CVE-2021-3483": { | |
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", | |
"cmt_id": "63d8737a59ae58e5c2d5fd640c294e7b5bb1d394" | |
} | |
}, | |
"4.4.266": { | |
"CVE-2021-29154": { | |
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", | |
"cmt_id": "ca97582a3fe79543de8e5905e829c5ad3661a1ef" | |
} | |
}, | |
"4.4.267": { | |
"CVE-2021-3659": { | |
"cmt_msg": "net: mac802154: Fix general protection fault", | |
"cmt_id": "cd19d85e6d4a361beb11431af3d22248190f5b48" | |
}, | |
"CVE-2021-0937": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" | |
}, | |
"CVE-2020-25672": { | |
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", | |
"cmt_id": "7ed6c0c7db2099792768150c070efca71e85bdf3" | |
}, | |
"CVE-2020-25673": { | |
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", | |
"cmt_id": "7f6c9e4314aa7d90b6261b8ae571d14c454ba964" | |
}, | |
"CVE-2020-25670": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", | |
"cmt_id": "a1cdd18c49d23ec38097ac2c5b0d761146fc0109" | |
}, | |
"CVE-2020-25671": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", | |
"cmt_id": "a524eabb5e309e49ee2d8422a771c5cedef003c4" | |
}, | |
"CVE-2021-22555": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" | |
} | |
}, | |
"4.4.269": { | |
"CVE-2021-33034": { | |
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", | |
"cmt_id": "b27a218d166b7f07cd5616fb90e727b6ed662b1a" | |
}, | |
"CVE-2017-0605": { | |
"cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", | |
"cmt_id": "150381302389fa01425396489a21dc7c53383a5b" | |
}, | |
"CVE-2021-31916": { | |
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices", | |
"cmt_id": "0c0f93fbd20276d65ae0581edfcdc93579aa1dc7" | |
}, | |
"CVE-2021-4157": { | |
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", | |
"cmt_id": "0c5ccd5e2a2e291774618c24c459fa397fd1b7da" | |
} | |
}, | |
"4.4.270": { | |
"CVE-2020-26558": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" | |
}, | |
"CVE-2021-0129": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" | |
} | |
}, | |
"4.4.271": { | |
"CVE-2020-24587": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" | |
}, | |
"CVE-2020-24586": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" | |
}, | |
"CVE-2021-34981": { | |
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", | |
"cmt_id": "61a811e8f5229264b822361f8b23d7638fd8c914" | |
}, | |
"CVE-2020-24588": { | |
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", | |
"cmt_id": "daea7ff51861cec93ff7f561095d9048b673b51f" | |
}, | |
"CVE-2020-26139": { | |
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", | |
"cmt_id": "e3d4030498c304d7c36bccc6acdedacf55402387" | |
}, | |
"CVE-2020-26147": { | |
"cmt_msg": "mac80211: assure all fragments are encrypted", | |
"cmt_id": "16cbc9756dd84e870867f003a200553931dd461b" | |
}, | |
"CVE-2021-29650": { | |
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.", | |
"cmt_id": "9bc6c1246941cf88cf06a27153d6a1108a240067" | |
}, | |
"CVE-2021-32399": { | |
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", | |
"cmt_id": "a7dc1c981038bbd5f7379148d7fd8821d2a7b9ae" | |
} | |
}, | |
"4.4.272": { | |
"CVE-2021-3564": { | |
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order", | |
"cmt_id": "054b0b4f9bf86baac0774e1ea38f4b65497089e5" | |
}, | |
"CVE-2021-38208": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" | |
}, | |
"CVE-2021-3573": { | |
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", | |
"cmt_id": "2260759b5300865dc209150e925aaeb9df758630" | |
}, | |
"CVE-2021-3587": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" | |
} | |
}, | |
"4.4.274": { | |
"CVE-2021-34693": { | |
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", | |
"cmt_id": "f638caa211e7a121a5596986d29ebbdaf9156398" | |
}, | |
"CVE-2021-45486": { | |
"cmt_msg": "inet: use bigger hash table for IP ID generation", | |
"cmt_id": "8fb8c138b5d69128964e54e1b5ee49fc395f011c" | |
} | |
}, | |
"4.4.276": { | |
"CVE-2021-38160": { | |
"cmt_msg": "virtio_console: Assure used length from device is limited", | |
"cmt_id": "187f14fb88a9e62d55924748a274816fe6f34de6" | |
}, | |
"CVE-2021-3609": { | |
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", | |
"cmt_id": "9c47fa9295ce58433cae4376240b738b126637d4" | |
}, | |
"CVE-2021-45485": { | |
"cmt_msg": "ipv6: use prandom_u32() for ID generation", | |
"cmt_id": "c43fa9ee9f1de295474a28903607f84209d7e611" | |
}, | |
"CVE-2022-0850": { | |
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", | |
"cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9" | |
}, | |
"CVE-2021-33909": { | |
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations", | |
"cmt_id": "3533e50cbee8ff086bfa04176ac42a01ee3db37d" | |
} | |
}, | |
"4.4.277": { | |
"CVE-2021-38204": { | |
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory", | |
"cmt_id": "fc2a7c2280fa2be8ff9b5af702368fcd49a0acdb" | |
}, | |
"CVE-2021-3679": { | |
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", | |
"cmt_id": "afa091792525dfa6c3c854069ec6b8a5ccc62c11" | |
}, | |
"CVE-2021-37576": { | |
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", | |
"cmt_id": "1e90a673f6ee09c668fe01aa1b94924f972c9811" | |
} | |
}, | |
"4.4.278": { | |
"CVE-2021-0920": { | |
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", | |
"cmt_id": "72247f34d90e25c1493436e45e193e8306082b19" | |
}, | |
"CVE-2021-21781": { | |
"cmt_msg": "ARM: ensure the signal page contains defined contents", | |
"cmt_id": "8db77dca7e1d1d1d6aa9334207ead57853832bb7" | |
} | |
}, | |
"4.4.281": { | |
"CVE-2021-38205": { | |
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", | |
"cmt_id": "3d4ba14fc5ffbe5712055af09a5c0cbab93c0f44" | |
}, | |
"CVE-2021-3732": { | |
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed", | |
"cmt_id": "c6e8810d25295acb40a7b69ed3962ff181919571" | |
} | |
}, | |
"4.4.282": { | |
"CVE-2021-3653": { | |
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", | |
"cmt_id": "53723b7be26ef31ad642ce5ffa8b42dec16db40e" | |
}, | |
"CVE-2021-42008": { | |
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", | |
"cmt_id": "d66736076bd84742c18397785476e9a84d5b54ef" | |
} | |
}, | |
"4.4.283": { | |
"CVE-2021-3753": { | |
"cmt_msg": "vt_kdsetmode: extend console locking", | |
"cmt_id": "01da584f08cbb1e04f22796cc49b10d570cd5ec1" | |
} | |
}, | |
"4.4.284": { | |
"CVE-2021-40490": { | |
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", | |
"cmt_id": "69d82df68fbc5e368820123200d7b88f6c058350" | |
}, | |
"CVE-2020-3702": { | |
"cmt_msg": "ath: Use safer key clearing with key cache entries", | |
"cmt_id": "4d6b4335838fd89419212e1e486c415ec36fb610" | |
} | |
}, | |
"4.4.285": { | |
"CVE-2021-20320": { | |
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", | |
"cmt_id": "a738597a79e588bcf9817d4ec12740c99842db3b" | |
}, | |
"CVE-2021-3655": { | |
"cmt_msg": "sctp: validate from_addr_param return", | |
"cmt_id": "c299c5925ab774b64ca6aba87fb8c497f5663780" | |
} | |
}, | |
"4.4.288": { | |
"CVE-2021-4203": { | |
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", | |
"cmt_id": "323f0968a81b082cf02ef15b447cd35e4328385e" | |
} | |
}, | |
"4.4.289": { | |
"CVE-2020-29374": { | |
"cmt_msg": "gup: document and work around \"COW can break either way\" issue", | |
"cmt_id": "58facc9c7ae307be5ecffc1697552550fedb55bd" | |
} | |
}, | |
"4.4.290": { | |
"CVE-2021-3896": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" | |
}, | |
"CVE-2021-20321": { | |
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", | |
"cmt_id": "a4f281ffc1d128d7ea693cbc3a796e56e919fd7c" | |
}, | |
"CVE-2021-3760": { | |
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", | |
"cmt_id": "1d5e0107bfdbef6cc140fb5d7a1a817a40948528" | |
}, | |
"CVE-2021-43389": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" | |
} | |
}, | |
"4.4.291": { | |
"CVE-2021-3772": { | |
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", | |
"cmt_id": "629d2823abf957bcbcba32154f1f6fd49bdb850c" | |
} | |
}, | |
"4.4.292": { | |
"CVE-2021-37159": { | |
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", | |
"cmt_id": "cbefdf724282e6a948885f379dc92ab841c2fee0" | |
} | |
}, | |
"4.4.293": { | |
"CVE-2021-4202": { | |
"cmt_msg": "NFC: reorganize the functions in nci_request", | |
"cmt_id": "6dc051117ba0e1dac9324593ff2c1c520f67ad21" | |
}, | |
"CVE-2021-3752": { | |
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", | |
"cmt_id": "88aed7d67197d155260f09078835290adfa1debd" | |
}, | |
"CVE-2021-45868": { | |
"cmt_msg": "quota: check block number when reading the block in quota file", | |
"cmt_id": "7a40f3e53f5de1d6876df8a9e8025b50616b8818" | |
}, | |
"CVE-2021-39686": { | |
"cmt_msg": "binder: use euid from cred instead of using task", | |
"cmt_id": "120ffcd83596fe94b6d6735d21349f118b60c936" | |
}, | |
"CVE-2021-3640": { | |
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", | |
"cmt_id": "f632f88fe209240f5cad853e33f74fda4d341004" | |
} | |
}, | |
"4.4.294": { | |
"CVE-2021-4002": { | |
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", | |
"cmt_id": "8a8ae093b52ba76b650b493848d67e7b526c8751" | |
}, | |
"CVE-2021-4083": { | |
"cmt_msg": "fget: check that the fd still exists after getting a ref to it", | |
"cmt_id": "8afa4ef999191477506b396fae518338b8996fec" | |
} | |
}, | |
"4.4.295": { | |
"CVE-2021-39698": { | |
"cmt_msg": "wait: add wake_up_pollfree()", | |
"cmt_id": "d0ceebaae0e406263b83462701b5645e075c1467" | |
}, | |
"CVE-2021-39685": { | |
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", | |
"cmt_id": "93cd7100fe471c5f76fb942358de4ed70dbcaf35" | |
} | |
}, | |
"4.4.296": { | |
"CVE-2021-28715": { | |
"cmt_msg": "xen/netback: don't queue unlimited number of packages", | |
"cmt_id": "0928efb09178e01d3dc8e8849aa1c807436c3c37" | |
}, | |
"CVE-2021-28713": { | |
"cmt_msg": "xen/console: harden hvc_xen against event channel storms", | |
"cmt_id": "c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027" | |
}, | |
"CVE-2021-28712": { | |
"cmt_msg": "xen/netfront: harden netfront against event channel storms", | |
"cmt_id": "81900aa7d7a130dec4c55b68875e30fb8c9effec" | |
}, | |
"CVE-2021-28711": { | |
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms", | |
"cmt_id": "3e04b9e6aa7d77287e70a400be83060d2b7b2cfe" | |
} | |
}, | |
"4.4.297": { | |
"CVE-2022-1195": { | |
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", | |
"cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6" | |
} | |
}, | |
"4.4.299": { | |
"CVE-2021-45095": { | |
"cmt_msg": "phonet: refcount leak in pep_sock_accep", | |
"cmt_id": "172b3f506c24a61805b3910b9acfe7159d980b9b" | |
}, | |
"CVE-2021-4155": { | |
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", | |
"cmt_id": "56adcda55aa213e106224ff3d18ef4625e25f52b" | |
} | |
}, | |
"4.4.300": { | |
"CVE-2021-43976": { | |
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", | |
"cmt_id": "7d5e12e452771509d94db391a3b5e428325ed268" | |
} | |
}, | |
"4.4.301": { | |
"CVE-2022-0330": { | |
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store", | |
"cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a" | |
} | |
}, | |
"4.4.302": { | |
"CVE-2022-0617": { | |
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", | |
"cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea" | |
} | |
}, | |
"outstanding": { | |
"CVE-2020-36322": { | |
"cmt_msg": "fuse: fix bad inode" | |
}, | |
"CVE-2020-26556": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26557": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26555": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-20794": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26559": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-35501": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0929": { | |
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" | |
}, | |
"CVE-2018-1128": { | |
"cmt_msg": "libceph: add authorizer challenge" | |
}, | |
"CVE-2018-1129": { | |
"cmt_msg": "libceph: implement CEPHX_V2 calculation mode" | |
}, | |
"CVE-2022-0001": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" | |
}, | |
"CVE-2022-29156": { | |
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" | |
}, | |
"CVE-2022-0002": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" | |
}, | |
"CVE-2018-20854": { | |
"cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" | |
}, | |
"CVE-2018-20855": { | |
"cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" | |
}, | |
"CVE-2019-19378": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1419": { | |
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" | |
}, | |
"CVE-2021-33098": { | |
"cmt_msg": "ixgbe: fix large MTU request from VF" | |
}, | |
"CVE-2017-5753": { | |
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" | |
}, | |
"CVE-2022-0995": { | |
"cmt_msg": "watch_queue: Fix filter limit check" | |
}, | |
"CVE-2020-26560": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0492": { | |
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent" | |
}, | |
"CVE-2022-0998": { | |
"cmt_msg": "vdpa: clean up get_config_size ret value handling" | |
}, | |
"CVE-2019-19377": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" | |
}, | |
"CVE-2019-2181": { | |
"cmt_msg": "binder: check for overflow when alloc for security context" | |
}, | |
"CVE-2022-0644": { | |
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" | |
}, | |
"CVE-2020-27820": { | |
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" | |
}, | |
"CVE-2022-0854": { | |
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" | |
}, | |
"CVE-2020-24503": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-24502": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-0067": { | |
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" | |
}, | |
"CVE-2019-19449": { | |
"cmt_msg": "f2fs: fix to do sanity check on segment/section count" | |
}, | |
"CVE-2022-0487": { | |
"cmt_msg": "moxart: fix potential use-after-free on remove path" | |
}, | |
"CVE-2020-26140": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26541": { | |
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" | |
}, | |
"CVE-2020-11725": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-20317": { | |
"cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" | |
}, | |
"CVE-2021-33061": { | |
"cmt_msg": "ixgbe: add improvement for MDD response functionality" | |
}, | |
"CVE-2022-1263": { | |
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" | |
}, | |
"CVE-2022-1158": { | |
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" | |
}, | |
"CVE-2021-35477": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" | |
}, | |
"CVE-2019-15222": { | |
"cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" | |
}, | |
"CVE-2019-15223": { | |
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" | |
}, | |
"CVE-2017-18552": { | |
"cmt_msg": "RDS: validate the requested traces user input against max supported" | |
}, | |
"CVE-2019-19815": { | |
"cmt_msg": "f2fs: support swap file w/ DIO" | |
}, | |
"CVE-2019-19814": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-27950": { | |
"cmt_msg": "HID: elo: fix memory leak in elo_probe" | |
}, | |
"CVE-2022-1015": { | |
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." | |
}, | |
"CVE-2021-39648": { | |
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" | |
}, | |
"CVE-2022-1011": { | |
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" | |
}, | |
"CVE-2019-19241": { | |
"cmt_msg": "io_uring: async workers should inherit the user creds" | |
}, | |
"CVE-2019-9453": { | |
"cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" | |
}, | |
"CVE-2021-43975": { | |
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" | |
}, | |
"CVE-2022-25636": { | |
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" | |
}, | |
"CVE-2017-1000405": { | |
"cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" | |
}, | |
"CVE-2016-8660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-12379": { | |
"cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" | |
}, | |
"CVE-2019-12378": { | |
"cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" | |
}, | |
"CVE-2022-23041": { | |
"cmt_msg": "xen/9p: use alloc/free_pages_exact()" | |
}, | |
"CVE-2022-0494": { | |
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" | |
}, | |
"CVE-2021-0941": { | |
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" | |
}, | |
"CVE-2020-16120": { | |
"cmt_msg": "ovl: switch to mounter creds in readdir" | |
}, | |
"CVE-2020-15802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-2544": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28796": { | |
"cmt_msg": "jbd2: fix use-after-free of transaction_t race" | |
}, | |
"CVE-2021-39713": { | |
"cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock" | |
}, | |
"CVE-2018-25020": { | |
"cmt_msg": "bpf: fix truncated jump targets on heavy expansions" | |
}, | |
"CVE-2019-20908": { | |
"cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" | |
}, | |
"CVE-2018-7754": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2018-1121": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-24448": { | |
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" | |
}, | |
"CVE-2018-3646": { | |
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" | |
}, | |
"CVE-2007-3719": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4037": { | |
"cmt_msg": "xfs: fix up non-directory creation in SGID directories" | |
}, | |
"CVE-2021-22543": { | |
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" | |
}, | |
"CVE-2019-1999": { | |
"cmt_msg": "binder: fix race between munmap() and direct reclaim" | |
}, | |
"CVE-2021-3506": { | |
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" | |
}, | |
"CVE-2020-0435": { | |
"cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" | |
}, | |
"CVE-2019-3874": { | |
"cmt_msg": "sctp: implement memory accounting on tx path" | |
}, | |
"CVE-2020-26145": { | |
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" | |
}, | |
"CVE-2022-25265": { | |
"cmt_msg": "" | |
}, | |
"CVE-2010-4563": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-7308": { | |
"cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" | |
}, | |
"CVE-2020-26143": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26142": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28893": { | |
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" | |
}, | |
"CVE-2021-29155": { | |
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" | |
}, | |
"CVE-2017-9986": { | |
"cmt_msg": "sound: Retire OSS" | |
}, | |
"CVE-2021-39711": { | |
"cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" | |
}, | |
"CVE-2021-34556": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" | |
}, | |
"CVE-2021-28714": { | |
"cmt_msg": "xen/netback: fix rx queue stall detection" | |
}, | |
"CVE-2021-39714": { | |
"cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" | |
}, | |
"CVE-2017-18261": { | |
"cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" | |
}, | |
"CVE-2018-13095": { | |
"cmt_msg": "xfs: More robust inode extent count validation" | |
}, | |
"CVE-2022-24958": { | |
"cmt_msg": "usb: gadget: don't release an existing dev->buf" | |
}, | |
"CVE-2018-13098": { | |
"cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" | |
}, | |
"CVE-2021-38300": { | |
"cmt_msg": "bpf, mips: Validate conditional branch offsets" | |
}, | |
"CVE-2021-3669": { | |
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" | |
}, | |
"CVE-2019-18885": { | |
"cmt_msg": "btrfs: merge btrfs_find_device and find_device" | |
}, | |
"CVE-2022-23042": { | |
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" | |
}, | |
"CVE-2019-11091": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" | |
}, | |
"CVE-2021-0695": { | |
"cmt_msg": "" | |
}, | |
"CVE-2015-8952": { | |
"cmt_msg": "ext2: convert to mbcache2" | |
}, | |
"CVE-2017-13693": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0399": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-38198": { | |
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" | |
}, | |
"CVE-2022-23039": { | |
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" | |
}, | |
"CVE-2017-13694": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36516": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-23036": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" | |
}, | |
"CVE-2022-23037": { | |
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" | |
}, | |
"CVE-2021-4149": { | |
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error" | |
}, | |
"CVE-2012-4542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-3894": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk" | |
}, | |
"CVE-2022-0812": { | |
"cmt_msg": "xprtrdma: fix incorrect header size calculations" | |
}, | |
"CVE-2022-1184": { | |
"cmt_msg": "" | |
}, | |
"CVE-2013-7445": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19036": { | |
"cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" | |
}, | |
"CVE-2022-28390": { | |
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" | |
}, | |
"CVE-2018-12130": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" | |
}, | |
"CVE-2021-20292": { | |
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." | |
}, | |
"CVE-2017-8065": { | |
"cmt_msg": "crypto: ccm - move cbcmac input off the stack" | |
}, | |
"CVE-2005-3660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1508": { | |
"cmt_msg": "io_uring: reexpand under-reexpanded iters" | |
}, | |
"CVE-2015-1350": { | |
"cmt_msg": "fs: Avoid premature clearing of capabilities" | |
}, | |
"CVE-2020-11669": { | |
"cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" | |
}, | |
"CVE-2019-19922": { | |
"cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" | |
}, | |
"CVE-2019-19927": { | |
"cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" | |
}, | |
"CVE-2021-4023": { | |
"cmt_msg": "io-wq: fix cancellation on create-worker failure" | |
}, | |
"CVE-2019-16921": { | |
"cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" | |
}, | |
"CVE-2021-4159": { | |
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" | |
}, | |
"CVE-2017-8797": { | |
"cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" | |
}, | |
"CVE-2017-5715": { | |
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" | |
}, | |
"CVE-2022-25258": { | |
"cmt_msg": "USB: gadget: validate interface OS descriptor requests" | |
}, | |
"CVE-2019-20806": { | |
"cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" | |
}, | |
"CVE-2008-4609": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4150": { | |
"cmt_msg": "block: fix incorrect references to disk objects" | |
}, | |
"CVE-2021-28951": { | |
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" | |
}, | |
"CVE-2020-14304": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-14305": { | |
"cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" | |
}, | |
"CVE-2018-3620": { | |
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" | |
}, | |
"CVE-2020-27777": { | |
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" | |
}, | |
"CVE-2020-0347": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-12615": { | |
"cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" | |
}, | |
"CVE-2021-3714": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-27223": { | |
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" | |
}, | |
"CVE-2022-28388": { | |
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" | |
}, | |
"CVE-2019-16230": { | |
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" | |
}, | |
"CVE-2019-16231": { | |
"cmt_msg": "fjes: Handle workqueue allocation failure" | |
}, | |
"CVE-2017-12168": { | |
"cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" | |
}, | |
"CVE-2017-18174": { | |
"cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" | |
}, | |
"CVE-2021-3892": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28356": { | |
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" | |
}, | |
"CVE-2021-4197": { | |
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" | |
}, | |
"CVE-2020-12362": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2020-12363": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2021-39636": { | |
"cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" | |
}, | |
"CVE-2022-28389": { | |
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" | |
}, | |
"CVE-2018-12127": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" | |
}, | |
"CVE-2018-12126": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" | |
}, | |
"CVE-2022-0500": { | |
"cmt_msg": "bpf: Introduce MEM_RDONLY flag" | |
}, | |
"CVE-2018-20509": { | |
"cmt_msg": "binder: refactor binder ref inc/dec for thread safety" | |
}, | |
"CVE-2022-0168": { | |
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" | |
}, | |
"CVE-2022-1055": { | |
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" | |
}, | |
"CVE-2022-0480": { | |
"cmt_msg": "memcg: enable accounting for file lock caches" | |
}, | |
"CVE-2021-45469": { | |
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" | |
}, | |
"CVE-2020-12888": { | |
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" | |
}, | |
"CVE-2019-12456": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-20811": { | |
"cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" | |
}, | |
"CVE-2020-26141": { | |
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" | |
}, | |
"CVE-2019-2025": { | |
"cmt_msg": "binder: fix race that allows malicious free of live buffer" | |
}, | |
"CVE-2022-1199": { | |
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" | |
}, | |
"CVE-2021-4218": { | |
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" | |
}, | |
"CVE-2022-23960": { | |
"cmt_msg": "ARM: report Spectre v2 status through sysfs" | |
}, | |
"CVE-2022-23222": { | |
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" | |
}, | |
"CVE-2018-5995": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2019-15290": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-7273": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2018-9465": { | |
"cmt_msg": "binder: fix proc->files use-after-free" | |
}, | |
"CVE-2018-17977": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-26878": { | |
"cmt_msg": "" | |
}, | |
"CVE-2016-5728": { | |
"cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" | |
}, | |
"CVE-2022-23038": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" | |
}, | |
"CVE-2010-5321": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1353": { | |
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" | |
}, | |
"CVE-2018-12930": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12931": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4148": { | |
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files" | |
}, | |
"CVE-2022-1198": { | |
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" | |
}, | |
"CVE-2022-1043": { | |
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" | |
}, | |
"CVE-2017-5967": { | |
"cmt_msg": "time: Remove CONFIG_TIMER_STATS" | |
}, | |
"CVE-2021-39801": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39800": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0382": { | |
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" | |
}, | |
"CVE-2019-2054": { | |
"cmt_msg": "arm/ptrace: run seccomp after ptrace" | |
}, | |
"CVE-2020-36385": { | |
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" | |
}, | |
"CVE-2022-1048": { | |
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" | |
}, | |
"CVE-2021-39633": { | |
"cmt_msg": "ip_gre: add validation for csum_start" | |
}, | |
"CVE-2019-12380": { | |
"cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" | |
}, | |
"CVE-2019-12381": { | |
"cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" | |
}, | |
"CVE-2019-12382": { | |
"cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" | |
}, | |
"CVE-2020-12364": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2021-3542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-25375": { | |
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" | |
}, | |
"CVE-2017-13166": { | |
"cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" | |
}, | |
"CVE-2021-44879": { | |
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" | |
}, | |
"CVE-2018-12207": { | |
"cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" | |
}, | |
"CVE-2022-1516": { | |
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" | |
}, | |
"CVE-2022-1016": { | |
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" | |
}, | |
"CVE-2020-12656": { | |
"cmt_msg": "sunrpc: check that domain table is empty at module unload." | |
}, | |
"CVE-2022-23040": { | |
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" | |
}, | |
"CVE-2020-12655": { | |
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" | |
}, | |
"CVE-2018-12929": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12928": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36310": { | |
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" | |
}, | |
"CVE-2020-36313": { | |
"cmt_msg": "KVM: Fix out of range accesses to memslots" | |
}, | |
"CVE-2015-2877": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1204": { | |
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" | |
}, | |
"CVE-2022-1205": { | |
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers" | |
}, | |
"CVE-2022-29582": { | |
"cmt_msg": "io_uring: fix race between timeout flush and removal" | |
}, | |
"CVE-2019-0146": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-10708": { | |
"cmt_msg": "" | |
}, | |
"CVE-2016-10723": { | |
"cmt_msg": "mm, oom: remove sleep from under oom_lock" | |
}, | |
"CVE-2022-0400": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0707": { | |
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" | |
}, | |
"CVE-2019-11191": { | |
"cmt_msg": "x86: Deprecate a.out support" | |
}, | |
"CVE-2022-26966": { | |
"cmt_msg": "sr9700: sanity check for packet length" | |
}, | |
"CVE-2021-42739": { | |
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" | |
}, | |
"CVE-2022-26490": { | |
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" | |
}, | |
"CVE-2019-19039": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" | |
}, | |
"CVE-2021-3847": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-10322": { | |
"cmt_msg": "xfs: enhance dinode verifier" | |
}, | |
"CVE-2020-8832": { | |
"cmt_msg": "drm/i915: Record the default hw state after reset upon load" | |
}, | |
"CVE-2022-1280": { | |
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" | |
}, | |
"CVE-2011-4917": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0742": { | |
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" | |
}, | |
"CVE-2021-32078": { | |
"cmt_msg": "ARM: footbridge: remove personal server platform" | |
}, | |
"CVE-2019-10220": { | |
"cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" | |
}, | |
"CVE-2021-3864": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-5489": { | |
"cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" | |
}, | |
"CVE-2019-2213": { | |
"cmt_msg": "binder: fix possible UAF when freeing buffer" | |
}, | |
"CVE-2017-18232": { | |
"cmt_msg": "scsi: libsas: direct call probe and destruct" | |
}, | |
"CVE-2017-16648": { | |
"cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" | |
} | |
} | |
}, | |
"5.4": { | |
"5.4-rc1": { | |
"CVE-2019-15099": { | |
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", | |
"cmt_id": "39d170b3cb62ba98567f5c4f40c27b5864b304e5" | |
} | |
}, | |
"5.4.1": { | |
"CVE-2019-18660": { | |
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", | |
"cmt_id": "79f6bca3bc524d8b2e29bbc96ad541d13d6d9547" | |
}, | |
"CVE-2019-15291": { | |
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", | |
"cmt_id": "acfcb05fbdb8ee3aad4359372c1b238a366b5355" | |
}, | |
"CVE-2019-18683": { | |
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", | |
"cmt_id": "5aa7ad7e991e6cb0c3a1825dbe7f78c2a8116ccc" | |
} | |
}, | |
"5.4.2": { | |
"CVE-2019-19767": { | |
"cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", | |
"cmt_id": "69412e8ac6206e36aa09a6e3f5503be020b64ba8" | |
}, | |
"CVE-2019-19241": { | |
"cmt_msg": "io_uring: async workers should inherit the user creds", | |
"cmt_id": "8387e3688aa9e06a12b58abbcfe2cbfd0cf0f589" | |
}, | |
"CVE-2019-19602": { | |
"cmt_msg": "x86/fpu: Don't cache access to fpu_fpregs_owner_ctx", | |
"cmt_id": "4c1bb6bbc541a1961ac3605a5507236961983185" | |
} | |
}, | |
"5.4.3": { | |
"CVE-2019-19062": { | |
"cmt_msg": "crypto: user - fix memory leak in crypto_report", | |
"cmt_id": "b022e155ccbcfadeaf5543d5b4d99c3c6d260ced" | |
}, | |
"CVE-2019-19050": { | |
"cmt_msg": "crypto: user - fix memory leak in crypto_reportstat", | |
"cmt_id": "d8d63ea238cc34dd3874969b13d44a158cd0fdd0" | |
}, | |
"CVE-2019-19338": { | |
"cmt_msg": "KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIES", | |
"cmt_id": "52c8b0c6e11e139f0e27ea41a7444bfbf17aa2e1" | |
}, | |
"CVE-2019-19071": { | |
"cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", | |
"cmt_id": "9f513166a8e773081f86b198371f6a80b4bd52ec" | |
}, | |
"CVE-2019-19252": { | |
"cmt_msg": "vcs: prevent write access to vcsu devices", | |
"cmt_id": "0b0923bb6d2808bc6f3b03028fec685144227ba8" | |
}, | |
"CVE-2019-19332": { | |
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", | |
"cmt_id": "8ad39a3b44c1b452e51c0fc996d65911e2545b84" | |
} | |
}, | |
"5.4.4": { | |
"CVE-2020-0041": { | |
"cmt_msg": "binder: fix incorrect calculation for num_valid", | |
"cmt_id": "34d8a89fe156b082823f438f8240e8d57291c9f2" | |
}, | |
"CVE-2019-19447": { | |
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", | |
"cmt_id": "a44a5939a4097c98481a5b873b7bd9f387e56f59" | |
} | |
}, | |
"5.4.5": { | |
"CVE-2020-1749": { | |
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", | |
"cmt_id": "48d58ae9e87aaa11814364ddb52b3461f9abac57" | |
} | |
}, | |
"5.4.7": { | |
"CVE-2019-18786": { | |
"cmt_msg": "media: rcar_drif: fix a memory disclosure", | |
"cmt_id": "96d7c3cb33c591070d067b048129a4ddd9fb9346" | |
}, | |
"CVE-2019-19057": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", | |
"cmt_id": "01b987532b79828ca67efb63eeec2bf07f3099df" | |
}, | |
"CVE-2019-19063": { | |
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", | |
"cmt_id": "39a974f8970268e7a02933e5cd6fab3e2dd8228e" | |
}, | |
"CVE-2020-0427": { | |
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", | |
"cmt_id": "f739a699db7d5a5cf39ca3ce2c84e4fe4a8f4c5d" | |
}, | |
"CVE-2019-19947": { | |
"cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices", | |
"cmt_id": "9562cdb0af47c4040c4e7e842b87a43f86845c7a" | |
}, | |
"CVE-2019-20812": { | |
"cmt_msg": "af_packet: set defaule value for tmo", | |
"cmt_id": "772f76457932305e63e2b796228158b842830022" | |
}, | |
"CVE-2019-19037": { | |
"cmt_msg": "ext4: fix ext4_empty_dir() for directories with holes", | |
"cmt_id": "6cc4ccdd0b975f5f4c334fac71fee47e564472bf" | |
}, | |
"CVE-2019-16230": { | |
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", | |
"cmt_id": "fbeec1d0e552662539a1b72e2530a7006bd677fa" | |
}, | |
"CVE-2019-16232": { | |
"cmt_msg": "libertas: fix a potential NULL pointer dereference", | |
"cmt_id": "6ab523073f222e2e3a4545cbe436ef94a33bffff" | |
}, | |
"CVE-2019-16229": { | |
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", | |
"cmt_id": "fbeec1d0e552662539a1b72e2530a7006bd677fa" | |
}, | |
"CVE-2019-19070": { | |
"cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe", | |
"cmt_id": "d7bb7d20a8bac687c16838f2b7b5629d595512d1" | |
} | |
}, | |
"5.4.8": { | |
"CVE-2020-10690": { | |
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", | |
"cmt_id": "bfa2e0cd3dfda64fde43c3dca3aeba298d2fe7ad" | |
} | |
}, | |
"5.4.9": { | |
"CVE-2019-18809": { | |
"cmt_msg": "media: usb: fix memory leak in af9005_identify_state", | |
"cmt_id": "3dba6e50d09ee8c05d5ba68bd69624ac1ea0c814" | |
}, | |
"CVE-2019-19965": { | |
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", | |
"cmt_id": "55c89290c7948e62ceac9eb3ffe6dd1555aa38d6" | |
} | |
}, | |
"5.4.11": { | |
"CVE-2019-14901": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", | |
"cmt_id": "389c0f743f9629392d119a11da780054456e9c49" | |
} | |
}, | |
"5.4.12": { | |
"CVE-2019-14895": { | |
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", | |
"cmt_id": "cbd6a85021a38ce3071fc50f2e11b709b0add8c7" | |
}, | |
"CVE-2019-19053": { | |
"cmt_msg": "rpmsg: char: release allocated memory", | |
"cmt_id": "5bbe72cf486c3b983f739b3e1d98b61c8a205795" | |
}, | |
"CVE-2019-19066": { | |
"cmt_msg": "scsi: bfa: release allocated memory in case of error", | |
"cmt_id": "448fe0b67c68d36cb45c09444c6b8298130d4c5e" | |
}, | |
"CVE-2019-20636": { | |
"cmt_msg": "Input: add safety guards to input_set_keycode()", | |
"cmt_id": "39f711b69799c49e0e385494b9b8c0787f51293f" | |
}, | |
"CVE-2019-19068": { | |
"cmt_msg": "rtl8xxxu: prevent leaking urb", | |
"cmt_id": "e380d974731502d24e0353df36a883fe232c866b" | |
}, | |
"CVE-2020-0305": { | |
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", | |
"cmt_id": "341464390512ed50d5e96cf8f5340dcfbebd837a" | |
}, | |
"CVE-2020-0431": { | |
"cmt_msg": "HID: hid-input: clear unmapped usages", | |
"cmt_id": "4091fbf6cc143c8ccd8275eaa642b2f2afe7c4ab" | |
}, | |
"CVE-2019-14615": { | |
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", | |
"cmt_id": "53b9bd37af59d1def99b20707536105857eb9bd0" | |
}, | |
"CVE-2019-19056": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", | |
"cmt_id": "3fe1ced40e189e31c21f6723fbe4bdf8d2731922" | |
}, | |
"CVE-2019-19078": { | |
"cmt_msg": "ath10k: fix memory leak", | |
"cmt_id": "ad1e0d1976b9061bf2aca99249b0187c9bbd3334" | |
} | |
}, | |
"5.4.13": { | |
"CVE-2019-19064": { | |
"cmt_msg": "spi: lpspi: fix memory leak in fsl_lpspi_probe", | |
"cmt_id": "bf3b4bc7bb03a2b0e67078d42a1d43ce05a14b7b" | |
} | |
}, | |
"5.4.14": { | |
"CVE-2020-12652": { | |
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", | |
"cmt_id": "b307a5e97483d72c4a18cc8755d362d88b50c6d1" | |
}, | |
"CVE-2021-3635": { | |
"cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption", | |
"cmt_id": "8f4dc50b5c12e159ac846fdc00702c547fdf2e95" | |
}, | |
"CVE-2019-19043": { | |
"cmt_msg": "i40e: prevent memory leak in i40e_setup_macvlans", | |
"cmt_id": "97e81f01f03c25a03ca1699111323e3984c3779c" | |
} | |
}, | |
"5.4.15": { | |
"CVE-2019-19046": { | |
"cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register", | |
"cmt_id": "57d748f43f0742f58b5cf01b2d7b9a0d2e113e3d" | |
} | |
}, | |
"5.4.16": { | |
"CVE-2019-14896": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "40b1747b03684f03827b6323a17e4aa67af1e307" | |
}, | |
"CVE-2019-14897": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "40b1747b03684f03827b6323a17e4aa67af1e307" | |
}, | |
"CVE-2020-14416": { | |
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", | |
"cmt_id": "34545cad8e0476aa6843f132e1177fe1517b2814" | |
}, | |
"CVE-2020-8428": { | |
"cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", | |
"cmt_id": "454759886d0b463213fad0f1c733469e2c501ab9" | |
} | |
}, | |
"5.4.17": { | |
"CVE-2020-0432": { | |
"cmt_msg": "staging: most: net: fix buffer overflow", | |
"cmt_id": "b5e5d81230ec6a24b3ce452fc41d8260292c686a" | |
}, | |
"CVE-2020-12769": { | |
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", | |
"cmt_id": "7db4e6c728cbb4caf6708b0181bc11763d1e89a7" | |
} | |
}, | |
"5.4.19": { | |
"CVE-2020-0404": { | |
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", | |
"cmt_id": "6fcbff54ded118b29ca05f56aea85825d24a5645" | |
}, | |
"CVE-2019-3016": { | |
"cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", | |
"cmt_id": "68460ceba319a46ea14b36129bfd0a152e0f00c3" | |
} | |
}, | |
"5.4.20": { | |
"CVE-2020-12653": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", | |
"cmt_id": "3c822e1f31186767d6b7261c3c066f01907ecfca" | |
}, | |
"CVE-2020-12654": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", | |
"cmt_id": "c5b071e3f44d1125694ad4dcf1234fb9a78d0be6" | |
} | |
}, | |
"5.4.21": { | |
"CVE-2022-1419": { | |
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", | |
"cmt_id": "3ea7f138cec139be98f8bb9fc1a6b432003f834e" | |
}, | |
"CVE-2020-8992": { | |
"cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode", | |
"cmt_id": "94f0fe04da78adc214b51523499031664f9db408" | |
} | |
}, | |
"5.4.23": { | |
"CVE-2020-9383": { | |
"cmt_msg": "floppy: check FDC index for errors before assigning it", | |
"cmt_id": "1eb78bc92c847f9e1c01a01b2773fc2fe7b134cf" | |
}, | |
"CVE-2020-2732": { | |
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", | |
"cmt_id": "24dfae91a23a55c9f4cbe8fd778ed229ee9cced1" | |
}, | |
"CVE-2020-0110": { | |
"cmt_msg": "sched/psi: Fix OOB write when writing 0 bytes to PSI files", | |
"cmt_id": "e61c236dcf3416211008774b6c2bfa01753a82c1" | |
}, | |
"CVE-2020-0009": { | |
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", | |
"cmt_id": "41a53f5b68ec36bcd100816554c31e3cff7b6c6e" | |
}, | |
"CVE-2020-9391": { | |
"cmt_msg": "mm: Avoid creating virtual address aliases in brk()/mmap()/mremap()", | |
"cmt_id": "95236ae76bf8c5a71bcbb90a0c46a564613831d7" | |
} | |
}, | |
"5.4.24": { | |
"CVE-2020-27068": { | |
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", | |
"cmt_id": "f0593f5b1b64d3e08c67ee756c4253080e52afb2" | |
}, | |
"CVE-2019-19768": { | |
"cmt_msg": "blktrace: Protect q->blk_trace with RCU", | |
"cmt_id": "6f9cff84dde800b4d9eab071810fbe284686601e" | |
}, | |
"CVE-2020-10942": { | |
"cmt_msg": "vhost: Check docket sk_family instead of call getname", | |
"cmt_id": "f09fbb1175cffdbbb36b28e2ff7db96dcc90de08" | |
}, | |
"CVE-2020-0444": { | |
"cmt_msg": "audit: fix error handling in audit_data_to_entry()", | |
"cmt_id": "37f4c2775267c6fea23172f4d0461eb42c8497a6" | |
} | |
}, | |
"5.4.25": { | |
"CVE-2020-8647": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "5d230547476eea90b57ed9fda4bfe5307779abbb" | |
}, | |
"CVE-2020-8649": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "5d230547476eea90b57ed9fda4bfe5307779abbb" | |
}, | |
"CVE-2020-8648": { | |
"cmt_msg": "vt: selection, close sel_buffer race", | |
"cmt_id": "4387bfa605206b57451e6f77af1287960981ffa2" | |
} | |
}, | |
"5.4.26": { | |
"CVE-2020-12465": { | |
"cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", | |
"cmt_id": "02013734629bf57070525a3515509780092a63ab" | |
} | |
}, | |
"5.4.27": { | |
"CVE-2020-29370": { | |
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", | |
"cmt_id": "ae119b7e12472517bc35c1c003d5abf26653674a" | |
} | |
}, | |
"5.4.28": { | |
"CVE-2019-19769": { | |
"cmt_msg": "locks: fix a potential use-after-free problem when wakeup a waiter", | |
"cmt_id": "384e15fc4226551a45b54226dc57bca7e23db9d8" | |
}, | |
"CVE-2020-14381": { | |
"cmt_msg": "futex: Fix inode life-time issue", | |
"cmt_id": "553d46b07dc4813e1d8e6a3b3d6eb8603b4dda74" | |
} | |
}, | |
"5.4.29": { | |
"CVE-2021-3715": { | |
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", | |
"cmt_id": "ff28c6195814bdbd4038b08d39e40f8d65d2025e" | |
}, | |
"CVE-2020-11608": { | |
"cmt_msg": "media: ov519: add missing endpoint sanity checks", | |
"cmt_id": "e4af1cf37b901839320e40515d9a60a1c8b51f3a" | |
}, | |
"CVE-2020-11609": { | |
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks", | |
"cmt_id": "4490085a9e2d2cde69e865e3691223ea9e94513b" | |
}, | |
"CVE-2020-11668": { | |
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", | |
"cmt_id": "e7cd85f398cd1ffe3ce707ce7e2ec0e4a5010475" | |
}, | |
"CVE-2020-27066": { | |
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", | |
"cmt_id": "21af83e17ffae4955bbd8154a1e975826b8188a1" | |
} | |
}, | |
"5.4.31": { | |
"CVE-2020-11565": { | |
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", | |
"cmt_id": "c3f87e03f90ff2901525cc99c0e3bfb6fcbfd184" | |
} | |
}, | |
"5.4.32": { | |
"CVE-2020-11494": { | |
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", | |
"cmt_id": "fdb6a094ba41e985d9fb14ae2bfc180e3e983720" | |
} | |
}, | |
"5.4.33": { | |
"CVE-2019-19039": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", | |
"cmt_id": "941dabde6c1a56908696d6642229521a125dd77e" | |
}, | |
"CVE-2020-12826": { | |
"cmt_msg": "signal: Extend exec_id to 64bits", | |
"cmt_id": "5f2d04139aa5ed04eab54b84e8a25bab87a2449c" | |
}, | |
"CVE-2020-12657": { | |
"cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", | |
"cmt_id": "b37de1b1e882fa3741d252333e5745eea444483b" | |
}, | |
"CVE-2019-19377": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", | |
"cmt_id": "941dabde6c1a56908696d6642229521a125dd77e" | |
} | |
}, | |
"5.4.35": { | |
"CVE-2020-12659": { | |
"cmt_msg": "xsk: Add missing check on user supplied headroom size", | |
"cmt_id": "25c9cdef57488578da21d99eb614b97ffcf6e59f" | |
} | |
}, | |
"5.4.36": { | |
"CVE-2020-0067": { | |
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", | |
"cmt_id": "5811f24abd27a8a0791c6909c6ff803659060c84" | |
}, | |
"CVE-2020-12464": { | |
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", | |
"cmt_id": "b48193a7c303272d357b27dd7d72cbf89f7b2d35" | |
}, | |
"CVE-2020-11884": { | |
"cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses", | |
"cmt_id": "44d9eb0ebe8fd04f46b18d10a18b2c543b379a0c" | |
} | |
}, | |
"5.4.39": { | |
"CVE-2020-10751": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "eeef0d9fd40df3c033dca68bca8249e5951660ac" | |
}, | |
"CVE-2020-0255": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "eeef0d9fd40df3c033dca68bca8249e5951660ac" | |
} | |
}, | |
"5.4.42": { | |
"CVE-2020-13143": { | |
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", | |
"cmt_id": "6bb054f006c3df224cc382f1ebd81b7276dcfb1c" | |
}, | |
"CVE-2020-10711": { | |
"cmt_msg": "netlabel: cope with NULL catmap", | |
"cmt_id": "debcbc56fdfc2847804d3d00d43f68f3074c5987" | |
}, | |
"CVE-2020-12770": { | |
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write", | |
"cmt_id": "2d6d0ce4de03832c8deedeb16c7af52868d7e99e" | |
}, | |
"CVE-2020-27786": { | |
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", | |
"cmt_id": "3fa58fc9f8c4d2b3557bca4363653464546e497e" | |
} | |
}, | |
"5.4.43": { | |
"CVE-2020-12768": { | |
"cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()", | |
"cmt_id": "ac46cea606d59be18a6afd4560c48bcca836c44c" | |
}, | |
"CVE-2019-18814": { | |
"cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init", | |
"cmt_id": "97d817b9ef13e2d52a86ea032b0df6a922e0e9df" | |
} | |
}, | |
"5.4.44": { | |
"CVE-2020-10732": { | |
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", | |
"cmt_id": "a02c130efbbce91af1e9dd99a5a381dd43494e15" | |
} | |
}, | |
"5.4.45": { | |
"CVE-2020-10757": { | |
"cmt_msg": "mm: Fix mremap not considering huge pmd devmap", | |
"cmt_id": "df4988aa1c9618d9c612639e96002cd4e772def2" | |
}, | |
"CVE-2019-19462": { | |
"cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", | |
"cmt_id": "1c44e6e09dc81dcc891a6ada446f86add73baa38" | |
} | |
}, | |
"5.4.46": { | |
"CVE-2020-13974": { | |
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", | |
"cmt_id": "9619c2f746f7991486d556789e8675f1d1a0a67d" | |
}, | |
"CVE-2020-0543": { | |
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", | |
"cmt_id": "dab0161b8a0bc6a86319412e39b221670ca758ca" | |
} | |
}, | |
"5.4.47": { | |
"CVE-2021-0342": { | |
"cmt_msg": "tun: correct header offsets in napi frags mode", | |
"cmt_id": "747d5bcb97eba1ecef0ceaa6b6234ba1aca87f60" | |
}, | |
"CVE-2020-10766": { | |
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", | |
"cmt_id": "9d1dcba6dd48cf7c5801d8aee12852ca41110896" | |
}, | |
"CVE-2020-10767": { | |
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", | |
"cmt_id": "6d60d5462a91eb46fb88b016508edfa8ee0bc7c8" | |
}, | |
"CVE-2020-10768": { | |
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", | |
"cmt_id": "e1545848ad5510e82eb75717c1f5757b984014cb" | |
}, | |
"CVE-2020-29374": { | |
"cmt_msg": "gup: document and work around \"COW can break either way\" issue", | |
"cmt_id": "1027dc04f557328eb7b7b7eea48698377a959157" | |
} | |
}, | |
"5.4.48": { | |
"CVE-2020-29368": { | |
"cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", | |
"cmt_id": "a88d8aaf9b8b5e0af163a235a3baa9fdcb7d430a" | |
}, | |
"CVE-2019-20810": { | |
"cmt_msg": "media: go7007: fix a miss of snd_card_free", | |
"cmt_id": "6e688a315acf9c2b9b6e8c3e3b7a0c2720f72cba" | |
} | |
}, | |
"5.4.49": { | |
"CVE-2020-12771": { | |
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", | |
"cmt_id": "f651e94899ed08b1766bda30f410d33fdd3970ff" | |
}, | |
"CVE-2020-15436": { | |
"cmt_msg": "block: Fix use-after-free in blkdev_get()", | |
"cmt_id": "b3dc33946a742256ad9d2ccac848c9e3c2aaafef" | |
} | |
}, | |
"5.4.50": { | |
"CVE-2020-15780": { | |
"cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down", | |
"cmt_id": "824d0b6225f3fa2992704478a8df520537cfcb56" | |
}, | |
"CVE-2020-12655": { | |
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", | |
"cmt_id": "ffd40b7962d463daa531a8110e5b708bcb5c6da7" | |
} | |
}, | |
"5.4.51": { | |
"CVE-2020-24394": { | |
"cmt_msg": "nfsd: apply umask on fs without ACL support", | |
"cmt_id": "fe05e114d0fde7f644ac9ab5edfce3fa65650875" | |
}, | |
"CVE-2020-15393": { | |
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", | |
"cmt_id": "3dca0a299ff43204a69c9a7a00ce2b3e7ab3088c" | |
} | |
}, | |
"5.4.53": { | |
"CVE-2020-14356": { | |
"cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", | |
"cmt_id": "94886c86e833dbc8995202b6c6aaff592b7abd24" | |
}, | |
"CVE-2022-0812": { | |
"cmt_msg": "xprtrdma: fix incorrect header size calculations", | |
"cmt_id": "c8a4452da9f4b09c28d904f70247b097d4c14932" | |
}, | |
"CVE-2020-10781": { | |
"cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", | |
"cmt_id": "72648019cd52488716891c2cbb096ad1023ab83e" | |
} | |
}, | |
"5.4.54": { | |
"CVE-2020-29369": { | |
"cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()", | |
"cmt_id": "549bfc14270681cd776c6d9b78fe544cbd21673a" | |
}, | |
"CVE-2020-15437": { | |
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", | |
"cmt_id": "af811869db0698b587aa5418eab05c9f7e0bea3c" | |
} | |
}, | |
"5.4.56": { | |
"CVE-2019-18808": { | |
"cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", | |
"cmt_id": "ecfa7fa198fc66731ded5dabefccc8e9e2f3b311" | |
}, | |
"CVE-2020-24490": { | |
"cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", | |
"cmt_id": "9acd96f14a49f59401478eefe158aec489e0161f" | |
}, | |
"CVE-2020-12656": { | |
"cmt_msg": "sunrpc: check that domain table is empty at module unload.", | |
"cmt_id": "98cef10fbcca40e70f9f389a4bea42384376376b" | |
}, | |
"CVE-2019-19054": { | |
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", | |
"cmt_id": "84da97713b9112c9529a941b230219b759e6f206" | |
} | |
}, | |
"5.4.57": { | |
"CVE-2020-16166": { | |
"cmt_msg": "random32: update the net random state on interrupt and activity", | |
"cmt_id": "c15a77bdda2c4f8acaa3e436128630a81f904ae7" | |
} | |
}, | |
"5.4.58": { | |
"CVE-2020-36386": { | |
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", | |
"cmt_id": "c26eaaf547b785ae98fa08607b599c7df0da51bc" | |
}, | |
"CVE-2020-14331": { | |
"cmt_msg": "vgacon: Fix for missing check in scrollback handling", | |
"cmt_id": "8c3215a0426c404f4b7b02a1e0fdb0f7f4f1e6d3" | |
} | |
}, | |
"5.4.59": { | |
"CVE-2020-26088": { | |
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", | |
"cmt_id": "0b305f259ca9b85c48f9cb3159d034b7328ed225" | |
}, | |
"CVE-2021-20292": { | |
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", | |
"cmt_id": "c6d2ddf1a30d524106265ad2c48b907cd7a083d4" | |
}, | |
"CVE-2019-19770": { | |
"cmt_msg": "blktrace: fix debugfs use after free", | |
"cmt_id": "6a291f9c21e4acf3429aacfa2e019d9965806c51" | |
} | |
}, | |
"5.4.60": { | |
"CVE-2019-19448": { | |
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", | |
"cmt_id": "7bbf647dbb5a28e754633512065146763a35ff77" | |
}, | |
"CVE-2020-25212": { | |
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", | |
"cmt_id": "75cf7f895f563e14c82c1aeea0362dc155b5baf3" | |
} | |
}, | |
"5.4.61": { | |
"CVE-2020-14314": { | |
"cmt_msg": "ext4: fix potential negative array index in do_split()", | |
"cmt_id": "ea54176e5821936d109bb45dc2c19bd53559e735" | |
}, | |
"CVE-2020-29371": { | |
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", | |
"cmt_id": "19a77c937a1914bdd655366e79a2a1b7d675f554" | |
}, | |
"CVE-2020-0466": { | |
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", | |
"cmt_id": "42694912aaf1d7fa426bd02b0b313f05601b6488" | |
} | |
}, | |
"5.4.62": { | |
"CVE-2021-3428": { | |
"cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount", | |
"cmt_id": "8e63c86f658005a9d8bc672642e587a787c53a72" | |
} | |
}, | |
"5.4.63": { | |
"CVE-2020-0465": { | |
"cmt_msg": "HID: core: Sanitize event code and type when mapping input", | |
"cmt_id": "4bae1afed43212ee3ec64f2bdc9e39e800974e7e" | |
} | |
}, | |
"5.4.64": { | |
"CVE-2020-25641": { | |
"cmt_msg": "block: allow for_each_bvec to support zero len bvec", | |
"cmt_id": "84c041c12442d233c9b3c593cbe9eb8a77875578" | |
}, | |
"CVE-2021-1048": { | |
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", | |
"cmt_id": "88405cf0f2bd771670b76c42b169527ff86048da" | |
}, | |
"CVE-2020-14386": { | |
"cmt_msg": "net/packet: fix overflow in tpacket_rcv", | |
"cmt_id": "bc846b58fe5cecaa2632d566355e607954779d45" | |
}, | |
"CVE-2020-25285": { | |
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", | |
"cmt_id": "af7786b20c717ff13d9148161dad4b8e286bfd39" | |
}, | |
"CVE-2020-14385": { | |
"cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", | |
"cmt_id": "da7a1676d6c19971758976a84e87f5b1009409e7" | |
}, | |
"CVE-2020-12888": { | |
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", | |
"cmt_id": "8f747b0149c5a0c72626a87eb0dd2a5ec91f1a7d" | |
} | |
}, | |
"5.4.66": { | |
"CVE-2020-25284": { | |
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", | |
"cmt_id": "ea3d3bf85669195247ad6a522f4e4209695edca2" | |
}, | |
"CVE-2020-14390": { | |
"cmt_msg": "fbcon: remove soft scrollback code", | |
"cmt_id": "cf5a7ded53652c3d63d7243944c6a8ec1f0ef392" | |
}, | |
"CVE-2020-28097": { | |
"cmt_msg": "vgacon: remove software scrollback support", | |
"cmt_id": "087b6cb17df5834d395ab72da3f937380470ba15" | |
}, | |
"CVE-2020-36312": { | |
"cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", | |
"cmt_id": "41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d" | |
} | |
}, | |
"5.4.68": { | |
"CVE-2020-25645": { | |
"cmt_msg": "geneve: add transport ports in route lookup for geneve", | |
"cmt_id": "745c24fd1d79b588a951d3c5beca43575907f881" | |
}, | |
"CVE-2020-25643": { | |
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", | |
"cmt_id": "c3de9daa662617132744731f1b4eb7b5cd1270a8" | |
}, | |
"CVE-2021-0605": { | |
"cmt_msg": "af_key: pfkey_dump needs parameter validation", | |
"cmt_id": "a769bff2333a8212cff4fd8bbe986979bf41c528" | |
} | |
}, | |
"5.4.70": { | |
"CVE-2020-25211": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "253052b636e98083b1ecc3e9b0cf6f151e1cb8c6" | |
}, | |
"CVE-2021-0448": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "253052b636e98083b1ecc3e9b0cf6f151e1cb8c6" | |
}, | |
"CVE-2021-39634": { | |
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", | |
"cmt_id": "8993da3d4d3a7ae721e9dafa140ba64c0e632a50" | |
} | |
}, | |
"5.4.71": { | |
"CVE-2020-28915": { | |
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", | |
"cmt_id": "1b2fcd82c0ca23f6fa01298c0d7b59eb4efbaf48" | |
} | |
}, | |
"5.4.72": { | |
"CVE-2020-10135": { | |
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", | |
"cmt_id": "ed6c361e3229a2aa64b04617baa7f452bed28bcc" | |
}, | |
"CVE-2020-12352": { | |
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", | |
"cmt_id": "0d9e9b6e1a26bb248c0afee754d5a577abd4376b" | |
}, | |
"CVE-2020-12351": { | |
"cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", | |
"cmt_id": "66a14350de9a4e3db7dedb524518b1394a5f7162" | |
} | |
}, | |
"5.4.73": { | |
"CVE-2020-0423": { | |
"cmt_msg": "binder: fix UAF when releasing todo list", | |
"cmt_id": "401d4d79a8ed5ac1c78031a00f8ac414e6605a38" | |
}, | |
"CVE-2020-25705": { | |
"cmt_msg": "icmp: randomize the global rate limiter", | |
"cmt_id": "8df0ffe2f32c09b4627cbce5cd5faf8e98a6a71e" | |
} | |
}, | |
"5.4.75": { | |
"CVE-2020-27777": { | |
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", | |
"cmt_id": "240baebeda09e1e010fff58acc9183992f41f638" | |
}, | |
"CVE-2020-27673": { | |
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", | |
"cmt_id": "4bea575a10691a99b03d5e9055f3079040b59868" | |
}, | |
"CVE-2020-25668": { | |
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", | |
"cmt_id": "c2313d7818b979f8b3751f052a8db34a7ed26780" | |
}, | |
"CVE-2020-25656": { | |
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers", | |
"cmt_id": "87d398f348b8a2d5246d3670a93fb63d4fd9f62a" | |
}, | |
"CVE-2020-27675": { | |
"cmt_msg": "xen/events: avoid removing an event channel while handling it", | |
"cmt_id": "a01379671d67d34f254cc81f42cf854aa628f3a3" | |
} | |
}, | |
"5.4.76": { | |
"CVE-2020-28974": { | |
"cmt_msg": "vt: Disable KD_FONT_OP_COPY", | |
"cmt_id": "642181fe3567419d84d2457b58f262c37467f525" | |
}, | |
"CVE-2020-35508": { | |
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", | |
"cmt_id": "beeb658cfd3544ceca894375c36b6572e4ae7a5f" | |
}, | |
"CVE-2020-25704": { | |
"cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", | |
"cmt_id": "b7f7474b392194530d1ec07203c8668e81b7fdb9" | |
} | |
}, | |
"5.4.77": { | |
"CVE-2020-8694": { | |
"cmt_msg": "powercap: restrict energy meter to root access", | |
"cmt_id": "19f6d91bdad42200aac557a683c17b1f65ee6c94" | |
} | |
}, | |
"5.4.78": { | |
"CVE-2020-14351": { | |
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", | |
"cmt_id": "c5cf5c7b585c7f48195892e44b76237010c0747a" | |
} | |
}, | |
"5.4.79": { | |
"CVE-2020-4788": { | |
"cmt_msg": "powerpc/64s: flush L1D on kernel entry", | |
"cmt_id": "b65458b6be8032c5179d4f562038575d7b3a6be3" | |
}, | |
"CVE-2020-25669": { | |
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", | |
"cmt_id": "df33054114475477b5e7810aa0efb26916220474" | |
} | |
}, | |
"5.4.80": { | |
"CVE-2020-28941": { | |
"cmt_msg": "speakup: Do not let the line discipline be used several times", | |
"cmt_id": "3b78db264675e47ad3cf9c1e809e85d02fe1de90" | |
} | |
}, | |
"5.4.82": { | |
"CVE-2020-35519": { | |
"cmt_msg": "net/x25: prevent a couple of overflows", | |
"cmt_id": "8bfe5b73b185d931b77c965002f84ad986aa94f1" | |
} | |
}, | |
"5.4.83": { | |
"CVE-2020-29661": { | |
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", | |
"cmt_id": "c536ecd4856084604701b95bd7e3fb15f05634bf" | |
}, | |
"CVE-2020-29660": { | |
"cmt_msg": "tty: Fix ->session locking", | |
"cmt_id": "35ee9ac513280f46eeb1196bac82ed5320380412" | |
}, | |
"CVE-2020-27830": { | |
"cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", | |
"cmt_id": "b0d4fa10bfcc3051e9426b6286fb2d80bad04d74" | |
}, | |
"CVE-2020-28588": { | |
"cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms", | |
"cmt_id": "867fbf2bb739bc7ba02cca09093f2d35ed7eadc5" | |
} | |
}, | |
"5.4.84": { | |
"CVE-2021-0938": { | |
"cmt_msg": "compiler.h: fix barrier_data() on clang", | |
"cmt_id": "c2c5dc84ac51da90cadcb12554c69bdd5ac7aeeb" | |
} | |
}, | |
"5.4.86": { | |
"CVE-2020-27815": { | |
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", | |
"cmt_id": "cbeb61258186978c26f9ee738c86fe4812cc27af" | |
}, | |
"CVE-2020-29568": { | |
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing", | |
"cmt_id": "eac0c12e329d489ff36e85fed5ce2a8606e3124d" | |
}, | |
"CVE-2020-29569": { | |
"cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", | |
"cmt_id": "8f3f6de44f7cc93a4723e63ea4381332826a6790" | |
} | |
}, | |
"5.4.88": { | |
"CVE-2020-36322": { | |
"cmt_msg": "fuse: fix bad inode", | |
"cmt_id": "732251cabeb3bfd917d453a42274d769d6883fc4" | |
}, | |
"CVE-2020-36158": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", | |
"cmt_id": "0a49aaf4df2936bca119ee38fe5a570a7024efdc" | |
} | |
}, | |
"5.4.89": { | |
"CVE-2021-0707": { | |
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode", | |
"cmt_id": "ef8133b1b47ed67873c291e9248fafd428d1767d" | |
}, | |
"CVE-2020-28374": { | |
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", | |
"cmt_id": "485e21729b1e1235e6075318225c09e76b376e81" | |
}, | |
"CVE-2021-39648": { | |
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", | |
"cmt_id": "bcffe2de9dde74174805d5f56a990353e33b8072" | |
} | |
}, | |
"5.4.92": { | |
"CVE-2021-3178": { | |
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", | |
"cmt_id": "4aef760c28e8bd1860a27fd78067b4ea77124987" | |
} | |
}, | |
"5.4.93": { | |
"CVE-2021-39657": { | |
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", | |
"cmt_id": "97853a7eae80a695a18ce432524eaa7432199a41" | |
} | |
}, | |
"5.4.94": { | |
"CVE-2020-27825": { | |
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call", | |
"cmt_id": "b899d5b2a42a963d6ca7e33d51a35b2eb25f6d10" | |
}, | |
"CVE-2021-3347": { | |
"cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", | |
"cmt_id": "0dae88a92596db9405fd4a341c1915cf7d8fbad4" | |
} | |
}, | |
"5.4.95": { | |
"CVE-2021-3348": { | |
"cmt_msg": "nbd: freeze the queue while we're adding connections", | |
"cmt_id": "587c6b75d7fdd366ad7dc615471006ce73c03a51" | |
} | |
}, | |
"5.4.98": { | |
"CVE-2021-3600": { | |
"cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", | |
"cmt_id": "78e2f71b89b22222583f74803d14f3d90cdf9d12" | |
} | |
}, | |
"5.4.99": { | |
"CVE-2021-21781": { | |
"cmt_msg": "ARM: ensure the signal page contains defined contents", | |
"cmt_id": "f49bff85b6dbb60a410c7f7dc53b52ee1dc22470" | |
} | |
}, | |
"5.4.100": { | |
"CVE-2021-26931": { | |
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", | |
"cmt_id": "7109f61d25ff4dc2041f4be71042219869112e4c" | |
}, | |
"CVE-2021-26930": { | |
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", | |
"cmt_id": "524a77aa5d69e726369b38813333f20c6511b66c" | |
}, | |
"CVE-2021-26932": { | |
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", | |
"cmt_id": "104eef95231497cdb4e4de24a1ddef7c831a8b44" | |
} | |
}, | |
"5.4.101": { | |
"CVE-2021-0512": { | |
"cmt_msg": "HID: make arrays usage and value to be the same", | |
"cmt_id": "fce3654c648d8f92882d0dae117c20231b8b224f" | |
}, | |
"CVE-2021-3444": { | |
"cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", | |
"cmt_id": "185c2266c1df80bec001c987d64cae2d9cd13816" | |
} | |
}, | |
"5.4.102": { | |
"CVE-2020-25639": { | |
"cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails", | |
"cmt_id": "0faef25462f886a77e0b397cca31d51163215332" | |
}, | |
"CVE-2021-3612": { | |
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", | |
"cmt_id": "80168ba86034fc938970500b40c88b3914fede96" | |
} | |
}, | |
"5.4.103": { | |
"CVE-2021-30002": { | |
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", | |
"cmt_id": "027ddd67f68583a178a9bd65220611e9f978f014" | |
}, | |
"CVE-2021-27365": { | |
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", | |
"cmt_id": "567a234a231db16a99067db3d31d351d9e770a82" | |
}, | |
"CVE-2021-27364": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "ca3afdd0377379f5031f376aec4b0c1b0285b556" | |
}, | |
"CVE-2021-27363": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "ca3afdd0377379f5031f376aec4b0c1b0285b556" | |
}, | |
"CVE-2021-28038": { | |
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", | |
"cmt_id": "474773c42ffd89f7606b54443990ccf5086a4734" | |
} | |
}, | |
"5.4.106": { | |
"CVE-2021-28375": { | |
"cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages", | |
"cmt_id": "e4b52c7cbaaf4d11288d331b654b0fac450e4971" | |
}, | |
"CVE-2021-33033": { | |
"cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", | |
"cmt_id": "b4800e7a1c9f80a1a0e417ab36a1da4959f8b399" | |
}, | |
"CVE-2021-29265": { | |
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", | |
"cmt_id": "8698133003cfb67e0f04dd044c954198e421b152" | |
}, | |
"CVE-2021-39656": { | |
"cmt_msg": "configfs: fix a use-after-free in __configfs_open_file", | |
"cmt_id": "73aa6f93e1e980f392b3da4fee830b0e0a4a40ff" | |
}, | |
"CVE-2021-28660": { | |
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", | |
"cmt_id": "da5abe369b03447b3df1e5816b9560cbae503993" | |
} | |
}, | |
"5.4.108": { | |
"CVE-2021-28964": { | |
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", | |
"cmt_id": "5b3b99525c4f18e543f6ef17ef97c29f5694e8b4" | |
}, | |
"CVE-2021-28972": { | |
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", | |
"cmt_id": "51a2b19b554c8c75ee2d253b87240309cd81f1fc" | |
}, | |
"CVE-2021-28971": { | |
"cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", | |
"cmt_id": "da326ba3b84aae8ac0513aa4725a49843f2f871e" | |
} | |
}, | |
"5.4.109": { | |
"CVE-2021-28688": { | |
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", | |
"cmt_id": "057dd3e6986b260f0bec68bd1f2cd23a5d9dbda3" | |
}, | |
"CVE-2021-31916": { | |
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices", | |
"cmt_id": "e6587d142d0214eb466f9978e25f0575c19b1ea0" | |
}, | |
"CVE-2021-29264": { | |
"cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", | |
"cmt_id": "ec7ce1e337ec2b5641dcc639396e04a28454f21a" | |
}, | |
"CVE-2021-29647": { | |
"cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", | |
"cmt_id": "ae23957bd1fb3184a9935bd99c5ad2351a59d7c8" | |
}, | |
"CVE-2021-29650": { | |
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.", | |
"cmt_id": "19a5fb4ceada903e692de96b8aa8494179abbf0b" | |
} | |
}, | |
"5.4.110": { | |
"CVE-2021-0941": { | |
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", | |
"cmt_id": "42c83e3bca434d9f63c58f9cbf2881e635679fee" | |
}, | |
"CVE-2021-3483": { | |
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", | |
"cmt_id": "5ecfad1efbc31ab913f16ed60f0efff301aebfca" | |
} | |
}, | |
"5.4.111": { | |
"CVE-2021-29154": { | |
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", | |
"cmt_id": "a0b3927a07be0c4cedd69970e082a8c23c92eb72" | |
} | |
}, | |
"5.4.112": { | |
"CVE-2021-3659": { | |
"cmt_msg": "net: mac802154: Fix general protection fault", | |
"cmt_id": "38ea2b3ed00fb4632a706f2c796d6aa4a884f573" | |
}, | |
"CVE-2020-25672": { | |
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", | |
"cmt_id": "404daa4d62a364623b48349eb73a18579edf51ac" | |
}, | |
"CVE-2020-25673": { | |
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", | |
"cmt_id": "aa0cff2e075152d474b0b01233ac0adfcfc0c0db" | |
}, | |
"CVE-2020-25670": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", | |
"cmt_id": "c89903c9eff219a4695e63715cf922748d743f65" | |
}, | |
"CVE-2020-25671": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", | |
"cmt_id": "41bc58ba0945d69578f60c6f06729d8e2dc327dc" | |
} | |
}, | |
"5.4.113": { | |
"CVE-2021-0937": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "cc59b872f2e1995b8cc819b9445c1198bfe83b2d" | |
}, | |
"CVE-2021-22555": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "cc59b872f2e1995b8cc819b9445c1198bfe83b2d" | |
} | |
}, | |
"5.4.114": { | |
"CVE-2021-23133": { | |
"cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", | |
"cmt_id": "6180d2274b17fc0473fb0764d3417c0bddb99b2e" | |
} | |
}, | |
"5.4.117": { | |
"CVE-2021-31829": { | |
"cmt_msg": "bpf: Fix masking negation logic upon negative dst register", | |
"cmt_id": "53e0db429b37a32b8fc706d0d90eb4583ad13848" | |
} | |
}, | |
"5.4.118": { | |
"CVE-2021-3506": { | |
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", | |
"cmt_id": "27a130638406815eba083c632ee083f0c5e688c2" | |
} | |
}, | |
"5.4.119": { | |
"CVE-2021-33034": { | |
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", | |
"cmt_id": "3a826ffa80d5c73ad7338fd98ace9c5b53844968" | |
}, | |
"CVE-2021-45486": { | |
"cmt_msg": "inet: use bigger hash table for IP ID generation", | |
"cmt_id": "fee81285bd09ec2080ce2cbb5063aad0e58eb272" | |
}, | |
"CVE-2021-32399": { | |
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", | |
"cmt_id": "eeec325c9944b4427f482018d00b737220c31fd9" | |
} | |
}, | |
"5.4.120": { | |
"CVE-2021-4157": { | |
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", | |
"cmt_id": "89862bd77e9cf511628eb7a97fe7f8d246192eec" | |
} | |
}, | |
"5.4.122": { | |
"CVE-2020-26558": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" | |
}, | |
"CVE-2021-0129": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" | |
} | |
}, | |
"5.4.124": { | |
"CVE-2021-33098": { | |
"cmt_msg": "ixgbe: fix large MTU request from VF", | |
"cmt_id": "cf20c704a26eb763daf6bfb10369a4f11fef2d9a" | |
}, | |
"CVE-2020-24587": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59" | |
}, | |
"CVE-2020-24586": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59" | |
}, | |
"CVE-2021-34981": { | |
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", | |
"cmt_id": "fe201316ac36c48fc3cb2891dfdc8ab68058734d" | |
}, | |
"CVE-2020-24588": { | |
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", | |
"cmt_id": "fa00d4928eafe4fe8d854028f73f7af8fdbc9c3c" | |
}, | |
"CVE-2020-26139": { | |
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", | |
"cmt_id": "88664d5e5dc9eedddbea9cc8ebb3d57d933f9f8a" | |
}, | |
"CVE-2020-26145": { | |
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe", | |
"cmt_id": "96d4d82652fa013d8b452871305a0c1e5f805d9e" | |
}, | |
"CVE-2020-26147": { | |
"cmt_msg": "mac80211: assure all fragments are encrypted", | |
"cmt_id": "b90cf214e2bbb3f0a25d19937807238f646d1d72" | |
}, | |
"CVE-2020-26141": { | |
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe", | |
"cmt_id": "aee0121afee53cde39e49086317af5d029911857" | |
} | |
}, | |
"5.4.125": { | |
"CVE-2021-3564": { | |
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order", | |
"cmt_id": "8d3d0ac73a4a1d31e3d4f7c068312aba78470166" | |
}, | |
"CVE-2021-38208": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" | |
}, | |
"CVE-2021-3573": { | |
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", | |
"cmt_id": "b6f97555c71f78288682bc967121572f10715c89" | |
}, | |
"CVE-2021-3587": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" | |
} | |
}, | |
"5.4.128": { | |
"CVE-2021-34693": { | |
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", | |
"cmt_id": "c297559a2a2a6b6f0de61ed333a978a118b0e660" | |
}, | |
"CVE-2021-3743": { | |
"cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", | |
"cmt_id": "26b8d10703a9be45d6097946b2b4011f7dd2c56f" | |
} | |
}, | |
"5.4.129": { | |
"CVE-2020-26541": { | |
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries", | |
"cmt_id": "e20b90e4f81bb04e2b180824caae585928e24ba9" | |
}, | |
"CVE-2021-35039": { | |
"cmt_msg": "module: limit enabling module.sig_enforce", | |
"cmt_id": "e2dc07ca4e0148d75963e14d2b78afc12426a487" | |
}, | |
"CVE-2021-22543": { | |
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", | |
"cmt_id": "bb85717e3797123ae7724751af21d0c9d605d61e" | |
} | |
}, | |
"5.4.131": { | |
"CVE-2020-36311": { | |
"cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy", | |
"cmt_id": "abbd42939db646f7210e1473e9cb17c6bc6f184c" | |
} | |
}, | |
"5.4.132": { | |
"CVE-2021-3609": { | |
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", | |
"cmt_id": "70a9116b9e5ccd5332d3a60b359fb5902d268fd0" | |
}, | |
"CVE-2022-0850": { | |
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", | |
"cmt_id": "ed628b2531196cc76d7c9b730abe4020cad26b0b" | |
} | |
}, | |
"5.4.133": { | |
"CVE-2021-3655": { | |
"cmt_msg": "sctp: validate from_addr_param return", | |
"cmt_id": "03a5e454614dc095a70d88c85ac45ba799c79971" | |
}, | |
"CVE-2021-45485": { | |
"cmt_msg": "ipv6: use prandom_u32() for ID generation", | |
"cmt_id": "ccde03a6a0fbdc3c0ba81930e629b8b14974cce4" | |
} | |
}, | |
"5.4.134": { | |
"CVE-2021-38160": { | |
"cmt_msg": "virtio_console: Assure used length from device is limited", | |
"cmt_id": "52bd1bce8624acb861fa96b7c8fc2e75422dc8f7" | |
}, | |
"CVE-2021-38199": { | |
"cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", | |
"cmt_id": "81e03fe5bf8f5f66b8a62429fb4832b11ec6b272" | |
}, | |
"CVE-2021-4154": { | |
"cmt_msg": "cgroup: verify that source is a string", | |
"cmt_id": "c17363ccd620c1a57ede00d5c777f0b8624debe6" | |
}, | |
"CVE-2021-33909": { | |
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations", | |
"cmt_id": "c1dafbb26164f43f2bb70bee9e5c4e1cad228ca7" | |
} | |
}, | |
"5.4.136": { | |
"CVE-2021-38204": { | |
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory", | |
"cmt_id": "863d071dbcd54dacf47192a1365faec46b7a68ca" | |
}, | |
"CVE-2021-3679": { | |
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", | |
"cmt_id": "f899f24d34d964593b16122a774c192a78e2ca56" | |
}, | |
"CVE-2021-37576": { | |
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", | |
"cmt_id": "2b9ffddd70b449cdc42b943788dc82a6d7b0d175" | |
} | |
}, | |
"5.4.137": { | |
"CVE-2021-0920": { | |
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", | |
"cmt_id": "85abe0d47fe65391ed41f78a66b5eff73987c086" | |
} | |
}, | |
"5.4.139": { | |
"CVE-2021-33624": { | |
"cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", | |
"cmt_id": "283d742988f6b304f32110f39e189a00d4e52b92" | |
} | |
}, | |
"5.4.141": { | |
"CVE-2021-38198": { | |
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", | |
"cmt_id": "d28adaabbbf4a6949d0f6f71daca6744979174e2" | |
}, | |
"CVE-2021-38205": { | |
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", | |
"cmt_id": "38b8485b72cbe4521fd2e0b8770e3d78f9b89e60" | |
}, | |
"CVE-2021-3732": { | |
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed", | |
"cmt_id": "812f39ed5b0b7f34868736de3055c92c7c4cf459" | |
} | |
}, | |
"5.4.142": { | |
"CVE-2021-3653": { | |
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", | |
"cmt_id": "7c1c96ffb658fbfe66c5ebed6bcb5909837bc267" | |
}, | |
"CVE-2021-3656": { | |
"cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", | |
"cmt_id": "a17f2f2c89494c0974529579f3552ecbd1bc2d52" | |
} | |
}, | |
"5.4.143": { | |
"CVE-2021-42008": { | |
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", | |
"cmt_id": "a73b9aa142691c2ae313980a8734997a78f74b22" | |
}, | |
"CVE-2020-3702": { | |
"cmt_msg": "ath: Use safer key clearing with key cache entries", | |
"cmt_id": "0c049ce432b37a51a0da005314ac32e5d9324ccf" | |
} | |
}, | |
"5.4.144": { | |
"CVE-2021-39633": { | |
"cmt_msg": "ip_gre: add validation for csum_start", | |
"cmt_id": "53b480e68c1c2c778b620cc7f45a2ba5dff518ca" | |
}, | |
"CVE-2021-3753": { | |
"cmt_msg": "vt_kdsetmode: extend console locking", | |
"cmt_id": "f4418015201bdca0cd4e28b363d88096206e4ad0" | |
}, | |
"CVE-2021-3739": { | |
"cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id", | |
"cmt_id": "d7f7eca72ecc08f0bb6897fda2290293fca63068" | |
} | |
}, | |
"5.4.145": { | |
"CVE-2021-40490": { | |
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", | |
"cmt_id": "9b3849ba667af99ee99a7853a021a7786851b9fd" | |
} | |
}, | |
"5.4.146": { | |
"CVE-2021-20322": { | |
"cmt_msg": "ipv6: make exception cache less predictible", | |
"cmt_id": "f73cbdd1b8e7ea32c66138426f826c8734b70c18" | |
}, | |
"CVE-2021-34556": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", | |
"cmt_id": "e80c3533c354ede56146ab0e4fbb8304d0c1209f" | |
}, | |
"CVE-2021-35477": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", | |
"cmt_id": "e80c3533c354ede56146ab0e4fbb8304d0c1209f" | |
} | |
}, | |
"5.4.148": { | |
"CVE-2021-42252": { | |
"cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", | |
"cmt_id": "2712f29c44f18db826c7e093915a727b6f3a20e4" | |
}, | |
"CVE-2021-20320": { | |
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", | |
"cmt_id": "a5fc48000b0ed5c389d426c341b43f580faa7904" | |
}, | |
"CVE-2020-16119": { | |
"cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", | |
"cmt_id": "5ab04a4ffed02f66e8e6310ba8261a43d1572343" | |
} | |
}, | |
"5.4.151": { | |
"CVE-2021-3764": { | |
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", | |
"cmt_id": "24f3d2609114f1e1f6b487b511ce5fa36f21e0ae" | |
}, | |
"CVE-2021-4203": { | |
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", | |
"cmt_id": "0fcfaa8ed9d1dcbe377b202a1b3cdfd4e566114c" | |
}, | |
"CVE-2021-3744": { | |
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", | |
"cmt_id": "24f3d2609114f1e1f6b487b511ce5fa36f21e0ae" | |
}, | |
"CVE-2021-37159": { | |
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", | |
"cmt_id": "fe57d53dd91d7823f1ceef5ea8e9458a4aeb47fa" | |
} | |
}, | |
"5.4.153": { | |
"CVE-2021-20321": { | |
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", | |
"cmt_id": "fab338f33c25c4816ca0b2d83a04a0097c2c4aaf" | |
}, | |
"CVE-2021-41864": { | |
"cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", | |
"cmt_id": "b14f28126c51533bb329379f65de5b0dd689b13a" | |
}, | |
"CVE-2021-38300": { | |
"cmt_msg": "bpf, mips: Validate conditional branch offsets", | |
"cmt_id": "1a0fe45501a273ac52252448e43f975f0c18811e" | |
} | |
}, | |
"5.4.155": { | |
"CVE-2021-3894": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk", | |
"cmt_id": "d88774539539dcbf825a25e61234f110513f5963" | |
}, | |
"CVE-2021-4149": { | |
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error", | |
"cmt_id": "005a07c9acd6cf8a40555884f0650dfd4ec23fbe" | |
}, | |
"CVE-2022-0322": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk", | |
"cmt_id": "d88774539539dcbf825a25e61234f110513f5963" | |
} | |
}, | |
"5.4.156": { | |
"CVE-2021-3896": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54" | |
}, | |
"CVE-2021-43056": { | |
"cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest", | |
"cmt_id": "d0148cfaf89ce2af0d76e39943e200365e7fc99a" | |
}, | |
"CVE-2022-0644": { | |
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", | |
"cmt_id": "0f218ba4c8aac7041cd8b81a5a893b0d121e6316" | |
}, | |
"CVE-2021-3760": { | |
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", | |
"cmt_id": "1f75f8883b4fe9fe1856d71f055120315e758188" | |
}, | |
"CVE-2021-43389": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "285e9210b1fab96a11c0be3ed5cea9dd48b6ac54" | |
} | |
}, | |
"5.4.157": { | |
"CVE-2021-3772": { | |
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", | |
"cmt_id": "5953ee99bab134d74c805a00eaa20fed33f54255" | |
} | |
}, | |
"5.4.158": { | |
"CVE-2021-42739": { | |
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", | |
"cmt_id": "2461f38384d50dd966e1db44fe165b1896f5df5a" | |
} | |
}, | |
"5.4.160": { | |
"CVE-2021-3752": { | |
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", | |
"cmt_id": "67bd269a84ce29dfc543c1683a2553b4169f9a55" | |
}, | |
"CVE-2021-45868": { | |
"cmt_msg": "quota: check block number when reading the block in quota file", | |
"cmt_id": "10b808307d37d09b132fc086002bc1aa9910d315" | |
}, | |
"CVE-2021-39686": { | |
"cmt_msg": "binder: use euid from cred instead of using task", | |
"cmt_id": "28a1e470b000d45bcf6c05f18a01d07cdc0b3235" | |
}, | |
"CVE-2021-3640": { | |
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", | |
"cmt_id": "d416020f1a9cc5f903ae66649b2c56d9ad5256ab" | |
} | |
}, | |
"5.4.162": { | |
"CVE-2021-4202": { | |
"cmt_msg": "NFC: reorganize the functions in nci_request", | |
"cmt_id": "e418bb556ff801e11592851fd465415757a2ef68" | |
}, | |
"CVE-2021-4002": { | |
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", | |
"cmt_id": "201340ca4eb748c52062c5e938826ddfbe313088" | |
}, | |
"CVE-2020-27820": { | |
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal", | |
"cmt_id": "1c4af56ffbfb2fc6bd222f5dc8cb210c5ffaab70" | |
} | |
}, | |
"5.4.164": { | |
"CVE-2021-43975": { | |
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", | |
"cmt_id": "89d15a2e40d7edaaa16da2763b349dd7b056cc09" | |
}, | |
"CVE-2021-4083": { | |
"cmt_msg": "fget: check that the fd still exists after getting a ref to it", | |
"cmt_id": "03d4462ba3bc8f830d9807e3c3fde54fad06e2e2" | |
} | |
}, | |
"5.4.165": { | |
"CVE-2021-39698": { | |
"cmt_msg": "wait: add wake_up_pollfree()", | |
"cmt_id": "e0c03d15cd03476dd698c1ae7fb32a16d3e87f5c" | |
}, | |
"CVE-2021-39685": { | |
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", | |
"cmt_id": "fd6de5a0cd42fc43810bd74ad129d98ab962ec6b" | |
} | |
}, | |
"5.4.168": { | |
"CVE-2021-28715": { | |
"cmt_msg": "xen/netback: don't queue unlimited number of packages", | |
"cmt_id": "0d99b3c6bd39a0a023e972d8f912fd47698bbbb8" | |
}, | |
"CVE-2021-28714": { | |
"cmt_msg": "xen/netback: fix rx queue stall detection", | |
"cmt_id": "8bfcd0385211044627f93d170991da1ae5937245" | |
}, | |
"CVE-2021-28713": { | |
"cmt_msg": "xen/console: harden hvc_xen against event channel storms", | |
"cmt_id": "560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3" | |
}, | |
"CVE-2021-28712": { | |
"cmt_msg": "xen/netfront: harden netfront against event channel storms", | |
"cmt_id": "3e68d099f09c260a7dee28b99af02fe6977a9e66" | |
}, | |
"CVE-2021-28711": { | |
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms", | |
"cmt_id": "4ed9f5c511ce95cb8db05ff82026ea901f45fd76" | |
}, | |
"CVE-2021-4135": { | |
"cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", | |
"cmt_id": "699e794c12a3cd79045ff135bc87a53b97024e43" | |
} | |
}, | |
"5.4.169": { | |
"CVE-2021-45469": { | |
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", | |
"cmt_id": "b0406b5ef4e2c4fb21d9e7d5c36a0453b4279e9b" | |
}, | |
"CVE-2022-1195": { | |
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", | |
"cmt_id": "a5c6a13e9056d87805ba3042c208fbd4164ad22b" | |
} | |
}, | |
"5.4.170": { | |
"CVE-2021-44733": { | |
"cmt_msg": "tee: handle lookup of shm with reference count 0", | |
"cmt_id": "940e68e57ab69248fabba5889e615305789db8a7" | |
} | |
}, | |
"5.4.171": { | |
"CVE-2021-45095": { | |
"cmt_msg": "phonet: refcount leak in pep_sock_accep", | |
"cmt_id": "2a6a811a45fde5acb805ead4d1e942be3875b302" | |
}, | |
"CVE-2021-4155": { | |
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", | |
"cmt_id": "102af6edfd3a372db6e229177762a91f552e5f5e" | |
} | |
}, | |
"5.4.173": { | |
"CVE-2022-0185": { | |
"cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", | |
"cmt_id": "bd2aed0464ae3d6e83ce064cd91fc1a7fec48826" | |
} | |
}, | |
"5.4.174": { | |
"CVE-2021-43976": { | |
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", | |
"cmt_id": "ae56c5524a750fd8cf32565cb3902ce5baaeb4e6" | |
} | |
}, | |
"5.4.175": { | |
"CVE-2022-0330": { | |
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store", | |
"cmt_id": "1b5553c79d52f17e735cd924ff2178a2409e6d0b" | |
}, | |
"CVE-2022-22942": { | |
"cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", | |
"cmt_id": "84b1259fe36ae0915f3d6ddcea6377779de48b82" | |
} | |
}, | |
"5.4.176": { | |
"CVE-2022-24448": { | |
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", | |
"cmt_id": "0dfacee40021dcc0a9aa991edd965addc04b9370" | |
}, | |
"CVE-2022-0617": { | |
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", | |
"cmt_id": "31136e5467f381cf18e2cfd467207dda7678c7a2" | |
}, | |
"CVE-2022-24959": { | |
"cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", | |
"cmt_id": "7afc09c8915b0735203ebcb8d766d7db37b794c0" | |
} | |
}, | |
"5.4.177": { | |
"CVE-2022-0492": { | |
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent", | |
"cmt_id": "0e8283cbe4996ae046cd680b3ed598a8f2b0d5d8" | |
}, | |
"CVE-2022-1055": { | |
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", | |
"cmt_id": "b1d17e920dfcd4b56fa2edced5710c191f7e50b5" | |
} | |
}, | |
"5.4.179": { | |
"CVE-2022-0435": { | |
"cmt_msg": "tipc: improve size validations for received domain records", | |
"cmt_id": "d692e3406e052dbf9f6d9da0cba36cb763272529" | |
}, | |
"CVE-2022-0487": { | |
"cmt_msg": "moxart: fix potential use-after-free on remove path", | |
"cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e" | |
} | |
}, | |
"5.4.180": { | |
"CVE-2022-25375": { | |
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", | |
"cmt_id": "c9e952871ae47af784b4aef0a77db02e557074d6" | |
}, | |
"CVE-2022-25258": { | |
"cmt_msg": "USB: gadget: validate interface OS descriptor requests", | |
"cmt_id": "38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18" | |
} | |
}, | |
"5.4.182": { | |
"CVE-2022-25636": { | |
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", | |
"cmt_id": "49c011a44edd14adb555dbcbaf757f52b1f2f748" | |
}, | |
"CVE-2022-27223": { | |
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", | |
"cmt_id": "6b23eda989236fd75b4a9893cc816cd690c29dfc" | |
}, | |
"CVE-2022-26966": { | |
"cmt_msg": "sr9700: sanity check for packet length", | |
"cmt_id": "b95d71abeb7d31d4d51cd836d80f99fd783fd6d5" | |
} | |
}, | |
"5.4.183": { | |
"CVE-2022-24958": { | |
"cmt_msg": "usb: gadget: don't release an existing dev->buf", | |
"cmt_id": "ba6fdd55b16677dcc1d7011270c140d2a37e5f35" | |
} | |
}, | |
"5.4.184": { | |
"CVE-2022-23038": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", | |
"cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0" | |
}, | |
"CVE-2022-23039": { | |
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", | |
"cmt_id": "d193785a4bc91c2b9e004d16d0c9ea5bc0a2f34d" | |
}, | |
"CVE-2022-23960": { | |
"cmt_msg": "ARM: report Spectre v2 status through sysfs", | |
"cmt_id": "fdfc0baf829dfb306a1ec45900d2cfbee265ae60" | |
}, | |
"CVE-2022-23036": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", | |
"cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0" | |
}, | |
"CVE-2022-23037": { | |
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", | |
"cmt_id": "b507879c1e2d2c55752f658439df71595f4adff2" | |
}, | |
"CVE-2022-0001": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", | |
"cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5" | |
}, | |
"CVE-2022-0002": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", | |
"cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5" | |
}, | |
"CVE-2022-23041": { | |
"cmt_msg": "xen/9p: use alloc/free_pages_exact()", | |
"cmt_id": "be63ea883e56aacf9326e581b53dff9ac087ace1" | |
}, | |
"CVE-2022-23040": { | |
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", | |
"cmt_id": "95ff82383266a7720d596eb8b4499ed01746a730" | |
}, | |
"CVE-2022-23042": { | |
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", | |
"cmt_id": "0e35f3ab69bcb01fdbf5aadc78f1731778963b1c" | |
} | |
}, | |
"5.4.185": { | |
"CVE-2022-1199": { | |
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", | |
"cmt_id": "0a64aea5fe023cf1e4973676b11f49038b1f045b" | |
}, | |
"CVE-2022-1011": { | |
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", | |
"cmt_id": "a9174077febfb1608ec3361622bf5f91e2668d7f" | |
} | |
}, | |
"5.4.188": { | |
"CVE-2022-26490": { | |
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", | |
"cmt_id": "0aef7184630b599493a0dcad4eec6d42b3e68e91" | |
}, | |
"CVE-2022-28356": { | |
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", | |
"cmt_id": "572f9a0d3f3feb8bd3422e88ad71882bc034b3ff" | |
}, | |
"CVE-2022-1016": { | |
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", | |
"cmt_id": "06f0ff82c70241a766a811ae1acf07d6e2734dcb" | |
}, | |
"CVE-2022-27666": { | |
"cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", | |
"cmt_id": "fee4dfbda68ba10f3bbcf51c861d6aa32f08f9e4" | |
} | |
}, | |
"5.4.189": { | |
"CVE-2022-28390": { | |
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", | |
"cmt_id": "e27caad38b59b5b00b9c5228d04c13111229deec" | |
}, | |
"CVE-2022-1158": { | |
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", | |
"cmt_id": "1553126eccf4fad17afaeaed08db9e5944aa2d55" | |
}, | |
"CVE-2022-1353": { | |
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", | |
"cmt_id": "ef388db2fe351230ff7194b37d507784bef659ec" | |
}, | |
"CVE-2022-1198": { | |
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", | |
"cmt_id": "28c8fd84bea13cbf238d7b19d392de2fcc31331c" | |
}, | |
"CVE-2021-4197": { | |
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", | |
"cmt_id": "691a0fd625e06c138f7662286a87ffba48773f34" | |
}, | |
"CVE-2022-28389": { | |
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", | |
"cmt_id": "2dfe9422d528630e2ce0d454147230cce113f814" | |
}, | |
"CVE-2022-1516": { | |
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", | |
"cmt_id": "9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f" | |
} | |
}, | |
"5.4.190": { | |
"CVE-2022-1204": { | |
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", | |
"cmt_id": "9e1e088a57c23251f1cfe9601bbd90ade2ea73b9" | |
}, | |
"CVE-2022-1205": { | |
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", | |
"cmt_id": "40cb8b3b19c087a4e20f6740701e53fefbe19a7b" | |
} | |
}, | |
"5.4.191": { | |
"CVE-2022-28388": { | |
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", | |
"cmt_id": "660784e7194ac2953aebe874c1f75f2441ba3d19" | |
} | |
}, | |
"outstanding": { | |
"CVE-2021-0929": { | |
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" | |
}, | |
"CVE-2020-26556": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26557": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26555": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-20794": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26559": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-35501": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0168": { | |
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" | |
}, | |
"CVE-2018-1121": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19378": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0995": { | |
"cmt_msg": "watch_queue: Fix filter limit check" | |
}, | |
"CVE-2022-0998": { | |
"cmt_msg": "vdpa: clean up get_config_size ret value handling" | |
}, | |
"CVE-2019-15794": { | |
"cmt_msg": "ovl: fix reference counting in ovl_mmap error path" | |
}, | |
"CVE-2021-3759": { | |
"cmt_msg": "memcg: enable accounting of ipc resources" | |
}, | |
"CVE-2022-0854": { | |
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" | |
}, | |
"CVE-2020-24503": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-24502": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19449": { | |
"cmt_msg": "f2fs: fix to do sanity check on segment/section count" | |
}, | |
"CVE-2020-24504": { | |
"cmt_msg": "ice: create scheduler aggregator node config and move VSIs" | |
}, | |
"CVE-2020-11725": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0382": { | |
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" | |
}, | |
"CVE-2021-33061": { | |
"cmt_msg": "ixgbe: add improvement for MDD response functionality" | |
}, | |
"CVE-2022-1263": { | |
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" | |
}, | |
"CVE-2021-3864": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-29373": { | |
"cmt_msg": "io_uring: grab ->fs as part of async preparation" | |
}, | |
"CVE-2019-19814": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-27950": { | |
"cmt_msg": "HID: elo: fix memory leak in elo_probe" | |
}, | |
"CVE-2022-1015": { | |
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." | |
}, | |
"CVE-2021-26934": { | |
"cmt_msg": "" | |
}, | |
"CVE-2016-8660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-3669": { | |
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" | |
}, | |
"CVE-2022-0494": { | |
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" | |
}, | |
"CVE-2018-12929": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-15802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-2544": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28796": { | |
"cmt_msg": "jbd2: fix use-after-free of transaction_t race" | |
}, | |
"CVE-2019-15239": { | |
"cmt_msg": "unknown" | |
}, | |
"CVE-2007-3719": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4037": { | |
"cmt_msg": "xfs: fix up non-directory creation in SGID directories" | |
}, | |
"CVE-2010-4563": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26140": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26143": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26142": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28893": { | |
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" | |
}, | |
"CVE-2022-29156": { | |
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" | |
}, | |
"CVE-2021-20177": { | |
"cmt_msg": "netfilter: add and use nf_hook_slow_list()" | |
}, | |
"CVE-2020-10708": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4023": { | |
"cmt_msg": "io-wq: fix cancellation on create-worker failure" | |
}, | |
"CVE-2017-13693": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0399": { | |
"cmt_msg": "" | |
}, | |
"CVE-2017-13694": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36516": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4148": { | |
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files" | |
}, | |
"CVE-2013-7445": { | |
"cmt_msg": "" | |
}, | |
"CVE-2005-3660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1508": { | |
"cmt_msg": "io_uring: reexpand under-reexpanded iters" | |
}, | |
"CVE-2021-4159": { | |
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" | |
}, | |
"CVE-2021-0695": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-4609": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4150": { | |
"cmt_msg": "block: fix incorrect references to disk objects" | |
}, | |
"CVE-2021-28951": { | |
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" | |
}, | |
"CVE-2020-14304": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-0347": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-29155": { | |
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" | |
}, | |
"CVE-2021-3714": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-12456": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26560": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-3892": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-12362": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2020-12363": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2022-0742": { | |
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" | |
}, | |
"CVE-2020-12364": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2022-0500": { | |
"cmt_msg": "bpf: Introduce MEM_RDONLY flag" | |
}, | |
"CVE-2022-0480": { | |
"cmt_msg": "memcg: enable accounting for file lock caches" | |
}, | |
"CVE-2022-1184": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-25265": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1043": { | |
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" | |
}, | |
"CVE-2021-4218": { | |
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" | |
}, | |
"CVE-2022-23222": { | |
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" | |
}, | |
"CVE-2019-15902": { | |
"cmt_msg": "unknown" | |
}, | |
"CVE-2019-15290": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-17977": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-26878": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-29582": { | |
"cmt_msg": "io_uring: fix race between timeout flush and removal" | |
}, | |
"CVE-2010-5321": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12930": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12931": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-29534": { | |
"cmt_msg": "io_uring: don't rely on weak ->files references" | |
}, | |
"CVE-2012-4542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-20239": { | |
"cmt_msg": "net: pass a sockptr_t into ->setsockopt" | |
}, | |
"CVE-2021-39801": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39800": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1048": { | |
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" | |
}, | |
"CVE-2020-36385": { | |
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" | |
}, | |
"CVE-2021-3542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-44879": { | |
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" | |
}, | |
"CVE-2020-16120": { | |
"cmt_msg": "ovl: switch to mounter creds in readdir" | |
}, | |
"CVE-2018-12928": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36310": { | |
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" | |
}, | |
"CVE-2020-36313": { | |
"cmt_msg": "KVM: Fix out of range accesses to memslots" | |
}, | |
"CVE-2015-2877": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-0146": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-16089": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0400": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-3847": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1280": { | |
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" | |
}, | |
"CVE-2011-4917": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-32078": { | |
"cmt_msg": "ARM: footbridge: remove personal server platform" | |
}, | |
"CVE-2020-27835": { | |
"cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" | |
} | |
} | |
}, | |
"4.14": { | |
"4.14": { | |
"CVE-2017-16647": { | |
"cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", | |
"cmt_id": "baedf68a068ca29624f241426843635920f16e1d" | |
}, | |
"CVE-2017-16650": { | |
"cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", | |
"cmt_id": "7fd078337201cf7468f53c3d9ef81ff78cb6df3b" | |
}, | |
"CVE-2017-16649": { | |
"cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", | |
"cmt_id": "2cb80187ba065d7decad7c6614e35e07aec8a974" | |
} | |
}, | |
"4.14.1": { | |
"CVE-2017-16646": { | |
"cmt_msg": "media: dib0700: fix invalid dvb_detach argument", | |
"cmt_id": "75d9dd294e2a41ddce75cc02d1675a9cf40873fc" | |
}, | |
"CVE-2017-16537": { | |
"cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", | |
"cmt_id": "16edf1a6a8a52040841e3e875c76bad0aa28f85f" | |
} | |
}, | |
"4.14.2": { | |
"CVE-2017-18204": { | |
"cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", | |
"cmt_id": "44ec0aecc73dc3959bdbb6fa733c69dc0bb633f4" | |
}, | |
"CVE-2017-16994": { | |
"cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", | |
"cmt_id": "bbce81fc966f59421e5f54c4bd3d3a4670f45e33" | |
} | |
}, | |
"4.14.3": { | |
"CVE-2017-18203": { | |
"cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", | |
"cmt_id": "3bfb87ecb4f7e19c53c31b7beca4ecd9bb906a67" | |
}, | |
"CVE-2017-16536": { | |
"cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", | |
"cmt_id": "5a482b8a75500ec7516f3d11c7fb063e3f4abc45" | |
} | |
}, | |
"4.14.4": { | |
"CVE-2017-18208": { | |
"cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", | |
"cmt_id": "8a0bb9ebaa8b8faee61f095757662fe5d7fd8da6" | |
}, | |
"CVE-2017-18202": { | |
"cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", | |
"cmt_id": "786b924d39bad16ff99aacdb4076df027cc2f8b8" | |
} | |
}, | |
"4.14.6": { | |
"CVE-2017-17807": { | |
"cmt_msg": "KEYS: add missing permission check for request_key() destination", | |
"cmt_id": "69d5894ce0a67d37f900d2597fc0b2b8cef6c863" | |
}, | |
"CVE-2017-0861": { | |
"cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", | |
"cmt_id": "0482dcd51004920b13b59995b7afb66df49937da" | |
}, | |
"CVE-2017-1000407": { | |
"cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", | |
"cmt_id": "a52c2829cd60492fc75bafc323145cab1af915f5" | |
} | |
}, | |
"4.14.7": { | |
"CVE-2018-18559": { | |
"cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", | |
"cmt_id": "589983eb9986ea9c851c8906a81781f317207313" | |
}, | |
"CVE-2018-7492": { | |
"cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", | |
"cmt_id": "9d9a63d74b2b6ed7c30c7d1584d87c16ae8d5862" | |
}, | |
"CVE-2017-16648": { | |
"cmt_msg": "dvb_frontend: don't use-after-free the frontend struct", | |
"cmt_id": "7bc8eb30f1e02b4dd6fd2869720c64d9bf39d765" | |
} | |
}, | |
"4.14.8": { | |
"CVE-2018-14619": { | |
"cmt_msg": "crypto: algif_aead - fix reference counting of null skcipher", | |
"cmt_id": "96c2dfaebe1a8eba95d43732a1413c777469128c" | |
}, | |
"CVE-2017-16913": { | |
"cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", | |
"cmt_id": "1621db059603e781f61a9bf33cba639b42faf0bc" | |
}, | |
"CVE-2017-16912": { | |
"cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", | |
"cmt_id": "7120d742ad8d0f1fe37e4b73827e166fc1e01eea" | |
}, | |
"CVE-2017-16911": { | |
"cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", | |
"cmt_id": "b6a2ad646c13bb9d1231bce5599cb3176ff33ca4" | |
}, | |
"CVE-2017-16914": { | |
"cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", | |
"cmt_id": "d78a5506cf0ea112124c1ffa5c0aae09b579d96d" | |
}, | |
"CVE-2017-17558": { | |
"cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", | |
"cmt_id": "4c5ae6a301a5415d1334f6c655bebf91d475bd89" | |
}, | |
"CVE-2017-18344": { | |
"cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", | |
"cmt_id": "3df23f7ce7255d1ef2a616071cac359a245fb6de" | |
}, | |
"CVE-2017-17806": { | |
"cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", | |
"cmt_id": "902ae89f841de0c8d2857919296923f6332e174f" | |
}, | |
"CVE-2017-17805": { | |
"cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", | |
"cmt_id": "c68b31521d5fb7216cb1113130399afe65437c6c" | |
} | |
}, | |
"4.14.9": { | |
"CVE-2017-17857": { | |
"cmt_msg": "bpf: fix missing error return in check_stack_boundary()", | |
"cmt_id": "2120fca0ecfb4552d27608d409ebd3403ce02ce4" | |
}, | |
"CVE-2017-17864": { | |
"cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", | |
"cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" | |
}, | |
"CVE-2017-17862": { | |
"cmt_msg": "bpf: fix branch pruning logic", | |
"cmt_id": "2b3ea8ceb2bb71e9e58527661261dba127137d9b" | |
}, | |
"CVE-2017-17863": { | |
"cmt_msg": "bpf: fix integer overflows", | |
"cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" | |
}, | |
"CVE-2017-17853": { | |
"cmt_msg": "bpf/verifier: fix bounds calculation on BPF_RSH", | |
"cmt_id": "4d54f7df5131d67f653f674003ec5f52c9818b53" | |
}, | |
"CVE-2017-17852": { | |
"cmt_msg": "bpf: fix 32-bit ALU op verification", | |
"cmt_id": "6c8e098d0324412d4ae9e06c7e611a96b87faf80" | |
}, | |
"CVE-2017-17855": { | |
"cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", | |
"cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" | |
}, | |
"CVE-2017-16996": { | |
"cmt_msg": "bpf: fix incorrect tracking of register size truncation", | |
"cmt_id": "bf5ee24e87e39548bf30d4e18e479e61a5a98336" | |
}, | |
"CVE-2017-16995": { | |
"cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", | |
"cmt_id": "6e12ea4fb45ca86cdd7425276b6993455fee947a" | |
}, | |
"CVE-2017-17856": { | |
"cmt_msg": "bpf: force strict alignment checks for stack pointers", | |
"cmt_id": "c90268f7cbee0781331b96d1423d0f28a6183889" | |
}, | |
"CVE-2017-17854": { | |
"cmt_msg": "bpf: fix integer overflows", | |
"cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" | |
} | |
}, | |
"4.14.11": { | |
"CVE-2017-18595": { | |
"cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", | |
"cmt_id": "21a9c7346ef696161dacbbd9f47dabb0f062c4c8" | |
}, | |
"CVE-2018-9465": { | |
"cmt_msg": "binder: fix proc->files use-after-free", | |
"cmt_id": "d87f1bc7d15b89bd3bcf31020eb7f3b3cd6f84b5" | |
}, | |
"CVE-2018-18386": { | |
"cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", | |
"cmt_id": "aaa5a91ff744f91fb1d1c91853aa0c8f126be563" | |
}, | |
"CVE-2017-17449": { | |
"cmt_msg": "netlink: Add netns check on taps", | |
"cmt_id": "e3fb538e5715250d6a61a26925215229f2e9f52f" | |
}, | |
"CVE-2017-17712": { | |
"cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", | |
"cmt_id": "3bc400bad0e003d40a0a2412411aed7cbae16f96" | |
}, | |
"CVE-2017-15129": { | |
"cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", | |
"cmt_id": "dd9a2648b3e35c2369f580215d916baf7e23253a" | |
} | |
}, | |
"4.14.13": { | |
"CVE-2017-18075": { | |
"cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", | |
"cmt_id": "7156c794b8ab462705e6ac80c5fa69565eb44c62" | |
} | |
}, | |
"4.14.14": { | |
"CVE-2017-13216": { | |
"cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", | |
"cmt_id": "242e20a5b3cc2b99ace977546d3cffc6a2a35991" | |
}, | |
"CVE-2017-17741": { | |
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", | |
"cmt_id": "653c41ac4729261cb356ee1aff0f3f4f342be1eb" | |
}, | |
"CVE-2018-5333": { | |
"cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", | |
"cmt_id": "5edbe3c0249f54578636b71377861d579b1781cf" | |
}, | |
"CVE-2017-1000410": { | |
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", | |
"cmt_id": "02462928e2234eea95dd1ce05ca1f2c02088dc13" | |
}, | |
"CVE-2018-5332": { | |
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", | |
"cmt_id": "5d127d15ad2f9f33af788f1edf720ba29317f55b" | |
} | |
}, | |
"4.14.15": { | |
"CVE-2017-18551": { | |
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", | |
"cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" | |
}, | |
"CVE-2018-6927": { | |
"cmt_msg": "futex: Prevent overflow by strengthen input validation", | |
"cmt_id": "17ae6ccfe5dd85605dc44534348b506f95d16a61" | |
}, | |
"CVE-2019-9454": { | |
"cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", | |
"cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" | |
}, | |
"CVE-2018-1000004": { | |
"cmt_msg": "ALSA: seq: Make ioctls race-free", | |
"cmt_id": "c3162384aed4cfe3f1a1f40041f3ba8cd7704d88" | |
} | |
}, | |
"4.14.16": { | |
"CVE-2018-1000028": { | |
"cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", | |
"cmt_id": "54e67ba7d20a5921cfe712cfe4bd773e75df10e0" | |
}, | |
"CVE-2017-17450": { | |
"cmt_msg": "netfilter: xt_osf: Add missing permission checks", | |
"cmt_id": "19848ca7b7dad5153860239c893c1eadd603217e" | |
}, | |
"CVE-2017-17448": { | |
"cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", | |
"cmt_id": "671624872144abc37bc5e8f3b27987890f6e87f3" | |
} | |
}, | |
"4.14.17": { | |
"CVE-2019-2215": { | |
"cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", | |
"cmt_id": "7a3cee43e935b9d526ad07f20bf005ba7e74d05b" | |
}, | |
"CVE-2018-5344": { | |
"cmt_msg": "loop: fix concurrent lo_open/lo_release", | |
"cmt_id": "d5e06a1867210049bbfe27864ee0a40cfd9b1e9b" | |
} | |
}, | |
"4.14.18": { | |
"CVE-2017-5754": { | |
"cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", | |
"cmt_id": "343c91242d092852ab22411780f886317d7001aa" | |
} | |
}, | |
"4.14.20": { | |
"CVE-2017-13166": { | |
"cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt", | |
"cmt_id": "ea96d8f676dd3caeb77e3dc509c880cc81d303a6" | |
}, | |
"CVE-2018-5750": { | |
"cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", | |
"cmt_id": "f232bfdcdd768bb6ba5945f1f8f28faa94fc10b8" | |
}, | |
"CVE-2017-16538": { | |
"cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", | |
"cmt_id": "fd31a38d268f50afe9c5cd3d4beafa020ad39e90" | |
}, | |
"CVE-2017-8824": { | |
"cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", | |
"cmt_id": "e5e1e153ecd40c2b09c23d2b2c161a6c8ddbba07" | |
}, | |
"CVE-2017-16644": { | |
"cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", | |
"cmt_id": "dd24d173b50af3aadb1ea2e04edaa8d68ca59b23" | |
} | |
}, | |
"4.14.21": { | |
"CVE-2018-7566": { | |
"cmt_msg": "ALSA: seq: Fix racy pool initializations", | |
"cmt_id": "7466294dad8963e29f051d8ab2f4d3f67d2f62a6" | |
} | |
}, | |
"4.14.22": { | |
"CVE-2018-20510": { | |
"cmt_msg": "binder: replace \"%p\" with \"%pK\"", | |
"cmt_id": "b46af094b82a47ca1cbba9092578f8f96af82798" | |
}, | |
"CVE-2020-0030": { | |
"cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", | |
"cmt_id": "441b5d10e4602b25ad960d1ca1c6bb77e788c220" | |
} | |
}, | |
"4.14.25": { | |
"CVE-2018-5803": { | |
"cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", | |
"cmt_id": "1fc74a57a8ae863c95afedef2510e7e42b194e56" | |
} | |
}, | |
"4.14.27": { | |
"CVE-2018-1068": { | |
"cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", | |
"cmt_id": "eaa06bfba8eabd44ce952758046492eebc973bbe" | |
}, | |
"CVE-2018-7995": { | |
"cmt_msg": "x86/MCE: Serialize sysfs changes", | |
"cmt_id": "5c1c405d393648da95339c3e0f2dcfd7a1021388" | |
}, | |
"CVE-2018-1065": { | |
"cmt_msg": "netfilter: add back stackpointer size checks", | |
"cmt_id": "638c2e4eff89aae86593e80ac2be01eee195fccb" | |
} | |
}, | |
"4.14.28": { | |
"CVE-2019-9456": { | |
"cmt_msg": "usb: usbmon: Read text within supplied buffer size", | |
"cmt_id": "59b0613d3f40f0ba621bb9c7ddf06dea2948e0b7" | |
} | |
}, | |
"4.14.31": { | |
"CVE-2018-8822": { | |
"cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", | |
"cmt_id": "2a2b9ef3092680bdf09751d55420910f81fd0c3c" | |
}, | |
"CVE-2018-7740": { | |
"cmt_msg": "hugetlbfs: check for pgoff value overflow", | |
"cmt_id": "1e8628443ede418464b0ab101b24fbb7030949b2" | |
}, | |
"CVE-2018-1087": { | |
"cmt_msg": "kvm/x86: fix icebp instruction handling", | |
"cmt_id": "06b2810150542cfe0e66407c77ea2de6790e35dc" | |
}, | |
"CVE-2018-8781": { | |
"cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", | |
"cmt_id": "c8deec7181212f170191c7ffbb01a16367682f5b" | |
}, | |
"CVE-2018-8897": { | |
"cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", | |
"cmt_id": "5a29ce2b9880a26e1ac95169dedabc988360c734" | |
} | |
}, | |
"4.14.32": { | |
"CVE-2019-15239": { | |
"cmt_msg": "unknown", | |
"cmt_id": "dbbf2d1e4077bab0c65ece2765d3fc69cf7d610f" | |
}, | |
"CVE-2021-0935": { | |
"cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure", | |
"cmt_id": "a8f02befc87d6f1a882c9b14a31bcfa1fbd3d430" | |
}, | |
"CVE-2018-1130": { | |
"cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", | |
"cmt_id": "91d27e0c302501e148460db9981b5b04481781ce" | |
} | |
}, | |
"4.14.33": { | |
"CVE-2018-1000199": { | |
"cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", | |
"cmt_id": "ca04476df8fd39c71818352db43090bd17dd1d58" | |
}, | |
"CVE-2017-17975": { | |
"cmt_msg": "media: usbtv: prevent double free in error case", | |
"cmt_id": "1f17d5033fe3c435556d8fb731f3a51ca073ce85" | |
} | |
}, | |
"4.14.34": { | |
"CVE-2018-7757": { | |
"cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", | |
"cmt_id": "8644d14c3240b6875c9e0e72c346146c24a6d8c1" | |
} | |
}, | |
"4.14.35": { | |
"CVE-2020-35513": { | |
"cmt_msg": "nfsd: fix incorrect umasks", | |
"cmt_id": "9a0a509839f31dc17f2ea788dc362c93589e077a" | |
} | |
}, | |
"4.14.36": { | |
"CVE-2019-14763": { | |
"cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()", | |
"cmt_id": "59d3a952e4f3d505f9444e86db069081323351c7" | |
}, | |
"CVE-2018-1094": { | |
"cmt_msg": "ext4: always initialize the crc32c checksum driver", | |
"cmt_id": "26dbb30c58ffb85bc015bd5e58831483d50f7d18" | |
}, | |
"CVE-2018-1095": { | |
"cmt_msg": "ext4: limit xattr size to INT_MAX", | |
"cmt_id": "a57eb14b740e6175aff8b8941bec628403992dfa" | |
}, | |
"CVE-2018-1108": { | |
"cmt_msg": "random: fix crng_ready() test", | |
"cmt_id": "6e513bc20ca63f594632eca4e1968791240b8f18" | |
}, | |
"CVE-2018-1092": { | |
"cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", | |
"cmt_id": "8e0e94683f8449f4e83b4b563b80eb9c76b9e18f" | |
}, | |
"CVE-2018-20961": { | |
"cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", | |
"cmt_id": "96dc465173a1f790e805246206aee3d18770f614" | |
} | |
}, | |
"4.14.37": { | |
"CVE-2018-8087": { | |
"cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()", | |
"cmt_id": "afadc440a1cc08895f451b4a9db551a45f2a1a21" | |
}, | |
"CVE-2021-39636": { | |
"cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace", | |
"cmt_id": "ad10785a706e63ff155fc97860cdcc5e3bc5992d" | |
} | |
}, | |
"4.14.38": { | |
"CVE-2018-10940": { | |
"cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", | |
"cmt_id": "68c09d548bfc61aec99fa9a24e703c3d6fdba9b1" | |
} | |
}, | |
"4.14.39": { | |
"CVE-2018-9415": { | |
"cmt_msg": "ARM: amba: Fix race condition with driver_override", | |
"cmt_id": "23abff7b984ff46b78b9964f9cdba42036b4149a" | |
}, | |
"CVE-2018-9385": { | |
"cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", | |
"cmt_id": "f671ee8de31a3c2702250e64e5f18ebceb21f1e6" | |
}, | |
"CVE-2018-1093": { | |
"cmt_msg": "ext4: add validity checks for bitmap block numbers", | |
"cmt_id": "b39430ea068797bb45b72429db3743064280b1be" | |
} | |
}, | |
"4.14.41": { | |
"CVE-2018-1000200": { | |
"cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3", | |
"cmt_id": "2270dfcc4b12d49c6d74394d245858ae882a8b79" | |
}, | |
"CVE-2018-11508": { | |
"cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field", | |
"cmt_id": "ef7c4825fe5fe9ed251bda8d4c04d47fe33c3afb" | |
} | |
}, | |
"4.14.42": { | |
"CVE-2018-1120": { | |
"cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", | |
"cmt_id": "5c9a9508de30d4d27a270047c7ab5f2817b1366d" | |
} | |
}, | |
"4.14.43": { | |
"CVE-2018-5814": { | |
"cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", | |
"cmt_id": "ec0c93951ecb3ab9463c9a0d0a79c69e4bcb2b2a" | |
}, | |
"CVE-2018-3639": { | |
"cmt_msg": "x86/nospec: Simplify alternative_msr_write()", | |
"cmt_id": "8410540f5aaf06ab01197443371be89822971e58" | |
} | |
}, | |
"4.14.44": { | |
"CVE-2018-10021": { | |
"cmt_msg": "scsi: libsas: defer ata device eh commands to libata", | |
"cmt_id": "58442874542fb41fd53de4ab34be180ad43779c9" | |
}, | |
"CVE-2018-1000204": { | |
"cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", | |
"cmt_id": "d827bea2d18c07ba514f7d48cde49f90da9a1384" | |
} | |
}, | |
"4.14.45": { | |
"CVE-2018-11506": { | |
"cmt_msg": "sr: pass down correctly sized SCSI sense buffer", | |
"cmt_id": "2a039b93679fb2e974bedf5b0d76da81731474ba" | |
}, | |
"CVE-2018-9518": { | |
"cmt_msg": "NFC: llcp: Limit size of SDP URI", | |
"cmt_id": "54881db3251a48f9a27ac8b7223a9b421757d395" | |
}, | |
"CVE-2017-13695": { | |
"cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", | |
"cmt_id": "1d1646c408f62148fd2bbc399927bdc5381cb3ba" | |
}, | |
"CVE-2018-6412": { | |
"cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", | |
"cmt_id": "ccf92117d49d77f3d88ad81d63ea5c0d02a94e3f" | |
} | |
}, | |
"4.14.49": { | |
"CVE-2019-18675": { | |
"cmt_msg": "mmap: introduce sane default mmap limits", | |
"cmt_id": "16d7ceb04b554207aa68dd27c1bc11f8933813fd" | |
} | |
}, | |
"4.14.50": { | |
"CVE-2018-10853": { | |
"cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", | |
"cmt_id": "53e4b19fcd0ce08933e0f7a7fe11654f6eac1f19" | |
}, | |
"CVE-2018-12904": { | |
"cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", | |
"cmt_id": "b1bd9caf5e98d8111361f53367fece3444b0a7c2" | |
} | |
}, | |
"4.14.52": { | |
"CVE-2018-10840": { | |
"cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", | |
"cmt_id": "21542545990c5aba4b919ac0f8c8ae6a408b49d4" | |
}, | |
"CVE-2018-1118": { | |
"cmt_msg": "vhost: fix info leak due to uninitialized memory", | |
"cmt_id": "7446344baafba2f23da58ac837b86770ec977b90" | |
}, | |
"CVE-2018-11412": { | |
"cmt_msg": "ext4: do not allow external inodes for inline data", | |
"cmt_id": "e81d371dac30019816a1c5a3a2c4c44bb3c68558" | |
}, | |
"CVE-2018-12232": { | |
"cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", | |
"cmt_id": "91717ffc9057f38a0203a40ef36ae2e482fd7cbe" | |
} | |
}, | |
"4.14.53": { | |
"CVE-2018-13406": { | |
"cmt_msg": "video: uvesafb: Fix integer overflow in allocation", | |
"cmt_id": "9aa818d42bf5f5477f66dbc941b4daddfcae290d" | |
} | |
}, | |
"4.14.55": { | |
"CVE-2018-9516": { | |
"cmt_msg": "HID: debug: check length before copy_to_user()", | |
"cmt_id": "50b4d984f55e7e8d75f75da6803505ca3c122cef" | |
}, | |
"CVE-2018-10879": { | |
"cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", | |
"cmt_id": "ac93c718365ac6ea9d7631641c8dec867d623491" | |
}, | |
"CVE-2018-10881": { | |
"cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", | |
"cmt_id": "deb465ec750b80776cc4ac5b92b72c0a71fd4f0b" | |
}, | |
"CVE-2018-10878": { | |
"cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", | |
"cmt_id": "ac48bb9bc0a32f5a4432be1645b57607f8c46aa7" | |
}, | |
"CVE-2018-10877": { | |
"cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", | |
"cmt_id": "d69a9df614fc68741efcb0fcc020f05caa99d668" | |
}, | |
"CVE-2018-10876": { | |
"cmt_msg": "ext4: only look at the bg_flags field if it is valid", | |
"cmt_id": "44a4bc970bfae625d0ec9ecdfefc88c9d93dfe6c" | |
}, | |
"CVE-2018-10880": { | |
"cmt_msg": "ext4: never move the system.data xattr out of the inode body", | |
"cmt_id": "8a9ef17c0dc93def47e17b227ada95c682592a1d" | |
}, | |
"CVE-2017-13168": { | |
"cmt_msg": "scsi: sg: mitigate read/write abuse", | |
"cmt_id": "6e51bfa950864343cfe210a75268e826a2b4b2e8" | |
}, | |
"CVE-2018-10882": { | |
"cmt_msg": "ext4: add more inode number paranoia checks", | |
"cmt_id": "c24aab6d86640ccf321b87be6096319f55b16274" | |
}, | |
"CVE-2018-10883": { | |
"cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", | |
"cmt_id": "0321e68838d7ba2528b367b879b2fcf9d96a2099" | |
} | |
}, | |
"4.14.56": { | |
"CVE-2018-13405": { | |
"cmt_msg": "Fix up non-directory creation in SGID directories", | |
"cmt_id": "298243a5fb640f018e2fae22c0c895f1b27f0963" | |
}, | |
"CVE-2018-16276": { | |
"cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", | |
"cmt_id": "90f2a76ccd37cce2530df49335bcea6cd0e23797" | |
} | |
}, | |
"4.14.57": { | |
"CVE-2017-18216": { | |
"cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", | |
"cmt_id": "c59a8f13f36b51f2100111121b39c6d15eca124d" | |
}, | |
"CVE-2017-18224": { | |
"cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", | |
"cmt_id": "1ccab2bf726e1cd9292deecf4d72d732527035d6" | |
} | |
}, | |
"4.14.58": { | |
"CVE-2018-10902": { | |
"cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", | |
"cmt_id": "5d251646ab1588077b26e89dcaa116aba105d097" | |
} | |
}, | |
"4.14.59": { | |
"CVE-2018-5390": { | |
"cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", | |
"cmt_id": "f3a5ba6310e11df370f6888ed716d1486896d983" | |
} | |
}, | |
"4.14.60": { | |
"CVE-2018-14734": { | |
"cmt_msg": "infiniband: fix a possible use-after-free bug", | |
"cmt_id": "e27dad1eb1ac7bedb5a033ac2e068543742c807b" | |
} | |
}, | |
"4.14.62": { | |
"CVE-2018-13093": { | |
"cmt_msg": "xfs: validate cached inodes are free when allocated", | |
"cmt_id": "6f021e4ef39ace7f58c415856aef9308c70e89b9" | |
}, | |
"CVE-2018-13094": { | |
"cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", | |
"cmt_id": "59f35b983e8aeb98188c6ef93f8eabc594f8f953" | |
}, | |
"CVE-2018-12233": { | |
"cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", | |
"cmt_id": "7d29fb53439c8c91874550cc078eda6db8feafe7" | |
} | |
}, | |
"4.14.63": { | |
"CVE-2018-3646": { | |
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", | |
"cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" | |
}, | |
"CVE-2018-15572": { | |
"cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", | |
"cmt_id": "f374b5593e44c01265156b4c4070b618097f401b" | |
}, | |
"CVE-2018-3620": { | |
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", | |
"cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" | |
} | |
}, | |
"4.14.64": { | |
"CVE-2018-9363": { | |
"cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", | |
"cmt_id": "6e2c702e797c25b49dac3a9f663c449f30cf8efc" | |
} | |
}, | |
"4.14.67": { | |
"CVE-2018-3693": { | |
"cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", | |
"cmt_id": "4bc32484df6a3bdc173301adff0c2fdc66667a40" | |
} | |
}, | |
"4.14.68": { | |
"CVE-2018-16658": { | |
"cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", | |
"cmt_id": "73b2e7073b51de0b03ebd15c97dd3ad0c3470810" | |
} | |
}, | |
"4.14.69": { | |
"CVE-2018-20856": { | |
"cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", | |
"cmt_id": "0affbaece6d0b7c75c5166732d0481ae9a28be60" | |
}, | |
"CVE-2019-12881": { | |
"cmt_msg": "drm/i915/userptr: reject zero user_size", | |
"cmt_id": "7188f7416438a34412a6702f548f81be9e2cf56c" | |
} | |
}, | |
"4.14.70": { | |
"CVE-2018-6554": { | |
"cmt_msg": "staging: irda: remove the irda network stack and drivers", | |
"cmt_id": "77be9452d0e5768bab9a041a62116cbeb9dc3174" | |
}, | |
"CVE-2018-6555": { | |
"cmt_msg": "staging: irda: remove the irda network stack and drivers", | |
"cmt_id": "e37957305de356b4f8719a3a4c7bc1453a2f0ca3" | |
}, | |
"CVE-2018-14617": { | |
"cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", | |
"cmt_id": "68e787c3c80059c776d1d7afb20f5eb9f20237a5" | |
}, | |
"CVE-2018-14609": { | |
"cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", | |
"cmt_id": "0cdbc3faf960de16ebe8a427feb3b0544ad983cc" | |
} | |
}, | |
"4.14.71": { | |
"CVE-2018-5391": { | |
"cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", | |
"cmt_id": "1c44969111cc68f361638b6e54f5a176609aa05a" | |
}, | |
"CVE-2018-13099": { | |
"cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", | |
"cmt_id": "7fb2b50ee59689578d5a712633d1e6755fc98933" | |
}, | |
"CVE-2018-17182": { | |
"cmt_msg": "mm: get rid of vmacache_flush_all() entirely", | |
"cmt_id": "06274364edb4407b386a996a7ff46c3ca3459b70" | |
} | |
}, | |
"4.14.73": { | |
"CVE-2018-20511": { | |
"cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", | |
"cmt_id": "9951e17efd05b8ad49bbc0db2e6b483f95d94d86" | |
}, | |
"CVE-2018-14633": { | |
"cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", | |
"cmt_id": "755e45f3155cc51e37dc1cce9ccde10b84df7d93" | |
} | |
}, | |
"4.14.74": { | |
"CVE-2019-9458": { | |
"cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", | |
"cmt_id": "d61ba3417e4fb71963441aa0c2e9c26f4568215b" | |
}, | |
"CVE-2018-18021": { | |
"cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", | |
"cmt_id": "38d070f9090af15b5bdb26fc0e084b22f34eabd9" | |
}, | |
"CVE-2018-7755": { | |
"cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", | |
"cmt_id": "04bc4dd86d0f2b166640c8ea5b7a030d92a3d993" | |
}, | |
"CVE-2018-13053": { | |
"cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", | |
"cmt_id": "a4dbaf7c2de0d622e0fe29840dd2bf4a281277a5" | |
}, | |
"CVE-2018-12896": { | |
"cmt_msg": "posix-timers: Sanitize overrun handling", | |
"cmt_id": "3e3f075f72bd2dfcd5211bd1ff3919bc118ad4cd" | |
} | |
}, | |
"4.14.75": { | |
"CVE-2018-17972": { | |
"cmt_msg": "proc: restrict kernel stack dumps to root", | |
"cmt_id": "f8566a92ab75d442a823453414c6158b0b3c5ce7" | |
} | |
}, | |
"4.14.76": { | |
"CVE-2018-15471": { | |
"cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", | |
"cmt_id": "309a1c5cfc598c162dfc951fac040554164056e4" | |
} | |
}, | |
"4.14.78": { | |
"CVE-2018-18281": { | |
"cmt_msg": "mremap: properly flush TLB before releasing the page", | |
"cmt_id": "541500abfe9eb30a89ff0a6eb42a21521996d68d" | |
} | |
}, | |
"4.14.82": { | |
"CVE-2018-19854": { | |
"cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", | |
"cmt_id": "fdc427442b374e84077d4214733764efb1a38a0e" | |
}, | |
"CVE-2018-16871": { | |
"cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", | |
"cmt_id": "6d1c38aa47d432f425c5829261eaa8e624274a4f" | |
}, | |
"CVE-2018-18710": { | |
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", | |
"cmt_id": "a8c254d8e96032d5bb235cb2e777203d9acda09d" | |
} | |
}, | |
"4.14.86": { | |
"CVE-2018-13100": { | |
"cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", | |
"cmt_id": "f3d6361a96a455c8ba12226a04efa67a0ada4966" | |
}, | |
"CVE-2018-5703": { | |
"cmt_msg": "tls: Use correct sk->sk_prot for IPV6", | |
"cmt_id": "2a0f5919e1e6a1c0423d895ab75eb15f94a67c69" | |
}, | |
"CVE-2018-13096": { | |
"cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", | |
"cmt_id": "b8321ccd045710ee04fd5322c34cadd13a5e58af" | |
}, | |
"CVE-2018-13097": { | |
"cmt_msg": "f2fs: fix to do sanity check with user_block_count", | |
"cmt_id": "f9cf5462b51d98026275cc51437fc531e808b64a" | |
}, | |
"CVE-2018-14615": { | |
"cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", | |
"cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" | |
}, | |
"CVE-2018-14614": { | |
"cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", | |
"cmt_id": "30130700acfad8a705c109325379f5bbe21b3ccc" | |
}, | |
"CVE-2018-13098": { | |
"cmt_msg": "f2fs: fix to do sanity check with extra_attr feature", | |
"cmt_id": "0081c90ebacebb3a82d0d24bf0f42273ce2d902e" | |
}, | |
"CVE-2018-5848": { | |
"cmt_msg": "wil6210: missing length check in wmi_set_ie", | |
"cmt_id": "107b02c81a8761f1f7efc1e8b54d435324ccd13e" | |
}, | |
"CVE-2018-14611": { | |
"cmt_msg": "btrfs: validate type when reading a chunk", | |
"cmt_id": "f7eef132ccc95c9af50b647c5da0511d2b8492f8" | |
}, | |
"CVE-2018-14610": { | |
"cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", | |
"cmt_id": "34407a175a59b668a1a2bbf0d0e495d87a7777d8" | |
}, | |
"CVE-2018-14613": { | |
"cmt_msg": "btrfs: tree-checker: Verify block_group_item", | |
"cmt_id": "9f268b5cf2d6a716779dfe11f4bc02d6461db693" | |
}, | |
"CVE-2018-14612": { | |
"cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", | |
"cmt_id": "c0dfb99847851fb830d1e8ea7d5e0571f50c325a" | |
}, | |
"CVE-2018-1128": { | |
"cmt_msg": "libceph: add authorizer challenge", | |
"cmt_id": "3fd73c8a71f299e30359a63add1f33e3fd834831" | |
}, | |
"CVE-2018-1129": { | |
"cmt_msg": "libceph: implement CEPHX_V2 calculation mode", | |
"cmt_id": "b16d0c5d32468a0624505a7b6b211e20488295e9" | |
}, | |
"CVE-2019-2024": { | |
"cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", | |
"cmt_id": "30cdc0c3bac950bebd3ba59f5ff980cdd3710e0f" | |
}, | |
"CVE-2018-18690": { | |
"cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", | |
"cmt_id": "cb7ccb9924bb3596f211badf0d2becf131a979cd" | |
}, | |
"CVE-2018-19407": { | |
"cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", | |
"cmt_id": "83f00ab9a7c03e9f1410727d985b7fe9473002e1" | |
}, | |
"CVE-2020-0435": { | |
"cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", | |
"cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" | |
}, | |
"CVE-2019-2025": { | |
"cmt_msg": "binder: fix race that allows malicious free of live buffer", | |
"cmt_id": "fd6cc33d0775b0d902906d88dd05cc1a2a059f8d" | |
} | |
}, | |
"4.14.87": { | |
"CVE-2018-16862": { | |
"cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", | |
"cmt_id": "60720df8bf43e8ca2ce1a17936904a52129c8471" | |
}, | |
"CVE-2018-18397": { | |
"cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", | |
"cmt_id": "82c5a8c0debac552750a00b4fc7551c89c7b34b8" | |
} | |
}, | |
"4.14.88": { | |
"CVE-2018-20169": { | |
"cmt_msg": "USB: check usb_get_extra_descriptor for proper size", | |
"cmt_id": "7b6e85da8d94948201abb8d576d485892a6a878f" | |
}, | |
"CVE-2018-5953": { | |
"cmt_msg": "printk: hash addresses printed with %p", | |
"cmt_id": "f2a4f7622d052eb987e8693633468c239c13575a" | |
}, | |
"CVE-2018-14616": { | |
"cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", | |
"cmt_id": "38fce19d4d7bc8acfa183ee2918758d279a69c9a" | |
}, | |
"CVE-2018-14625": { | |
"cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", | |
"cmt_id": "f15c072d6576c5e2b693c22e39ccc9103c952078" | |
}, | |
"CVE-2018-19824": { | |
"cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", | |
"cmt_id": "19f74e45746253cafb8cb1e773041e7cadbac622" | |
} | |
}, | |
"4.14.91": { | |
"CVE-2018-16882": { | |
"cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", | |
"cmt_id": "cc70f14956fa0ea84ee1a3a5b79347730c6c2d08" | |
}, | |
"CVE-2018-19985": { | |
"cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", | |
"cmt_id": "49be8dc589aee04c64d61e362c5029ab20fd6fd7" | |
} | |
}, | |
"4.14.93": { | |
"CVE-2019-15927": { | |
"cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", | |
"cmt_id": "1117b7a380f4b4f575d90a318a43d2e168c01fbd" | |
}, | |
"CVE-2018-20784": { | |
"cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", | |
"cmt_id": "c6a9a1ccafc49fe95d8de54eef154ad5c3b94077" | |
}, | |
"CVE-2019-6133": { | |
"cmt_msg": "fork: record start_time late", | |
"cmt_id": "3f2e4e1d9a6cffa95d31b7a491243d5e92a82507" | |
} | |
}, | |
"4.14.94": { | |
"CVE-2018-16884": { | |
"cmt_msg": "sunrpc: use-after-free in svc_process_common()", | |
"cmt_id": "65dba32522065b79a16393efc75f8006c2c3dbb8" | |
} | |
}, | |
"4.14.95": { | |
"CVE-2019-3701": { | |
"cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", | |
"cmt_id": "39ff087b5c6be2ff0b08e617d334e5bf72a08b44" | |
}, | |
"CVE-2020-10769": { | |
"cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", | |
"cmt_id": "b9119fd2749c1459416ebb559cf7c1d379786cff" | |
} | |
}, | |
"4.14.96": { | |
"CVE-2019-11085": { | |
"cmt_msg": "drm/i915/gvt: Fix mmap range check", | |
"cmt_id": "e89ec9b92f9b75b44e1ff9f52dab48bd01834ed6" | |
} | |
}, | |
"4.14.99": { | |
"CVE-2019-7222": { | |
"cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", | |
"cmt_id": "ef1b3d4893cec543305d30e8160df8c096135950" | |
}, | |
"CVE-2019-6974": { | |
"cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", | |
"cmt_id": "8c1b11bc3555b5d1207b0e179cbdd8b945e71e69" | |
}, | |
"CVE-2019-7221": { | |
"cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", | |
"cmt_id": "1c965b1b5ecc2c9e1d59b2514cedb6f7483a0241" | |
} | |
}, | |
"4.14.102": { | |
"CVE-2018-1000026": { | |
"cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", | |
"cmt_id": "60cd31866de4386d940e55073491c3ee17ca593e" | |
} | |
}, | |
"4.14.103": { | |
"CVE-2019-8912": { | |
"cmt_msg": "net: crypto set sk to NULL when af_alg_release.", | |
"cmt_id": "6e4c01ee785c2192fcc4be234cedde3706309a7e" | |
} | |
}, | |
"4.14.105": { | |
"CVE-2019-9213": { | |
"cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", | |
"cmt_id": "f5817069248630b3b7b17ebfcdee0b679c52be33" | |
} | |
}, | |
"4.14.106": { | |
"CVE-2019-16994": { | |
"cmt_msg": "net: sit: fix memory leak in sit_init_net()", | |
"cmt_id": "46a5caa79ff73c9403ab37475ef47ed4c027e712" | |
}, | |
"CVE-2019-12818": { | |
"cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", | |
"cmt_id": "b275f8e6a0096cac11cf697c4e3ad226070264f5" | |
}, | |
"CVE-2019-8980": { | |
"cmt_msg": "exec: Fix mem leak in kernel_read_file", | |
"cmt_id": "069fb92ea221c72bd75f4863b3540420082f32ba" | |
}, | |
"CVE-2019-15916": { | |
"cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", | |
"cmt_id": "306bbaeb077068141d472b922ae1adf7ab81fd72" | |
}, | |
"CVE-2019-2101": { | |
"cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", | |
"cmt_id": "aa4ba765e0903926de64b359e8653bfd29a3c353" | |
} | |
}, | |
"4.14.107": { | |
"CVE-2019-16995": { | |
"cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", | |
"cmt_id": "1aa1e0a3f6dde5c37bb5d6a9121847b95b255c1f" | |
}, | |
"CVE-2019-12819": { | |
"cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", | |
"cmt_id": "07c2216c3783daca34ea0d86affb9dfc5346f183" | |
} | |
}, | |
"4.14.108": { | |
"CVE-2019-10124": { | |
"cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", | |
"cmt_id": "c02fd076842636fb7506d4ca8a2bb3f91faf1af3" | |
}, | |
"CVE-2019-9455": { | |
"cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", | |
"cmt_id": "8d6df5097c0005320ab6f3cd8dda2ef31db6c6d1" | |
}, | |
"CVE-2019-16413": { | |
"cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", | |
"cmt_id": "be0b155c2b2f8c39adaa1641f3f6a4be47277993" | |
} | |
}, | |
"4.14.109": { | |
"CVE-2019-15917": { | |
"cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", | |
"cmt_id": "a1dbb34da6f2edf321df5023cb2accd92579269b" | |
} | |
}, | |
"4.14.110": { | |
"CVE-2019-20811": { | |
"cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", | |
"cmt_id": "e331c9066901dfe40bea4647521b86e9fb9901bb" | |
}, | |
"CVE-2019-20054": { | |
"cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", | |
"cmt_id": "0d9ef3f5b07e4b6fe6105a45603de1e133e4df49" | |
}, | |
"CVE-2019-3460": { | |
"cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", | |
"cmt_id": "82868814a87236b17ac588fbb779c87616e99345" | |
}, | |
"CVE-2019-15921": { | |
"cmt_msg": "genetlink: Fix a memory leak on error path", | |
"cmt_id": "111fdc6e948b36115e29cf3b1981058d033ffd54" | |
}, | |
"CVE-2019-3459": { | |
"cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", | |
"cmt_id": "2b59d36f22622c92c0b06aee7571f0a86a217188" | |
} | |
}, | |
"4.14.111": { | |
"CVE-2019-11810": { | |
"cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", | |
"cmt_id": "90fca247abf6adc1ee6eef9b3de199448c8a4ad6" | |
} | |
}, | |
"4.14.112": { | |
"CVE-2019-11486": { | |
"cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", | |
"cmt_id": "429977fd9f7153607230a6040ee12510a525e930" | |
}, | |
"CVE-2019-11815": { | |
"cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", | |
"cmt_id": "c8a88799e632045399af886a1b1a5205e5d49897" | |
}, | |
"CVE-2019-10639": { | |
"cmt_msg": "netns: provide pure entropy for net_hash_mix()", | |
"cmt_id": "adbb8bdd392db14dc80ad1ac29f8f1d37ab57a62" | |
} | |
}, | |
"4.14.113": { | |
"CVE-2019-15292": { | |
"cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", | |
"cmt_id": "0ba1fa56351e6e9c2f8db4ffc823cb7057e4ea82" | |
}, | |
"CVE-2019-7308": { | |
"cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", | |
"cmt_id": "6588a490bfe1b879f11b5e74724ef53a33b68641" | |
} | |
}, | |
"4.14.114": { | |
"CVE-2018-5995": { | |
"cmt_msg": "printk: hash addresses printed with %p", | |
"cmt_id": "47ad82a34560ea70e85d2eb56be0ada03dc4fd35" | |
}, | |
"CVE-2019-11599": { | |
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", | |
"cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" | |
}, | |
"CVE-2019-3892": { | |
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", | |
"cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" | |
}, | |
"CVE-2019-15214": { | |
"cmt_msg": "ALSA: core: Fix card races between register and disconnect", | |
"cmt_id": "d11a33e9ba584bb6f5cc74df9d74b26156ba9bb2" | |
} | |
}, | |
"4.14.115": { | |
"CVE-2019-3882": { | |
"cmt_msg": "vfio/type1: Limit DMA mappings per container", | |
"cmt_id": "73a95f1a41c0bb586b8c62622ebf25aca1582af3" | |
}, | |
"CVE-2019-15924": { | |
"cmt_msg": "fm10k: Fix a potential NULL pointer dereference", | |
"cmt_id": "2617f9af19ce93c509ebf3fd3ce26048b8f85216" | |
} | |
}, | |
"4.14.116": { | |
"CVE-2019-11487": { | |
"cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", | |
"cmt_id": "c88a0aa7ace7eb10dca42be59f21e2cbd263575e" | |
} | |
}, | |
"4.14.117": { | |
"CVE-2019-15216": { | |
"cmt_msg": "USB: yurex: Fix protection fault after device removal", | |
"cmt_id": "5696fa3f42168ee33256c0b0b72ca963d224327f" | |
} | |
}, | |
"4.14.118": { | |
"CVE-2018-20836": { | |
"cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", | |
"cmt_id": "3739f98aea7113a21d11b1a604525049e422e29e" | |
}, | |
"CVE-2019-11884": { | |
"cmt_msg": "Bluetooth: hidp: fix buffer overflow", | |
"cmt_id": "2c33156b2d2f5efe820d8efdd610fb168c9acf72" | |
} | |
}, | |
"4.14.119": { | |
"CVE-2019-11091": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" | |
}, | |
"CVE-2018-12130": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" | |
}, | |
"CVE-2018-12127": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" | |
}, | |
"CVE-2018-12126": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" | |
} | |
}, | |
"4.14.120": { | |
"CVE-2019-10142": { | |
"cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", | |
"cmt_id": "1a3a561df5e176a4422270e3d2cca1cd835b292e" | |
} | |
}, | |
"4.14.121": { | |
"CVE-2019-11833": { | |
"cmt_msg": "ext4: zero out the unused memory region in the extent tree block", | |
"cmt_id": "d7d9e4823b658eb795f4a379d121d3f0539c1117" | |
} | |
}, | |
"4.14.122": { | |
"CVE-2019-15666": { | |
"cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", | |
"cmt_id": "1a2bb5125acb5be09ac8dcbf0f1e47ec28468fdc" | |
} | |
}, | |
"4.14.123": { | |
"CVE-2019-20095": { | |
"cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", | |
"cmt_id": "ccebaeca5089c49f2b331e91334b2d2e7a40e53c" | |
}, | |
"CVE-2019-19543": { | |
"cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", | |
"cmt_id": "f1c9f1f3665635d86e4d507312f4d114d0d738e3" | |
}, | |
"CVE-2019-9466": { | |
"cmt_msg": "brcmfmac: add subtype check for event handling in data path", | |
"cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" | |
}, | |
"CVE-2019-9500": { | |
"cmt_msg": "brcmfmac: assure SSID length from firmware is limited", | |
"cmt_id": "f9ba91b5d1bfb6124640e00dca6562f69b71ca19" | |
}, | |
"CVE-2019-9503": { | |
"cmt_msg": "brcmfmac: add subtype check for event handling in data path", | |
"cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" | |
}, | |
"CVE-2019-19966": { | |
"cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", | |
"cmt_id": "b7eaea002ad0a3d2563df9d18e2ca3c6bd81abd3" | |
} | |
}, | |
"4.14.124": { | |
"CVE-2020-10720": { | |
"cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", | |
"cmt_id": "385ee66eaf88e1f04be973f623b81e4bf0ec0c6f" | |
}, | |
"CVE-2019-15219": { | |
"cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", | |
"cmt_id": "47ffaae93ea154ae149315389a30780fa3189caf" | |
}, | |
"CVE-2019-15218": { | |
"cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", | |
"cmt_id": "5a7adcda3de26a44fc0fa3f68199358b1527daf4" | |
}, | |
"CVE-2019-15212": { | |
"cmt_msg": "USB: rio500: refuse more than one device at a time", | |
"cmt_id": "f18227d08e6b50717e1560a86fbebda0ca911507" | |
}, | |
"CVE-2019-1999": { | |
"cmt_msg": "binder: fix race between munmap() and direct reclaim", | |
"cmt_id": "c2a035d7822ac8d2870cd6dbaadc1ab407713b83" | |
}, | |
"CVE-2019-10638": { | |
"cmt_msg": "inet: switch IP ID generator to siphash", | |
"cmt_id": "e10789acbe6a76b304f45cbc8bb77a926ae4f201" | |
} | |
}, | |
"4.14.127": { | |
"CVE-2019-11479": { | |
"cmt_msg": "tcp: add tcp_min_snd_mss sysctl", | |
"cmt_id": "cd6f35b8421ff20365ff711c0ac7647fd70e9af7" | |
}, | |
"CVE-2019-11478": { | |
"cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", | |
"cmt_id": "9daf226ff92679d09aeca1b5c1240e3607153336" | |
}, | |
"CVE-2019-11477": { | |
"cmt_msg": "tcp: limit payload size of sacked skbs", | |
"cmt_id": "d632920554c5aec81d8a79c23dac07efcbabbd54" | |
} | |
}, | |
"4.14.128": { | |
"CVE-2019-15090": { | |
"cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", | |
"cmt_id": "af1630c6dc4fd96c09fef088f9c400c35e259e72" | |
} | |
}, | |
"4.14.129": { | |
"CVE-2019-15807": { | |
"cmt_msg": "scsi: libsas: delete sas port if expander discover failed", | |
"cmt_id": "5992a6926eb037cb8ed30521c74e2bef082a8946" | |
} | |
}, | |
"4.14.130": { | |
"CVE-2019-12615": { | |
"cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", | |
"cmt_id": "b1013624a8adb9caa83b4c9f487778c7b51467a0" | |
}, | |
"CVE-2019-0136": { | |
"cmt_msg": "mac80211: drop robust management frames from unknown TA", | |
"cmt_id": "7a680d6e5441400b768d6e6cfe5524726ebd6b7f" | |
} | |
}, | |
"4.14.133": { | |
"CVE-2019-13272": { | |
"cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", | |
"cmt_id": "bf71ef9655d25e8b275ec6ed649b6bd719231ddc" | |
}, | |
"CVE-2019-15221": { | |
"cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", | |
"cmt_id": "37eaa74451c1003a6bec548c957890c264559463" | |
}, | |
"CVE-2019-9506": { | |
"cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", | |
"cmt_id": "05206de4e9ae033afd32f685c4a005cbc1dceb39" | |
}, | |
"CVE-2019-3900": { | |
"cmt_msg": "vhost_net: fix possible infinite loop", | |
"cmt_id": "ae446749492d8bd23f1d0b81adba16e5739dc740" | |
} | |
}, | |
"4.14.134": { | |
"CVE-2019-10126": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", | |
"cmt_id": "b1459fb34061337efbf0d47a3ba6208f2f59829d" | |
}, | |
"CVE-2019-3846": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", | |
"cmt_id": "d50f6b58d7ad30ad8e96c0bbc3e5ecfe9b91ba77" | |
}, | |
"CVE-2019-15220": { | |
"cmt_msg": "p54usb: Fix race between disconnect and firmware loading", | |
"cmt_id": "c760ecb74f84f729ae31b9fbc6b772923cdc78df" | |
} | |
}, | |
"4.14.135": { | |
"CVE-2019-17351": { | |
"cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", | |
"cmt_id": "ba110e6dc391f70195c161bcc3de2c58ba705045" | |
}, | |
"CVE-2019-12382": { | |
"cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", | |
"cmt_id": "df56de8931b924c1d850b80e1b22b62449758e90" | |
}, | |
"CVE-2019-13631": { | |
"cmt_msg": "Input: gtco - bounds check collection indent level", | |
"cmt_id": "81bf168d855cc1d97a7c9cde6787ff42485556c8" | |
}, | |
"CVE-2019-15925": { | |
"cmt_msg": "net: hns3: add some error checking in hclge_tm module", | |
"cmt_id": "18f05a6fc4cfb78ff1de275d9ebf88c3ed5522a2" | |
}, | |
"CVE-2019-15926": { | |
"cmt_msg": "ath6kl: add some bounds checking", | |
"cmt_id": "193a754afbe979a43893c88373a625ed384123ab" | |
}, | |
"CVE-2019-14284": { | |
"cmt_msg": "floppy: fix div-by-zero in setup_format_params", | |
"cmt_id": "a904a690ea0317fcd88c5b9dfef40ef0f98d9530" | |
}, | |
"CVE-2019-14283": { | |
"cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", | |
"cmt_id": "80637a906eded08e04ed8a6fbbdd2b8112eaa387" | |
}, | |
"CVE-2019-13648": { | |
"cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", | |
"cmt_id": "26bee6ef0d72193d58a085610fe49169d23baa83" | |
} | |
}, | |
"4.14.136": { | |
"CVE-2019-15211": { | |
"cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", | |
"cmt_id": "c4c213d9aadc85a2808b04d3676970ea5f90340e" | |
}, | |
"CVE-2019-10207": { | |
"cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", | |
"cmt_id": "69f9c2bc3f754ad1d610b30b940681d678c8e684" | |
}, | |
"CVE-2019-20934": { | |
"cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", | |
"cmt_id": "d0919216e468d5613cc8c53d4d0676026960fe39" | |
}, | |
"CVE-2019-15215": { | |
"cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", | |
"cmt_id": "3566a98e59b5cb19829d21bfe18cd396812ce15e" | |
}, | |
"CVE-2019-2213": { | |
"cmt_msg": "binder: fix possible UAF when freeing buffer", | |
"cmt_id": "a4a3c070b8760f71c8311399fa9bfe67c8629bca" | |
} | |
}, | |
"4.14.137": { | |
"CVE-2019-1125": { | |
"cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", | |
"cmt_id": "83e6e48e70a133a5ea6167bf152ce2b274008b3d" | |
} | |
}, | |
"4.14.139": { | |
"CVE-2019-19536": { | |
"cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", | |
"cmt_id": "dc741536d5d04065217a8402c52ad49df4cf134c" | |
}, | |
"CVE-2019-19535": { | |
"cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", | |
"cmt_id": "15312ff709e6a5598a33edb3d31882951233d765" | |
}, | |
"CVE-2019-19531": { | |
"cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", | |
"cmt_id": "f0d684599b4f2525a6a7fe0cde8dff6800d16a22" | |
} | |
}, | |
"4.14.140": { | |
"CVE-2019-19537": { | |
"cmt_msg": "USB: core: Fix races in character device registration and deregistraion", | |
"cmt_id": "282a771475c2016ef77871f4438d9aaf9c8aa2b7" | |
}, | |
"CVE-2019-19527": { | |
"cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", | |
"cmt_id": "d65ca54d05c209571cf2b3913277f75ab477e214" | |
}, | |
"CVE-2019-19530": { | |
"cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", | |
"cmt_id": "e630f38040b5d2ecc56920742f7bafd57834cd2a" | |
} | |
}, | |
"4.14.141": { | |
"CVE-2019-15538": { | |
"cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", | |
"cmt_id": "044d098441df8fabffba3b084a70beba0e77f8d4" | |
} | |
}, | |
"4.14.142": { | |
"CVE-2019-15118": { | |
"cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", | |
"cmt_id": "6e1a602dfd51709538fc371d053708934909e3ba" | |
}, | |
"CVE-2019-15902": { | |
"cmt_msg": "unknown", | |
"cmt_id": "3a647417696217c5861a81ccfe5d2e6791d696ac" | |
}, | |
"CVE-2019-15117": { | |
"cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", | |
"cmt_id": "96b0e80b6d5fb88c4f5b1e9d5224f2aa56395926" | |
} | |
}, | |
"4.14.144": { | |
"CVE-2019-14835": { | |
"cmt_msg": "vhost: make sure log_num < in_num", | |
"cmt_id": "7e9480b480a57fb4ef2e4d2c2cddbb1a31d56b33" | |
}, | |
"CVE-2019-15030": { | |
"cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", | |
"cmt_id": "32b803e81ce17eec816f09d5388ef0a1cc9e4c2f" | |
} | |
}, | |
"4.14.146": { | |
"CVE-2019-14816": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" | |
}, | |
"CVE-2019-14814": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" | |
}, | |
"CVE-2019-14815": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" | |
}, | |
"CVE-2019-15505": { | |
"cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", | |
"cmt_id": "120d5674a14f5d641970bc4287a752e60415b17c" | |
}, | |
"CVE-2019-14821": { | |
"cmt_msg": "KVM: coalesced_mmio: add bounds checking", | |
"cmt_id": "bf81752d808cd31e18d9a8db6d92b73497aa48d2" | |
} | |
}, | |
"4.14.147": { | |
"CVE-2019-17056": { | |
"cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "b6a2d6c11272b3cf5d2d902bb9aaf7558560a5eb" | |
}, | |
"CVE-2019-17053": { | |
"cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "70f80cb205649c7350617ca79515b98419e90475" | |
}, | |
"CVE-2019-17052": { | |
"cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "6567debe7f9c0423e18a758060cc63ee69e2e7d0" | |
}, | |
"CVE-2019-19533": { | |
"cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", | |
"cmt_id": "580ee4a521ddc18aad5c750cc84bf43171599b29" | |
}, | |
"CVE-2019-17055": { | |
"cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "371af137855d633d7c6226f659bbb6dcceb21322" | |
}, | |
"CVE-2019-17054": { | |
"cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "272f46fe19daa1a18c0243cc8ac150e291ea51fd" | |
} | |
}, | |
"4.14.148": { | |
"CVE-2019-18806": { | |
"cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", | |
"cmt_id": "dca8aabd7198e1aa7210ff2de081befba79d0d41" | |
} | |
}, | |
"4.14.149": { | |
"CVE-2019-19525": { | |
"cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", | |
"cmt_id": "481376cc2ccb32113a2492ed1f8de32b5c777b00" | |
}, | |
"CVE-2019-16746": { | |
"cmt_msg": "nl80211: validate beacon head", | |
"cmt_id": "01ec813e457954d8eeaf768d57d625752d245bc9" | |
} | |
}, | |
"4.14.150": { | |
"CVE-2018-20976": { | |
"cmt_msg": "xfs: clear sb->s_fs_info on mount failure", | |
"cmt_id": "6921174cd2fb5f2d0608770fe23056ab128b6d97" | |
}, | |
"CVE-2019-19523": { | |
"cmt_msg": "USB: adutux: fix use-after-free on disconnect", | |
"cmt_id": "b074263b69bc7683d5ac595cb135b4b5dfd04813" | |
}, | |
"CVE-2019-19528": { | |
"cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", | |
"cmt_id": "10b0e388a18353d224ccf17cc46a57f1070abb2b" | |
} | |
}, | |
"4.14.151": { | |
"CVE-2019-19075": { | |
"cmt_msg": "ieee802154: ca8210: prevent memory leak", | |
"cmt_id": "0cafebaf5719dc84361e39f3f3874721ec95d1af" | |
}, | |
"CVE-2019-17075": { | |
"cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", | |
"cmt_id": "1db19d6805d9dc5c79f8a19dddde324dbf0a33f9" | |
}, | |
"CVE-2019-17133": { | |
"cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", | |
"cmt_id": "63eb9c2849bc377c6bbf491f752c6cc6b9b75bca" | |
} | |
}, | |
"4.14.152": { | |
"CVE-2019-19065": { | |
"cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", | |
"cmt_id": "8f7b8f1d14d714181b35e69f4cb73f02ea8f0156" | |
}, | |
"CVE-2019-17666": { | |
"cmt_msg": "rtlwifi: Fix potential overflow on P2P code", | |
"cmt_id": "1b940dd55d42133791d7ba4841adfcf436fab98e" | |
}, | |
"CVE-2019-15099": { | |
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", | |
"cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" | |
}, | |
"CVE-2019-15098": { | |
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", | |
"cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" | |
}, | |
"CVE-2020-10773": { | |
"cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", | |
"cmt_id": "119e9aef452a6b6976d20dac8f35aa2dc3e01348" | |
}, | |
"CVE-2019-19526": { | |
"cmt_msg": "NFC: pn533: fix use-after-free and memleaks", | |
"cmt_id": "2a571bd399084762a67519f35ef586407fbd3cb2" | |
}, | |
"CVE-2019-19532": { | |
"cmt_msg": "HID: Fix assumption that devices have inputs", | |
"cmt_id": "e13a3d84494ca7b560551a9927231e7ecf27d96a" | |
} | |
}, | |
"4.14.153": { | |
"CVE-2019-18282": { | |
"cmt_msg": "net/flow_dissector: switch to siphash", | |
"cmt_id": "a9de6f42e945cdb24b59c7ab7ebad1eba6cb5875" | |
}, | |
"CVE-2019-19049": { | |
"cmt_msg": "of: unittest: fix memory leak in unittest_data_add", | |
"cmt_id": "9f4ca715dae36ff5b737d56165df1b7964a2cb3e" | |
} | |
}, | |
"4.14.154": { | |
"CVE-2019-19045": { | |
"cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", | |
"cmt_id": "d905f0cea5e0f29b8aced5a38b1ce243051887de" | |
}, | |
"CVE-2019-19052": { | |
"cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", | |
"cmt_id": "3f5e99731cd55f9be6468e9af7985a838ce7255b" | |
}, | |
"CVE-2018-12207": { | |
"cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", | |
"cmt_id": "82e77746f07db70367f66ef272256037d6415353" | |
}, | |
"CVE-2019-0155": { | |
"cmt_msg": "drm/i915: Rename gen7 cmdparser tables", | |
"cmt_id": "82e0caec38b8eb2ec4fa90b614ba02fc297faeb7" | |
}, | |
"CVE-2019-0154": { | |
"cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", | |
"cmt_id": "d302d64a90b0b390ead3f70832aac2662e34323b" | |
}, | |
"CVE-2019-19922": { | |
"cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", | |
"cmt_id": "3dec71e388f95382d83ebb5589f0016eac4a6d2b" | |
}, | |
"CVE-2019-19529": { | |
"cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", | |
"cmt_id": "72e535208bc328e0617a8adb242bf8d89cdfd7d4" | |
}, | |
"CVE-2019-11135": { | |
"cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", | |
"cmt_id": "74bccd0ec712fdff716cec80ba1553d41bc887b8" | |
}, | |
"CVE-2019-16231": { | |
"cmt_msg": "fjes: Handle workqueue allocation failure", | |
"cmt_id": "81370ee55d9250e0744e09493186cb0e071dbcb2" | |
}, | |
"CVE-2019-19534": { | |
"cmt_msg": "can: peak_usb: fix slab info leak", | |
"cmt_id": "89a23a5d03956b44eac1a778806449577d690c6c" | |
} | |
}, | |
"4.14.155": { | |
"CVE-2019-19524": { | |
"cmt_msg": "Input: ff-memless - kill timer in destroy()", | |
"cmt_id": "5edab14154213a4b6bcc527f60adb6124034a0be" | |
} | |
}, | |
"4.14.157": { | |
"CVE-2019-18660": { | |
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", | |
"cmt_id": "bc06abfb2bc7e5856f997ebc57c361caa08cd961" | |
}, | |
"CVE-2019-15291": { | |
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", | |
"cmt_id": "9a611c200ee2777bb3551ee1d979bf923b93653a" | |
}, | |
"CVE-2019-18683": { | |
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", | |
"cmt_id": "4a2c9b037a08b8496f04a76987332ca6f19bd794" | |
} | |
}, | |
"4.14.158": { | |
"CVE-2019-12614": { | |
"cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", | |
"cmt_id": "0583dc6fceb6b70cbd7e39802da41d8269fe82ac" | |
}, | |
"CVE-2019-19767": { | |
"cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", | |
"cmt_id": "eb3257cba634f9a520467f6c8c56f4abfa347484" | |
} | |
}, | |
"4.14.159": { | |
"CVE-2019-19227": { | |
"cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", | |
"cmt_id": "39de8cc3678f5cd1f4e0ae274c20acabbd85a8b1" | |
}, | |
"CVE-2019-19062": { | |
"cmt_msg": "crypto: user - fix memory leak in crypto_report", | |
"cmt_id": "41b3b8e0775465c33083ce1998df7f15c039c9bf" | |
}, | |
"CVE-2019-19332": { | |
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", | |
"cmt_id": "f70609f898d63973388b36adf3650489311b13b9" | |
}, | |
"CVE-2019-19071": { | |
"cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", | |
"cmt_id": "0d8b2921af273b9545e16ad21375fabcb647c56e" | |
}, | |
"CVE-2019-19447": { | |
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", | |
"cmt_id": "d5a2955049171e48feba628e60f15206689bba94" | |
} | |
}, | |
"4.14.161": { | |
"CVE-2019-18786": { | |
"cmt_msg": "media: rcar_drif: fix a memory disclosure", | |
"cmt_id": "3feec89682118fad5139e745c3453a4cf8580ef0" | |
}, | |
"CVE-2019-19057": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", | |
"cmt_id": "1cdafe368ec4ad7e878eddc30ea0d11a0f57b222" | |
}, | |
"CVE-2019-19063": { | |
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", | |
"cmt_id": "9c84ba30947a9d8ac2c67abaafc17087ead04426" | |
}, | |
"CVE-2020-0427": { | |
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", | |
"cmt_id": "679c4f27b8958b65bb51d1c3dfdbf3befe4a33a3" | |
}, | |
"CVE-2019-20812": { | |
"cmt_msg": "af_packet: set defaule value for tmo", | |
"cmt_id": "665c9af8987880414e141e623bf7e6481d1c1696" | |
}, | |
"CVE-2019-16232": { | |
"cmt_msg": "libertas: fix a potential NULL pointer dereference", | |
"cmt_id": "b88d9f8b8ba5722ab4aef7d01c2a5a66b5414b83" | |
} | |
}, | |
"4.14.162": { | |
"CVE-2020-10690": { | |
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", | |
"cmt_id": "2dece4d6d13fe179ee3a5991811712725a56e2f7" | |
} | |
}, | |
"4.14.163": { | |
"CVE-2019-18809": { | |
"cmt_msg": "media: usb: fix memory leak in af9005_identify_state", | |
"cmt_id": "2d7c27957cac081eeacea7c38d8c9c59049883dc" | |
}, | |
"CVE-2019-19965": { | |
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", | |
"cmt_id": "82df1d3fa11bc7b25789efa4232bf0c188c8bc72" | |
} | |
}, | |
"4.14.164": { | |
"CVE-2019-14901": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", | |
"cmt_id": "ec3bb975c6013aa2f5e8a96a0bee2c8d39618e89" | |
}, | |
"CVE-2020-0430": { | |
"cmt_msg": "bpf: reject passing modified ctx to helper functions", | |
"cmt_id": "7fed98f4a1e6eb77a5d66ecfdf9345e21df6ac82" | |
} | |
}, | |
"4.14.165": { | |
"CVE-2019-14895": { | |
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", | |
"cmt_id": "c2544fb30080aecc3fff99f2e97999ce8e625f45" | |
}, | |
"CVE-2020-0305": { | |
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", | |
"cmt_id": "c807f43500e14ed24599106745bb6005665f74d6" | |
}, | |
"CVE-2019-19066": { | |
"cmt_msg": "scsi: bfa: release allocated memory in case of error", | |
"cmt_id": "f4e8c78fad1294c785de5e92562862dbef1e9c1e" | |
}, | |
"CVE-2019-20636": { | |
"cmt_msg": "Input: add safety guards to input_set_keycode()", | |
"cmt_id": "af62c38b0f86539504dc5c0e5dcfc7613b1150a5" | |
}, | |
"CVE-2019-19068": { | |
"cmt_msg": "rtl8xxxu: prevent leaking urb", | |
"cmt_id": "32079b0c59f4620fdf7a5576af7502b0d05fcb01" | |
}, | |
"CVE-2020-0431": { | |
"cmt_msg": "HID: hid-input: clear unmapped usages", | |
"cmt_id": "cb0a3edf8d00740303e5b42e9c0e72d924fc23d2" | |
}, | |
"CVE-2019-14615": { | |
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", | |
"cmt_id": "39465647eda707db7c7561006da3a8450ca634b9" | |
}, | |
"CVE-2019-19056": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", | |
"cmt_id": "6ddbe82681d911534f460e6afd297fcf7f388049" | |
}, | |
"CVE-2019-19078": { | |
"cmt_msg": "ath10k: fix memory leak", | |
"cmt_id": "4af2276845448609264360e95973246f222a7d86" | |
} | |
}, | |
"4.14.166": { | |
"CVE-2019-20096": { | |
"cmt_msg": "dccp: Fix memleak in __feat_register_sp", | |
"cmt_id": "d0c15c1e8f9223552818fe5340b0427483b34f22" | |
}, | |
"CVE-2019-15217": { | |
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", | |
"cmt_id": "ffe76c896fbc91af8859aaea15b75b0b887960f3" | |
}, | |
"CVE-2019-19058": { | |
"cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", | |
"cmt_id": "db1fb5a39747a680a4cc182c8bb4648b845a841f" | |
}, | |
"CVE-2018-21008": { | |
"cmt_msg": "rsi: add fix for crash during assertions", | |
"cmt_id": "ba8bbddaa188235df007411fdead5832f9e0cb59" | |
}, | |
"CVE-2019-2182": { | |
"cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", | |
"cmt_id": "68a066f6ff13e7029d54da9d322ad686694c7039" | |
}, | |
"CVE-2019-15918": { | |
"cmt_msg": "cifs: Fix lease buffer length error", | |
"cmt_id": "1059b758b6fb0fb6949b8c0474d5db27ea269b01" | |
}, | |
"CVE-2019-5108": { | |
"cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", | |
"cmt_id": "57e1b5f6b55acb655358bd62c7e2f14d8af90e0a" | |
} | |
}, | |
"4.14.167": { | |
"CVE-2020-12652": { | |
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", | |
"cmt_id": "fedf64ea8f461ac51d9772998b277a30cbf8375e" | |
} | |
}, | |
"4.14.168": { | |
"CVE-2019-20806": { | |
"cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", | |
"cmt_id": "f4c8d9e5ea524d7f53e54da2920a7d1250822ec5" | |
} | |
}, | |
"4.14.169": { | |
"CVE-2019-14896": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" | |
}, | |
"CVE-2019-14897": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" | |
}, | |
"CVE-2020-14416": { | |
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", | |
"cmt_id": "c39c4e9116943faf30fb7fb9cc1e739c732b4443" | |
} | |
}, | |
"4.14.170": { | |
"CVE-2020-0432": { | |
"cmt_msg": "staging: most: net: fix buffer overflow", | |
"cmt_id": "6560fd66278fec045902010ff7b07878a13e501f" | |
}, | |
"CVE-2020-12769": { | |
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", | |
"cmt_id": "b56f2a4a4327f609e30872e37eda6d73a6433ed2" | |
} | |
}, | |
"4.14.171": { | |
"CVE-2020-12653": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", | |
"cmt_id": "43e189049f32740c0d015f43a407658ac53d1743" | |
}, | |
"CVE-2020-12654": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", | |
"cmt_id": "49e9f1057ef968af57a62860697898cb35246936" | |
}, | |
"CVE-2020-0404": { | |
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", | |
"cmt_id": "52f001bf9ba6d5fc628852dd6102a98f573e0b3b" | |
} | |
}, | |
"4.14.172": { | |
"CVE-2020-9383": { | |
"cmt_msg": "floppy: check FDC index for errors before assigning it", | |
"cmt_id": "e4c587650f64608fcd3506fa2cb47f81c0f88348" | |
}, | |
"CVE-2020-2732": { | |
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", | |
"cmt_id": "ee1238c0285f40d8297e70f3aaa0d8a981ea0b53" | |
}, | |
"CVE-2019-16233": { | |
"cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", | |
"cmt_id": "2011a54b6161cdeb42ec8d7843170977701f97b6" | |
}, | |
"CVE-2020-0009": { | |
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", | |
"cmt_id": "60ba005bbf5751c2c58ca23ccfc9289ae06782b7" | |
} | |
}, | |
"4.14.173": { | |
"CVE-2020-8649": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" | |
}, | |
"CVE-2020-8648": { | |
"cmt_msg": "vt: selection, close sel_buffer race", | |
"cmt_id": "432ef54c0444e7cab85a291347bfc1f69ee6257a" | |
}, | |
"CVE-2020-8647": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" | |
}, | |
"CVE-2020-10942": { | |
"cmt_msg": "vhost: Check docket sk_family instead of call getname", | |
"cmt_id": "ff8e12b0cfe277a54edbab525f068b39c7ed0de3" | |
}, | |
"CVE-2020-27068": { | |
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", | |
"cmt_id": "ffe09a48bd96094786c303f1cf29b32a29aa6dc8" | |
}, | |
"CVE-2020-0444": { | |
"cmt_msg": "audit: fix error handling in audit_data_to_entry()", | |
"cmt_id": "edde9fcd5f41b2e22e455250214de0c4b126b255" | |
}, | |
"CVE-2019-16234": { | |
"cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", | |
"cmt_id": "864ef06aaef5b164669a5292eb822c454c46dd69" | |
} | |
}, | |
"4.14.174": { | |
"CVE-2020-29370": { | |
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", | |
"cmt_id": "992a5c90af04da6e1e047f10c5ee5d6d8752a699" | |
} | |
}, | |
"4.14.175": { | |
"CVE-2020-14381": { | |
"cmt_msg": "futex: Fix inode life-time issue", | |
"cmt_id": "e52694b56eb6d4b1fe424bda6126b8ce13c246a8" | |
}, | |
"CVE-2020-11668": { | |
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", | |
"cmt_id": "e251c592321cb82e5f31b06542b2f1f6e81cb2b8" | |
}, | |
"CVE-2021-3715": { | |
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", | |
"cmt_id": "f0c92f59cf528bc1b872f2ca91b01e128a2af3e6" | |
}, | |
"CVE-2020-27066": { | |
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", | |
"cmt_id": "dc0ea9b710102ef628a26663d892031a2c381549" | |
}, | |
"CVE-2020-11608": { | |
"cmt_msg": "media: ov519: add missing endpoint sanity checks", | |
"cmt_id": "ea7d13d02a76c76dd3a0ee7bda97bb4361473b62" | |
}, | |
"CVE-2020-11609": { | |
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks", | |
"cmt_id": "b4ac6fbe5b1a3cb83d84cb9f7ab8df71d104f535" | |
} | |
}, | |
"4.14.176": { | |
"CVE-2020-11494": { | |
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", | |
"cmt_id": "d0a7c3373404bd931565f361802d320462fbe9f9" | |
}, | |
"CVE-2020-11565": { | |
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", | |
"cmt_id": "c51609ac4c48d31a8881af669f1192d2ee405928" | |
}, | |
"CVE-2020-0433": { | |
"cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", | |
"cmt_id": "574eb136ec7f315c3ef2ca68fa9b3e16c56baa24" | |
} | |
}, | |
"4.14.177": { | |
"CVE-2020-12826": { | |
"cmt_msg": "signal: Extend exec_id to 64bits", | |
"cmt_id": "28c63ef17d620f0e95458c56c5d839ea3de3e500" | |
}, | |
"CVE-2020-12657": { | |
"cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", | |
"cmt_id": "f83b75ef20ac868046f90a7006b44bfea671a7c3" | |
}, | |
"CVE-2020-11669": { | |
"cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", | |
"cmt_id": "66a93f57330d3e172bf2c3da29f0501634bfac7a" | |
} | |
}, | |
"4.14.178": { | |
"CVE-2019-19319": { | |
"cmt_msg": "ext4: protect journal inode's blocks using block_validity", | |
"cmt_id": "795762468125a6412c089651e74f780bee154118" | |
}, | |
"CVE-2020-12114": { | |
"cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", | |
"cmt_id": "e21c8c03af20932c15d8b1d3bb9cbad9607a6eab" | |
}, | |
"CVE-2020-12464": { | |
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", | |
"cmt_id": "b49aa64f1d2526de71ae0354d37026e5861ccb4b" | |
} | |
}, | |
"4.14.179": { | |
"CVE-2020-10751": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" | |
}, | |
"CVE-2020-0255": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" | |
} | |
}, | |
"4.14.181": { | |
"CVE-2019-9245": { | |
"cmt_msg": "f2fs: sanity check of xattr entry size", | |
"cmt_id": "ec236cd6a254da2192c35a65fa0011a0268d66b7" | |
}, | |
"CVE-2020-10711": { | |
"cmt_msg": "netlabel: cope with NULL catmap", | |
"cmt_id": "0f5ae0f5b2675e4e703b980221976a1c2d79dba9" | |
}, | |
"CVE-2020-13143": { | |
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", | |
"cmt_id": "3d1e9fbbfb888ef59697766561e982524c0a6a03" | |
}, | |
"CVE-2020-1749": { | |
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", | |
"cmt_id": "8ab8786f78c3fc930f9abf6d6d85e95567de4e1f" | |
}, | |
"CVE-2020-27786": { | |
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", | |
"cmt_id": "8645ac3684a70e4e8a21c7c407c07a1a4316beec" | |
}, | |
"CVE-2019-9453": { | |
"cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", | |
"cmt_id": "1d295b32df866ea09aa8cc94500ed6e96e2ea09e" | |
}, | |
"CVE-2020-0067": { | |
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", | |
"cmt_id": "ae811cecbbb231f11a84acaf74baca1283b964c7" | |
}, | |
"CVE-2019-19768": { | |
"cmt_msg": "blktrace: Protect q->blk_trace with RCU", | |
"cmt_id": "7a35c8cbf2522e4f45d266dca95dacc71cf412ed" | |
}, | |
"CVE-2020-12770": { | |
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write", | |
"cmt_id": "3f743dd319951491d005ea51470e180f6df9125e" | |
} | |
}, | |
"4.14.182": { | |
"CVE-2021-0447": { | |
"cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", | |
"cmt_id": "26f8819ddd10141ebe7bbce700fbab36bfa5f478" | |
} | |
}, | |
"4.14.183": { | |
"CVE-2020-10732": { | |
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", | |
"cmt_id": "61ce1733b30fdcf45e31308bc7795b6dc7f2ffba" | |
} | |
}, | |
"4.14.184": { | |
"CVE-2020-13974": { | |
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", | |
"cmt_id": "26079af52bf616bc492acc1fe41dce53fe199456" | |
}, | |
"CVE-2020-0543": { | |
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", | |
"cmt_id": "9c98ba3f69b156c9fee72b71260d51f623a4a457" | |
}, | |
"CVE-2019-19462": { | |
"cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", | |
"cmt_id": "7821131c16cb2d32a5014009b50d362317418556" | |
}, | |
"CVE-2020-10757": { | |
"cmt_msg": "mm: Fix mremap not considering huge pmd devmap", | |
"cmt_id": "469ef673629d36d8ed5912b52f5d87ecc0309b3c" | |
} | |
}, | |
"4.14.185": { | |
"CVE-2019-20810": { | |
"cmt_msg": "media: go7007: fix a miss of snd_card_free", | |
"cmt_id": "033e86f47388583d460e1ea075fc4581d23c0fe1" | |
}, | |
"CVE-2018-20669": { | |
"cmt_msg": "make 'user_access_begin()' do 'access_ok()'", | |
"cmt_id": "b25df2918ba94ccc0ae44b4bb53f0f76a4bb0e96" | |
}, | |
"CVE-2020-29368": { | |
"cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", | |
"cmt_id": "3b6c93db0a02b843694cf91f8bacd94f8e7259c8" | |
}, | |
"CVE-2020-10766": { | |
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", | |
"cmt_id": "d808ea8d0b4deaf6be37a58d41550df48f117a3a" | |
}, | |
"CVE-2020-10767": { | |
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", | |
"cmt_id": "b4eba1edf71e3ce882d79fd46d654770a7b277b0" | |
}, | |
"CVE-2020-10768": { | |
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", | |
"cmt_id": "96f1500aedc9ee67ad9614917d7c6e97bc7dbaa1" | |
} | |
}, | |
"4.14.186": { | |
"CVE-2020-12771": { | |
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", | |
"cmt_id": "80d90125a3e1c98aafb6b13e62bd680fe9a4cd5a" | |
}, | |
"CVE-2020-15436": { | |
"cmt_msg": "block: Fix use-after-free in blkdev_get()", | |
"cmt_id": "a43abf15844c9e5de016957b8e612f447b7fb077" | |
} | |
}, | |
"4.14.187": { | |
"CVE-2020-12655": { | |
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", | |
"cmt_id": "115267e8d9fce8d5efe0949f1d2e5cee30441cf7" | |
} | |
}, | |
"4.14.188": { | |
"CVE-2020-24394": { | |
"cmt_msg": "nfsd: apply umask on fs without ACL support", | |
"cmt_id": "15fefb108c7af7ec8e19a88caed928d8b88120ff" | |
}, | |
"CVE-2020-15393": { | |
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", | |
"cmt_id": "4336374bc2220bf3c439b70c31d9e8f6f9583ea8" | |
} | |
}, | |
"4.14.189": { | |
"CVE-2020-14356": { | |
"cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", | |
"cmt_id": "82fd2138a5ffd7e0d4320cdb669e115ee976a26e" | |
}, | |
"CVE-2020-10781": { | |
"cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", | |
"cmt_id": "5cd9ec70b9f6431fc3e60075c01bc00f08c5606b" | |
} | |
}, | |
"4.14.190": { | |
"CVE-2020-15437": { | |
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", | |
"cmt_id": "c5760ab7aae09899412646e0cf842e23bea5b7a2" | |
} | |
}, | |
"4.14.191": { | |
"CVE-2018-10323": { | |
"cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", | |
"cmt_id": "8a443ffcf7b572c071398644d35cf9cc55cfa2cb" | |
} | |
}, | |
"4.14.192": { | |
"CVE-2019-19061": { | |
"cmt_msg": "iio: imu: adis16400: fix memory leak", | |
"cmt_id": "8d75cc141d702ebc280dde2b32b50cfdea3a02b3" | |
}, | |
"CVE-2019-9445": { | |
"cmt_msg": "f2fs: check if file namelen exceeds max value", | |
"cmt_id": "6a27f426266ac0d29faa95bed8934afeef1f9d13" | |
}, | |
"CVE-2019-19054": { | |
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", | |
"cmt_id": "12273ec840cc67b2ec469ee5f5214559357436bb" | |
}, | |
"CVE-2018-8043": { | |
"cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", | |
"cmt_id": "9e06953ee2a406c4bf4ff08c700d3ce1254974d1" | |
}, | |
"CVE-2019-18808": { | |
"cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", | |
"cmt_id": "a42f149865da48f25e5a49ca344dbcad61b66ae1" | |
}, | |
"CVE-2019-19074": { | |
"cmt_msg": "ath9k: release allocated buffer if timed out", | |
"cmt_id": "83c212df7794563a2f45a3be8fbc097e352b2c3a" | |
}, | |
"CVE-2019-19073": { | |
"cmt_msg": "ath9k_htc: release allocated buffer if timed out", | |
"cmt_id": "5502de13f91db625b063cb9d0793c7391f38452d" | |
}, | |
"CVE-2017-18232": { | |
"cmt_msg": "scsi: libsas: direct call probe and destruct", | |
"cmt_id": "3a156abd24346a3188eb7e88cf86386a409e0d02" | |
}, | |
"CVE-2019-3016": { | |
"cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", | |
"cmt_id": "fd4a641bb5731c0ce5397698560a823602dbaac2" | |
} | |
}, | |
"4.14.193": { | |
"CVE-2020-16166": { | |
"cmt_msg": "random32: update the net random state on interrupt and activity", | |
"cmt_id": "583bcbc024f6bf8daa266f4f71b99e9d6e78c40b" | |
} | |
}, | |
"4.14.194": { | |
"CVE-2020-26088": { | |
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", | |
"cmt_id": "980415fffec6952602edac586eb8c3a7d3f50b43" | |
}, | |
"CVE-2020-36386": { | |
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", | |
"cmt_id": "d91299b8382b129156708708d69876e753b9ade6" | |
}, | |
"CVE-2019-19448": { | |
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", | |
"cmt_id": "10742034076daea73acc17779e8f234060e03489" | |
}, | |
"CVE-2020-25212": { | |
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", | |
"cmt_id": "e4ddf4e58946c7dfe8568a21ee3d27b03d96bc56" | |
}, | |
"CVE-2020-14331": { | |
"cmt_msg": "vgacon: Fix for missing check in scrollback handling", | |
"cmt_id": "041a5a238a1e31992b5f22ef4f9792729d3b46ca" | |
} | |
}, | |
"4.14.195": { | |
"CVE-2020-14314": { | |
"cmt_msg": "ext4: fix potential negative array index in do_split()", | |
"cmt_id": "fbbfd55a40d5d0806b59ee0403c75d5ac517533f" | |
}, | |
"CVE-2020-29371": { | |
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", | |
"cmt_id": "89346bc395e7bc0a7d3c36c824782050b17d4fec" | |
}, | |
"CVE-2020-0466": { | |
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", | |
"cmt_id": "6875d79ba740f47a480908cf9fa791715ea0e4f1" | |
} | |
}, | |
"4.14.197": { | |
"CVE-2020-25285": { | |
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", | |
"cmt_id": "c4b219136040bc57e9704afee8f5c5a9430795a5" | |
}, | |
"CVE-2020-0465": { | |
"cmt_msg": "HID: core: Sanitize event code and type when mapping input", | |
"cmt_id": "a083dcdcfa2568747112edf865b3e848d70835e5" | |
}, | |
"CVE-2020-25641": { | |
"cmt_msg": "block: allow for_each_bvec to support zero len bvec", | |
"cmt_id": "b7aae706e84ac271f755a574d6a18fc9b42e8e8f" | |
}, | |
"CVE-2021-1048": { | |
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", | |
"cmt_id": "c5c6e00f6cc5d3ed0d6464b14e33f2f5c8505888" | |
} | |
}, | |
"4.14.198": { | |
"CVE-2020-12888": { | |
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", | |
"cmt_id": "1356c3e8539ac48b9362e60b1fa80ec06bb960ec" | |
} | |
}, | |
"4.14.199": { | |
"CVE-2020-25284": { | |
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", | |
"cmt_id": "af4a88994936474294b2f484be01117dc7550e68" | |
}, | |
"CVE-2020-14390": { | |
"cmt_msg": "fbcon: remove soft scrollback code", | |
"cmt_id": "6e2e0735dadecc1c1657e458e8f88e0ca6a4ec04" | |
}, | |
"CVE-2020-28097": { | |
"cmt_msg": "vgacon: remove software scrollback support", | |
"cmt_id": "34c050b531a72639e61a3be24b608604753f885a" | |
} | |
}, | |
"4.14.200": { | |
"CVE-2020-25645": { | |
"cmt_msg": "geneve: add transport ports in route lookup for geneve", | |
"cmt_id": "494648fc5286830b149bc1c1a059a827a45df3c8" | |
}, | |
"CVE-2021-0605": { | |
"cmt_msg": "af_key: pfkey_dump needs parameter validation", | |
"cmt_id": "05570d97443f8e569a79cf6e140f5ed96e6ac172" | |
}, | |
"CVE-2020-25643": { | |
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", | |
"cmt_id": "8f0addb36dd1c61fe0f1a458a48b1a5ddc96aa24" | |
}, | |
"CVE-2020-36312": { | |
"cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", | |
"cmt_id": "40a023f681befd9b2862a3c16fb306a38b359ae5" | |
} | |
}, | |
"4.14.201": { | |
"CVE-2020-14386": { | |
"cmt_msg": "net/packet: fix overflow in tpacket_rcv", | |
"cmt_id": "5b08356f184a0314d87f9a889be2ed9fef087691" | |
}, | |
"CVE-2020-25211": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" | |
}, | |
"CVE-2021-0448": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" | |
}, | |
"CVE-2021-39634": { | |
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", | |
"cmt_id": "23fb662b13e4f75688123e1d16aa7116f602db32" | |
}, | |
"CVE-2020-28915": { | |
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", | |
"cmt_id": "30386c13a1bfb0d1ce59ea83b825aa73bd516bc5" | |
} | |
}, | |
"4.14.202": { | |
"CVE-2020-10135": { | |
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", | |
"cmt_id": "7c9748f455b9206b279a4710210c902cb1f275e2" | |
}, | |
"CVE-2020-12352": { | |
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", | |
"cmt_id": "d53b1e94d08c032754a9aabeb3df309209c00347" | |
}, | |
"CVE-2020-12351": { | |
"cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", | |
"cmt_id": "2acf87436517894275a804210caa33b9a08cf93c" | |
} | |
}, | |
"4.14.203": { | |
"CVE-2020-0423": { | |
"cmt_msg": "binder: fix UAF when releasing todo list", | |
"cmt_id": "d4c49b6733c3125c3cc71617399d22f5b8ff962f" | |
}, | |
"CVE-2020-25705": { | |
"cmt_msg": "icmp: randomize the global rate limiter", | |
"cmt_id": "e1b8b57623521b7f4974476a20bd6ff971fde6c4" | |
} | |
}, | |
"4.14.204": { | |
"CVE-2020-27777": { | |
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", | |
"cmt_id": "818783bf8da5c20eb75a6bcf749eb97003ea9983" | |
}, | |
"CVE-2020-25668": { | |
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", | |
"cmt_id": "0182d680ead968cea5673ed5dcac0e4505a75f29" | |
}, | |
"CVE-2020-25656": { | |
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers", | |
"cmt_id": "7f4c966f2ad5f580fd5b1e2dcb19ba1c06a9254f" | |
} | |
}, | |
"4.14.205": { | |
"CVE-2019-0148": { | |
"cmt_msg": "i40e: Wrong truncation from u16 to u8", | |
"cmt_id": "9900bf4d433be6a2ed8c158779137c7a4742ab67" | |
}, | |
"CVE-2020-35508": { | |
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", | |
"cmt_id": "ee55b8c6bf4d59c7b82079b8a7d67597bb3a5539" | |
}, | |
"CVE-2020-28974": { | |
"cmt_msg": "vt: Disable KD_FONT_OP_COPY", | |
"cmt_id": "9421bad22e9fb7f513d81ef8fec513c8a4850c0d" | |
}, | |
"CVE-2019-0147": { | |
"cmt_msg": "i40e: add num_vectors checker in iwarp handler", | |
"cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" | |
}, | |
"CVE-2019-19770": { | |
"cmt_msg": "blktrace: fix debugfs use after free", | |
"cmt_id": "8268f88785ca9476c68da06d1f93c3d0d9747d28" | |
}, | |
"CVE-2019-0145": { | |
"cmt_msg": "i40e: add num_vectors checker in iwarp handler", | |
"cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" | |
} | |
}, | |
"4.14.206": { | |
"CVE-2020-8694": { | |
"cmt_msg": "powercap: restrict energy meter to root access", | |
"cmt_id": "bab6310b64994ee6ca679d86c90ca24111783516" | |
} | |
}, | |
"4.14.207": { | |
"CVE-2020-14351": { | |
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", | |
"cmt_id": "30c8324e9e7ee57b58af2501cb7db5d9d4f7b69b" | |
}, | |
"CVE-2020-27673": { | |
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", | |
"cmt_id": "025ea15db5665fa14d1c48e39aa788acaf30471b" | |
}, | |
"CVE-2020-27675": { | |
"cmt_msg": "xen/events: avoid removing an event channel while handling it", | |
"cmt_id": "b559da71974b5eb93311f7f475b2e4b16c0f9bb3" | |
}, | |
"CVE-2020-25704": { | |
"cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", | |
"cmt_id": "65c4000ccf7cc58a455977c5ec928525954058ac" | |
} | |
}, | |
"4.14.208": { | |
"CVE-2020-4788": { | |
"cmt_msg": "powerpc/64s: flush L1D on kernel entry", | |
"cmt_id": "db01cad9efe3c3838a6b3a3f68affd295c4b92d6" | |
}, | |
"CVE-2020-25669": { | |
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", | |
"cmt_id": "436aff975718106d8e168fde69a3786962ca356e" | |
} | |
}, | |
"4.14.209": { | |
"CVE-2020-28941": { | |
"cmt_msg": "speakup: Do not let the line discipline be used several times", | |
"cmt_id": "e712cefb3699ea978611edb3c2a5d3acd57d4004" | |
} | |
}, | |
"4.14.210": { | |
"CVE-2019-19813": { | |
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", | |
"cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" | |
}, | |
"CVE-2019-19816": { | |
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", | |
"cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" | |
} | |
}, | |
"4.14.211": { | |
"CVE-2020-35519": { | |
"cmt_msg": "net/x25: prevent a couple of overflows", | |
"cmt_id": "f1fbbcb61d840792ae38bc4007160fc80c14ee90" | |
} | |
}, | |
"4.14.212": { | |
"CVE-2020-29661": { | |
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", | |
"cmt_id": "882e038d2cd276163a8fc7bbeffda59ae0924471" | |
}, | |
"CVE-2020-29660": { | |
"cmt_msg": "tty: Fix ->session locking", | |
"cmt_id": "8deb3d9018400fab0a7401a910d3341053f5ec82" | |
}, | |
"CVE-2020-27830": { | |
"cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", | |
"cmt_id": "bccd77063e971a006164968873f4c2918b7188e6" | |
} | |
}, | |
"4.14.213": { | |
"CVE-2020-27815": { | |
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", | |
"cmt_id": "4a0809752ef23cd4be99b0cd8f7586c8ed7bd433" | |
}, | |
"CVE-2020-29568": { | |
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing", | |
"cmt_id": "92d4ced9881361aefa2f7bc58dab19aa4d28ddf8" | |
}, | |
"CVE-2020-29569": { | |
"cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", | |
"cmt_id": "62afce1adda51bd9d033dbec1dfe413891021bae" | |
} | |
}, | |
"4.14.214": { | |
"CVE-2020-36158": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", | |
"cmt_id": "d367530330f7f638eecdfc724ae276546f1b1e68" | |
} | |
}, | |
"4.14.215": { | |
"CVE-2020-28374": { | |
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", | |
"cmt_id": "c842ead67ae3cac58e84e7880153e68cccd59773" | |
}, | |
"CVE-2021-39648": { | |
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", | |
"cmt_id": "6766064c794afeacc29b21fc09ea4dbe3cae1af3" | |
} | |
}, | |
"4.14.217": { | |
"CVE-2021-3178": { | |
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", | |
"cmt_id": "0f60f9d1e6182d9440614c13cdf6106e2d470f89" | |
} | |
}, | |
"4.14.218": { | |
"CVE-2020-27825": { | |
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call", | |
"cmt_id": "fdb2310d58812b15f6b460509b43ff0b87e59367" | |
}, | |
"CVE-2021-39657": { | |
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", | |
"cmt_id": "30f2a89f9481f851bc68e51a1e7114392b052231" | |
} | |
}, | |
"4.14.219": { | |
"CVE-2021-3348": { | |
"cmt_msg": "nbd: freeze the queue while we're adding connections", | |
"cmt_id": "51359110d9d9b0231dc6a60716895104c73e7770" | |
} | |
}, | |
"4.14.222": { | |
"CVE-2021-26931": { | |
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", | |
"cmt_id": "fd8ec8c708953323feb7c6177d894d39a23b08e4" | |
}, | |
"CVE-2021-26930": { | |
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", | |
"cmt_id": "5571633988e02a1107720544a57ab4878c4446be" | |
}, | |
"CVE-2021-21781": { | |
"cmt_msg": "ARM: ensure the signal page contains defined contents", | |
"cmt_id": "b71cc506778eb283b752400e234784ee86b5891c" | |
}, | |
"CVE-2021-26932": { | |
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", | |
"cmt_id": "da2e2a5c88abfe0974b4b8575c798fcafb552fc9" | |
} | |
}, | |
"4.14.223": { | |
"CVE-2021-0512": { | |
"cmt_msg": "HID: make arrays usage and value to be the same", | |
"cmt_id": "00022873fdc1a304fd89016d227e3781f413dfbd" | |
}, | |
"CVE-2021-3612": { | |
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", | |
"cmt_id": "d4b7440883871cbcaf6c1cd95a76048a86b005c7" | |
} | |
}, | |
"4.14.224": { | |
"CVE-2021-30002": { | |
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", | |
"cmt_id": "d4daa80676bfa53359ae31e601105cbdefaf2554" | |
}, | |
"CVE-2021-27365": { | |
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", | |
"cmt_id": "1a588b51ff984aadc027078125064807c5c7bc3f" | |
}, | |
"CVE-2021-27364": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" | |
}, | |
"CVE-2021-27363": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" | |
}, | |
"CVE-2021-28038": { | |
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", | |
"cmt_id": "893a88ea0ee11a1f5e2279cad3c0ed7736187288" | |
} | |
}, | |
"4.14.226": { | |
"CVE-2019-19060": { | |
"cmt_msg": "iio: imu: adis16400: release allocated memory on failure", | |
"cmt_id": "593b7ff46bc064f2acac9ed6b7baa3189d2bcd90" | |
}, | |
"CVE-2021-33033": { | |
"cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", | |
"cmt_id": "ab44f7317c16ddcf9ee12ba2aca60771266c2dc6" | |
}, | |
"CVE-2021-29265": { | |
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", | |
"cmt_id": "04f879ba79b056041972122c1dc597b79d2464e5" | |
}, | |
"CVE-2021-28660": { | |
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", | |
"cmt_id": "33cdc63f0e07abf637ba326b6016731be958088d" | |
} | |
}, | |
"4.14.227": { | |
"CVE-2021-28964": { | |
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", | |
"cmt_id": "0fbf41006d8c850963049c35563e7775fe7c2164" | |
}, | |
"CVE-2021-28972": { | |
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", | |
"cmt_id": "6d7724c9c507d5b526991dcdef861c6b28c45eb2" | |
}, | |
"CVE-2021-28971": { | |
"cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", | |
"cmt_id": "403fdabcc1bcd0d31f9fcb9b9b2e831214ab2192" | |
} | |
}, | |
"4.14.228": { | |
"CVE-2021-28688": { | |
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", | |
"cmt_id": "db108b67d81397cdbaf3f91aeca6e5eb5f71de1d" | |
}, | |
"CVE-2021-29647": { | |
"cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", | |
"cmt_id": "749d2e33bfbacb3112cbfaafde75e507cb46c67d" | |
}, | |
"CVE-2021-31916": { | |
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices", | |
"cmt_id": "ba73e621ced58ff4ad1020a140ccb5843da1cb26" | |
} | |
}, | |
"4.14.229": { | |
"CVE-2021-0941": { | |
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", | |
"cmt_id": "64cf6c3156a5cbd9c29f54370b801b336d2f7894" | |
}, | |
"CVE-2021-3483": { | |
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", | |
"cmt_id": "8aa6e548a5ee59c91e9e5d67fd6de5cbaa5c458a" | |
} | |
}, | |
"4.14.230": { | |
"CVE-2021-29154": { | |
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", | |
"cmt_id": "32f9a870ab6b1f72f100e9db55b8a022072f78a6" | |
} | |
}, | |
"4.14.231": { | |
"CVE-2021-3659": { | |
"cmt_msg": "net: mac802154: Fix general protection fault", | |
"cmt_id": "d103fd20f0539e2bd615ed6f6159537cb7e2c5ba" | |
}, | |
"CVE-2021-0937": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" | |
}, | |
"CVE-2020-25672": { | |
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", | |
"cmt_id": "02b99cae71335f9f38d0a164ffe3a7a1328f44fc" | |
}, | |
"CVE-2020-25673": { | |
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", | |
"cmt_id": "892e1f065c1b3c99a12a1a41683f9ddbc22abb3e" | |
}, | |
"CVE-2020-25670": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", | |
"cmt_id": "538a6ff11516d38a61e237d2d2dc04c30c845fbe" | |
}, | |
"CVE-2020-25671": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", | |
"cmt_id": "b1d5c07a3b597766bbf5bf61083cd65e72034144" | |
}, | |
"CVE-2021-22555": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" | |
} | |
}, | |
"4.14.232": { | |
"CVE-2020-29374": { | |
"cmt_msg": "gup: document and work around \"COW can break either way\" issue", | |
"cmt_id": "407faed92b4a4e2ad900d61ea3831dd597640f29" | |
}, | |
"CVE-2021-23133": { | |
"cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", | |
"cmt_id": "54b63c76b9bb95fba20cd268086ee448f87208c6" | |
} | |
}, | |
"4.14.233": { | |
"CVE-2021-4157": { | |
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", | |
"cmt_id": "40286f0852d2ecfa713438199557c706dc6a8db3" | |
}, | |
"CVE-2021-33034": { | |
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", | |
"cmt_id": "21f6aee6682a1f7415e23f96ce94ff387d9cdb2e" | |
}, | |
"CVE-2021-32399": { | |
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", | |
"cmt_id": "40acc1aa3e2a705a3c2ed171ed563ef04f7ba19e" | |
} | |
}, | |
"4.14.234": { | |
"CVE-2020-26558": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" | |
}, | |
"CVE-2021-0129": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" | |
} | |
}, | |
"4.14.235": { | |
"CVE-2021-33098": { | |
"cmt_msg": "ixgbe: fix large MTU request from VF", | |
"cmt_id": "5217f9cab7dd28e9c7626cd795e51da98ecb2af4" | |
}, | |
"CVE-2020-24587": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" | |
}, | |
"CVE-2020-24586": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" | |
}, | |
"CVE-2021-34981": { | |
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", | |
"cmt_id": "6f6ac2a7959b1864886d07fcf3b9cec587dfe635" | |
}, | |
"CVE-2020-24588": { | |
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", | |
"cmt_id": "a3558e1b75fefb2299659ee0070ee917927d9220" | |
}, | |
"CVE-2020-26139": { | |
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", | |
"cmt_id": "557bb37533a365f9d8a0093ecce29417da4b9228" | |
}, | |
"CVE-2020-26147": { | |
"cmt_msg": "mac80211: assure all fragments are encrypted", | |
"cmt_id": "c39f180c7bd8379de238a4fd4a2f7515e03802f8" | |
}, | |
"CVE-2021-29650": { | |
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.", | |
"cmt_id": "f1fd7a174018f1107881150c6c2ce00e49a1e643" | |
} | |
}, | |
"4.14.236": { | |
"CVE-2021-3564": { | |
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order", | |
"cmt_id": "fa7d2874963312030d9618541b9bc2e549e19ac1" | |
}, | |
"CVE-2021-38208": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" | |
}, | |
"CVE-2021-3573": { | |
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", | |
"cmt_id": "88481ea480756644b5221648216bb67866e51391" | |
}, | |
"CVE-2021-3587": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" | |
} | |
}, | |
"4.14.238": { | |
"CVE-2021-34693": { | |
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", | |
"cmt_id": "4fa028860bb1656f370851c2c26de15fc67da300" | |
}, | |
"CVE-2021-45486": { | |
"cmt_msg": "inet: use bigger hash table for IP ID generation", | |
"cmt_id": "3ba51ed2c3ac36aa947d0b250d318de6ed7cf552" | |
} | |
}, | |
"4.14.240": { | |
"CVE-2021-45485": { | |
"cmt_msg": "ipv6: use prandom_u32() for ID generation", | |
"cmt_id": "4b55d7b3106a410cdab4ea60f5e55ca0668c6a09" | |
}, | |
"CVE-2021-3655": { | |
"cmt_msg": "sctp: validate from_addr_param return", | |
"cmt_id": "f01bfaea62d14938ff2fbeaf67f0afec2ec64ab9" | |
}, | |
"CVE-2021-3609": { | |
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", | |
"cmt_id": "630f13442f1472abe5013ef98f76a3bbca64dd80" | |
}, | |
"CVE-2022-0850": { | |
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", | |
"cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4" | |
}, | |
"CVE-2021-33909": { | |
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations", | |
"cmt_id": "3c07d1335d17ae0411101024de438dbc3734e992" | |
}, | |
"CVE-2021-38160": { | |
"cmt_msg": "virtio_console: Assure used length from device is limited", | |
"cmt_id": "56cf748562d3cbfd33d1ba2eb4a7603a5e20da88" | |
} | |
}, | |
"4.14.241": { | |
"CVE-2021-38204": { | |
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory", | |
"cmt_id": "edddc79c4391f8001095320d3ca423214b9aa4bf" | |
}, | |
"CVE-2021-3679": { | |
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", | |
"cmt_id": "76598512d5d7fc407c319ca4448cf5348b65058a" | |
}, | |
"CVE-2021-37576": { | |
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", | |
"cmt_id": "b67a821813c7b8160b54d83928281fec84a42d88" | |
} | |
}, | |
"4.14.242": { | |
"CVE-2021-0920": { | |
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", | |
"cmt_id": "af3e2b87b36100c28feb71da52c57293c4540690" | |
} | |
}, | |
"4.14.243": { | |
"CVE-2021-22543": { | |
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", | |
"cmt_id": "46d75ff2c1beebe90e7af8887256d8f0323679e4" | |
} | |
}, | |
"4.14.244": { | |
"CVE-2021-38205": { | |
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", | |
"cmt_id": "1994eacac7af52da86e4b0cb6ae61621bef7393f" | |
}, | |
"CVE-2021-3732": { | |
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed", | |
"cmt_id": "517b875dfbf58f0c6c9e32dc90f5cf42d71a42ce" | |
} | |
}, | |
"4.14.245": { | |
"CVE-2021-42008": { | |
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", | |
"cmt_id": "5e0e782874ad03ae6d47d3e55aff378da0b51104" | |
}, | |
"CVE-2021-3653": { | |
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", | |
"cmt_id": "26af47bdc45e454877f15fa7658a167bb9799681" | |
}, | |
"CVE-2021-3656": { | |
"cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", | |
"cmt_id": "6ed198381ed2496fbc82214108e56a441d3b0213" | |
}, | |
"CVE-2020-3702": { | |
"cmt_msg": "ath: Use safer key clearing with key cache entries", | |
"cmt_id": "2cbb22fd4b4fb4d0822d185bf5bd6d027107bfda" | |
} | |
}, | |
"4.14.246": { | |
"CVE-2021-38198": { | |
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", | |
"cmt_id": "cea9e8ee3b8059bd2b36d68f1f428d165e5d13ce" | |
}, | |
"CVE-2021-39633": { | |
"cmt_msg": "ip_gre: add validation for csum_start", | |
"cmt_id": "99279223a37b46dc7716ec4e0ed4b3e03f1cfa4c" | |
}, | |
"CVE-2021-3753": { | |
"cmt_msg": "vt_kdsetmode: extend console locking", | |
"cmt_id": "3f488313d96fc6512a4a0fe3ed56cce92cbeec94" | |
} | |
}, | |
"4.14.247": { | |
"CVE-2021-42252": { | |
"cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", | |
"cmt_id": "b1b55e4073d3da6119ecc41636a2994b67a2be37" | |
}, | |
"CVE-2021-40490": { | |
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", | |
"cmt_id": "9569234645f102025aaf0fc83d3dcbf1b8cbf2dc" | |
} | |
}, | |
"4.14.248": { | |
"CVE-2021-20320": { | |
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", | |
"cmt_id": "daf48f68fca9040b542282a5cd17397af316dd89" | |
} | |
}, | |
"4.14.249": { | |
"CVE-2021-3764": { | |
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", | |
"cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" | |
}, | |
"CVE-2021-4203": { | |
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", | |
"cmt_id": "9d76f723256d68eea16f0c563fc80b3c14258634" | |
}, | |
"CVE-2021-3744": { | |
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", | |
"cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" | |
}, | |
"CVE-2021-37159": { | |
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", | |
"cmt_id": "4c0db9c4b3701c29f47bac0721e2f7d2b15d8edb" | |
} | |
}, | |
"4.14.250": { | |
"CVE-2021-20317": { | |
"cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", | |
"cmt_id": "0135fcb86a0bc9e4484f7e1228cadcc343c5edef" | |
} | |
}, | |
"4.14.251": { | |
"CVE-2021-20321": { | |
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", | |
"cmt_id": "1caaa820915d802328bc72e4de0d5b1629eab5da" | |
}, | |
"CVE-2021-41864": { | |
"cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", | |
"cmt_id": "f34bcd10c4832d491049905d25ea3f46a410c426" | |
}, | |
"CVE-2021-38300": { | |
"cmt_msg": "bpf, mips: Validate conditional branch offsets", | |
"cmt_id": "3401bca8827ba4918b3d582bd2c27708d4b133fe" | |
} | |
}, | |
"4.14.252": { | |
"CVE-2021-3894": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk", | |
"cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" | |
}, | |
"CVE-2022-0322": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk", | |
"cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" | |
} | |
}, | |
"4.14.253": { | |
"CVE-2021-3896": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" | |
}, | |
"CVE-2022-0644": { | |
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", | |
"cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d" | |
}, | |
"CVE-2021-3760": { | |
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", | |
"cmt_id": "a2efe3df65359add2164740a5777c26e64dd594b" | |
}, | |
"CVE-2021-43389": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" | |
} | |
}, | |
"4.14.254": { | |
"CVE-2021-3772": { | |
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", | |
"cmt_id": "82ad781d98040b4a5eea4eeb9a5acdd200a420c6" | |
} | |
}, | |
"4.14.255": { | |
"CVE-2021-42739": { | |
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", | |
"cmt_id": "8d6c05da808f8351db844b69a9d6ce7f295214bb" | |
} | |
}, | |
"4.14.256": { | |
"CVE-2021-4202": { | |
"cmt_msg": "NFC: reorganize the functions in nci_request", | |
"cmt_id": "6e2944d8bbc58682691438b57620491b5a4b7cfb" | |
}, | |
"CVE-2021-3752": { | |
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", | |
"cmt_id": "cd76d797a690969186c0c100e8a301c4480e4e7f" | |
}, | |
"CVE-2021-45868": { | |
"cmt_msg": "quota: check block number when reading the block in quota file", | |
"cmt_id": "1d0606dc3e27e6c281a2684cb8bdf47134051114" | |
}, | |
"CVE-2021-39686": { | |
"cmt_msg": "binder: use euid from cred instead of using task", | |
"cmt_id": "8989da231b3b989e48d885d61345fe290114b648" | |
}, | |
"CVE-2021-3640": { | |
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", | |
"cmt_id": "3eb50acbc96c9de3d8a056982938ece9bd1c2b91" | |
} | |
}, | |
"4.14.257": { | |
"CVE-2021-4002": { | |
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", | |
"cmt_id": "7bf1f5cb5150b1a53f6ccaadc0bc77f8f33206c8" | |
}, | |
"CVE-2021-4083": { | |
"cmt_msg": "fget: check that the fd still exists after getting a ref to it", | |
"cmt_id": "98548c3a9882a1ea993a103be7c1b499f3b88202" | |
} | |
}, | |
"4.14.258": { | |
"CVE-2021-39698": { | |
"cmt_msg": "wait: add wake_up_pollfree()", | |
"cmt_id": "a36e1978c6cb6282fadd5d62d4b3e7808cf0597b" | |
}, | |
"CVE-2021-39685": { | |
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", | |
"cmt_id": "e7c8afee149134b438df153b09af7fd928a8bc24" | |
} | |
}, | |
"4.14.259": { | |
"CVE-2021-39711": { | |
"cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb", | |
"cmt_id": "20fdf274472998123a8d173ba4cb6282ff6b63bd" | |
}, | |
"CVE-2021-28715": { | |
"cmt_msg": "xen/netback: don't queue unlimited number of packages", | |
"cmt_id": "9bebb2eedf679b3be4acaa20efda97f32c999d74" | |
}, | |
"CVE-2021-28714": { | |
"cmt_msg": "xen/netback: fix rx queue stall detection", | |
"cmt_id": "eae85b8c6e17d3e3888d9159205390e8dbcff6a8" | |
}, | |
"CVE-2021-28713": { | |
"cmt_msg": "xen/console: harden hvc_xen against event channel storms", | |
"cmt_id": "68b78f976ca47d52c03c41eded207a312e46b934" | |
}, | |
"CVE-2021-28712": { | |
"cmt_msg": "xen/netfront: harden netfront against event channel storms", | |
"cmt_id": "4bf81386e3d6e5083c93d51eff70260bcec091bb" | |
}, | |
"CVE-2021-28711": { | |
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms", | |
"cmt_id": "5ac3b68b79c9e964dd6f3cf80ff825518e502b79" | |
} | |
}, | |
"4.14.260": { | |
"CVE-2021-45469": { | |
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", | |
"cmt_id": "88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5" | |
}, | |
"CVE-2022-1195": { | |
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", | |
"cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9" | |
} | |
}, | |
"4.14.261": { | |
"CVE-2021-44733": { | |
"cmt_msg": "tee: handle lookup of shm with reference count 0", | |
"cmt_id": "3d556a28bbfe34a80b014db49908b0f1bcb1ae80" | |
} | |
}, | |
"4.14.262": { | |
"CVE-2021-45095": { | |
"cmt_msg": "phonet: refcount leak in pep_sock_accep", | |
"cmt_id": "a025db5658d5c10019ffed0d59026da8172897b6" | |
}, | |
"CVE-2021-4155": { | |
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", | |
"cmt_id": "2af625c89bf4a41c8a0bc818d8cf30a291f216ca" | |
} | |
}, | |
"4.14.263": { | |
"CVE-2021-29264": { | |
"cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", | |
"cmt_id": "93e83b226a16bcc800013c6e02c98eef7ba9868c" | |
}, | |
"CVE-2020-36322": { | |
"cmt_msg": "fuse: fix bad inode", | |
"cmt_id": "2cd45139c0f28ebfa7604866faee00c99231a62b" | |
}, | |
"CVE-2021-20292": { | |
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", | |
"cmt_id": "4a2cec066dc8d099d30c649ae7ed26771029e0b5" | |
}, | |
"CVE-2021-43976": { | |
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", | |
"cmt_id": "8c9261b84c9b90d130d97fc7d13727706253af87" | |
}, | |
"CVE-2021-38199": { | |
"cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", | |
"cmt_id": "d5e6dff8c92943a2719fa5415cc3d333e57d5d90" | |
} | |
}, | |
"4.14.264": { | |
"CVE-2022-0330": { | |
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store", | |
"cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0" | |
}, | |
"CVE-2022-22942": { | |
"cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", | |
"cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516" | |
} | |
}, | |
"4.14.265": { | |
"CVE-2022-24448": { | |
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", | |
"cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8" | |
}, | |
"CVE-2018-25020": { | |
"cmt_msg": "bpf: fix truncated jump targets on heavy expansions", | |
"cmt_id": "6824208b59a4727b8a8653f83d8e685584d04606" | |
}, | |
"CVE-2022-0617": { | |
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", | |
"cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76" | |
} | |
}, | |
"4.14.266": { | |
"CVE-2022-0492": { | |
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent", | |
"cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045" | |
}, | |
"CVE-2022-0435": { | |
"cmt_msg": "tipc: improve size validations for received domain records", | |
"cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d" | |
}, | |
"CVE-2022-0487": { | |
"cmt_msg": "moxart: fix potential use-after-free on remove path", | |
"cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e" | |
} | |
}, | |
"4.14.267": { | |
"CVE-2022-25375": { | |
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", | |
"cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175" | |
}, | |
"CVE-2022-25258": { | |
"cmt_msg": "USB: gadget: validate interface OS descriptor requests", | |
"cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731" | |
} | |
}, | |
"4.14.269": { | |
"CVE-2022-27223": { | |
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", | |
"cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa" | |
}, | |
"CVE-2022-26966": { | |
"cmt_msg": "sr9700: sanity check for packet length", | |
"cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26" | |
} | |
}, | |
"4.14.270": { | |
"CVE-2022-24958": { | |
"cmt_msg": "usb: gadget: don't release an existing dev->buf", | |
"cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2" | |
} | |
}, | |
"4.14.271": { | |
"CVE-2022-23038": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", | |
"cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" | |
}, | |
"CVE-2022-23039": { | |
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", | |
"cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354" | |
}, | |
"CVE-2022-23960": { | |
"cmt_msg": "ARM: report Spectre v2 status through sysfs", | |
"cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143" | |
}, | |
"CVE-2022-23036": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", | |
"cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" | |
}, | |
"CVE-2022-23037": { | |
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", | |
"cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5" | |
}, | |
"CVE-2022-0001": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", | |
"cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" | |
}, | |
"CVE-2022-0002": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", | |
"cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" | |
}, | |
"CVE-2022-23041": { | |
"cmt_msg": "xen/9p: use alloc/free_pages_exact()", | |
"cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5" | |
}, | |
"CVE-2022-23040": { | |
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", | |
"cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc" | |
}, | |
"CVE-2022-23042": { | |
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", | |
"cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296" | |
} | |
}, | |
"4.14.272": { | |
"CVE-2022-1199": { | |
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", | |
"cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5" | |
}, | |
"CVE-2021-4149": { | |
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error", | |
"cmt_id": "e0956dd95ddd6b02b7eb084d127b926a509ae8e7" | |
} | |
}, | |
"4.14.274": { | |
"CVE-2022-26490": { | |
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", | |
"cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9" | |
}, | |
"CVE-2022-28356": { | |
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", | |
"cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210" | |
}, | |
"CVE-2022-1016": { | |
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", | |
"cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9" | |
}, | |
"CVE-2022-27666": { | |
"cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", | |
"cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d" | |
} | |
}, | |
"4.14.276": { | |
"CVE-2022-28390": { | |
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", | |
"cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8" | |
}, | |
"CVE-2022-1353": { | |
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", | |
"cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031" | |
}, | |
"CVE-2022-1198": { | |
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", | |
"cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018" | |
}, | |
"CVE-2021-4197": { | |
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", | |
"cmt_id": "a70bcf9ed08f3628a9324f054b0e041697b26853" | |
}, | |
"CVE-2022-28389": { | |
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", | |
"cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411" | |
}, | |
"CVE-2022-1516": { | |
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", | |
"cmt_id": "858642789ada1b48630f322e59416ca9fca3e6b7" | |
}, | |
"CVE-2022-1011": { | |
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", | |
"cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e" | |
} | |
}, | |
"4.14.277": { | |
"CVE-2022-1204": { | |
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", | |
"cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456" | |
}, | |
"CVE-2022-1205": { | |
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", | |
"cmt_id": "331210983ba5ce82bf63b827bca0e1c833f293db" | |
}, | |
"CVE-2022-28388": { | |
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", | |
"cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614" | |
} | |
}, | |
"outstanding": { | |
"CVE-2021-0929": { | |
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" | |
}, | |
"CVE-2020-26556": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26557": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26555": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-20794": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26559": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-35501": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0168": { | |
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" | |
}, | |
"CVE-2018-20854": { | |
"cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" | |
}, | |
"CVE-2018-1121": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19378": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1419": { | |
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" | |
}, | |
"CVE-2017-5753": { | |
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" | |
}, | |
"CVE-2022-0995": { | |
"cmt_msg": "watch_queue: Fix filter limit check" | |
}, | |
"CVE-2022-0998": { | |
"cmt_msg": "vdpa: clean up get_config_size ret value handling" | |
}, | |
"CVE-2019-19377": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" | |
}, | |
"CVE-2019-2181": { | |
"cmt_msg": "binder: check for overflow when alloc for security context" | |
}, | |
"CVE-2021-3759": { | |
"cmt_msg": "memcg: enable accounting of ipc resources" | |
}, | |
"CVE-2020-27820": { | |
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" | |
}, | |
"CVE-2022-0854": { | |
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" | |
}, | |
"CVE-2020-24503": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-24502": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19449": { | |
"cmt_msg": "f2fs: fix to do sanity check on segment/section count" | |
}, | |
"CVE-2020-26541": { | |
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" | |
}, | |
"CVE-2020-11725": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0382": { | |
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" | |
}, | |
"CVE-2021-33061": { | |
"cmt_msg": "ixgbe: add improvement for MDD response functionality" | |
}, | |
"CVE-2022-1263": { | |
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" | |
}, | |
"CVE-2022-1158": { | |
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" | |
}, | |
"CVE-2021-35477": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" | |
}, | |
"CVE-2019-15222": { | |
"cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" | |
}, | |
"CVE-2019-15223": { | |
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" | |
}, | |
"CVE-2021-3864": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19815": { | |
"cmt_msg": "f2fs: support swap file w/ DIO" | |
}, | |
"CVE-2019-19814": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-27950": { | |
"cmt_msg": "HID: elo: fix memory leak in elo_probe" | |
}, | |
"CVE-2022-1015": { | |
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." | |
}, | |
"CVE-2019-19241": { | |
"cmt_msg": "io_uring: async workers should inherit the user creds" | |
}, | |
"CVE-2021-43975": { | |
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" | |
}, | |
"CVE-2022-25636": { | |
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" | |
}, | |
"CVE-2017-1000405": { | |
"cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" | |
}, | |
"CVE-2016-8660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-12379": { | |
"cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" | |
}, | |
"CVE-2019-12378": { | |
"cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" | |
}, | |
"CVE-2022-0494": { | |
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" | |
}, | |
"CVE-2018-12929": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-15802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-2544": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28796": { | |
"cmt_msg": "jbd2: fix use-after-free of transaction_t race" | |
}, | |
"CVE-2021-39713": { | |
"cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock" | |
}, | |
"CVE-2019-20908": { | |
"cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" | |
}, | |
"CVE-2018-7754": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2018-20855": { | |
"cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" | |
}, | |
"CVE-2007-3719": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4037": { | |
"cmt_msg": "xfs: fix up non-directory creation in SGID directories" | |
}, | |
"CVE-2019-9444": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2021-3506": { | |
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" | |
}, | |
"CVE-2019-19067": { | |
"cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" | |
}, | |
"CVE-2019-3874": { | |
"cmt_msg": "sctp: implement memory accounting on tx path" | |
}, | |
"CVE-2020-26145": { | |
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" | |
}, | |
"CVE-2010-4563": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26140": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26143": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26142": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28893": { | |
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" | |
}, | |
"CVE-2017-9986": { | |
"cmt_msg": "sound: Retire OSS" | |
}, | |
"CVE-2021-34556": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" | |
}, | |
"CVE-2022-29156": { | |
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" | |
}, | |
"CVE-2018-13095": { | |
"cmt_msg": "xfs: More robust inode extent count validation" | |
}, | |
"CVE-2021-3669": { | |
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" | |
}, | |
"CVE-2019-18885": { | |
"cmt_msg": "btrfs: merge btrfs_find_device and find_device" | |
}, | |
"CVE-2020-10708": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-7273": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2021-4023": { | |
"cmt_msg": "io-wq: fix cancellation on create-worker failure" | |
}, | |
"CVE-2019-18680": { | |
"cmt_msg": "" | |
}, | |
"CVE-2017-13693": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0399": { | |
"cmt_msg": "" | |
}, | |
"CVE-2017-13694": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36516": { | |
"cmt_msg": "" | |
}, | |
"CVE-2012-4542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0812": { | |
"cmt_msg": "xprtrdma: fix incorrect header size calculations" | |
}, | |
"CVE-2013-7445": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19036": { | |
"cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" | |
}, | |
"CVE-2005-3660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1508": { | |
"cmt_msg": "io_uring: reexpand under-reexpanded iters" | |
}, | |
"CVE-2019-19927": { | |
"cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" | |
}, | |
"CVE-2019-16921": { | |
"cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" | |
}, | |
"CVE-2021-4159": { | |
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" | |
}, | |
"CVE-2017-5715": { | |
"cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" | |
}, | |
"CVE-2021-0695": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-4609": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4150": { | |
"cmt_msg": "block: fix incorrect references to disk objects" | |
}, | |
"CVE-2021-28951": { | |
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" | |
}, | |
"CVE-2020-14304": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-25265": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-0347": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-29155": { | |
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" | |
}, | |
"CVE-2021-3714": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-16230": { | |
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" | |
}, | |
"CVE-2019-12455": { | |
"cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" | |
}, | |
"CVE-2019-12456": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26560": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-3892": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-12362": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2020-12363": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2022-0742": { | |
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" | |
}, | |
"CVE-2020-12364": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2022-0500": { | |
"cmt_msg": "bpf: Introduce MEM_RDONLY flag" | |
}, | |
"CVE-2022-1055": { | |
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" | |
}, | |
"CVE-2022-0480": { | |
"cmt_msg": "memcg: enable accounting for file lock caches" | |
}, | |
"CVE-2022-1184": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26141": { | |
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" | |
}, | |
"CVE-2020-8834": { | |
"cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" | |
}, | |
"CVE-2021-4218": { | |
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" | |
}, | |
"CVE-2022-23222": { | |
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" | |
}, | |
"CVE-2019-15290": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-15780": { | |
"cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" | |
}, | |
"CVE-2018-17977": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-26878": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-29582": { | |
"cmt_msg": "io_uring: fix race between timeout flush and removal" | |
}, | |
"CVE-2010-5321": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12930": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12931": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4148": { | |
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files" | |
}, | |
"CVE-2022-1043": { | |
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" | |
}, | |
"CVE-2021-39801": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39800": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1048": { | |
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" | |
}, | |
"CVE-2020-36385": { | |
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" | |
}, | |
"CVE-2019-12380": { | |
"cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" | |
}, | |
"CVE-2019-12381": { | |
"cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" | |
}, | |
"CVE-2020-7053": { | |
"cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" | |
}, | |
"CVE-2021-3542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-44879": { | |
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" | |
}, | |
"CVE-2020-12656": { | |
"cmt_msg": "sunrpc: check that domain table is empty at module unload." | |
}, | |
"CVE-2020-16120": { | |
"cmt_msg": "ovl: switch to mounter creds in readdir" | |
}, | |
"CVE-2018-12928": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36310": { | |
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" | |
}, | |
"CVE-2020-36313": { | |
"cmt_msg": "KVM: Fix out of range accesses to memslots" | |
}, | |
"CVE-2015-2877": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-0146": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-20449": { | |
"cmt_msg": "printk: hash addresses printed with %p" | |
}, | |
"CVE-2016-10723": { | |
"cmt_msg": "mm, oom: remove sleep from under oom_lock" | |
}, | |
"CVE-2022-0400": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0707": { | |
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" | |
}, | |
"CVE-2019-11191": { | |
"cmt_msg": "x86: Deprecate a.out support" | |
}, | |
"CVE-2019-19039": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" | |
}, | |
"CVE-2021-3847": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-10322": { | |
"cmt_msg": "xfs: enhance dinode verifier" | |
}, | |
"CVE-2020-8832": { | |
"cmt_msg": "drm/i915: Record the default hw state after reset upon load" | |
}, | |
"CVE-2022-1280": { | |
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" | |
}, | |
"CVE-2011-4917": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-16089": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-32078": { | |
"cmt_msg": "ARM: footbridge: remove personal server platform" | |
}, | |
"CVE-2019-10220": { | |
"cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" | |
}, | |
"CVE-2020-27835": { | |
"cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" | |
}, | |
"CVE-2019-5489": { | |
"cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" | |
} | |
} | |
}, | |
"4.19": { | |
"4.19": { | |
"CVE-2018-18281": { | |
"cmt_msg": "mremap: properly flush TLB before releasing the page", | |
"cmt_id": "eb66ae030829605d61fbef1909ce310e29f78821" | |
} | |
}, | |
"4.19-rc1": { | |
"CVE-2019-19083": { | |
"cmt_msg": "drm/amd/display: memory leak", | |
"cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" | |
} | |
}, | |
"4.19.2": { | |
"CVE-2018-18955": { | |
"cmt_msg": "userns: also map extents in the reverse map to kernel IDs", | |
"cmt_id": "9a7a80fb02cc7515b273dbb4249374d6e6a35b70" | |
} | |
}, | |
"4.19.3": { | |
"CVE-2018-19854": { | |
"cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", | |
"cmt_id": "a0f044f025e9a023e1e2b33c0731291059e2748d" | |
}, | |
"CVE-2018-16871": { | |
"cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", | |
"cmt_id": "20965de7f47207394ffe03d70a4806f5e1cfcd7f" | |
}, | |
"CVE-2018-18710": { | |
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", | |
"cmt_id": "c8099dbf492b565a4f75ae7b8c08b76ca18c4c3f" | |
} | |
}, | |
"4.19.7": { | |
"CVE-2018-19407": { | |
"cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", | |
"cmt_id": "61c42d657c859ccc95e53afdac64f73a0053b8ea" | |
}, | |
"CVE-2018-19406": { | |
"cmt_msg": "KVM: LAPIC: Fix pv ipis use-before-initialization", | |
"cmt_id": "ffb01e73737b4d3e66734c901ee666ae8a23a857" | |
}, | |
"CVE-2019-2025": { | |
"cmt_msg": "binder: fix race that allows malicious free of live buffer", | |
"cmt_id": "553927d6aab993e1297d0c69274cd0c2df5440ca" | |
}, | |
"CVE-2018-16862": { | |
"cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", | |
"cmt_id": "16a2d602244ff5327cecd210fdd50ad5ad443c9c" | |
} | |
}, | |
"4.19.8": { | |
"CVE-2018-18397": { | |
"cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", | |
"cmt_id": "10f98c134b02d11923d45ce6688c2479435e8ec9" | |
} | |
}, | |
"4.19.9": { | |
"CVE-2018-20169": { | |
"cmt_msg": "USB: check usb_get_extra_descriptor for proper size", | |
"cmt_id": "1b2e742bf7230ce04cda5b7348f922174bef2d7a" | |
}, | |
"CVE-2018-14625": { | |
"cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", | |
"cmt_id": "f9cd25b1e5e575a5f18547bdc04ea40a23ad511a" | |
}, | |
"CVE-2018-19824": { | |
"cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", | |
"cmt_id": "a7e719ace75e4451b7958cb73cbc12c627760007" | |
} | |
}, | |
"4.19.13": { | |
"CVE-2018-16882": { | |
"cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", | |
"cmt_id": "1972ca04708330b0edd52956e644e3974065a613" | |
}, | |
"CVE-2018-19985": { | |
"cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", | |
"cmt_id": "8f980122236c1fc8e11ffb57ec73315d01dc88e0" | |
} | |
}, | |
"4.19.14": { | |
"CVE-2019-9245": { | |
"cmt_msg": "f2fs: sanity check of xattr entry size", | |
"cmt_id": "5036fcd9b14516f62efae6ed0c42dfbb9798b643" | |
} | |
}, | |
"4.19.15": { | |
"CVE-2019-15927": { | |
"cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", | |
"cmt_id": "8ee6f180d56fe760b275ab7f060c7b12fc05d7b7" | |
}, | |
"CVE-2018-20784": { | |
"cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", | |
"cmt_id": "dc8408ea0b22ab181ee541f3786b4fd6161e0ce3" | |
}, | |
"CVE-2019-6133": { | |
"cmt_msg": "fork: record start_time late", | |
"cmt_id": "bc999b5099d70030a9cb1aff2c48b073f65e0f8f" | |
} | |
}, | |
"4.19.16": { | |
"CVE-2018-16884": { | |
"cmt_msg": "sunrpc: use-after-free in svc_process_common()", | |
"cmt_id": "44e7bab39f877c9c095bfaaee943b0807574a7f7" | |
} | |
}, | |
"4.19.17": { | |
"CVE-2019-3701": { | |
"cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", | |
"cmt_id": "8db82a6f2b76d42ec2615f8def6e797e064e7822" | |
}, | |
"CVE-2020-10769": { | |
"cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", | |
"cmt_id": "44c67402c3f738b7048de4464c02461bc8d0fd37" | |
}, | |
"CVE-2019-11085": { | |
"cmt_msg": "drm/i915/gvt: Fix mmap range check", | |
"cmt_id": "ac8b9e8e7ddd69f3efa91e8a99312de5729382c0" | |
} | |
}, | |
"4.19.18": { | |
"CVE-2019-9003": { | |
"cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda", | |
"cmt_id": "1c393ca118cfaf36c95270b9bed295bba109fafa" | |
} | |
}, | |
"4.19.19": { | |
"CVE-2019-7308": { | |
"cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", | |
"cmt_id": "eed84f94ff8d97abcbc5706f6f9427520fd60a10" | |
} | |
}, | |
"4.19.20": { | |
"CVE-2018-16880": { | |
"cmt_msg": "vhost: fix OOB in get_rx_bufs()", | |
"cmt_id": "aafe74b726891386cd139d3432ec619ed5189b29" | |
} | |
}, | |
"4.19.21": { | |
"CVE-2019-3819": { | |
"cmt_msg": "HID: debug: fix the ring buffer implementation", | |
"cmt_id": "c70374ce418e7ae9276d3dc26aed0301e4da5e35" | |
}, | |
"CVE-2019-8956": { | |
"cmt_msg": "sctp: walk the list of asoc safely", | |
"cmt_id": "7c2361308e1727c3135ebb3b5c6906fb781bb261" | |
}, | |
"CVE-2019-7222": { | |
"cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", | |
"cmt_id": "5a45d3720b5437515f8c094f1c3d61f6afe211c1" | |
}, | |
"CVE-2019-6974": { | |
"cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", | |
"cmt_id": "24b027d2b1386da03aafb2aaac69d4fa67ee7d9c" | |
}, | |
"CVE-2019-7221": { | |
"cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", | |
"cmt_id": "236fd677125f974aaf39f09074d226a884b4fe0e" | |
} | |
}, | |
"4.19.25": { | |
"CVE-2019-9162": { | |
"cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs", | |
"cmt_id": "6a3f7237871c4d5c090ab9a6fce3ba6a1baf1f82" | |
}, | |
"CVE-2019-8912": { | |
"cmt_msg": "net: crypto set sk to NULL when af_alg_release.", | |
"cmt_id": "eb5e6869125f69dd28513f92992d97ec62bb9773" | |
} | |
}, | |
"4.19.27": { | |
"CVE-2019-9213": { | |
"cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", | |
"cmt_id": "de04d2973a62e4efb3de45e93bd46acd6d510e0a" | |
} | |
}, | |
"4.19.28": { | |
"CVE-2019-16994": { | |
"cmt_msg": "net: sit: fix memory leak in sit_init_net()", | |
"cmt_id": "d0bedaac932f4c02c080a50d4a30b2a1fec5d682" | |
}, | |
"CVE-2019-12818": { | |
"cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", | |
"cmt_id": "f132b3f5f1ad1cbe818474ab8d0b555ff39369d5" | |
}, | |
"CVE-2019-8980": { | |
"cmt_msg": "exec: Fix mem leak in kernel_read_file", | |
"cmt_id": "b60d90b2d3d14c426693a0a34041db11be66d29e" | |
}, | |
"CVE-2019-15916": { | |
"cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", | |
"cmt_id": "7ce2a517fd8b7742e381d3b3551b9b03e667ad79" | |
} | |
}, | |
"4.19.29": { | |
"CVE-2019-2101": { | |
"cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", | |
"cmt_id": "ac8befb6dd601fd35c1d64167750c6698bc27c80" | |
} | |
}, | |
"4.19.30": { | |
"CVE-2019-16995": { | |
"cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", | |
"cmt_id": "996ee1aca7def6125e9d96f58151799d44082cfc" | |
}, | |
"CVE-2019-12819": { | |
"cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", | |
"cmt_id": "96a3b14450afa83f4f3ffdeafaca19db8e05c2fd" | |
} | |
}, | |
"4.19.31": { | |
"CVE-2019-11811": { | |
"cmt_msg": "ipmi_si: fix use-after-free of resource->name", | |
"cmt_id": "a441fdaf8c3034436fb6045ee285e515628fc555" | |
}, | |
"CVE-2019-10124": { | |
"cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", | |
"cmt_id": "234c0cc982211bb5539db632f31490bf0ad54827" | |
}, | |
"CVE-2019-9455": { | |
"cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", | |
"cmt_id": "573d423a9bd76b396954ddf847ff24d97658453d" | |
}, | |
"CVE-2019-16413": { | |
"cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", | |
"cmt_id": "e08ba890dc29250fafdfa7c9dba62ccfeec8ef7f" | |
} | |
}, | |
"4.19.32": { | |
"CVE-2019-15917": { | |
"cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", | |
"cmt_id": "e365b94086f9dec02ddfcc193dcad72858c6d973" | |
} | |
}, | |
"4.19.33": { | |
"CVE-2019-20811": { | |
"cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", | |
"cmt_id": "d9d215be3a3aa8b3638f2705826f52a7fb84cf24" | |
}, | |
"CVE-2019-20054": { | |
"cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", | |
"cmt_id": "07d0d2bd957ad922cf571e7cabb6c34067142b93" | |
}, | |
"CVE-2019-3460": { | |
"cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", | |
"cmt_id": "2318c0e4b87e590c9d8e88db185477cfac18abe2" | |
}, | |
"CVE-2019-15921": { | |
"cmt_msg": "genetlink: Fix a memory leak on error path", | |
"cmt_id": "9b8ef421b481d6e648438131d867986c649c297c" | |
}, | |
"CVE-2019-3459": { | |
"cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", | |
"cmt_id": "15d6538a0d6e0f6de5116081a948cba7cc3e1d3d" | |
} | |
}, | |
"4.19.34": { | |
"CVE-2019-11810": { | |
"cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", | |
"cmt_id": "8032fc9120c211cd40beef4c91c8206f4167e523" | |
} | |
}, | |
"4.19.35": { | |
"CVE-2019-11486": { | |
"cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", | |
"cmt_id": "894dc8495898cf6075eadf99fd496374decd3986" | |
}, | |
"CVE-2019-11815": { | |
"cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", | |
"cmt_id": "78b4bf26a8a76569fd6d0b47d98fb553c333b06f" | |
}, | |
"CVE-2019-3887": { | |
"cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)", | |
"cmt_id": "119031be7b0a2ce4ff4cd5525bec6d42817ff53d" | |
}, | |
"CVE-2019-10639": { | |
"cmt_msg": "netns: provide pure entropy for net_hash_mix()", | |
"cmt_id": "a1c2f3229734a4bb8d5ac008c0a67e025aa11547" | |
} | |
}, | |
"4.19.36": { | |
"CVE-2019-15292": { | |
"cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", | |
"cmt_id": "6c42507f426b40c63e8eb98ce6dd4afbc7efcdb5" | |
}, | |
"CVE-2019-9857": { | |
"cmt_msg": "inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()", | |
"cmt_id": "ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b" | |
} | |
}, | |
"4.19.37": { | |
"CVE-2019-3892": { | |
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", | |
"cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" | |
}, | |
"CVE-2019-11599": { | |
"cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", | |
"cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" | |
}, | |
"CVE-2019-15920": { | |
"cmt_msg": "cifs: Fix use-after-free in SMB2_read", | |
"cmt_id": "c69330a855ab4342d304f67f8c1e7d1fa2686bec" | |
}, | |
"CVE-2019-15919": { | |
"cmt_msg": "cifs: Fix use-after-free in SMB2_write", | |
"cmt_id": "8fb89b43b65fcd35f15d982712904b96fc64c68a" | |
}, | |
"CVE-2019-15214": { | |
"cmt_msg": "ALSA: core: Fix card races between register and disconnect", | |
"cmt_id": "b50e435df2d8b9a1d3e956e1c767dfc7e30a441b" | |
} | |
}, | |
"4.19.38": { | |
"CVE-2019-3882": { | |
"cmt_msg": "vfio/type1: Limit DMA mappings per container", | |
"cmt_id": "f7b467ad1be0478f0341afa8a9ac112732def088" | |
}, | |
"CVE-2019-15924": { | |
"cmt_msg": "fm10k: Fix a potential NULL pointer dereference", | |
"cmt_id": "9b9b0df4e7882638e53c55e8f556aa78915418b9" | |
}, | |
"CVE-2019-10125": { | |
"cmt_msg": "aio: simplify - and fix - fget/fput for io_submit()", | |
"cmt_id": "d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd" | |
}, | |
"CVE-2019-18805": { | |
"cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day", | |
"cmt_id": "250e51f856e1534e3e769add508f121966030462" | |
} | |
}, | |
"4.19.39": { | |
"CVE-2019-11487": { | |
"cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", | |
"cmt_id": "0311ff82b70fa12e80d188635bff24029ec06ae1" | |
} | |
}, | |
"4.19.41": { | |
"CVE-2019-15216": { | |
"cmt_msg": "USB: yurex: Fix protection fault after device removal", | |
"cmt_id": "9f632afe4f3989d77fdbf8ac6a015d6beb03ccb9" | |
} | |
}, | |
"4.19.42": { | |
"CVE-2018-20836": { | |
"cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", | |
"cmt_id": "0f18e433b97bf74bb62e0caa95c61e8631967fb9" | |
}, | |
"CVE-2019-11884": { | |
"cmt_msg": "Bluetooth: hidp: fix buffer overflow", | |
"cmt_id": "c6d1f9b4b2cb768e29f5d44af143f25ad89062b1" | |
} | |
}, | |
"4.19.43": { | |
"CVE-2019-11091": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" | |
}, | |
"CVE-2018-12130": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" | |
}, | |
"CVE-2018-12127": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" | |
}, | |
"CVE-2018-12126": { | |
"cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", | |
"cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" | |
} | |
}, | |
"4.19.44": { | |
"CVE-2019-10142": { | |
"cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", | |
"cmt_id": "e9ec5073c90d6de2ca5338bd67f7935b19d7c0c7" | |
} | |
}, | |
"4.19.45": { | |
"CVE-2019-11833": { | |
"cmt_msg": "ext4: zero out the unused memory region in the extent tree block", | |
"cmt_id": "25d010f4e0ece1ddf0d8d57942c0b0f1568fe498" | |
} | |
}, | |
"4.19.46": { | |
"CVE-2019-25045": { | |
"cmt_msg": "xfrm: clean up xfrm protocol checks", | |
"cmt_id": "d410ef75886a4efb3c49b8bacd8e3c295235e744" | |
}, | |
"CVE-2019-15666": { | |
"cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", | |
"cmt_id": "c9516503fe53c8960f180c1cc1cdf2341bed843d" | |
} | |
}, | |
"4.19.47": { | |
"CVE-2019-20095": { | |
"cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", | |
"cmt_id": "a27ce4840f89acd1e23efe2b4dfc0d512aa5b38a" | |
}, | |
"CVE-2019-19543": { | |
"cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", | |
"cmt_id": "aec118ecf579a6c70e505b39fc6eb6a2d878c89e" | |
}, | |
"CVE-2019-9466": { | |
"cmt_msg": "brcmfmac: add subtype check for event handling in data path", | |
"cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" | |
}, | |
"CVE-2019-9500": { | |
"cmt_msg": "brcmfmac: assure SSID length from firmware is limited", | |
"cmt_id": "cc240e057c1d48665dde8036144114854bae058c" | |
}, | |
"CVE-2019-9503": { | |
"cmt_msg": "brcmfmac: add subtype check for event handling in data path", | |
"cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" | |
}, | |
"CVE-2019-19966": { | |
"cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", | |
"cmt_id": "bdf3da72ae79f0cfb88c720dedabe16b0d67334b" | |
} | |
}, | |
"4.19.48": { | |
"CVE-2020-10720": { | |
"cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", | |
"cmt_id": "39fd0dc4a5565a1df7d84b1c92d2050233b15b5a" | |
}, | |
"CVE-2019-10638": { | |
"cmt_msg": "inet: switch IP ID generator to siphash", | |
"cmt_id": "07480da0c8a1979e0973d6dd783b6aed966dccf6" | |
} | |
}, | |
"4.19.49": { | |
"CVE-2019-15212": { | |
"cmt_msg": "USB: rio500: refuse more than one device at a time", | |
"cmt_id": "d2d93077bac37c6895d8c58f564699a3a897c5db" | |
}, | |
"CVE-2019-15219": { | |
"cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", | |
"cmt_id": "d27ea5e9eb4ac45e0e4cf8250a45aa06b0944787" | |
}, | |
"CVE-2019-15218": { | |
"cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", | |
"cmt_id": "35b1044566528b26d48b31a52069f45851d49885" | |
}, | |
"CVE-2019-1999": { | |
"cmt_msg": "binder: fix race between munmap() and direct reclaim", | |
"cmt_id": "9d57cfd4e9d81400c1fe2b7cd4503f54830b46c2" | |
}, | |
"CVE-2019-15223": { | |
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection", | |
"cmt_id": "eb2eeec920fb1b9b6faf8ea340f6295a2d03602b" | |
} | |
}, | |
"4.19.50": { | |
"CVE-2019-13233": { | |
"cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry", | |
"cmt_id": "b598ddc7b9fc87b09bdadb63abf92b4ba46cd385" | |
} | |
}, | |
"4.19.52": { | |
"CVE-2019-11479": { | |
"cmt_msg": "tcp: add tcp_min_snd_mss sysctl", | |
"cmt_id": "7f9f8a37e563c67b24ccd57da1d541a95538e8d9" | |
}, | |
"CVE-2019-11478": { | |
"cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", | |
"cmt_id": "ec83921899a571ad70d582934ee9e3e07f478848" | |
}, | |
"CVE-2019-11477": { | |
"cmt_msg": "tcp: limit payload size of sacked skbs", | |
"cmt_id": "c09be31461ed140976c60a87364415454a2c3d42" | |
} | |
}, | |
"4.19.53": { | |
"CVE-2019-9453": { | |
"cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", | |
"cmt_id": "ae3787d433f7b87ebf6b916e524c6e280e4e5804" | |
}, | |
"CVE-2019-15090": { | |
"cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", | |
"cmt_id": "f3a7a1137ffc69e1f460eb9e1b5f4fd09d3c4ea9" | |
} | |
}, | |
"4.19.54": { | |
"CVE-2019-15807": { | |
"cmt_msg": "scsi: libsas: delete sas port if expander discover failed", | |
"cmt_id": "114e8135ae0031556ead1bcb67249ecb84b804de" | |
}, | |
"CVE-2019-12984": { | |
"cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler", | |
"cmt_id": "4bb4ba362cc1ed3acb181a6d0b68c6de22be78e2" | |
} | |
}, | |
"4.19.56": { | |
"CVE-2019-12817": { | |
"cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork", | |
"cmt_id": "cd3e49394cb0f45c8dbf3c17c0818cd3d30b1332" | |
}, | |
"CVE-2019-12615": { | |
"cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", | |
"cmt_id": "7b460a9bb13db3f442f153c2ab8a9ff8520c368c" | |
}, | |
"CVE-2019-0136": { | |
"cmt_msg": "mac80211: drop robust management frames from unknown TA", | |
"cmt_id": "0e879ef1cb5baddebe1f12a9a3940a87d8e61558" | |
} | |
}, | |
"4.19.58": { | |
"CVE-2019-13272": { | |
"cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", | |
"cmt_id": "54435b7fff7bfb9515cc457b71c3734c1c3fff76" | |
}, | |
"CVE-2019-15221": { | |
"cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", | |
"cmt_id": "7f52af5e9baa9c478edcecdd4058eeef2835b1c3" | |
}, | |
"CVE-2019-9506": { | |
"cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", | |
"cmt_id": "5dd6139a0aa22112e46a6df5fd283046095822e0" | |
} | |
}, | |
"4.19.59": { | |
"CVE-2019-10126": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", | |
"cmt_id": "c7e427e28a3a2d1b89b8f9fa7c3f559774d91a7b" | |
}, | |
"CVE-2019-3846": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", | |
"cmt_id": "d4c0f752c1d2c6383cc7582c19b2ed7159d45937" | |
}, | |
"CVE-2019-15220": { | |
"cmt_msg": "p54usb: Fix race between disconnect and firmware loading", | |
"cmt_id": "449a8d08a4bc45101fa26e6d233b98258d33620a" | |
} | |
}, | |
"4.19.61": { | |
"CVE-2019-17351": { | |
"cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", | |
"cmt_id": "e73db096691e5f2720049502a3794a2a0c6d1b1f" | |
}, | |
"CVE-2019-13631": { | |
"cmt_msg": "Input: gtco - bounds check collection indent level", | |
"cmt_id": "d657077eda7b5572d86f2f618391bb016b5d9a64" | |
}, | |
"CVE-2019-15213": { | |
"cmt_msg": "media: dvb: usb: fix use after free in dvb_usb_device_exit", | |
"cmt_id": "94f2b518a7882f562537796b77e3ce6a6461236d" | |
}, | |
"CVE-2019-15925": { | |
"cmt_msg": "net: hns3: add some error checking in hclge_tm module", | |
"cmt_id": "26d86b29e806769adba91bd6fc1f077b94e9b64b" | |
}, | |
"CVE-2019-15926": { | |
"cmt_msg": "ath6kl: add some bounds checking", | |
"cmt_id": "83c911f4bd6846397017aa38c32dd18dc532f754" | |
}, | |
"CVE-2019-14284": { | |
"cmt_msg": "floppy: fix div-by-zero in setup_format_params", | |
"cmt_id": "6e34fd07484a0622a17b40e0ca89ed451260ef45" | |
}, | |
"CVE-2019-14283": { | |
"cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", | |
"cmt_id": "ff54c44f103825a426e46d08b5d3d76e44791a87" | |
} | |
}, | |
"4.19.63": { | |
"CVE-2019-12382": { | |
"cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", | |
"cmt_id": "2a18d76592e0d86c7fddcc6a7aa52509a2900f9d" | |
}, | |
"CVE-2019-13648": { | |
"cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", | |
"cmt_id": "b993a66d8ddc1c26da0d9aa3471789cc170b28ee" | |
} | |
}, | |
"4.19.64": { | |
"CVE-2019-20934": { | |
"cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", | |
"cmt_id": "48046e092ad557a01d7daf53205624944793b19d" | |
}, | |
"CVE-2019-15211": { | |
"cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", | |
"cmt_id": "b3836af8560e27cd0d27940ff9c5a08b90b8d256" | |
}, | |
"CVE-2019-3900": { | |
"cmt_msg": "vhost_net: fix possible infinite loop", | |
"cmt_id": "3af3b843aee41ed22343b011a4cf3812a80d2f38" | |
}, | |
"CVE-2019-10207": { | |
"cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", | |
"cmt_id": "56966212e23f82ced10831f7cca02f7339147428" | |
}, | |
"CVE-2019-15215": { | |
"cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", | |
"cmt_id": "8b44cc225e6024174508164931cab9f01c79dca2" | |
}, | |
"CVE-2019-2213": { | |
"cmt_msg": "binder: fix possible UAF when freeing buffer", | |
"cmt_id": "22068d49d09d2b3890e19d7b2048a33340f992da" | |
} | |
}, | |
"4.19.65": { | |
"CVE-2019-1125": { | |
"cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", | |
"cmt_id": "befb822c062b4c3d93380a58d5fd479395e8b267" | |
} | |
}, | |
"4.19.67": { | |
"CVE-2019-19536": { | |
"cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", | |
"cmt_id": "cab569a44a524709d95bbd88700860ac45e5d5cf" | |
}, | |
"CVE-2019-19535": { | |
"cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", | |
"cmt_id": "9ce1b3eb5489416338b2fb2b40f30f0d425700b4" | |
}, | |
"CVE-2019-19531": { | |
"cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", | |
"cmt_id": "33f2240acfa8b4017ee5dd64601c8a5ec7f53b4e" | |
} | |
}, | |
"4.19.68": { | |
"CVE-2019-15118": { | |
"cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", | |
"cmt_id": "46f9a1bc60a4c15a14a6504168cee1c2e0bf3ab4" | |
}, | |
"CVE-2019-19537": { | |
"cmt_msg": "USB: core: Fix races in character device registration and deregistraion", | |
"cmt_id": "7f52d6d2a82df15d7ea01d69d0943d2abc201b43" | |
}, | |
"CVE-2019-19527": { | |
"cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", | |
"cmt_id": "b545dc9debe69ca513b93f4a244451e9be14b0c5" | |
}, | |
"CVE-2019-19530": { | |
"cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", | |
"cmt_id": "c02c0249ce5523a7a264136ed36f857b85555bac" | |
}, | |
"CVE-2019-15117": { | |
"cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", | |
"cmt_id": "58b9f19ee438990f6406e61943d0bc7c875a0921" | |
} | |
}, | |
"4.19.69": { | |
"CVE-2019-15538": { | |
"cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", | |
"cmt_id": "11f85d4d77afb8f1cb1989f1565b26df21280118" | |
} | |
}, | |
"4.19.70": { | |
"CVE-2019-15902": { | |
"cmt_msg": "unknown", | |
"cmt_id": "b307f99dca5ab33edc1e04b9b479bcb0852ff85f" | |
} | |
}, | |
"4.19.73": { | |
"CVE-2019-15918": { | |
"cmt_msg": "cifs: Fix lease buffer length error", | |
"cmt_id": "4061e662c8e9f5fb796b05fd2ab58fed8cd16d59" | |
}, | |
"CVE-2019-19319": { | |
"cmt_msg": "ext4: protect journal inode's blocks using block_validity", | |
"cmt_id": "2fd4629de51974002f4e9cf1a35a1926dd6c9d99" | |
}, | |
"CVE-2019-14835": { | |
"cmt_msg": "vhost: make sure log_num < in_num", | |
"cmt_id": "ba03ee62aed0b0ee2eadfeb4a2fecc7d7eb47871" | |
}, | |
"CVE-2019-15031": { | |
"cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts", | |
"cmt_id": "569775bd536416ed9049aa580d9f89a0b4307d60" | |
}, | |
"CVE-2019-15030": { | |
"cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", | |
"cmt_id": "47a0f70d7d9ac3d6b1a96b312d07bc67af3834e9" | |
} | |
}, | |
"4.19.74": { | |
"CVE-2019-15504": { | |
"cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()", | |
"cmt_id": "3622d621e9beca76d53cd3007eb7b1d6e724716b" | |
} | |
}, | |
"4.19.75": { | |
"CVE-2019-14816": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" | |
}, | |
"CVE-2019-14814": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" | |
}, | |
"CVE-2019-14815": { | |
"cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", | |
"cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" | |
}, | |
"CVE-2019-15505": { | |
"cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", | |
"cmt_id": "b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1" | |
}, | |
"CVE-2019-14821": { | |
"cmt_msg": "KVM: coalesced_mmio: add bounds checking", | |
"cmt_id": "232a6462f43fceeac82bd99ef092b38e3a7ee296" | |
} | |
}, | |
"4.19.77": { | |
"CVE-2019-19533": { | |
"cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", | |
"cmt_id": "8630a4d13683095fbf14091d59a20e1ac71fdd6b" | |
}, | |
"CVE-2019-19080": { | |
"cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs", | |
"cmt_id": "5b6c791f494d5e770dfd015390386f321b9a94da" | |
}, | |
"CVE-2019-19081": { | |
"cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs", | |
"cmt_id": "587df35cbf654a063372fb1b523a0b56a5f789ab" | |
}, | |
"CVE-2019-17053": { | |
"cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "dd651ab7a11436f787aed0a987c85864b261ff19" | |
}, | |
"CVE-2019-17052": { | |
"cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "6f0f18e532693ecc1e0c7938e0d63531ea62bc3e" | |
}, | |
"CVE-2019-17056": { | |
"cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "33fe1f517e29566d842535038be227c71a4bd54d" | |
}, | |
"CVE-2019-17055": { | |
"cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "50dddec689cb2105f6bccf4a2c6fe43dcc3295d7" | |
}, | |
"CVE-2019-17054": { | |
"cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", | |
"cmt_id": "6fbf866276089853727dd9b31f1d251e61dde367" | |
} | |
}, | |
"4.19.78": { | |
"CVE-2019-18806": { | |
"cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", | |
"cmt_id": "9d0995cc268b4a431dbfb29db5cac36546732bc0" | |
} | |
}, | |
"4.19.79": { | |
"CVE-2019-19525": { | |
"cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", | |
"cmt_id": "3f41e88f4bd44284c575ad3fb579581a16b39069" | |
}, | |
"CVE-2019-16746": { | |
"cmt_msg": "nl80211: validate beacon head", | |
"cmt_id": "1bd17a737c9e7e91483d9a603528b0e6d4c772f8" | |
} | |
}, | |
"4.19.80": { | |
"CVE-2019-19528": { | |
"cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", | |
"cmt_id": "2fdcf7e19bdefc683da824264c0898af39bf8d50" | |
}, | |
"CVE-2019-19523": { | |
"cmt_msg": "USB: adutux: fix use-after-free on disconnect", | |
"cmt_id": "316f51d7759735a5295301ab22a7c6231b49c24f" | |
} | |
}, | |
"4.19.81": { | |
"CVE-2019-19075": { | |
"cmt_msg": "ieee802154: ca8210: prevent memory leak", | |
"cmt_id": "960019214539ce75398eaf38d31c77b86aadd739" | |
}, | |
"CVE-2019-17075": { | |
"cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", | |
"cmt_id": "27414f90ff6e1d7f6657e4a820b04a7b2d760272" | |
}, | |
"CVE-2019-17133": { | |
"cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", | |
"cmt_id": "73c066a9552a6d33ed7de002855337d1c966e8ce" | |
} | |
}, | |
"4.19.82": { | |
"CVE-2019-19060": { | |
"cmt_msg": "iio: imu: adis16400: release allocated memory on failure", | |
"cmt_id": "4a4206a83fc69782d4ef36d8f5eb28836d8b6814" | |
}, | |
"CVE-2019-19065": { | |
"cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", | |
"cmt_id": "962cff4f3f89acf54b6fb418e7ff386b720b0fd6" | |
}, | |
"CVE-2019-17666": { | |
"cmt_msg": "rtlwifi: Fix potential overflow on P2P code", | |
"cmt_id": "64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33" | |
}, | |
"CVE-2019-15099": { | |
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", | |
"cmt_id": "696da02259463ea634821e117088f82afe7bf851" | |
}, | |
"CVE-2019-15098": { | |
"cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", | |
"cmt_id": "696da02259463ea634821e117088f82afe7bf851" | |
}, | |
"CVE-2019-19048": { | |
"cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr", | |
"cmt_id": "c2ea451f22f180e9e46225f54b5ec50c50bb639f" | |
}, | |
"CVE-2020-10773": { | |
"cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", | |
"cmt_id": "ced8cb0230d070274cd26bec818dd7c67514d586" | |
}, | |
"CVE-2019-19526": { | |
"cmt_msg": "NFC: pn533: fix use-after-free and memleaks", | |
"cmt_id": "24aaf7f4528f0df0f29667d3921f4a63aa7b806c" | |
}, | |
"CVE-2019-19532": { | |
"cmt_msg": "HID: Fix assumption that devices have inputs", | |
"cmt_id": "8a01c4b908cf0a5367d3309c1c0d4e9be655ce00" | |
} | |
}, | |
"4.19.83": { | |
"CVE-2019-18282": { | |
"cmt_msg": "net/flow_dissector: switch to siphash", | |
"cmt_id": "558d2bdad5f6a0dd65ed7ed4f74419e826a97759" | |
}, | |
"CVE-2019-16233": { | |
"cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", | |
"cmt_id": "3ee6a8bdae81a09c1dc9c27d3a50e6b1b6a24676" | |
}, | |
"CVE-2019-19049": { | |
"cmt_msg": "of: unittest: fix memory leak in unittest_data_add", | |
"cmt_id": "fcc3f7c810c3bc595ce179ea4d9e18f506fd0d03" | |
} | |
}, | |
"4.19.84": { | |
"CVE-2019-19045": { | |
"cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", | |
"cmt_id": "42de3a902443b64c6e3cf9c61d9cd6f30b2c0d67" | |
}, | |
"CVE-2019-19052": { | |
"cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", | |
"cmt_id": "9289226f69822de0b716c0fbfc31db0283f14e2b" | |
}, | |
"CVE-2019-18813": { | |
"cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe", | |
"cmt_id": "10eb9abd21bad2a9726f50557b38924cb8d81ccd" | |
}, | |
"CVE-2019-0155": { | |
"cmt_msg": "drm/i915: Rename gen7 cmdparser tables", | |
"cmt_id": "b4b1abdc6b181cb78a072b95557ae392d423c3eb" | |
}, | |
"CVE-2019-0154": { | |
"cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", | |
"cmt_id": "011b7173cbdbd1a5f1826656693ea51516f15dc1" | |
}, | |
"CVE-2019-19922": { | |
"cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", | |
"cmt_id": "502bd151448c2c76a927b26783e5538875c534ff" | |
}, | |
"CVE-2019-19529": { | |
"cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", | |
"cmt_id": "ce9b94da0e043b7b0ec1bd3d0e451d956acff9c1" | |
}, | |
"CVE-2018-12207": { | |
"cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", | |
"cmt_id": "a991063ce57684a2259688886643cf1c430f8188" | |
}, | |
"CVE-2019-11135": { | |
"cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", | |
"cmt_id": "4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6" | |
}, | |
"CVE-2019-16231": { | |
"cmt_msg": "fjes: Handle workqueue allocation failure", | |
"cmt_id": "f09b99c883e82fd5d28a529e11e66c2e887da636" | |
}, | |
"CVE-2019-19534": { | |
"cmt_msg": "can: peak_usb: fix slab info leak", | |
"cmt_id": "a7be2debb769092c7c07b9a866b055d8bee5afaf" | |
} | |
}, | |
"4.19.85": { | |
"CVE-2019-19524": { | |
"cmt_msg": "Input: ff-memless - kill timer in destroy()", | |
"cmt_id": "c02230815282a436366d3d0d6de6d2636dd71b74" | |
} | |
}, | |
"4.19.87": { | |
"CVE-2019-18660": { | |
"cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", | |
"cmt_id": "0a60d4bddc0ba6a7e06d10efa59f7861837860b0" | |
}, | |
"CVE-2019-15291": { | |
"cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", | |
"cmt_id": "8b42c263ec1a348bf098e6255407486c1bf17ece" | |
}, | |
"CVE-2019-18683": { | |
"cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", | |
"cmt_id": "467052f6ea5a51524992e43f02b543550495c391" | |
} | |
}, | |
"4.19.88": { | |
"CVE-2019-12614": { | |
"cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", | |
"cmt_id": "32a24a397aee35ca2bb0f835b8f3daabd88890fa" | |
}, | |
"CVE-2019-19767": { | |
"cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", | |
"cmt_id": "e91cce02f3025da559468729ea0ad9dea242d3eb" | |
} | |
}, | |
"4.19.89": { | |
"CVE-2019-19062": { | |
"cmt_msg": "crypto: user - fix memory leak in crypto_report", | |
"cmt_id": "351a567ebf2482de4dd5e5bbd539f2175540b717" | |
}, | |
"CVE-2019-19227": { | |
"cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", | |
"cmt_id": "0977763a13fd87a7aebe376dc96385758de3aa9e" | |
}, | |
"CVE-2019-19071": { | |
"cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", | |
"cmt_id": "5da96cc31633a9076404621ebb89bbe78f2c8676" | |
}, | |
"CVE-2019-19079": { | |
"cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter", | |
"cmt_id": "754e3c0c31c96cf3a4a54ed2a8c63cca28109136" | |
}, | |
"CVE-2019-19252": { | |
"cmt_msg": "vcs: prevent write access to vcsu devices", | |
"cmt_id": "627f3b9e4dd812dac9d93e578af80de751e704a4" | |
}, | |
"CVE-2019-19332": { | |
"cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", | |
"cmt_id": "5119ffd480b644d8bc9af741cc8ef435a7ec5ff7" | |
} | |
}, | |
"4.19.90": { | |
"CVE-2019-19447": { | |
"cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", | |
"cmt_id": "8e7a865366105b978eef4108f49a12100eea4299" | |
} | |
}, | |
"4.19.92": { | |
"CVE-2019-18786": { | |
"cmt_msg": "media: rcar_drif: fix a memory disclosure", | |
"cmt_id": "debdd16cbd99ffc767227685e2738e5b495b7c54" | |
}, | |
"CVE-2019-19057": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", | |
"cmt_id": "1b3e52db38471d5ac896eb9be111565e3734d5b5" | |
}, | |
"CVE-2019-19063": { | |
"cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", | |
"cmt_id": "3717a450f83945c481059a6921440e5e6fe3c856" | |
}, | |
"CVE-2020-0427": { | |
"cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", | |
"cmt_id": "f88ac1330779c5bfdd79f7d7f7d4d3343c782f92" | |
}, | |
"CVE-2019-19947": { | |
"cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices", | |
"cmt_id": "9ed59600c3524f12144b30cfc1d86734cfb3927b" | |
}, | |
"CVE-2019-20812": { | |
"cmt_msg": "af_packet: set defaule value for tmo", | |
"cmt_id": "e99af2cb552e3fe1ec6157fc15856a89a6388886" | |
}, | |
"CVE-2019-16230": { | |
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", | |
"cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" | |
}, | |
"CVE-2019-16232": { | |
"cmt_msg": "libertas: fix a potential NULL pointer dereference", | |
"cmt_id": "60bb6967b543be59f66f60526ca816e1b33ec480" | |
}, | |
"CVE-2019-16229": { | |
"cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", | |
"cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" | |
} | |
}, | |
"4.19.93": { | |
"CVE-2020-10690": { | |
"cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", | |
"cmt_id": "0393b8720128d5b39db8523e5bfbfc689f18c37c" | |
} | |
}, | |
"4.19.94": { | |
"CVE-2019-18809": { | |
"cmt_msg": "media: usb: fix memory leak in af9005_identify_state", | |
"cmt_id": "d933de8115f3263fd50cf3b1f1dac2faff02fd89" | |
}, | |
"CVE-2019-19965": { | |
"cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", | |
"cmt_id": "8b9bf467061bc89ccf4a43be637e08d8a70fd76d" | |
} | |
}, | |
"4.19.95": { | |
"CVE-2019-14901": { | |
"cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", | |
"cmt_id": "21f08020dd8519baf209348c345131a8967e3cef" | |
} | |
}, | |
"4.19.96": { | |
"CVE-2019-14895": { | |
"cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", | |
"cmt_id": "0aa8632c57930243bea6fa4ebcbff8fac089e664" | |
}, | |
"CVE-2020-0305": { | |
"cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", | |
"cmt_id": "ec576895d61356a2cab096e1ca23bf7cc765e5b2" | |
}, | |
"CVE-2019-19066": { | |
"cmt_msg": "scsi: bfa: release allocated memory in case of error", | |
"cmt_id": "486f51201528126bec2c647fa9d4216fc4fda91b" | |
}, | |
"CVE-2019-20636": { | |
"cmt_msg": "Input: add safety guards to input_set_keycode()", | |
"cmt_id": "f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4" | |
}, | |
"CVE-2019-19068": { | |
"cmt_msg": "rtl8xxxu: prevent leaking urb", | |
"cmt_id": "0e27512c5d0bc2c3d33c1e7f73a8983015c82b83" | |
}, | |
"CVE-2020-0431": { | |
"cmt_msg": "HID: hid-input: clear unmapped usages", | |
"cmt_id": "64c8b76e69acdecab62b035e72b12775d6d35a3b" | |
}, | |
"CVE-2019-14615": { | |
"cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", | |
"cmt_id": "dd4f3b3508f65fe37975db223365216316da3998" | |
}, | |
"CVE-2019-19056": { | |
"cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", | |
"cmt_id": "f2bde0e9989e243345316e3c96b352ab94037340" | |
}, | |
"CVE-2019-19078": { | |
"cmt_msg": "ath10k: fix memory leak", | |
"cmt_id": "aed1b68eadf22513ac1fbd389f591f91c8bdaaf5" | |
} | |
}, | |
"4.19.97": { | |
"CVE-2019-9445": { | |
"cmt_msg": "f2fs: check if file namelen exceeds max value", | |
"cmt_id": "4124927e36b7753efb6faf1a508e2bc6783343cf" | |
}, | |
"CVE-2019-20096": { | |
"cmt_msg": "dccp: Fix memleak in __feat_register_sp", | |
"cmt_id": "e58c590c772eb5dc5a3603c5aef4148f47ab2e20" | |
}, | |
"CVE-2019-15217": { | |
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", | |
"cmt_id": "0648766cb7d336e5932278c316aef6aac35d60ab" | |
}, | |
"CVE-2019-19059": { | |
"cmt_msg": "iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init", | |
"cmt_id": "6e41dd9731e13b0bdf2f57f84b9d25d009bd9f87" | |
}, | |
"CVE-2019-19058": { | |
"cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", | |
"cmt_id": "09044a4a142404799e519def0bbfcc98fa68c677" | |
}, | |
"CVE-2019-19927": { | |
"cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages", | |
"cmt_id": "8c2cdfb2c81bb533b9e6a3874ee5399102c4c580" | |
}, | |
"CVE-2019-19077": { | |
"cmt_msg": "RDMA: Fix goto target to release the allocated memory", | |
"cmt_id": "d203ff6a3059b7fc3a9b48048eaf5641ed7fda2c" | |
}, | |
"CVE-2019-5108": { | |
"cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", | |
"cmt_id": "8f483142b0bb278f67eabccbe3d6a0e8c45284ad" | |
} | |
}, | |
"4.19.98": { | |
"CVE-2020-12652": { | |
"cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", | |
"cmt_id": "3dae5041c65545ac65d610375b4ac30b00f174a3" | |
}, | |
"CVE-2021-3635": { | |
"cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption", | |
"cmt_id": "8260ce5aeee4d7c4a6305e469edeae1066de2800" | |
} | |
}, | |
"4.19.99": { | |
"CVE-2019-19046": { | |
"cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register", | |
"cmt_id": "211eabc55d07fc3709e967b08b6f5bb77198dbd0" | |
}, | |
"CVE-2019-20806": { | |
"cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", | |
"cmt_id": "30fd5b16c9081afebe74d4d614fe582ff84ef6b2" | |
} | |
}, | |
"4.19.100": { | |
"CVE-2019-14896": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" | |
}, | |
"CVE-2019-14897": { | |
"cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", | |
"cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" | |
}, | |
"CVE-2020-14416": { | |
"cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", | |
"cmt_id": "bd1448458c6a67782d4e82c181b5540b5727546b" | |
}, | |
"CVE-2020-8428": { | |
"cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", | |
"cmt_id": "752f72edea55f9b7c6fd019e71365def13a0f2b6" | |
} | |
}, | |
"4.19.101": { | |
"CVE-2020-0432": { | |
"cmt_msg": "staging: most: net: fix buffer overflow", | |
"cmt_id": "9dab6bbc9462c43001a88ee933a491a1502fa6f5" | |
}, | |
"CVE-2020-12769": { | |
"cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", | |
"cmt_id": "6fb12237c51e73e65899f9b1df69cd3999b4d90a" | |
} | |
}, | |
"4.19.103": { | |
"CVE-2020-0404": { | |
"cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", | |
"cmt_id": "3ceb3fcd6d1a6a65e7bf3873a63009d01ba4b05f" | |
}, | |
"CVE-2019-3016": { | |
"cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", | |
"cmt_id": "25a7898937f4a9f32ca2d1e9b7f5f07176af8037" | |
} | |
}, | |
"4.19.104": { | |
"CVE-2020-12653": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", | |
"cmt_id": "48247f7e14911a4d18e9c774ba3a1d368f5d8a6f" | |
}, | |
"CVE-2020-12654": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", | |
"cmt_id": "fab5ca79960b7fbda4e9a79a4754c749fdea2bd0" | |
} | |
}, | |
"4.19.107": { | |
"CVE-2020-9383": { | |
"cmt_msg": "floppy: check FDC index for errors before assigning it", | |
"cmt_id": "c8fd87c53a1509162b910cec91c0c46753c58f9a" | |
}, | |
"CVE-2020-2732": { | |
"cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", | |
"cmt_id": "ed9e97c35b454ceb1da4f65c318015a7ab298dae" | |
}, | |
"CVE-2020-0009": { | |
"cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", | |
"cmt_id": "a4307700608e43dcf9b8abf1ee74f68227e9c61a" | |
} | |
}, | |
"4.19.108": { | |
"CVE-2020-27068": { | |
"cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", | |
"cmt_id": "0fb31bd53a5e27394916758173eb748c5e0dbd47" | |
}, | |
"CVE-2020-0444": { | |
"cmt_msg": "audit: fix error handling in audit_data_to_entry()", | |
"cmt_id": "c24d457a824f641ca328a20dd28872cfd97a005a" | |
}, | |
"CVE-2019-16234": { | |
"cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", | |
"cmt_id": "1d8780188c8d7f009a05d40fbb8a111eab89746d" | |
}, | |
"CVE-2020-10942": { | |
"cmt_msg": "vhost: Check docket sk_family instead of call getname", | |
"cmt_id": "ad598a48fe61c6c2407f08a807cb7a2ea83386b3" | |
} | |
}, | |
"4.19.109": { | |
"CVE-2020-8647": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" | |
}, | |
"CVE-2020-8649": { | |
"cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", | |
"cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" | |
}, | |
"CVE-2020-8648": { | |
"cmt_msg": "vt: selection, close sel_buffer race", | |
"cmt_id": "31559b59040fc0e6ad363642112d4eb03ad4ebb7" | |
} | |
}, | |
"4.19.111": { | |
"CVE-2020-12465": { | |
"cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", | |
"cmt_id": "319478cbd2be90995b011ca6adbd834121eb7acf" | |
} | |
}, | |
"4.19.112": { | |
"CVE-2020-29370": { | |
"cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", | |
"cmt_id": "30f6cae722654caef2ab4bacb2e910bfd766866b" | |
} | |
}, | |
"4.19.113": { | |
"CVE-2020-14381": { | |
"cmt_msg": "futex: Fix inode life-time issue", | |
"cmt_id": "e6d506cd2243aa8f6e19fdb4dc61d85275c2c918" | |
} | |
}, | |
"4.19.114": { | |
"CVE-2021-3715": { | |
"cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", | |
"cmt_id": "ea3d6652c240978736a91b9e85fde9fee9359be4" | |
}, | |
"CVE-2020-11608": { | |
"cmt_msg": "media: ov519: add missing endpoint sanity checks", | |
"cmt_id": "747a7431661ab3c22ad1e721558bdf9e3d53d4a6" | |
}, | |
"CVE-2020-11609": { | |
"cmt_msg": "media: stv06xx: add missing descriptor sanity checks", | |
"cmt_id": "70764334b2bcb15c67dfbd912d9a9f7076f6d0df" | |
}, | |
"CVE-2020-11668": { | |
"cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", | |
"cmt_id": "5d064d7f0327d9425c5f63fa96efc70a74032d8b" | |
}, | |
"CVE-2020-27066": { | |
"cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", | |
"cmt_id": "7ad217a824f7fab1e8534a6dfa82899ae1900bcb" | |
} | |
}, | |
"4.19.115": { | |
"CVE-2020-11494": { | |
"cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", | |
"cmt_id": "b774578329afb238ccd504477731129aa15e9ec2" | |
}, | |
"CVE-2020-11565": { | |
"cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", | |
"cmt_id": "fa138035f104ae14651ee3217d81fc16cd3aba4d" | |
} | |
}, | |
"4.19.116": { | |
"CVE-2020-12826": { | |
"cmt_msg": "signal: Extend exec_id to 64bits", | |
"cmt_id": "a2a1be2de7e4d9a3a2c6cf8512d38eb24bbeb059" | |
}, | |
"CVE-2020-12657": { | |
"cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", | |
"cmt_id": "d999063be0cf91bff8e0d6daaea21e1a4f70d336" | |
}, | |
"CVE-2020-11669": { | |
"cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", | |
"cmt_id": "1855c5436fa50e8dc930b0a24c52157dceef9a54" | |
} | |
}, | |
"4.19.118": { | |
"CVE-2020-12659": { | |
"cmt_msg": "xsk: Add missing check on user supplied headroom size", | |
"cmt_id": "ad8fb61c184fe0f8d1e0b5b954d010fb9f94a6ee" | |
} | |
}, | |
"4.19.119": { | |
"CVE-2020-11884": { | |
"cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses", | |
"cmt_id": "215d1f3928713d6eaec67244bcda72105b898000" | |
}, | |
"CVE-2020-1749": { | |
"cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", | |
"cmt_id": "5dd6835278454a7c7a045462253625de7c16b13e" | |
}, | |
"CVE-2020-12464": { | |
"cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", | |
"cmt_id": "45ea77b75a604da875186519fea94997175c38e3" | |
}, | |
"CVE-2020-0067": { | |
"cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", | |
"cmt_id": "ed523cbd4a6594edf123dc03ec9d70ea4f793671" | |
}, | |
"CVE-2019-19768": { | |
"cmt_msg": "blktrace: Protect q->blk_trace with RCU", | |
"cmt_id": "473d7f5ed75b8c3750f0c6b442c8e23090d6da8f" | |
}, | |
"CVE-2020-12114": { | |
"cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", | |
"cmt_id": "f511dc75d22e0c000fc70b54f670c2c17f5fba9a" | |
} | |
}, | |
"4.19.121": { | |
"CVE-2020-10751": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" | |
}, | |
"CVE-2020-0255": { | |
"cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", | |
"cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" | |
} | |
}, | |
"4.19.124": { | |
"CVE-2020-13143": { | |
"cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", | |
"cmt_id": "a105bb549252e3e8bd9db0bdd81cdd6a853e4238" | |
}, | |
"CVE-2020-10711": { | |
"cmt_msg": "netlabel: cope with NULL catmap", | |
"cmt_id": "caf6c20c6421ca687751d27b96c8021c655e56e6" | |
}, | |
"CVE-2020-12770": { | |
"cmt_msg": "scsi: sg: add sg_remove_request in sg_write", | |
"cmt_id": "34fcb4291e234468f9bf9d4b851c9f522f3bbb13" | |
}, | |
"CVE-2020-27786": { | |
"cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", | |
"cmt_id": "a507658fdb2ad8ca282b0eb42f2a40b805deb1e6" | |
} | |
}, | |
"4.19.125": { | |
"CVE-2020-12768": { | |
"cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()", | |
"cmt_id": "008708152ebb229c29e065135599984fa9c4a51c" | |
}, | |
"CVE-2019-18814": { | |
"cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init", | |
"cmt_id": "f1738ae012a106c6c8fa7d33ed47fb478d9d3c75" | |
} | |
}, | |
"4.19.126": { | |
"CVE-2020-10732": { | |
"cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", | |
"cmt_id": "d16b0abe2687f7f0a2f6343a09797e8aac045c86" | |
} | |
}, | |
"4.19.127": { | |
"CVE-2020-10757": { | |
"cmt_msg": "mm: Fix mremap not considering huge pmd devmap", | |
"cmt_id": "78385480fd6572a83e7541e37658d9a7de6dc9b1" | |
}, | |
"CVE-2019-19462": { | |
"cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", | |
"cmt_id": "8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622" | |
} | |
}, | |
"4.19.128": { | |
"CVE-2020-13974": { | |
"cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", | |
"cmt_id": "18059925dbb6a7b6be1c0166ecca29d6b7977c9a" | |
}, | |
"CVE-2020-0543": { | |
"cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", | |
"cmt_id": "6682fe2fca22e45153e69f5b7ce7282bcba3565f" | |
} | |
}, | |
"4.19.129": { | |
"CVE-2019-20810": { | |
"cmt_msg": "media: go7007: fix a miss of snd_card_free", | |
"cmt_id": "95b58c96a28e6174661dcd5bc543618973fc43d3" | |
}, | |
"CVE-2018-20669": { | |
"cmt_msg": "make 'user_access_begin()' do 'access_ok()'", | |
"cmt_id": "216284c4a126b28469eb0bf4994c669e251f47ba" | |
}, | |
"CVE-2021-0342": { | |
"cmt_msg": "tun: correct header offsets in napi frags mode", | |
"cmt_id": "75e36c19ff10836e5d03f87cf17793cf83b59430" | |
}, | |
"CVE-2020-29368": { | |
"cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", | |
"cmt_id": "453d8a481b127edfa7fb76af1bc7586b7a63bdd2" | |
}, | |
"CVE-2020-10766": { | |
"cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", | |
"cmt_id": "5aaf72a0dcb82d5c98f3b7df149baf4c7cf63e19" | |
}, | |
"CVE-2020-10767": { | |
"cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", | |
"cmt_id": "5d9d55cf4733c5ced8e1d19ea242a128ab9612d2" | |
}, | |
"CVE-2019-18885": { | |
"cmt_msg": "btrfs: merge btrfs_find_device and find_device", | |
"cmt_id": "8cb9b069fa631b613bbbd6f63887190e55cafa3c" | |
}, | |
"CVE-2019-19036": { | |
"cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations", | |
"cmt_id": "227af79e6cb0ee3faeb8c70be4bc0aec0b09ea25" | |
}, | |
"CVE-2020-10768": { | |
"cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", | |
"cmt_id": "52c419ba4c96880abd61b38e6e08e4ecd17350f3" | |
} | |
}, | |
"4.19.130": { | |
"CVE-2020-12771": { | |
"cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", | |
"cmt_id": "2ee8f6e72269eb06649ebab3da6bbf59aed3eabe" | |
}, | |
"CVE-2020-15436": { | |
"cmt_msg": "block: Fix use-after-free in blkdev_get()", | |
"cmt_id": "49289b1fa5a67011c4010e4e9c801b9d565ce395" | |
} | |
}, | |
"4.19.131": { | |
"CVE-2020-12655": { | |
"cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", | |
"cmt_id": "135eccd83909e75389a5754577b0336bbd0939ef" | |
} | |
}, | |
"4.19.132": { | |
"CVE-2020-24394": { | |
"cmt_msg": "nfsd: apply umask on fs without ACL support", | |
"cmt_id": "2b3faab744b04de198aee4ed8dd74fca7a2a8306" | |
}, | |
"CVE-2020-15393": { | |
"cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", | |
"cmt_id": "7b0f1f89a0dd6e257367eddc840179e85195ca18" | |
} | |
}, | |
"4.19.134": { | |
"CVE-2020-14356": { | |
"cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", | |
"cmt_id": "0505cc4c908f46a4d22c4994dbbe7bc489d0c52d" | |
}, | |
"CVE-2020-10781": { | |
"cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", | |
"cmt_id": "81a91bf266dd7f2dd56fc3472b7bb54348ac62c7" | |
} | |
}, | |
"4.19.135": { | |
"CVE-2020-15437": { | |
"cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", | |
"cmt_id": "c358255ff1dfa51ddbcbc8dfcc4eaa5719008daa" | |
} | |
}, | |
"4.19.137": { | |
"CVE-2019-19061": { | |
"cmt_msg": "iio: imu: adis16400: fix memory leak", | |
"cmt_id": "c57c213538156bff971aa352d9d7749196dfbfd8" | |
}, | |
"CVE-2019-19067": { | |
"cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init", | |
"cmt_id": "e15f8a9b0046418295d09db24c1ec306c80d013b" | |
}, | |
"CVE-2020-24490": { | |
"cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", | |
"cmt_id": "5df9e5613d1c51e16b1501a4c75e139fbbe0fb6c" | |
}, | |
"CVE-2019-19816": { | |
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", | |
"cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" | |
}, | |
"CVE-2019-3874": { | |
"cmt_msg": "sctp: implement memory accounting on tx path", | |
"cmt_id": "9a84bb13816fe3b361a75e10ee9821ab68aa36f5" | |
}, | |
"CVE-2019-19082": { | |
"cmt_msg": "drm/amd/display: prevent memory leak", | |
"cmt_id": "60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e" | |
}, | |
"CVE-2019-18808": { | |
"cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", | |
"cmt_id": "167edeeb034f65f57790ff70b1af84a501274d15" | |
}, | |
"CVE-2019-19813": { | |
"cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", | |
"cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" | |
}, | |
"CVE-2019-19054": { | |
"cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", | |
"cmt_id": "17271f33fd8811b364ae3c54671566434d46d3eb" | |
}, | |
"CVE-2019-19074": { | |
"cmt_msg": "ath9k: release allocated buffer if timed out", | |
"cmt_id": "e0cf3ebfcf93dbce123b8bef00f549712efe1135" | |
}, | |
"CVE-2019-19073": { | |
"cmt_msg": "ath9k_htc: release allocated buffer if timed out", | |
"cmt_id": "5b8464dc9a6e81a16481549c77d0d341041e425e" | |
}, | |
"CVE-2019-19072": { | |
"cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory", | |
"cmt_id": "7deb2dcb8963812742ed08420cfa4e23bbeda074" | |
} | |
}, | |
"4.19.138": { | |
"CVE-2020-16166": { | |
"cmt_msg": "random32: update the net random state on interrupt and activity", | |
"cmt_id": "29204c846894d73108f87e78aea4757a8ec52c74" | |
} | |
}, | |
"4.19.139": { | |
"CVE-2020-36386": { | |
"cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", | |
"cmt_id": "8c4a649c20fec015ebb326f36b47d4e39d9ff5b7" | |
}, | |
"CVE-2019-0148": { | |
"cmt_msg": "i40e: Wrong truncation from u16 to u8", | |
"cmt_id": "48a9be93ff2c5a09e308ef93560ea1f4ecbd22f6" | |
}, | |
"CVE-2019-0147": { | |
"cmt_msg": "i40e: add num_vectors checker in iwarp handler", | |
"cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" | |
}, | |
"CVE-2020-14331": { | |
"cmt_msg": "vgacon: Fix for missing check in scrollback handling", | |
"cmt_id": "61219546f3036d2b4a1898be7a38da22e97a3b62" | |
}, | |
"CVE-2019-0145": { | |
"cmt_msg": "i40e: add num_vectors checker in iwarp handler", | |
"cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" | |
} | |
}, | |
"4.19.140": { | |
"CVE-2020-26088": { | |
"cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", | |
"cmt_id": "b200620cada4eaa63108be32e040ed557a1965fd" | |
}, | |
"CVE-2021-20292": { | |
"cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", | |
"cmt_id": "10c8a526b2db1fcdf9e2d59d4885377b91939c55" | |
} | |
}, | |
"4.19.141": { | |
"CVE-2019-19448": { | |
"cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", | |
"cmt_id": "627fa9d8071daad6aa84316c1fcb114a62db914f" | |
}, | |
"CVE-2020-25212": { | |
"cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", | |
"cmt_id": "a906b868953a9c9bba44649a8fe760e818dd7224" | |
} | |
}, | |
"4.19.142": { | |
"CVE-2020-14314": { | |
"cmt_msg": "ext4: fix potential negative array index in do_split()", | |
"cmt_id": "b3ddf6ba5e28a57729fff1605ae08e21be5c92e3" | |
}, | |
"CVE-2020-29371": { | |
"cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", | |
"cmt_id": "9660983738399465fd0e3b1977a61bbd29b2e5be" | |
}, | |
"CVE-2020-0466": { | |
"cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", | |
"cmt_id": "dcb6e6efb3298e59d90ee05c6ed33de810314892" | |
} | |
}, | |
"4.19.144": { | |
"CVE-2020-0465": { | |
"cmt_msg": "HID: core: Sanitize event code and type when mapping input", | |
"cmt_id": "a47b8511d90528c77346597e2012100dfc28cd8c" | |
}, | |
"CVE-2020-25641": { | |
"cmt_msg": "block: allow for_each_bvec to support zero len bvec", | |
"cmt_id": "b48bcb664b657ae94b19c0728978c88e012f7a37" | |
}, | |
"CVE-2021-1048": { | |
"cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", | |
"cmt_id": "37d933e8b41b83bb8278815e366aec5a542b7e31" | |
}, | |
"CVE-2020-25285": { | |
"cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", | |
"cmt_id": "221ea9a3da9169dc3c9a364a5f938e215db6419e" | |
}, | |
"CVE-2020-14385": { | |
"cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", | |
"cmt_id": "017265f1421529a473c25dc46a0cee98facbb1a3" | |
}, | |
"CVE-2020-12888": { | |
"cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", | |
"cmt_id": "da7aea6eb5608695f590dcd72523536b709d0399" | |
} | |
}, | |
"4.19.146": { | |
"CVE-2020-25284": { | |
"cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", | |
"cmt_id": "0070f9906d7190d4c69e338403db4abfec81fe7f" | |
}, | |
"CVE-2020-14390": { | |
"cmt_msg": "fbcon: remove soft scrollback code", | |
"cmt_id": "770adb5d2b8ebe94a92e4c9510f4f2517f4204eb" | |
}, | |
"CVE-2020-28097": { | |
"cmt_msg": "vgacon: remove software scrollback support", | |
"cmt_id": "f5fa64c8daf7b97280865c73903edc0a3eea819e" | |
} | |
}, | |
"4.19.148": { | |
"CVE-2020-25645": { | |
"cmt_msg": "geneve: add transport ports in route lookup for geneve", | |
"cmt_id": "c797110d97c48054d1491251fd713900ff51615c" | |
}, | |
"CVE-2021-0605": { | |
"cmt_msg": "af_key: pfkey_dump needs parameter validation", | |
"cmt_id": "b59a23d596807a5aa88d8dd5655a66c6843729b3" | |
}, | |
"CVE-2020-25643": { | |
"cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", | |
"cmt_id": "45676c0bc28eff8f46455b28e2db80a77676488b" | |
}, | |
"CVE-2020-36312": { | |
"cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", | |
"cmt_id": "19184bd06f488af62924ff1747614a8cb284ad63" | |
} | |
}, | |
"4.19.150": { | |
"CVE-2020-14386": { | |
"cmt_msg": "net/packet: fix overflow in tpacket_rcv", | |
"cmt_id": "1c3886dc302329f199cc04f8a56ba44d17a0df16" | |
}, | |
"CVE-2020-25211": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" | |
}, | |
"CVE-2021-0448": { | |
"cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", | |
"cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" | |
}, | |
"CVE-2021-39634": { | |
"cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", | |
"cmt_id": "3e3bbc4d23eeb90bf282e98c7dfeca7702df3169" | |
} | |
}, | |
"4.19.151": { | |
"CVE-2020-28915": { | |
"cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", | |
"cmt_id": "43198a5b1c42e3d8aadc6524a73bb3aa3666cd43" | |
} | |
}, | |
"4.19.152": { | |
"CVE-2020-10135": { | |
"cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", | |
"cmt_id": "0c75831bc108ec23c663d969181a4dd7e4b651bb" | |
}, | |
"CVE-2020-12352": { | |
"cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", | |
"cmt_id": "128278f444ab3a0d38759c4935092d256edc77d0" | |
}, | |
"CVE-2020-12351": { | |
"cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", | |
"cmt_id": "360f80e34292dbe91c23e893f90cd357aff8b68a" | |
} | |
}, | |
"4.19.153": { | |
"CVE-2020-0423": { | |
"cmt_msg": "binder: fix UAF when releasing todo list", | |
"cmt_id": "35cc2facc2a5ff52b9aa03f2dc81dcb000d97da3" | |
}, | |
"CVE-2020-25705": { | |
"cmt_msg": "icmp: randomize the global rate limiter", | |
"cmt_id": "d6c552505c0d1719dda42b4af2def0618bd7bf54" | |
} | |
}, | |
"4.19.155": { | |
"CVE-2020-27777": { | |
"cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", | |
"cmt_id": "94e8f0bbc475228c93d28b2e0f7e37303db80ffe" | |
}, | |
"CVE-2020-27673": { | |
"cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", | |
"cmt_id": "25f6b08895d579b461487291d6e48b3953a8bf65" | |
}, | |
"CVE-2020-25668": { | |
"cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", | |
"cmt_id": "619e366268e0430687d07b24b48f7382fc088c9f" | |
}, | |
"CVE-2020-25656": { | |
"cmt_msg": "vt: keyboard, extend func_buf_lock to readers", | |
"cmt_id": "7e3ba72e5b9376e12839ea347c49fc4108244b0c" | |
}, | |
"CVE-2020-27675": { | |
"cmt_msg": "xen/events: avoid removing an event channel while handling it", | |
"cmt_id": "61d359d51a1cce8a5913843c8c3601dc878cc519" | |
} | |
}, | |
"4.19.156": { | |
"CVE-2020-28974": { | |
"cmt_msg": "vt: Disable KD_FONT_OP_COPY", | |
"cmt_id": "6612b754ac0c85ca8b1181b5d3ea4461a8c1bbcb" | |
}, | |
"CVE-2020-35508": { | |
"cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", | |
"cmt_id": "b177d2d915cea2d0a590f0034a20299dd1ee3ef2" | |
}, | |
"CVE-2020-25704": { | |
"cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", | |
"cmt_id": "29a975bcc107d68e379a55048813ddf3e7b120b8" | |
}, | |
"CVE-2019-19377": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", | |
"cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" | |
}, | |
"CVE-2019-19770": { | |
"cmt_msg": "blktrace: fix debugfs use after free", | |
"cmt_id": "8a78b4c0d6292d32d76b4268b5a33ae089a5d791" | |
}, | |
"CVE-2019-19039": { | |
"cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", | |
"cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" | |
} | |
}, | |
"4.19.157": { | |
"CVE-2020-8694": { | |
"cmt_msg": "powercap: restrict energy meter to root access", | |
"cmt_id": "900281e167f45e0c0e5df6e59fa00334b5e38133" | |
} | |
}, | |
"4.19.158": { | |
"CVE-2020-14351": { | |
"cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", | |
"cmt_id": "1cbfb60332f4e62224440f6d38a6b3114b2355f0" | |
} | |
}, | |
"4.19.159": { | |
"CVE-2020-4788": { | |
"cmt_msg": "powerpc/64s: flush L1D on kernel entry", | |
"cmt_id": "f69bb4e51f41973fb7594be1479fa689831efe1a" | |
}, | |
"CVE-2020-25669": { | |
"cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", | |
"cmt_id": "8bf2e8fe8a8e2e05246215697bb55f8901faef44" | |
} | |
}, | |
"4.19.160": { | |
"CVE-2020-28941": { | |
"cmt_msg": "speakup: Do not let the line discipline be used several times", | |
"cmt_id": "3560603ef82f11277143a433170bca05bd9288a8" | |
} | |
}, | |
"4.19.162": { | |
"CVE-2020-35519": { | |
"cmt_msg": "net/x25: prevent a couple of overflows", | |
"cmt_id": "304c080fc33258e3b177b6f0736b97d54e6fea3b" | |
} | |
}, | |
"4.19.163": { | |
"CVE-2020-29661": { | |
"cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", | |
"cmt_id": "13f10a78097df2f14d4e1fd390dbaa3e28502ca7" | |
}, | |
"CVE-2020-29660": { | |
"cmt_msg": "tty: Fix ->session locking", | |
"cmt_id": "361e822b7d8a9d06d88f7cea0fdb0fb6e41c4d45" | |
}, | |
"CVE-2020-27830": { | |
"cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", | |
"cmt_id": "de867367f35237729e285ff6efa3fd4e4b0b9008" | |
} | |
}, | |
"4.19.164": { | |
"CVE-2021-0938": { | |
"cmt_msg": "compiler.h: fix barrier_data() on clang", | |
"cmt_id": "b207caff4176e3a6ba273243da2db2e595e4aad2" | |
}, | |
"CVE-2020-27815": { | |
"cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", | |
"cmt_id": "c7e31b2fecfe0ebd5bd6a8274b2fbfb9c9401738" | |
}, | |
"CVE-2020-29568": { | |
"cmt_msg": "xen/xenbus: Allow watches discard events before queueing", | |
"cmt_id": "9039eb22f99545fa80a5897496452cf9962e3289" | |
}, | |
"CVE-2020-29569": { | |
"cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", | |
"cmt_id": "014ee1c7d184acb8986152014a570ba7c69d3616" | |
} | |
}, | |
"4.19.166": { | |
"CVE-2020-36158": { | |
"cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", | |
"cmt_id": "b35029a1f24fe511af750537e6565dcf68e5c862" | |
} | |
}, | |
"4.19.167": { | |
"CVE-2020-28374": { | |
"cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", | |
"cmt_id": "fff1180d24e68d697f98642d71444316036a81ff" | |
}, | |
"CVE-2021-39648": { | |
"cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", | |
"cmt_id": "83b74059fdf1c4fa6ed261725e6f301552ad23f7" | |
} | |
}, | |
"4.19.170": { | |
"CVE-2021-3178": { | |
"cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", | |
"cmt_id": "a08c2e586ad047fcea3f75664cca0915c77934fe" | |
} | |
}, | |
"4.19.171": { | |
"CVE-2021-39657": { | |
"cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", | |
"cmt_id": "b397fcae2207963747c6f947ef4d06575553eaef" | |
} | |
}, | |
"4.19.172": { | |
"CVE-2020-27825": { | |
"cmt_msg": "tracing: Fix race in trace_open and buffer resize call", | |
"cmt_id": "acfa7ad7b7f6489e2bed20880ce090fdabdbb841" | |
}, | |
"CVE-2021-3347": { | |
"cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", | |
"cmt_id": "72f38fffa4758b878f819f8a47761b3f03443f36" | |
} | |
}, | |
"4.19.173": { | |
"CVE-2021-3348": { | |
"cmt_msg": "nbd: freeze the queue while we're adding connections", | |
"cmt_id": "424838c0f727f1d11ce2ccaabba96f4346c03906" | |
} | |
}, | |
"4.19.177": { | |
"CVE-2021-26931": { | |
"cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", | |
"cmt_id": "a01b49a9bf91a723f541139c063c1ff681ac536a" | |
}, | |
"CVE-2021-26930": { | |
"cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", | |
"cmt_id": "98f16e171e2849dba76e2e0346e914452c030dc5" | |
}, | |
"CVE-2021-21781": { | |
"cmt_msg": "ARM: ensure the signal page contains defined contents", | |
"cmt_id": "80ef523d2cb719c3de66787e922a96b5099d2fbb" | |
}, | |
"CVE-2021-26932": { | |
"cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", | |
"cmt_id": "dfed59ee4b41b0937163dfed36752d29e72d0712" | |
} | |
}, | |
"4.19.178": { | |
"CVE-2021-0512": { | |
"cmt_msg": "HID: make arrays usage and value to be the same", | |
"cmt_id": "ffca531f71d078c6caf752d64bc2a592f420f7c6" | |
}, | |
"CVE-2021-3612": { | |
"cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", | |
"cmt_id": "88438fdeeffe11dcb05c2dd0ddd22cb6e3f024b4" | |
} | |
}, | |
"4.19.179": { | |
"CVE-2021-30002": { | |
"cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", | |
"cmt_id": "ff2111a6fab31923685b6ca8ea466ea0576b8a0e" | |
}, | |
"CVE-2021-27365": { | |
"cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", | |
"cmt_id": "b2957d7baff77b399c7408dc12bacc7f63765897" | |
}, | |
"CVE-2021-27364": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" | |
}, | |
"CVE-2021-27363": { | |
"cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", | |
"cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" | |
}, | |
"CVE-2021-28038": { | |
"cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", | |
"cmt_id": "1a999d25ef536a14f6a7c25778836857adfba3f8" | |
} | |
}, | |
"4.19.181": { | |
"CVE-2021-33033": { | |
"cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", | |
"cmt_id": "a44af1c69737f9e64d5134c34eb9d5c4c2e04da1" | |
}, | |
"CVE-2021-29265": { | |
"cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", | |
"cmt_id": "c6b0ca71d3cd561decd39c1c4132c2d10a496e1a" | |
}, | |
"CVE-2021-28660": { | |
"cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", | |
"cmt_id": "eda4378094de16090d74eacea3d8c10f7719ed25" | |
} | |
}, | |
"4.19.183": { | |
"CVE-2021-28964": { | |
"cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", | |
"cmt_id": "12dc6889bcff1bc2921a1587afca55ca4091b73e" | |
}, | |
"CVE-2021-28972": { | |
"cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", | |
"cmt_id": "f27a00f0d5b0646a52633e98f5fc3ef719004dcd" | |
}, | |
"CVE-2021-28971": { | |
"cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", | |
"cmt_id": "b35214c541365c7dd7c9d5f44a02b0633a1cc83f" | |
} | |
}, | |
"4.19.184": { | |
"CVE-2021-28688": { | |
"cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", | |
"cmt_id": "16356ddb587867c2a5ab85407eeb75f2b8818207" | |
}, | |
"CVE-2021-31916": { | |
"cmt_msg": "dm ioctl: fix out of bounds array access when no devices", | |
"cmt_id": "76aa61c55279fdaa8d428236ba8834edf313b372" | |
}, | |
"CVE-2021-29264": { | |
"cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", | |
"cmt_id": "9943741c2792a7f1d091aad38f496ed6eb7681c4" | |
}, | |
"CVE-2021-29647": { | |
"cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", | |
"cmt_id": "5f09be2a1a35cb8bd6c178d5f205b7265bd68646" | |
}, | |
"CVE-2021-29650": { | |
"cmt_msg": "netfilter: x_tables: Use correct memory barriers.", | |
"cmt_id": "81bc258370c6eeb1f41d350325e8a2c8e20fafad" | |
} | |
}, | |
"4.19.185": { | |
"CVE-2021-0941": { | |
"cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", | |
"cmt_id": "8c1a77ae15ce70a72f26f4bb83c50f769011220c" | |
}, | |
"CVE-2021-3483": { | |
"cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", | |
"cmt_id": "89a2c28a3b67c7d918218f57e4bb7b591f7e5d0f" | |
} | |
}, | |
"4.19.186": { | |
"CVE-2021-29154": { | |
"cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", | |
"cmt_id": "5f26f1f838aa960045c712e13dbab8ff451fed74" | |
} | |
}, | |
"4.19.187": { | |
"CVE-2021-3659": { | |
"cmt_msg": "net: mac802154: Fix general protection fault", | |
"cmt_id": "c166c0f5311dc9de687b8985574a5ee5166d367e" | |
}, | |
"CVE-2020-25672": { | |
"cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", | |
"cmt_id": "301a4264d6ab56d2b9230066b060d7ceaa000d68" | |
}, | |
"CVE-2020-25673": { | |
"cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", | |
"cmt_id": "eab391e0766ed88262160b14bb7131f331f6af1a" | |
}, | |
"CVE-2020-25670": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", | |
"cmt_id": "adbb1d218c5f56dbae052765da83c0f57fce2a31" | |
}, | |
"CVE-2020-25671": { | |
"cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", | |
"cmt_id": "c14b50185cd0d5ba6d7a5eb8acf9fbcc3663416d" | |
} | |
}, | |
"4.19.188": { | |
"CVE-2021-0937": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" | |
}, | |
"CVE-2021-22555": { | |
"cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", | |
"cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" | |
} | |
}, | |
"4.19.189": { | |
"CVE-2020-29374": { | |
"cmt_msg": "gup: document and work around \"COW can break either way\" issue", | |
"cmt_id": "5e24029791e809d641e9ea46a1f99806484e53fc" | |
}, | |
"CVE-2021-23133": { | |
"cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", | |
"cmt_id": "301084de76eb5bfedddda41ec33e2913e90c99e7" | |
} | |
}, | |
"4.19.191": { | |
"CVE-2021-4157": { | |
"cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", | |
"cmt_id": "f27638a92f77d8107efbaf48a0d3bfa24da8cdad" | |
}, | |
"CVE-2021-33034": { | |
"cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", | |
"cmt_id": "75e26178e26f910f7f26c79c2824b726eecf0dfb" | |
}, | |
"CVE-2021-32399": { | |
"cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", | |
"cmt_id": "35113c4c9fa7c970ff456982e381dc9e9594154a" | |
}, | |
"CVE-2021-3506": { | |
"cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", | |
"cmt_id": "bfa08a47cea2a9fab077c7135b9cfdf04e69c67a" | |
} | |
}, | |
"4.19.192": { | |
"CVE-2020-26558": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" | |
}, | |
"CVE-2021-0129": { | |
"cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", | |
"cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" | |
} | |
}, | |
"4.19.193": { | |
"CVE-2021-33098": { | |
"cmt_msg": "ixgbe: fix large MTU request from VF", | |
"cmt_id": "938ffd6d2dd78fb83b9346c9b689e2a3a6fe7174" | |
}, | |
"CVE-2020-24587": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" | |
}, | |
"CVE-2020-24586": { | |
"cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", | |
"cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" | |
}, | |
"CVE-2021-34981": { | |
"cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", | |
"cmt_id": "f8be26b9950710fe50fb45358df5bd01ad18efb7" | |
}, | |
"CVE-2020-24588": { | |
"cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", | |
"cmt_id": "8ea9e997642360ea097710cfa7b1cd750a73fe64" | |
}, | |
"CVE-2020-26139": { | |
"cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", | |
"cmt_id": "24347f561816634ab780bf7e03deeb049898b3bc" | |
}, | |
"CVE-2020-26147": { | |
"cmt_msg": "mac80211: assure all fragments are encrypted", | |
"cmt_id": "3c919823e4cad7bdc2c92b0dd3b4dc463c9315bd" | |
} | |
}, | |
"4.19.194": { | |
"CVE-2021-3564": { | |
"cmt_msg": "Bluetooth: fix the erroneous flush_work() order", | |
"cmt_id": "64700748e8a7af4883538c72ada57999d9a78e92" | |
}, | |
"CVE-2021-38208": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" | |
}, | |
"CVE-2021-3573": { | |
"cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", | |
"cmt_id": "2b9e9c2ed0f1910b5201c5d37b355b60201df415" | |
}, | |
"CVE-2021-3587": { | |
"cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", | |
"cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" | |
} | |
}, | |
"4.19.196": { | |
"CVE-2021-34693": { | |
"cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", | |
"cmt_id": "8899857d7e450805e6410de5004126491f197146" | |
}, | |
"CVE-2021-45486": { | |
"cmt_msg": "inet: use bigger hash table for IP ID generation", | |
"cmt_id": "7f7e23df8509e072593200400a4b094cc44376d2" | |
}, | |
"CVE-2021-35039": { | |
"cmt_msg": "module: limit enabling module.sig_enforce", | |
"cmt_id": "ff660863628fb144badcb3395cde7821c82c13a6" | |
}, | |
"CVE-2021-3743": { | |
"cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", | |
"cmt_id": "f8111c0d7ed42ede41a3d0d393b104de0730a8a6" | |
} | |
}, | |
"4.19.197": { | |
"CVE-2020-36311": { | |
"cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy", | |
"cmt_id": "cadf5bbcefbd9717e51c61d6128b520583ffdf4f" | |
} | |
}, | |
"4.19.198": { | |
"CVE-2021-45485": { | |
"cmt_msg": "ipv6: use prandom_u32() for ID generation", | |
"cmt_id": "f0be58ec9931907e980cf21737e51d369808eb95" | |
}, | |
"CVE-2021-3655": { | |
"cmt_msg": "sctp: validate from_addr_param return", | |
"cmt_id": "c7a03ebace4f9cd40d9cd9dd5fb2af558025583c" | |
}, | |
"CVE-2021-38199": { | |
"cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", | |
"cmt_id": "743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368" | |
}, | |
"CVE-2021-3609": { | |
"cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", | |
"cmt_id": "eabe65197876e4a0906eab784f5766c4c76098c7" | |
}, | |
"CVE-2022-0850": { | |
"cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", | |
"cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0" | |
}, | |
"CVE-2021-33909": { | |
"cmt_msg": "seq_file: disallow extremely large seq buffer allocations", | |
"cmt_id": "6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d" | |
}, | |
"CVE-2021-38160": { | |
"cmt_msg": "virtio_console: Assure used length from device is limited", | |
"cmt_id": "b5fba782ccd3d12a14f884cd20f255fc9c0eec0c" | |
} | |
}, | |
"4.19.199": { | |
"CVE-2021-38204": { | |
"cmt_msg": "usb: max-3421: Prevent corruption of freed memory", | |
"cmt_id": "51fc12f4d37622fa0c481604833f98f11b1cac4f" | |
}, | |
"CVE-2021-3679": { | |
"cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", | |
"cmt_id": "6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a" | |
}, | |
"CVE-2021-37576": { | |
"cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", | |
"cmt_id": "0493b10c06021796ba80cbe53c961defd5aca6e5" | |
}, | |
"CVE-2021-22543": { | |
"cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", | |
"cmt_id": "117777467bc015f0dc5fc079eeba0fa80c965149" | |
} | |
}, | |
"4.19.200": { | |
"CVE-2021-0920": { | |
"cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", | |
"cmt_id": "1dabafa9f61118b1377fde424d9a94bf8dbf2813" | |
} | |
}, | |
"4.19.204": { | |
"CVE-2021-38198": { | |
"cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", | |
"cmt_id": "4c07e70141eebd3db64297515a427deea4822957" | |
}, | |
"CVE-2021-38205": { | |
"cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", | |
"cmt_id": "9322401477a6d1f9de8f18e5d6eb43a68e0b113a" | |
}, | |
"CVE-2021-3732": { | |
"cmt_msg": "ovl: prevent private clone if bind mount is not allowed", | |
"cmt_id": "963d85d630dabe75a3cfde44a006fec3304d07b8" | |
}, | |
"CVE-2021-33624": { | |
"cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", | |
"cmt_id": "0abc8c9754c953f5cd0ac7488c668ca8d53ffc90" | |
} | |
}, | |
"4.19.205": { | |
"CVE-2021-42008": { | |
"cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", | |
"cmt_id": "4e370cc081a78ee23528311ca58fd98a06768ec7" | |
}, | |
"CVE-2021-3653": { | |
"cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", | |
"cmt_id": "42f4312c0e8a225b5f1e3ed029509ef514f2157a" | |
}, | |
"CVE-2021-3656": { | |
"cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", | |
"cmt_id": "119d547cbf7c055ba8100309ad71910478092f24" | |
}, | |
"CVE-2020-3702": { | |
"cmt_msg": "ath: Use safer key clearing with key cache entries", | |
"cmt_id": "dd5815f023b89c9a28325d8a2a5f0779b57b7190" | |
} | |
}, | |
"4.19.206": { | |
"CVE-2021-3444": { | |
"cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", | |
"cmt_id": "39f74b7c81cca139c05757d9c8f9d1e35fbbf56b" | |
}, | |
"CVE-2021-3600": { | |
"cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", | |
"cmt_id": "8313432df224d926590731ec3ace3e1bd7bc4a1a" | |
}, | |
"CVE-2021-3753": { | |
"cmt_msg": "vt_kdsetmode: extend console locking", | |
"cmt_id": "0776c1a20babb4ad0b7ce7f2f4e0806a97663187" | |
}, | |
"CVE-2021-39633": { | |
"cmt_msg": "ip_gre: add validation for csum_start", | |
"cmt_id": "c33471daf2763c5aee2b7926202c74b75c365119" | |
} | |
}, | |
"4.19.207": { | |
"CVE-2021-42252": { | |
"cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", | |
"cmt_id": "9c8891b638319ddba9cfa330247922cd960c95b0" | |
}, | |
"CVE-2021-34556": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", | |
"cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" | |
}, | |
"CVE-2021-35477": { | |
"cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", | |
"cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" | |
}, | |
"CVE-2020-16119": { | |
"cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", | |
"cmt_id": "dfec82f3e5b8bd93ab65b7417a64886ec8c42f14" | |
}, | |
"CVE-2021-40490": { | |
"cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", | |
"cmt_id": "c481607ba522e31e6ed01efefc19cc1d0e0a46fa" | |
} | |
}, | |
"4.19.208": { | |
"CVE-2021-20320": { | |
"cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", | |
"cmt_id": "ddf58efd05b5d16d86ea4638675e8bd397320930" | |
} | |
}, | |
"4.19.209": { | |
"CVE-2021-3764": { | |
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", | |
"cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" | |
}, | |
"CVE-2021-4203": { | |
"cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", | |
"cmt_id": "0512a9aede6e4417c4fa6e0042a7ca8bc7e06b86" | |
}, | |
"CVE-2021-3744": { | |
"cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", | |
"cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" | |
}, | |
"CVE-2021-37159": { | |
"cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", | |
"cmt_id": "f6cf22a1ef49f8e131f99c3f5fd80ab6b23a2d21" | |
} | |
}, | |
"4.19.210": { | |
"CVE-2021-20317": { | |
"cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", | |
"cmt_id": "b9a1ac8e7c03fd09992352c7fb1a61cbbb9ad52b" | |
} | |
}, | |
"4.19.211": { | |
"CVE-2021-20321": { | |
"cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", | |
"cmt_id": "9d4969d8b5073d02059bae3f1b8d9a20cf023c55" | |
}, | |
"CVE-2021-41864": { | |
"cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", | |
"cmt_id": "078cdd572408176a3900a6eb5a403db0da22f8e0" | |
}, | |
"CVE-2021-38300": { | |
"cmt_msg": "bpf, mips: Validate conditional branch offsets", | |
"cmt_id": "79f3a086dfc34887f9bbb0801768608b9470e942" | |
} | |
}, | |
"4.19.213": { | |
"CVE-2021-3894": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk", | |
"cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" | |
}, | |
"CVE-2022-0322": { | |
"cmt_msg": "sctp: account stream padding length for reconf chunk", | |
"cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" | |
} | |
}, | |
"4.19.214": { | |
"CVE-2021-3896": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" | |
}, | |
"CVE-2022-0644": { | |
"cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", | |
"cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735" | |
}, | |
"CVE-2021-3760": { | |
"cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", | |
"cmt_id": "1ac0d736c8ae9b59ab44e4e80ad73c8fba5c6132" | |
}, | |
"CVE-2021-43389": { | |
"cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", | |
"cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" | |
} | |
}, | |
"4.19.215": { | |
"CVE-2021-20322": { | |
"cmt_msg": "ipv6: make exception cache less predictible", | |
"cmt_id": "c6d0d68d6da68159948cad3d808d61bb291a0283" | |
}, | |
"CVE-2021-3772": { | |
"cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", | |
"cmt_id": "1f52dfacca7bb315d89f5ece5660b0337809798e" | |
} | |
}, | |
"4.19.216": { | |
"CVE-2021-42739": { | |
"cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", | |
"cmt_id": "53ec9dab4eb0a8140fc85760fb50effb526fe219" | |
} | |
}, | |
"4.19.218": { | |
"CVE-2021-4202": { | |
"cmt_msg": "NFC: reorganize the functions in nci_request", | |
"cmt_id": "62be2b1e7914b7340281f09412a7bbb62e6c8b67" | |
}, | |
"CVE-2021-3752": { | |
"cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", | |
"cmt_id": "72bb30165337b7bce77578ad151fbfab6c8e693c" | |
}, | |
"CVE-2021-45868": { | |
"cmt_msg": "quota: check block number when reading the block in quota file", | |
"cmt_id": "e5222c87dc441dcc8a66e93cb3fd34dfff03d3ec" | |
}, | |
"CVE-2021-39686": { | |
"cmt_msg": "binder: use euid from cred instead of using task", | |
"cmt_id": "5d40061285b81a7e213dc9b37acc4a0545eedf32" | |
}, | |
"CVE-2021-3640": { | |
"cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", | |
"cmt_id": "c1c913f797f3d2441310182ad75b7bd855a327ff" | |
} | |
}, | |
"4.19.219": { | |
"CVE-2021-4002": { | |
"cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", | |
"cmt_id": "b0313bc7f5fbb6beee327af39d818ffdc921821a" | |
} | |
}, | |
"4.19.220": { | |
"CVE-2021-43975": { | |
"cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", | |
"cmt_id": "0275fcd9b54f0364f66f2f3f6a0f3748648f3d35" | |
}, | |
"CVE-2021-4083": { | |
"cmt_msg": "fget: check that the fd still exists after getting a ref to it", | |
"cmt_id": "8bf31f9d9395b71af3ed33166a057cd3ec0c59da" | |
} | |
}, | |
"4.19.221": { | |
"CVE-2021-39713": { | |
"cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock", | |
"cmt_id": "ae214e04b95ff64a4b0e9aab6742520bfde6ff0c" | |
}, | |
"CVE-2021-39698": { | |
"cmt_msg": "wait: add wake_up_pollfree()", | |
"cmt_id": "8dd7c46a59756bdc29cb9783338b899cd3fb4b83" | |
}, | |
"CVE-2021-39685": { | |
"cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", | |
"cmt_id": "13e45e7a262dd96e8161823314679543048709b9" | |
} | |
}, | |
"4.19.222": { | |
"CVE-2021-28715": { | |
"cmt_msg": "xen/netback: don't queue unlimited number of packages", | |
"cmt_id": "c9f17e92917fd5786be872626a3928979ecc4c39" | |
}, | |
"CVE-2021-28714": { | |
"cmt_msg": "xen/netback: fix rx queue stall detection", | |
"cmt_id": "1de7644eac41981817fb66b74e0f82ca4477dc9d" | |
}, | |
"CVE-2021-28713": { | |
"cmt_msg": "xen/console: harden hvc_xen against event channel storms", | |
"cmt_id": "57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2" | |
}, | |
"CVE-2021-28712": { | |
"cmt_msg": "xen/netfront: harden netfront against event channel storms", | |
"cmt_id": "3559ca594f15fcd23ed10c0056d40d71e5dab8e5" | |
}, | |
"CVE-2021-28711": { | |
"cmt_msg": "xen/blkfront: harden blkfront against event channel storms", | |
"cmt_id": "269d7124bcfad2558d2329d0fe603ca20b20d3f4" | |
}, | |
"CVE-2021-4135": { | |
"cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", | |
"cmt_id": "d861443c4dc88650eed113310d933bd593d37b23" | |
} | |
}, | |
"4.19.223": { | |
"CVE-2021-45469": { | |
"cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", | |
"cmt_id": "f9dfa44be0fb5e8426183a70f69a246cf5827f49" | |
}, | |
"CVE-2022-1195": { | |
"cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", | |
"cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59" | |
} | |
}, | |
"4.19.224": { | |
"CVE-2021-44733": { | |
"cmt_msg": "tee: handle lookup of shm with reference count 0", | |
"cmt_id": "b4a661b4212b8fac8853ec3b68e4a909dccc88a1" | |
} | |
}, | |
"4.19.225": { | |
"CVE-2021-45095": { | |
"cmt_msg": "phonet: refcount leak in pep_sock_accep", | |
"cmt_id": "4dece2760af408ad91d6e43afc485d20386c2885" | |
}, | |
"CVE-2021-4155": { | |
"cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", | |
"cmt_id": "1c3564fca0e7b8c9e96245a2cb35e198b036ee9a" | |
} | |
}, | |
"4.19.226": { | |
"CVE-2020-36322": { | |
"cmt_msg": "fuse: fix bad inode", | |
"cmt_id": "1e1bb4933f1faafc68db8e0ecd5838a65dd1aae9" | |
}, | |
"CVE-2021-43976": { | |
"cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", | |
"cmt_id": "2f4b037bf6e8c663a593b8149263c5b6940c7afd" | |
} | |
}, | |
"4.19.227": { | |
"CVE-2022-0330": { | |
"cmt_msg": "drm/i915: Flush TLBs before releasing backing store", | |
"cmt_id": "b188780649081782e341e52223db47c49f172712" | |
}, | |
"CVE-2022-22942": { | |
"cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", | |
"cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d" | |
} | |
}, | |
"4.19.228": { | |
"CVE-2022-24448": { | |
"cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", | |
"cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de" | |
}, | |
"CVE-2022-0617": { | |
"cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", | |
"cmt_id": "a23a59717f9f01a49394488f515550f9382fbada" | |
}, | |
"CVE-2022-24959": { | |
"cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", | |
"cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7" | |
} | |
}, | |
"4.19.229": { | |
"CVE-2022-0492": { | |
"cmt_msg": "cgroup-v1: Require capabilities to set release_agent", | |
"cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3" | |
}, | |
"CVE-2022-0435": { | |
"cmt_msg": "tipc: improve size validations for received domain records", | |
"cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d" | |
}, | |
"CVE-2022-0487": { | |
"cmt_msg": "moxart: fix potential use-after-free on remove path", | |
"cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552" | |
} | |
}, | |
"4.19.230": { | |
"CVE-2022-25375": { | |
"cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", | |
"cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda" | |
}, | |
"CVE-2022-25258": { | |
"cmt_msg": "USB: gadget: validate interface OS descriptor requests", | |
"cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164" | |
} | |
}, | |
"4.19.232": { | |
"CVE-2022-27223": { | |
"cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", | |
"cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1" | |
}, | |
"CVE-2022-26966": { | |
"cmt_msg": "sr9700: sanity check for packet length", | |
"cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337" | |
} | |
}, | |
"4.19.233": { | |
"CVE-2022-24958": { | |
"cmt_msg": "usb: gadget: don't release an existing dev->buf", | |
"cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52" | |
} | |
}, | |
"4.19.234": { | |
"CVE-2022-23038": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", | |
"cmt_id": "17659846fe336366b1663194f5669d10f5947f53" | |
}, | |
"CVE-2022-23039": { | |
"cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", | |
"cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce" | |
}, | |
"CVE-2022-23960": { | |
"cmt_msg": "ARM: report Spectre v2 status through sysfs", | |
"cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a" | |
}, | |
"CVE-2022-23036": { | |
"cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", | |
"cmt_id": "17659846fe336366b1663194f5669d10f5947f53" | |
}, | |
"CVE-2022-23037": { | |
"cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", | |
"cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72" | |
}, | |
"CVE-2022-0001": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", | |
"cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" | |
}, | |
"CVE-2022-0002": { | |
"cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", | |
"cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" | |
}, | |
"CVE-2022-23041": { | |
"cmt_msg": "xen/9p: use alloc/free_pages_exact()", | |
"cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea" | |
}, | |
"CVE-2022-23040": { | |
"cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", | |
"cmt_id": "8d521d960aef22781ff499e16899c30af899de8d" | |
}, | |
"CVE-2022-23042": { | |
"cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", | |
"cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5" | |
} | |
}, | |
"4.19.235": { | |
"CVE-2022-1199": { | |
"cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", | |
"cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c" | |
}, | |
"CVE-2021-4149": { | |
"cmt_msg": "btrfs: unlock newly allocated extent buffer after error", | |
"cmt_id": "73d55fa1b9310573f623195a4f7ab3170bbaf248" | |
} | |
}, | |
"4.19.237": { | |
"CVE-2022-26490": { | |
"cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", | |
"cmt_id": "0043b74987acb44f1ade537aad901695511cfebe" | |
}, | |
"CVE-2022-28356": { | |
"cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", | |
"cmt_id": "d14193111c436fc5de33206c67c7afd45c730099" | |
}, | |
"CVE-2022-1016": { | |
"cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", | |
"cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b" | |
}, | |
"CVE-2022-27666": { | |
"cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", | |
"cmt_id": "ce89087966651ad41e103770efc5ce2742046284" | |
} | |
}, | |
"4.19.238": { | |
"CVE-2022-28390": { | |
"cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", | |
"cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba" | |
}, | |
"CVE-2022-1353": { | |
"cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", | |
"cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795" | |
}, | |
"CVE-2022-1198": { | |
"cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", | |
"cmt_id": "79e2f40c210a47f283bca352745068207798fbb9" | |
}, | |
"CVE-2021-4197": { | |
"cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", | |
"cmt_id": "0bd407959f7d6671ba0617e2dbda3e89d8a0419f" | |
}, | |
"CVE-2022-28389": { | |
"cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", | |
"cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59" | |
}, | |
"CVE-2022-1516": { | |
"cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", | |
"cmt_id": "4c240c5a105557e4546d0836e694868f22fd09b0" | |
}, | |
"CVE-2022-1011": { | |
"cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", | |
"cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9" | |
} | |
}, | |
"4.19.240": { | |
"CVE-2022-1204": { | |
"cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", | |
"cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b" | |
}, | |
"CVE-2022-1205": { | |
"cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", | |
"cmt_id": "512f09df261b51b088f17d86dbdf300a3492523d" | |
}, | |
"CVE-2022-28388": { | |
"cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", | |
"cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe" | |
} | |
}, | |
"outstanding": { | |
"CVE-2021-0929": { | |
"cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" | |
}, | |
"CVE-2020-26556": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26557": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26555": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-20794": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26559": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-35501": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0168": { | |
"cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" | |
}, | |
"CVE-2018-20854": { | |
"cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" | |
}, | |
"CVE-2018-1121": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19378": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1419": { | |
"cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" | |
}, | |
"CVE-2022-0995": { | |
"cmt_msg": "watch_queue: Fix filter limit check" | |
}, | |
"CVE-2022-0998": { | |
"cmt_msg": "vdpa: clean up get_config_size ret value handling" | |
}, | |
"CVE-2019-15794": { | |
"cmt_msg": "ovl: fix reference counting in ovl_mmap error path" | |
}, | |
"CVE-2019-2181": { | |
"cmt_msg": "binder: check for overflow when alloc for security context" | |
}, | |
"CVE-2021-3759": { | |
"cmt_msg": "memcg: enable accounting of ipc resources" | |
}, | |
"CVE-2020-27820": { | |
"cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" | |
}, | |
"CVE-2022-0854": { | |
"cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"" | |
}, | |
"CVE-2020-24503": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-24502": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19449": { | |
"cmt_msg": "f2fs: fix to do sanity check on segment/section count" | |
}, | |
"CVE-2020-24504": { | |
"cmt_msg": "ice: create scheduler aggregator node config and move VSIs" | |
}, | |
"CVE-2020-26541": { | |
"cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" | |
}, | |
"CVE-2020-11725": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0382": { | |
"cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" | |
}, | |
"CVE-2021-33061": { | |
"cmt_msg": "ixgbe: add improvement for MDD response functionality" | |
}, | |
"CVE-2022-1263": { | |
"cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" | |
}, | |
"CVE-2019-15222": { | |
"cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" | |
}, | |
"CVE-2021-3864": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-19815": { | |
"cmt_msg": "f2fs: support swap file w/ DIO" | |
}, | |
"CVE-2019-19814": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-27950": { | |
"cmt_msg": "HID: elo: fix memory leak in elo_probe" | |
}, | |
"CVE-2022-1015": { | |
"cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." | |
}, | |
"CVE-2019-19241": { | |
"cmt_msg": "io_uring: async workers should inherit the user creds" | |
}, | |
"CVE-2021-26934": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-25636": { | |
"cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" | |
}, | |
"CVE-2016-8660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-12379": { | |
"cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" | |
}, | |
"CVE-2019-12378": { | |
"cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" | |
}, | |
"CVE-2022-0494": { | |
"cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" | |
}, | |
"CVE-2018-12929": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-15802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-2544": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28796": { | |
"cmt_msg": "jbd2: fix use-after-free of transaction_t race" | |
}, | |
"CVE-2019-20908": { | |
"cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" | |
}, | |
"CVE-2019-15239": { | |
"cmt_msg": "unknown" | |
}, | |
"CVE-2007-3719": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4037": { | |
"cmt_msg": "xfs: fix up non-directory creation in SGID directories" | |
}, | |
"CVE-2020-26145": { | |
"cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" | |
}, | |
"CVE-2010-4563": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26140": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26143": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26142": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-28893": { | |
"cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" | |
}, | |
"CVE-2022-29156": { | |
"cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" | |
}, | |
"CVE-2021-20177": { | |
"cmt_msg": "netfilter: add and use nf_hook_slow_list()" | |
}, | |
"CVE-2021-3669": { | |
"cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" | |
}, | |
"CVE-2020-10708": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4023": { | |
"cmt_msg": "io-wq: fix cancellation on create-worker failure" | |
}, | |
"CVE-2019-19070": { | |
"cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" | |
}, | |
"CVE-2017-13693": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0399": { | |
"cmt_msg": "" | |
}, | |
"CVE-2017-13694": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-36516": { | |
"cmt_msg": "" | |
}, | |
"CVE-2012-4542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0812": { | |
"cmt_msg": "xprtrdma: fix incorrect header size calculations" | |
}, | |
"CVE-2013-7445": { | |
"cmt_msg": "" | |
}, | |
"CVE-2005-3660": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1508": { | |
"cmt_msg": "io_uring: reexpand under-reexpanded iters" | |
}, | |
"CVE-2022-1158": { | |
"cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" | |
}, | |
"CVE-2021-4159": { | |
"cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" | |
}, | |
"CVE-2021-0695": { | |
"cmt_msg": "" | |
}, | |
"CVE-2008-4609": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4150": { | |
"cmt_msg": "block: fix incorrect references to disk objects" | |
}, | |
"CVE-2021-28951": { | |
"cmt_msg": "io_uring: ensure that SQPOLL thread is started for exit" | |
}, | |
"CVE-2020-14304": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-0347": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-29155": { | |
"cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" | |
}, | |
"CVE-2021-3714": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-12455": { | |
"cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" | |
}, | |
"CVE-2019-12456": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26560": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-3892": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-12362": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2020-12363": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2022-0742": { | |
"cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()" | |
}, | |
"CVE-2020-12364": { | |
"cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" | |
}, | |
"CVE-2022-0500": { | |
"cmt_msg": "bpf: Introduce MEM_RDONLY flag" | |
}, | |
"CVE-2022-1055": { | |
"cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" | |
}, | |
"CVE-2022-0480": { | |
"cmt_msg": "memcg: enable accounting for file lock caches" | |
}, | |
"CVE-2022-1184": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-26141": { | |
"cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" | |
}, | |
"CVE-2022-25265": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4218": { | |
"cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" | |
}, | |
"CVE-2022-23222": { | |
"cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" | |
}, | |
"CVE-2019-15290": { | |
"cmt_msg": "" | |
}, | |
"CVE-2020-15780": { | |
"cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" | |
}, | |
"CVE-2018-17977": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-26878": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-29582": { | |
"cmt_msg": "io_uring: fix race between timeout flush and removal" | |
}, | |
"CVE-2010-5321": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12930": { | |
"cmt_msg": "" | |
}, | |
"CVE-2018-12931": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-4148": { | |
"cmt_msg": "mm: khugepaged: skip huge page collapse for special files" | |
}, | |
"CVE-2022-1043": { | |
"cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check" | |
}, | |
"CVE-2021-39801": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39800": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-39802": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1048": { | |
"cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" | |
}, | |
"CVE-2020-36385": { | |
"cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" | |
}, | |
"CVE-2019-12380": { | |
"cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" | |
}, | |
"CVE-2019-12381": { | |
"cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" | |
}, | |
"CVE-2020-7053": { | |
"cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" | |
}, | |
"CVE-2021-3542": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-44879": { | |
"cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" | |
}, | |
"CVE-2020-12656": { | |
"cmt_msg": "sunrpc: check that domain table is empty at module unload." | |
}, | |
"CVE-2020-16120": { | |
"cmt_msg": "ovl: switch to mounter creds in readdir" | |
}, | |
"CVE-2018-12928": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-0149": { | |
"cmt_msg": "i40e: Add bounds check for ch[] array" | |
}, | |
"CVE-2020-36310": { | |
"cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" | |
}, | |
"CVE-2020-36313": { | |
"cmt_msg": "KVM: Fix out of range accesses to memslots" | |
}, | |
"CVE-2015-2877": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-0146": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-16089": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-0400": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-0707": { | |
"cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" | |
}, | |
"CVE-2019-11191": { | |
"cmt_msg": "x86: Deprecate a.out support" | |
}, | |
"CVE-2021-3847": { | |
"cmt_msg": "" | |
}, | |
"CVE-2022-1280": { | |
"cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" | |
}, | |
"CVE-2011-4917": { | |
"cmt_msg": "" | |
}, | |
"CVE-2019-18680": { | |
"cmt_msg": "" | |
}, | |
"CVE-2021-32078": { | |
"cmt_msg": "ARM: footbridge: remove personal server platform" | |
}, | |
"CVE-2019-10220": { | |
"cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" | |
}, | |
"CVE-2020-27835": { | |
"cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" | |
}, | |
"CVE-2019-5489": { | |
"cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" | |
} | |
} | |
}, | |
"4.9": { | |
"4.9": { | |
"CVE-2016-9576": { | |
"cmt_msg": "Don't feed anything but regular iovec's to blk_rq_map_user_iov", | |
"cmt_id": "a0ac402cfcdc904f9772e1762b3fda112dcc56a0" | |
}, | |
"CVE-2016-10147": { | |
"cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", | |
"cmt_id": "48a992727d82cb7db076fa15d372178743b1f4cd" | |
}, | |
"CVE-2016-8399": { | |
"cmt_msg": "net: ping: check minimum size on ICMP header length", | |
"cmt_id": "0eab121ef8750a5c8637d51534d5e9143fb0633f" | |
} | |
}, | |
"4.9.1": { | |
"CVE-2016-10154": { | |
"cmt_msg": "cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack", | |
"cmt_id": "7aa58e7ad53bd9536aa49a18ccd0778c728bf57d" | |
}, | |
"CVE-2015-8709": { | |
"cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", | |
"cmt_id": "694a95fa6dae4991f16cda333d897ea063021fed" | |
} | |
}, | |
"4.9.2": { | |
"CVE-2016-9588": { | |
"cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", | |
"cmt_id": "3f618a0b872fea38c7d1d1f79eda40f88c6466c2" | |
}, | |
"CVE-2016-10088": { | |
"cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", | |
"cmt_id": "3f3a6bbe6f9f5e895d8945494173594ee51632da" | |
} | |
}, | |
"4.9.3": { | |
"CVE-2016-10741": { | |
"cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", | |
"cmt_id": "3978c5bb004312fd267aed7279fe64b119e126b0" | |
} | |
}, | |
"4.9.4": { | |
"CVE-2017-7273": { | |
"cmt_msg": "HID: hid-cypress: validate length of report", | |
"cmt_id": "2c867216c555f5897b327daed6240bfb9e489c97" | |
} | |
}, | |
"4.9.5": { | |
"CVE-2016-9191": { | |
"cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", | |
"cmt_id": "00cf64fbaa1e99d0420f2934f301c671ba298342" | |
}, | |
"CVE-2017-5549": { | |
"cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", | |
"cmt_id": "58ede4beda662c4e1681fee4fae2174028a1a841" | |
}, | |
"CVE-2017-5546": { | |
"cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries", | |
"cmt_id": "8315c22ea879082bba365d46dd2cc7881fbfb49a" | |
}, | |
"CVE-2017-5550": { | |
"cmt_msg": "fix a fencepost error in pipe_advance()", | |
"cmt_id": "d06367ac1730ded79aa78307126236bf83af95a3" | |
}, | |
"CVE-2017-2583": { | |
"cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", | |
"cmt_id": "7718ffcf9a64830bbae148432f625346cde2f2d6" | |
}, | |
"CVE-2017-2584": { | |
"cmt_msg": "KVM: x86: Introduce segmented_write_std", | |
"cmt_id": "736e77c07fba8b49cead504b885a82ce52c0ff10" | |
} | |
}, | |
"4.9.6": { | |
"CVE-2017-5547": { | |
"cmt_msg": "HID: corsair: fix DMA buffers on stack", | |
"cmt_id": "63df1ccb937f67fbefa0a77415b3a4d10434a09b" | |
}, | |
"CVE-2017-5551": { | |
"cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", | |
"cmt_id": "782b361c93062f083bbc9a78928498218f950399" | |
}, | |
"CVE-2017-5548": { | |
"cmt_msg": "ieee802154: atusb: do not use the stack for buffers to make them DMA able", | |
"cmt_id": "86249aef233e6e05ba84f6c9aab9e6b890fc6ba7" | |
}, | |
"CVE-2016-10764": { | |
"cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()", | |
"cmt_id": "e55e6c026b7c49c4dcc33f4ebc330e660ecf3963" | |
}, | |
"CVE-2016-10153": { | |
"cmt_msg": "libceph: introduce ceph_crypt() for in-place en/decryption", | |
"cmt_id": "ecf7ced8562811576cd02158d6ae8e44c1fb4671" | |
} | |
}, | |
"4.9.7": { | |
"CVE-2017-6001": { | |
"cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", | |
"cmt_id": "922813f4d66fb317e8602d058d03a1619af1ffd0" | |
}, | |
"CVE-2017-5576": { | |
"cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout.", | |
"cmt_id": "b9edac54cb85da589ca809bf8dcf86e5cd3f41c0" | |
}, | |
"CVE-2017-5577": { | |
"cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing.", | |
"cmt_id": "cfba2a001d0e36905016bb4f87fc47245c944c36" | |
}, | |
"CVE-2016-8405": { | |
"cmt_msg": "fbdev: color map copying bounds checking", | |
"cmt_id": "544160b6ea18670196d1173c099f2cced5075132" | |
} | |
}, | |
"4.9.9": { | |
"CVE-2016-10208": { | |
"cmt_msg": "ext4: validate s_first_meta_bg at mount time", | |
"cmt_id": "13e6ef99d23b05807e7f8a72f45e3d8260b61570" | |
}, | |
"CVE-2017-8071": { | |
"cmt_msg": "HID: cp2112: fix sleep-while-atomic", | |
"cmt_id": "a18c4584a48931e8048508469bcdb53c6082221a" | |
}, | |
"CVE-2017-8072": { | |
"cmt_msg": "HID: cp2112: fix gpio-callback error handling", | |
"cmt_id": "7396685a1bca323b96fd79b836ae22b7569d7068" | |
} | |
}, | |
"4.9.10": { | |
"CVE-2017-2618": { | |
"cmt_msg": "selinux: fix off-by-one in setprocattr", | |
"cmt_id": "6cbaf7b94373743deb42fd410173aab81f8945fe" | |
}, | |
"CVE-2016-8636": { | |
"cmt_msg": "IB/rxe: Fix mem_check_range integer overflow", | |
"cmt_id": "b7dd5edc3dd9191f2cb1bd508279b0ff7274c5aa" | |
} | |
}, | |
"4.9.11": { | |
"CVE-2017-5897": { | |
"cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", | |
"cmt_id": "ae1768bbbc469b75662c6714957fe5886cc960c4" | |
}, | |
"CVE-2017-8069": { | |
"cmt_msg": "rtl8150: Use heap buffers for all register access", | |
"cmt_id": "e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec" | |
}, | |
"CVE-2017-8068": { | |
"cmt_msg": "pegasus: Use heap buffers for all register access", | |
"cmt_id": "878b015bcc726560b13be2d906caf6923428f05d" | |
}, | |
"CVE-2017-5970": { | |
"cmt_msg": "ipv4: keep skb->dst around in presence of IP options", | |
"cmt_id": "f5b54446630a973e1f27b68599366bbd0ac53066" | |
}, | |
"CVE-2017-5986": { | |
"cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", | |
"cmt_id": "00eff2ebbd229758e90659907724c14dd5a18339" | |
}, | |
"CVE-2017-8070": { | |
"cmt_msg": "catc: Use heap buffer for memory size test", | |
"cmt_id": "970390fd5d53de0817b538350131edd2514a8321" | |
}, | |
"CVE-2017-6214": { | |
"cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", | |
"cmt_id": "0f895f51a831d73ce24158534784aba5b2a72a9e" | |
} | |
}, | |
"4.9.13": { | |
"CVE-2017-6345": { | |
"cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", | |
"cmt_id": "42b52783a59cc706c71cdc7096edce4a6f086fd3" | |
}, | |
"CVE-2017-6346": { | |
"cmt_msg": "packet: fix races in fanout_add()", | |
"cmt_id": "722737f27774b14be5a1d2d3b9281dcded7c48b2" | |
}, | |
"CVE-2017-6347": { | |
"cmt_msg": "ip: fix IP_CHECKSUM handling", | |
"cmt_id": "481aedf869fbf2d4503ca0005dbd68b78422955a" | |
}, | |
"CVE-2017-6348": { | |
"cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", | |
"cmt_id": "c2219da51664451149350e47321aa0fcf72a8b8f" | |
}, | |
"CVE-2017-6074": { | |
"cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", | |
"cmt_id": "171d92a9d915d238e05285ca67faf30f554d7df7" | |
} | |
}, | |
"4.9.14": { | |
"CVE-2017-8066": { | |
"cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers", | |
"cmt_id": "cec7abd27e878e3c83dc9af41ee87a2e9d483ac0" | |
}, | |
"CVE-2017-5669": { | |
"cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", | |
"cmt_id": "270e84a1e6effd6c0c6e9b13b196b5fdaa392954" | |
} | |
}, | |
"4.9.15": { | |
"CVE-2017-2636": { | |
"cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", | |
"cmt_id": "e5b9778761558ff3d239ed76925a1a7a734918ea" | |
} | |
}, | |
"4.9.16": { | |
"CVE-2017-8062": { | |
"cmt_msg": "dw2102: don't do DMA on stack", | |
"cmt_id": "06996254a605913cd7c1927d0e8a89b5138e110d" | |
}, | |
"CVE-2017-8924": { | |
"cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", | |
"cmt_id": "d0ef6ecee85e17742d8bce1559872cb542d6ccac" | |
}, | |
"CVE-2016-2188": { | |
"cmt_msg": "USB: iowarrior: fix NULL-deref at probe", | |
"cmt_id": "653418adaf1026a10e0c2e4e29b7319610117b33" | |
}, | |
"CVE-2017-6874": { | |
"cmt_msg": "ucount: Remove the atomicity from ucount->count", | |
"cmt_id": "ee6f7ee1e4cdb0098fee4593ddf11ca6028abef2" | |
}, | |
"CVE-2017-8925": { | |
"cmt_msg": "USB: serial: omninet: fix reference leaks at open", | |
"cmt_id": "6d6c5895f45431579c20f4183b25183f0e3afc92" | |
} | |
}, | |
"4.9.20": { | |
"CVE-2017-7184": { | |
"cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", | |
"cmt_id": "64a5465799ee40e3d54d9da3037934cd4b7b502f" | |
}, | |
"CVE-2017-7374": { | |
"cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", | |
"cmt_id": "2984e52c75c657db7901f6189f02e0251ca963c2" | |
} | |
}, | |
"4.9.21": { | |
"CVE-2017-7187": { | |
"cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", | |
"cmt_id": "c2a869527865c35b605877f966cb5d514fdc5fbb" | |
} | |
}, | |
"4.9.22": { | |
"CVE-2017-7261": { | |
"cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", | |
"cmt_id": "73ab72517b61ce4b27ceddec47dd5d6edafb556a" | |
}, | |
"CVE-2017-7616": { | |
"cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", | |
"cmt_id": "cddab768d13469d1e254fb8c0e1629f93c8dfaca" | |
}, | |
"CVE-2017-7294": { | |
"cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", | |
"cmt_id": "4ddd24d54fedff301e8f020d7b9f70116383af31" | |
} | |
}, | |
"4.9.23": { | |
"CVE-2017-7308": { | |
"cmt_msg": "net/packet: fix overflow in check for priv area size", | |
"cmt_id": "16fc98c2479f5477f2df220acd9cb53686e33f4c" | |
} | |
}, | |
"4.9.24": { | |
"CVE-2017-6353": { | |
"cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", | |
"cmt_id": "35b9d61ea910c1ebd4652b32cc7d713f6689b4f4" | |
}, | |
"CVE-2017-8063": { | |
"cmt_msg": "cxusb: Use a dma capable buffer also for reading", | |
"cmt_id": "fb00319317c152bf3528df13a54c28bf8c5daa55" | |
}, | |
"CVE-2017-8061": { | |
"cmt_msg": "dvb-usb-firmware: don't do DMA on stack", | |
"cmt_id": "28d1e8b7ef81d254583f68627095f8a85e39597d" | |
}, | |
"CVE-2017-8067": { | |
"cmt_msg": "virtio-console: avoid DMA from stack", | |
"cmt_id": "86c6667f6a5f6bdb392d8ffbe58fbcbcf6db2704" | |
}, | |
"CVE-2017-8064": { | |
"cmt_msg": "dvb-usb-v2: avoid use-after-free", | |
"cmt_id": "1992564156b5dc4ac73418e5b95e1a43f12f3cb1" | |
}, | |
"CVE-2017-7618": { | |
"cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", | |
"cmt_id": "c10479591869177ae7ac0570b54ace6fbdeb57c2" | |
}, | |
"CVE-2017-7889": { | |
"cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", | |
"cmt_id": "2c0ad235ac77f2fc2eee593bf06822cad772e0e2" | |
}, | |
"CVE-2017-2596": { | |
"cmt_msg": "kvm: fix page struct leak in handle_vmon", | |
"cmt_id": "75465e71ec3139b958d06d48dfc85720aed69b6a" | |
} | |
}, | |
"4.9.25": { | |
"CVE-2017-7472": { | |
"cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", | |
"cmt_id": "174a74dbca2ddc7269c265598399c000e5b9b870" | |
}, | |
"CVE-2016-9604": { | |
"cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", | |
"cmt_id": "a5c6e0a76817a3751f58d761aaff7c0b0c4001ff" | |
} | |
}, | |
"4.9.26": { | |
"CVE-2017-7477": { | |
"cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec", | |
"cmt_id": "07389a140f48a3d5d223881bb01cef9f389e2844" | |
}, | |
"CVE-2017-7645": { | |
"cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", | |
"cmt_id": "fc6445df466f37291a70937642068bda78802a5b" | |
}, | |
"CVE-2017-2671": { | |
"cmt_msg": "ping: implement proper locking", | |
"cmt_id": "e88a8e0a23c23e09858a4f5caeb106da972e7934" | |
}, | |
"CVE-2017-7895": { | |
"cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", | |
"cmt_id": "d7809b9e99bb75e83bdd13dc70ce27df61faf5de" | |
} | |
}, | |
"4.9.27": { | |
"CVE-2017-10661": { | |
"cmt_msg": "timerfd: Protect the might cancel mechanism proper", | |
"cmt_id": "00cca9768ebe1ac4ac16366662dd9087b6e5f4e7" | |
} | |
}, | |
"4.9.28": { | |
"CVE-2017-9150": { | |
"cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", | |
"cmt_id": "ced0a31e667fbf618591f0a76a8213018407cde0" | |
}, | |
"CVE-2017-10662": { | |
"cmt_msg": "f2fs: sanity check segment count", | |
"cmt_id": "93862955cbf485215f0677229292d0f358af55fc" | |
} | |
}, | |
"4.9.30": { | |
"CVE-2017-18360": { | |
"cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", | |
"cmt_id": "f9cd79e0ad1fa620ff34715d24ae1b671c97bc91" | |
}, | |
"CVE-2017-7487": { | |
"cmt_msg": "ipx: call ipxitf_put() in ioctl error path", | |
"cmt_id": "820adccd0e3be9bdd2384ca8fc4712108cfdf28b" | |
}, | |
"CVE-2017-8797": { | |
"cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify", | |
"cmt_id": "ea465551af30146efea215da58786ff732da70fb" | |
}, | |
"CVE-2017-1000363": { | |
"cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", | |
"cmt_id": "5d263d94a870a774a24acb2a2cc1e79ef39c2416" | |
} | |
}, | |
"4.9.31": { | |
"CVE-2017-9077": { | |
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", | |
"cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" | |
}, | |
"CVE-2017-9076": { | |
"cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", | |
"cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" | |
}, | |
"CVE-2017-9075": { | |
"cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", | |
"cmt_id": "5e7d9f0b3f729a64b99e58047f7bb0ff36acb759" | |
}, | |
"CVE-2017-9074": { | |
"cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", | |
"cmt_id": "a2c845e51a820549a6df5a1e8907ee754422119e" | |
}, | |
"CVE-2017-9211": { | |
"cmt_msg": "crypto: skcipher - Add missing API setkey checks", | |
"cmt_id": "4472887cbd1373d7781bea9d8935f2d4968dd580" | |
}, | |
"CVE-2017-18221": { | |
"cmt_msg": "mlock: fix mlock count can not decrease in race condition", | |
"cmt_id": "1163e785b1506a4f46dbdee89bbab161dd742186" | |
}, | |
"CVE-2017-8890": { | |
"cmt_msg": "dccp/tcp: do not inherit mc_list from parent", | |
"cmt_id": "4eed44029507acc666ac7afe9c6a8ea0abf857b7" | |
}, | |
"CVE-2017-9242": { | |
"cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", | |
"cmt_id": "304b41014acbdc5fa5126c86bac31dc41a245f9f" | |
} | |
}, | |
"4.9.32": { | |
"CVE-2017-9605": { | |
"cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", | |
"cmt_id": "7860d0e5e2bf986d4bd06e7b029786747b5dc766" | |
}, | |
"CVE-2017-15274": { | |
"cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", | |
"cmt_id": "1b253e023f8f75b109564a61d2050d818f75b4f3" | |
}, | |
"CVE-2017-7346": { | |
"cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", | |
"cmt_id": "a76ff847013a7f6b1cd328381ca263ddcca12061" | |
}, | |
"CVE-2017-1000380": { | |
"cmt_msg": "ALSA: timer: Fix race between read and ioctl", | |
"cmt_id": "66e982d8f1a1f5e151377fe37612e9151e552dc9" | |
} | |
}, | |
"4.9.34": { | |
"CVE-2017-1000364": { | |
"cmt_msg": "mm: larger stack guard gap, between vmas", | |
"cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" | |
}, | |
"CVE-2017-1000379": { | |
"cmt_msg": "mm: larger stack guard gap, between vmas", | |
"cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" | |
} | |
}, | |
"4.9.35": { | |
"CVE-2017-10911": { | |
"cmt_msg": "xen-blkback: don't leak stack data via response ring", | |
"cmt_id": "4ae2cb91a6365a6472fad7f04785cc0420ea5ada" | |
}, | |
"CVE-2017-1000365": { | |
"cmt_msg": "fs/exec.c: account for argv/envp pointers", | |
"cmt_id": "3d6848e491df6abbf5fb5b1fabb7a5df2e2b8f4f" | |
}, | |
"CVE-2017-7482": { | |
"cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", | |
"cmt_id": "f2060387421109ac389dd209355918b566fc6f84" | |
} | |
}, | |
"4.9.36": { | |
"CVE-2017-18017": { | |
"cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", | |
"cmt_id": "ced7689be60ddcac4b1746212c547e8817c5ae5e" | |
} | |
}, | |
"4.9.37": { | |
"CVE-2017-12146": { | |
"cmt_msg": "driver core: platform: fix race condition with driver_override", | |
"cmt_id": "c4c592b2c137e4451b7fdf76700ae9c98db133f5" | |
}, | |
"CVE-2017-10810": { | |
"cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", | |
"cmt_id": "366d9207d9e002bf1a6d9da13a7f8f85b8a40c0b" | |
} | |
}, | |
"4.9.38": { | |
"CVE-2017-11176": { | |
"cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", | |
"cmt_id": "e6952841ade0f937750c7748a812cb403bd744b0" | |
} | |
}, | |
"4.9.39": { | |
"CVE-2019-9457": { | |
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", | |
"cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" | |
}, | |
"CVE-2018-14634": { | |
"cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", | |
"cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" | |
}, | |
"CVE-2017-11089": { | |
"cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", | |
"cmt_id": "b68aa7dff96efc59fee40e25b8044017de21161a" | |
}, | |
"CVE-2017-7541": { | |
"cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", | |
"cmt_id": "414848bba6ab91fe12ca8105b4652c4aa6f4b574" | |
}, | |
"CVE-2017-1000371": { | |
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", | |
"cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" | |
}, | |
"CVE-2017-1000370": { | |
"cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", | |
"cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" | |
} | |
}, | |
"4.9.40": { | |
"CVE-2017-11473": { | |
"cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", | |
"cmt_id": "036d59f40ac94964a1bbc8959f78f34efac71fd5" | |
}, | |
"CVE-2017-18079": { | |
"cmt_msg": "Input: i8042 - fix crash at boot time", | |
"cmt_id": "5b50e0e74e2e5f084d18a03f6dedc67cfdb8db49" | |
} | |
}, | |
"4.9.41": { | |
"CVE-2017-7533": { | |
"cmt_msg": "dentry name snapshots", | |
"cmt_id": "ad25f11ed216d5ce3b5566b2f187b59fa3061b40" | |
}, | |
"CVE-2017-12762": { | |
"cmt_msg": "isdn/i4l: fix buffer overflow", | |
"cmt_id": "7b3a66739ff01fcd9b8007a18ddd29edd2cb74f7" | |
} | |
}, | |
"4.9.42": { | |
"CVE-2017-10663": { | |
"cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", | |
"cmt_id": "0f442c5b2e4ac0b65027ed3374462f1c38675f7e" | |
}, | |
"CVE-2017-8831": { | |
"cmt_msg": "saa7164: fix double fetch PCIe access condition", | |
"cmt_id": "12d17d78e3f74b5022f61eee7d6de082e472a401" | |
}, | |
"CVE-2017-7542": { | |
"cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", | |
"cmt_id": "4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad" | |
} | |
}, | |
"4.9.43": { | |
"CVE-2017-1000": { | |
"cmt_msg": "udp: consistently apply ufo or fragmentation", | |
"cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" | |
}, | |
"CVE-2017-1000112": { | |
"cmt_msg": "udp: consistently apply ufo or fragmentation", | |
"cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" | |
}, | |
"CVE-2017-1000111": { | |
"cmt_msg": "packet: fix tp_reserve race in packet_set_ring", | |
"cmt_id": "e5841355061332f8b326e098949490345dba776b" | |
} | |
}, | |
"4.9.45": { | |
"CVE-2017-12134": { | |
"cmt_msg": "xen: fix bio vec merging", | |
"cmt_id": "6c7f3756d072050d612e5c5c04108f90f1985435" | |
}, | |
"CVE-2017-14140": { | |
"cmt_msg": "Sanitize 'move_pages()' permission checks", | |
"cmt_id": "61332dc598c3f223678b2d7192ccf3472c544799" | |
}, | |
"CVE-2018-10675": { | |
"cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", | |
"cmt_id": "91105f2c621ef0b3c40d6725475b6896eb06f954" | |
} | |
}, | |
"4.9.46": { | |
"CVE-2017-17053": { | |
"cmt_msg": "x86/mm: Fix use-after-free of ldt_struct", | |
"cmt_id": "3559de45c99a68c0b8c4956fc35367837df9161c" | |
}, | |
"CVE-2017-17052": { | |
"cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free", | |
"cmt_id": "b65b6ac52e0f8694aa3a4402d5f766b2bb9e94ef" | |
} | |
}, | |
"4.9.48": { | |
"CVE-2017-11600": { | |
"cmt_msg": "xfrm: policy: check policy direction value", | |
"cmt_id": "12a70ccaa6868163487f9a5ad97e1a91a397b453" | |
} | |
}, | |
"4.9.50": { | |
"CVE-2017-14340": { | |
"cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", | |
"cmt_id": "5b82e0e938af5d9dfb038e2483cb2a84e24584fd" | |
}, | |
"CVE-2017-1000251": { | |
"cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", | |
"cmt_id": "6300c8bfafe032187f3cbaa43dbf7d306650c5ed" | |
}, | |
"CVE-2017-9985": { | |
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", | |
"cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" | |
}, | |
"CVE-2017-9984": { | |
"cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", | |
"cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" | |
} | |
}, | |
"4.9.51": { | |
"CVE-2017-14106": { | |
"cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", | |
"cmt_id": "a10c510179b369f7d1e8cf77f43ee2db900c1ac9" | |
}, | |
"CVE-2017-14497": { | |
"cmt_msg": "packet: Don't write vnet header beyond end of buffer", | |
"cmt_id": "8c623e5d03692dc478277185a0b907d53aea1b43" | |
}, | |
"CVE-2017-7558": { | |
"cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", | |
"cmt_id": "08d56d8a99bb82e134ba7704e4cfdabbcc16fc4f" | |
} | |
}, | |
"4.9.52": { | |
"CVE-2017-9059": { | |
"cmt_msg": "NFSv4: Fix callback server shutdown", | |
"cmt_id": "f609266b12d214437cf9d68245dc27f8d4f69836" | |
}, | |
"CVE-2017-14991": { | |
"cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", | |
"cmt_id": "90cb12f6dc5ac45c51082721ec5bbe18850cf80f" | |
}, | |
"CVE-2017-14051": { | |
"cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", | |
"cmt_id": "2a913aecc4f746ce15eb1bec98b134aff4190ae2" | |
}, | |
"CVE-2017-0627": { | |
"cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", | |
"cmt_id": "38993f320506d7ead26695218ba1481f250469d5" | |
} | |
}, | |
"4.9.53": { | |
"CVE-2020-14353": { | |
"cmt_msg": "KEYS: prevent creating a different user's keyrings", | |
"cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" | |
}, | |
"CVE-2017-14156": { | |
"cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", | |
"cmt_id": "64afde6f956dfcb719e329a9d2098b53e68d2755" | |
}, | |
"CVE-2017-12153": { | |
"cmt_msg": "nl80211: check for the required netlink attributes presence", | |
"cmt_id": "c820441a7a52e3626aede8df94069a50a9e4efdb" | |
}, | |
"CVE-2017-1000252": { | |
"cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", | |
"cmt_id": "3d4213fac7d10e72859112c9100d8015ce442a3a" | |
}, | |
"CVE-2017-12154": { | |
"cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", | |
"cmt_id": "86ef97b2dfd504fbc65f6b244a422db0c1b15797" | |
}, | |
"CVE-2017-18270": { | |
"cmt_msg": "KEYS: prevent creating a different user's keyrings", | |
"cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" | |
}, | |
"CVE-2017-14489": { | |
"cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", | |
"cmt_id": "b42bf0f15cf70926f3a460e7517703fda6191ba7" | |
}, | |
"CVE-2017-12192": { | |
"cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", | |
"cmt_id": "dda70d28c0ac191f128bfd3acfd800667ed86bdf" | |
}, | |
"CVE-2017-15537": { | |
"cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", | |
"cmt_id": "5e9b07f30d21295b83f2024ffb5a349d3af6f749" | |
} | |
}, | |
"4.9.55": { | |
"CVE-2017-0786": { | |
"cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", | |
"cmt_id": "4d3132d97aa753104ee35722352a895750a0fca5" | |
}, | |
"CVE-2017-16526": { | |
"cmt_msg": "uwb: properly check kthread_run return value", | |
"cmt_id": "8ff7adb930d4a62f43dfc76220a988a043c510ff" | |
}, | |
"CVE-2017-15649": { | |
"cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", | |
"cmt_id": "0f22167d3321a028c0b6edc2d5b2ab0e37a2ac53" | |
}, | |
"CVE-2017-16531": { | |
"cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", | |
"cmt_id": "a6d4ce2e8b653ff7facde0d0051663fa4cf57b78" | |
}, | |
"CVE-2017-16530": { | |
"cmt_msg": "USB: uas: fix bug in handling of alternate settings", | |
"cmt_id": "d77606e93d819ad4b8f57511ff61a629ced49750" | |
}, | |
"CVE-2017-16534": { | |
"cmt_msg": "USB: core: harden cdc_parse_cdc_header", | |
"cmt_id": "767f7a2cf33a135fe3f57010b51c3f6e92d7677d" | |
}, | |
"CVE-2017-16529": { | |
"cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", | |
"cmt_id": "37b6d898388e78d92a13a8ab50c960d507c968d1" | |
}, | |
"CVE-2018-9568": { | |
"cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", | |
"cmt_id": "cf2eaf16ab284e3c5b057dff4c68516cfeae62ba" | |
}, | |
"CVE-2017-1000255": { | |
"cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks", | |
"cmt_id": "afebf5ef60da6d15e75398e41ea2817c7a2bb283" | |
}, | |
"CVE-2017-7518": { | |
"cmt_msg": "KVM: x86: fix singlestepping over syscall", | |
"cmt_id": "922e562b2613ae713d661c4fc0f92662f4fe6c41" | |
} | |
}, | |
"4.9.57": { | |
"CVE-2017-16527": { | |
"cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", | |
"cmt_id": "e0c70289a1e334a60b54b54688f18e2ee38396a9" | |
}, | |
"CVE-2017-16525": { | |
"cmt_msg": "USB: serial: console: fix use-after-free after failed setup", | |
"cmt_id": "063b57d556181c796294b1cdf4d649cebc12678a" | |
}, | |
"CVE-2017-16533": { | |
"cmt_msg": "HID: usbhid: fix out-of-bounds bug", | |
"cmt_id": "57265cddde308292af881ce634a5378dd4e25900" | |
}, | |
"CVE-2017-12188": { | |
"cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT", | |
"cmt_id": "28955b03fac36829831e185e3ec2793f8eb18689" | |
}, | |
"CVE-2017-15265": { | |
"cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", | |
"cmt_id": "35b84860667ff081eee56b62f3db2a28ca8a3823" | |
}, | |
"CVE-2017-12190": { | |
"cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", | |
"cmt_id": "5444d8ab9a1406af9f1bc2f00c26838637542480" | |
} | |
}, | |
"4.9.59": { | |
"CVE-2017-15299": { | |
"cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", | |
"cmt_id": "da0c7503c0b886784bf8bcb279c7d71c1e50c438" | |
}, | |
"CVE-2017-16535": { | |
"cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", | |
"cmt_id": "9d13d3e05be29056eeab610d9ad26b04c9231a04" | |
}, | |
"CVE-2017-15951": { | |
"cmt_msg": "KEYS: Fix race between updating and finding a negative key", | |
"cmt_id": "63c8e452554962f88c0952212c8a4202469d4914" | |
} | |
}, | |
"4.9.60": { | |
"CVE-2017-16939": { | |
"cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", | |
"cmt_id": "543aabb7d14b2414f40b632e37b0921bd0af3a96" | |
}, | |
"CVE-2017-16643": { | |
"cmt_msg": "Input: gtco - fix potential out-of-bound access", | |
"cmt_id": "52f65e35c2b85908fa66cfc265be4e3fd88744a3" | |
}, | |
"CVE-2017-12193": { | |
"cmt_msg": "assoc_array: Fix a buggy node-splitting case", | |
"cmt_id": "67bcc5e530d55e646b7324038c926c2bde735a7e" | |
}, | |
"CVE-2017-15306": { | |
"cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM", | |
"cmt_id": "474cb9e0f02fdabadfc5ecc17b9afbb0ca6aa15a" | |
} | |
}, | |
"4.9.63": { | |
"CVE-2018-7191": { | |
"cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", | |
"cmt_id": "3e2ab0ceef68ab995bc9f7c699e62b95c0edcdc4" | |
}, | |
"CVE-2017-13080": { | |
"cmt_msg": "mac80211: accept key reinstall without changing anything", | |
"cmt_id": "2586fa0007dc6b7745da14250be7e3aae706b128" | |
}, | |
"CVE-2017-16645": { | |
"cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", | |
"cmt_id": "9d65d0ea55dcb813cea7df05602f233ad4843baf" | |
}, | |
"CVE-2017-16528": { | |
"cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", | |
"cmt_id": "1862eca99e2732da2594e05406c9f78b4265bf5b" | |
}, | |
"CVE-2017-16532": { | |
"cmt_msg": "usb: usbtest: fix NULL pointer dereference", | |
"cmt_id": "8cf061d919e2102d0de0379bafea6cce1405d786" | |
} | |
}, | |
"4.9.64": { | |
"CVE-2017-16646": { | |
"cmt_msg": "media: dib0700: fix invalid dvb_detach argument", | |
"cmt_id": "49c1e5f032382713933a86fa1077c438b430f6fc" | |
}, | |
"CVE-2017-16537": { | |
"cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", | |
"cmt_id": "ca98a5c721703de77f7fb8bbafd0673e4a60a841" | |
} | |
}, | |
"4.9.65": { | |
"CVE-2017-18204": { | |
"cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", | |
"cmt_id": "8af777385f7a3e693f5e79fb4655aebf881156e6" | |
}, | |
"CVE-2017-16647": { | |
"cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", | |
"cmt_id": "58baa36d3728eea14884f74817d5749b32b0cdeb" | |
}, | |
"CVE-2017-16994": { | |
"cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", | |
"cmt_id": "ceaec6e8cd98c8fd87701ddfb7468a13d989d79d" | |
}, | |
"CVE-2017-16650": { | |
"cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", | |
"cmt_id": "02a0c0639ae07beab982bbad4527b40da96d33ff" | |
}, | |
"CVE-2017-16649": { | |
"cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", | |
"cmt_id": "f376621861e3d8a713d6931f4363c4137912330b" | |
}, | |
"CVE-2017-15115": { | |
"cmt_msg": "sctp: do not peel off an assoc from one netns to another one", | |
"cmt_id": "362d2ce0f851653d2eed87fdb8891ab4cfb0c2bf" | |
} | |
}, | |
"4.9.66": { | |
"CVE-2017-18203": { | |
"cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", | |
"cmt_id": "1cd9686e0a3b5b5a09a2025c21cd4d92e8db0e1f" | |
}, | |
"CVE-2017-16536": { | |
"cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", | |
"cmt_id": "38c043d26c97a04332df960200a389bc4141ff21" | |
} | |
}, | |
"4.9.67": { | |
"CVE-2017-18208": { | |
"cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", | |
"cmt_id": "ba32d7dce43f14ef1a1cb0540959431526cf7fe0" | |
} | |
}, | |
"4.9.68": { | |
"CVE-2017-18202": { | |
"cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", | |
"cmt_id": "ee23ae915fa74956503507c1e55cbb2102f349ec" | |
} | |
}, | |
"4.9.69": { | |
"CVE-2017-17807": { | |
"cmt_msg": "KEYS: add missing permission check for request_key() destination", | |
"cmt_id": "982707eb4ff84d4ae21618c02dd8926801b10a07" | |
}, | |
"CVE-2017-0861": { | |
"cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", | |
"cmt_id": "45ddff3ce4e9a3d7e935d5b596686d9e176ed4a9" | |
}, | |
"CVE-2017-1000407": { | |
"cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", | |
"cmt_id": "6ead44d4b5b8b1ecfcbd2302f15028dab7774da3" | |
} | |
}, | |
"4.9.70": { | |
"CVE-2018-7492": { | |
"cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", | |
"cmt_id": "3259862dd73bfb9d9b7a647ea77cb20ba8b179a4" | |
}, | |
"CVE-2018-18559": { | |
"cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", | |
"cmt_id": "5471afeef41388ec08e6cf610640aaf89805d6db" | |
} | |
}, | |
"4.9.71": { | |
"CVE-2017-16913": { | |
"cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", | |
"cmt_id": "f3e957266ae56c200fb13a42309c50f84576c64a" | |
}, | |
"CVE-2017-16912": { | |
"cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", | |
"cmt_id": "20e825cdf7a1627f92371d45a5322ccecdebcb3b" | |
}, | |
"CVE-2017-16914": { | |
"cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", | |
"cmt_id": "14513e49c43cd3149a03ff9e1c223c3d5803ad09" | |
}, | |
"CVE-2017-17558": { | |
"cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", | |
"cmt_id": "99542e468b76ae180675566692e0528c4c712661" | |
}, | |
"CVE-2017-17806": { | |
"cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", | |
"cmt_id": "43259d07fceb8cc1f5ba7e8003ae19023e0620f5" | |
}, | |
"CVE-2017-17805": { | |
"cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", | |
"cmt_id": "c32e053a11f231376f0899ef906fd43f8fc8dbd0" | |
} | |
}, | |
"4.9.72": { | |
"CVE-2017-17862": { | |
"cmt_msg": "bpf: fix branch pruning logic", | |
"cmt_id": "7b5b73ea87a06236fa124bdebed1390d362d3439" | |
}, | |
"CVE-2017-16995": { | |
"cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", | |
"cmt_id": "3695b3b18519099224efbc5875569d2cb6da256d" | |
} | |
}, | |
"4.9.73": { | |
"CVE-2017-17863": { | |
"cmt_msg": "bpf: fix integer overflows", | |
"cmt_id": "37435f7e80ef9adc32a69013c18f135e3f434244" | |
} | |
}, | |
"4.9.74": { | |
"CVE-2017-17712": { | |
"cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", | |
"cmt_id": "f75f910ffa90af17eeca18714847eaa0f16cb4ad" | |
}, | |
"CVE-2017-18595": { | |
"cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", | |
"cmt_id": "5dc4cd2688e39b0286e9a4b815c9bf5e71b5a685" | |
}, | |
"CVE-2017-15129": { | |
"cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", | |
"cmt_id": "03c93293a83a603fc5b87fc15321f392d3cf0043" | |
}, | |
"CVE-2018-18386": { | |
"cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", | |
"cmt_id": "00fc57ae06c3519a5e32e39882549e4e1f6328fb" | |
}, | |
"CVE-2017-17449": { | |
"cmt_msg": "netlink: Add netns check on taps", | |
"cmt_id": "0b18782288a2f1c2a25e85d2553c15ea83bb5802" | |
} | |
}, | |
"4.9.76": { | |
"CVE-2017-18075": { | |
"cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", | |
"cmt_id": "c195a4c0230d7a1dafb53cdbd5eed4dea4493504" | |
} | |
}, | |
"4.9.77": { | |
"CVE-2017-13216": { | |
"cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", | |
"cmt_id": "c51d23dffc2e9ca05d611c86c440f9055541c62d" | |
}, | |
"CVE-2017-17741": { | |
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", | |
"cmt_id": "c781e3be97a1cbeef8c853101e8f266db556b0a3" | |
}, | |
"CVE-2018-5333": { | |
"cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", | |
"cmt_id": "ce31b6ac1111096ae9bb0b45f4ba564a909bb366" | |
}, | |
"CVE-2017-1000410": { | |
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", | |
"cmt_id": "6aebc2670ebfdda0762a6b471fbf8ca18dcf44f2" | |
}, | |
"CVE-2018-5332": { | |
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", | |
"cmt_id": "cebb382931c4fb341162eae80b696650260e4a2b" | |
} | |
}, | |
"4.9.78": { | |
"CVE-2018-6927": { | |
"cmt_msg": "futex: Prevent overflow by strengthen input validation", | |
"cmt_id": "d8a3170db0deca6bfee32ad77f492caba9f6791d" | |
}, | |
"CVE-2018-1000004": { | |
"cmt_msg": "ALSA: seq: Make ioctls race-free", | |
"cmt_id": "e4ff9f294629b65df3f7982cd4faf86b2856b9d7" | |
} | |
}, | |
"4.9.79": { | |
"CVE-2017-16911": { | |
"cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", | |
"cmt_id": "ce601a07bc504b4748f8e7a34896684f79514e51" | |
}, | |
"CVE-2017-11472": { | |
"cmt_msg": "ACPICA: Namespace: fix operand cache leak", | |
"cmt_id": "2915f16bdce204621695e7a0dfcd5f73b120cccb" | |
}, | |
"CVE-2018-1000028": { | |
"cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", | |
"cmt_id": "f12d0602633decf073796f3aaa59eec7ff2da9e2" | |
}, | |
"CVE-2017-17450": { | |
"cmt_msg": "netfilter: xt_osf: Add missing permission checks", | |
"cmt_id": "898eeca02a55e354c42a7aa5cdfebf16c3742f44" | |
}, | |
"CVE-2017-17448": { | |
"cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", | |
"cmt_id": "2c3184ea80322347287bc7e57f782d77f478e73c" | |
} | |
}, | |
"4.9.80": { | |
"CVE-2018-5344": { | |
"cmt_msg": "loop: fix concurrent lo_open/lo_release", | |
"cmt_id": "56bc086358cac1a2949783646eabd57447b9d672" | |
} | |
}, | |
"4.9.81": { | |
"CVE-2017-5754": { | |
"cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", | |
"cmt_id": "40532f65cccc5056b50cf1ab07a9a41445b24aa8" | |
}, | |
"CVE-2017-13305": { | |
"cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", | |
"cmt_id": "9692602ab850eec484d8cc5a740803d34f00016c" | |
} | |
}, | |
"4.9.82": { | |
"CVE-2018-5873": { | |
"cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", | |
"cmt_id": "daaa81c48402da28cc9e32ad55c48fb05e61b005" | |
}, | |
"CVE-2017-8824": { | |
"cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", | |
"cmt_id": "7e2fb808d3c7c52f88ebc670949dbf1bae48f2a2" | |
}, | |
"CVE-2017-16538": { | |
"cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", | |
"cmt_id": "1ff1353a03c6cde5334a94cb67f8632141b0589b" | |
}, | |
"CVE-2017-16644": { | |
"cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", | |
"cmt_id": "198a7ddaf5d2c76130b28f19ed6d768860ea2b8e" | |
}, | |
"CVE-2017-18344": { | |
"cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", | |
"cmt_id": "0b376535ad5493d2fcf70ab5f6539551aadb493e" | |
}, | |
"CVE-2018-5750": { | |
"cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", | |
"cmt_id": "623c28ee02b36a9f45780be0ded6d13ad74e2d0e" | |
} | |
}, | |
"4.9.83": { | |
"CVE-2018-7566": { | |
"cmt_msg": "ALSA: seq: Fix racy pool initializations", | |
"cmt_id": "869182f45e38e4c62722b20a5c6f4bc48b2e60c3" | |
} | |
}, | |
"4.9.86": { | |
"CVE-2017-18193": { | |
"cmt_msg": "f2fs: fix a bug caused by NULL extent tree", | |
"cmt_id": "4a97b2d09d332c43612f489c99b97d691002b6d4" | |
} | |
}, | |
"4.9.87": { | |
"CVE-2018-5803": { | |
"cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", | |
"cmt_id": "9b7d723439a444ea578462f50054641a09c45023" | |
} | |
}, | |
"4.9.88": { | |
"CVE-2018-1068": { | |
"cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", | |
"cmt_id": "21ff147189ff0692d203282c1dced02f83dcf785" | |
}, | |
"CVE-2018-7995": { | |
"cmt_msg": "x86/MCE: Serialize sysfs changes", | |
"cmt_id": "2cc98fddf0f4a746071e098075a832fbec4bbfff" | |
}, | |
"CVE-2018-1065": { | |
"cmt_msg": "netfilter: add back stackpointer size checks", | |
"cmt_id": "f506da51bdf6602ec942f25d682a4de9b59760da" | |
}, | |
"CVE-2019-9456": { | |
"cmt_msg": "usb: usbmon: Read text within supplied buffer size", | |
"cmt_id": "63f3bac3bedcf415d789ff3ae8fb1361e4ab104e" | |
} | |
}, | |
"4.9.89": { | |
"CVE-2018-7480": { | |
"cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", | |
"cmt_id": "7bd2d0c746f1fac2fb7f2ee972767cbc8be60962" | |
} | |
}, | |
"4.9.90": { | |
"CVE-2017-18222": { | |
"cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", | |
"cmt_id": "b2a863dba3defce5f37af95007999ce9f48f8af6" | |
}, | |
"CVE-2018-1066": { | |
"cmt_msg": "CIFS: Enable encryption during session setup phase", | |
"cmt_id": "df09b6f7b54adba78693997096d0bcb1bd80537c" | |
} | |
}, | |
"4.9.91": { | |
"CVE-2018-8822": { | |
"cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", | |
"cmt_id": "5e7124c4d6786488198b192f90491e5a5ba51230" | |
}, | |
"CVE-2018-8781": { | |
"cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", | |
"cmt_id": "4ac9ab4f5f45d1ad0585c7bfa9ccff43b9984045" | |
}, | |
"CVE-2018-1087": { | |
"cmt_msg": "kvm/x86: fix icebp instruction handling", | |
"cmt_id": "587da2b6282302325bd4bcc28a7615e822184ff1" | |
}, | |
"CVE-2018-8897": { | |
"cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", | |
"cmt_id": "3681c24a7d096b092cf05c8338adbb9019bb1536" | |
} | |
}, | |
"4.9.92": { | |
"CVE-2017-18218": { | |
"cmt_msg": "net: hns: Fix a skb used after free bug", | |
"cmt_id": "a8f4be0168d5bf0c8838ca08301ae5341208dfba" | |
}, | |
"CVE-2018-1130": { | |
"cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", | |
"cmt_id": "1fdc00c1503f2164893454958cf62c3bf4eff8d6" | |
} | |
}, | |
"4.9.93": { | |
"CVE-2018-1000199": { | |
"cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", | |
"cmt_id": "7614f7db9bee160c5e8d298919af3f28941fc703" | |
}, | |
"CVE-2017-17975": { | |
"cmt_msg": "media: usbtv: prevent double free in error case", | |
"cmt_id": "50cd7759a34104c3acb510e644355d4ae8010851" | |
} | |
}, | |
"4.9.94": { | |
"CVE-2018-7757": { | |
"cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", | |
"cmt_id": "0ef71347d2e8db15ab0f8c7b79cf2c38d34d1870" | |
} | |
}, | |
"4.9.96": { | |
"CVE-2018-1108": { | |
"cmt_msg": "random: fix crng_ready() test", | |
"cmt_id": "4dfb3442bb7e1fb80515df4a199ca5a7a8edf900" | |
}, | |
"CVE-2018-20961": { | |
"cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", | |
"cmt_id": "b3b0809ac25c3ffedc58e7f83bc01a03193e7834" | |
}, | |
"CVE-2018-1092": { | |
"cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", | |
"cmt_id": "6b289a7c34d72212bcd5a8ab9b6a657f2f44f0ee" | |
} | |
}, | |
"4.9.97": { | |
"CVE-2018-10940": { | |
"cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", | |
"cmt_id": "4bd744b86114a406efb563c8717e5bea7672d427" | |
} | |
}, | |
"4.9.98": { | |
"CVE-2018-9415": { | |
"cmt_msg": "ARM: amba: Fix race condition with driver_override", | |
"cmt_id": "272c99cf85a371401b78f3c56a18745bf07817a3" | |
}, | |
"CVE-2018-9385": { | |
"cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", | |
"cmt_id": "8970c12ac9b917b27e42c0537ab7fce0357f0cf3" | |
}, | |
"CVE-2018-1093": { | |
"cmt_msg": "ext4: add validity checks for bitmap block numbers", | |
"cmt_id": "76964816c83d3e4e8a6a393777b30f22a6f9cd51" | |
} | |
}, | |
"4.9.99": { | |
"CVE-2017-18255": { | |
"cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", | |
"cmt_id": "0f8a75e90963019cef486565f2b088bb570a7ddb" | |
} | |
}, | |
"4.9.100": { | |
"CVE-2017-18257": { | |
"cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", | |
"cmt_id": "b8bf4b886b82585202ab4ee169718656661cb89e" | |
} | |
}, | |
"4.9.101": { | |
"CVE-2018-1120": { | |
"cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", | |
"cmt_id": "6f1abf8628b750905606996fd5ff5ea22d149238" | |
}, | |
"CVE-2018-10087": { | |
"cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", | |
"cmt_id": "04103c29b6cc1ffcf9efe167a07e882be68f8367" | |
} | |
}, | |
"4.9.102": { | |
"CVE-2018-5814": { | |
"cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", | |
"cmt_id": "f2a6d5f19450086e5cbdac7168d3fc75af32becf" | |
}, | |
"CVE-2018-3639": { | |
"cmt_msg": "x86/nospec: Simplify alternative_msr_write()", | |
"cmt_id": "741c026d1a0c594f7ad509f44488ef29582fed74" | |
} | |
}, | |
"4.9.103": { | |
"CVE-2018-10021": { | |
"cmt_msg": "scsi: libsas: defer ata device eh commands to libata", | |
"cmt_id": "e420d98384760f55ffac9951b9b5cccbf2edd752" | |
}, | |
"CVE-2018-1000204": { | |
"cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", | |
"cmt_id": "ad2518320bc440ed3db072e2444a1bb226a9cf7a" | |
} | |
}, | |
"4.9.104": { | |
"CVE-2018-10124": { | |
"cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", | |
"cmt_id": "ec1975ac988686eba0f105f87ed0b587da43d384" | |
}, | |
"CVE-2018-9518": { | |
"cmt_msg": "NFC: llcp: Limit size of SDP URI", | |
"cmt_id": "69b28c18f7c8b3bbdc037f1cc029acc21723b997" | |
}, | |
"CVE-2017-13695": { | |
"cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", | |
"cmt_id": "9c6d844357a30e5dfcbb015c0d07a8175464b9c6" | |
}, | |
"CVE-2018-6412": { | |
"cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", | |
"cmt_id": "05b4268070b14dbd77ac6f5986b77a80a458fffa" | |
} | |
}, | |
"4.9.108": { | |
"CVE-2019-18675": { | |
"cmt_msg": "mmap: introduce sane default mmap limits", | |
"cmt_id": "7a40374c34e8c25062b0d7e2d2152ff8b7af1274" | |
} | |
}, | |
"4.9.110": { | |
"CVE-2018-1118": { | |
"cmt_msg": "vhost: fix info leak due to uninitialized memory", | |
"cmt_id": "9681c3bdb098f6c87a0422b6b63912c1b90ad197" | |
} | |
}, | |
"4.9.111": { | |
"CVE-2018-13406": { | |
"cmt_msg": "video: uvesafb: Fix integer overflow in allocation", | |
"cmt_id": "7673ca3c93414faf90fa2a3c339f1f625415fecb" | |
} | |
}, | |
"4.9.112": { | |
"CVE-2018-10878": { | |
"cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", | |
"cmt_id": "cdde876fce2501828af33d5e4faa36c8919fc96a" | |
}, | |
"CVE-2018-9516": { | |
"cmt_msg": "HID: debug: check length before copy_to_user()", | |
"cmt_id": "4a30c12542290f1def08b9ef0d677c024c500589" | |
}, | |
"CVE-2017-13168": { | |
"cmt_msg": "scsi: sg: mitigate read/write abuse", | |
"cmt_id": "b6db8af7e34edfa1bf1d7b0797da15c3811a2a98" | |
}, | |
"CVE-2018-10877": { | |
"cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", | |
"cmt_id": "87dad44faabd45683fba94443471298f8809e8a8" | |
}, | |
"CVE-2018-10876": { | |
"cmt_msg": "ext4: only look at the bg_flags field if it is valid", | |
"cmt_id": "5ae57329580d6ceca97559ff030a5f0e91fa66fe" | |
}, | |
"CVE-2018-10879": { | |
"cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", | |
"cmt_id": "9e4842f2aa6c4b4340669730c90cb6fbf630ee42" | |
}, | |
"CVE-2018-10881": { | |
"cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", | |
"cmt_id": "a5e063d348bd2ef14fff96b129749409a8991ea5" | |
}, | |
"CVE-2018-10882": { | |
"cmt_msg": "ext4: add more inode number paranoia checks", | |
"cmt_id": "425dc465de3725210162da9b1e9062e86cc2de27" | |
}, | |
"CVE-2018-10883": { | |
"cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", | |
"cmt_id": "8ef97ef67ce0f8fc3d32c7218e6b412e479ee2ab" | |
} | |
}, | |
"4.9.113": { | |
"CVE-2018-13405": { | |
"cmt_msg": "Fix up non-directory creation in SGID directories", | |
"cmt_id": "d2c7c52431819aa05d76fae77bb3f95dd0955da1" | |
}, | |
"CVE-2018-16276": { | |
"cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", | |
"cmt_id": "0fdef3142f99430b94f5d394ca2b181d20d87e77" | |
} | |
}, | |
"4.9.114": { | |
"CVE-2017-18216": { | |
"cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", | |
"cmt_id": "32a1733cf823011266dac0ea34c13555ff35dde5" | |
}, | |
"CVE-2017-18224": { | |
"cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", | |
"cmt_id": "78a65505cdf7b7392c963d3715269516bc812ef2" | |
} | |
}, | |
"4.9.115": { | |
"CVE-2018-10902": { | |
"cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", | |
"cmt_id": "c4f094deb3d69dcc8b4e3dc6c056c1e62a72c33e" | |
} | |
}, | |
"4.9.116": { | |
"CVE-2018-5390": { | |
"cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", | |
"cmt_id": "2d08921c8da26bdce3d8848ef6f32068f594d7d4" | |
} | |
}, | |
"4.9.117": { | |
"CVE-2018-14734": { | |
"cmt_msg": "infiniband: fix a possible use-after-free bug", | |
"cmt_id": "73298a828c90398d582ec0e204b637e9bbee2dd5" | |
} | |
}, | |
"4.9.119": { | |
"CVE-2018-12233": { | |
"cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", | |
"cmt_id": "240d46556d5961c7100febbee0e058185b3c8d4f" | |
} | |
}, | |
"4.9.120": { | |
"CVE-2018-3646": { | |
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", | |
"cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" | |
}, | |
"CVE-2018-15572": { | |
"cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", | |
"cmt_id": "6455f41db5206cf46b623be071a0aa308c183642" | |
}, | |
"CVE-2018-3620": { | |
"cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", | |
"cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" | |
} | |
}, | |
"4.9.121": { | |
"CVE-2018-9363": { | |
"cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", | |
"cmt_id": "7c7940ffbaefdbb189f78a48b4e64b6f268b1dbf" | |
} | |
}, | |
"4.9.124": { | |
"CVE-2018-3693": { | |
"cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", | |
"cmt_id": "51ada11083605de581b3c29212b5641d18cc8fcb" | |
} | |
}, | |
"4.9.125": { | |
"CVE-2018-10938": { | |
"cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", | |
"cmt_id": "e8e519f8ec33ce670abef2cfc0613ec26319841e" | |
}, | |
"CVE-2018-16658": { | |
"cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", | |
"cmt_id": "b8c0e15469bab732065e64f7dffadab0b7103990" | |
} | |
}, | |
"4.9.126": { | |
"CVE-2019-12881": { | |
"cmt_msg": "drm/i915/userptr: reject zero user_size", | |
"cmt_id": "f916daa615e1c0d67fb3b7a65572fbc56c6aaea6" | |
} | |
}, | |
"4.9.127": { | |
"CVE-2018-6554": { | |
"cmt_msg": "staging: irda: remove the irda network stack and drivers", | |
"cmt_id": "ce54bf4aec595c479b462180d682783b3776fb80" | |
}, | |
"CVE-2018-6555": { | |
"cmt_msg": "staging: irda: remove the irda network stack and drivers", | |
"cmt_id": "18d94895f505d6eef2da8868e87a403cde1d9ef0" | |
}, | |
"CVE-2018-14617": { | |
"cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", | |
"cmt_id": "1cedd72d0f688b9c169836649ac9ec07a3c601d6" | |
}, | |
"CVE-2018-14609": { | |
"cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", | |
"cmt_id": "93d960de56cef4582088dfc0ba9494143351772f" | |
} | |
}, | |
"4.9.128": { | |
"CVE-2018-13099": { | |
"cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", | |
"cmt_id": "7e0782ceebaaed70b0c4b775c27b81e8f8cf6ddb" | |
}, | |
"CVE-2018-17182": { | |
"cmt_msg": "mm: get rid of vmacache_flush_all() entirely", | |
"cmt_id": "84580567f1f856d2c7a610273315852e345bc3ac" | |
} | |
}, | |
"4.9.130": { | |
"CVE-2018-20511": { | |
"cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", | |
"cmt_id": "11f734283a987ac26365aefafdd012a3f37e05a3" | |
}, | |
"CVE-2018-14633": { | |
"cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", | |
"cmt_id": "5eeb39743ba17bd36db8d86d0047181ee0b9ff71" | |
} | |
}, | |
"4.9.131": { | |
"CVE-2018-7755": { | |
"cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", | |
"cmt_id": "3da4db1dfc217c6f330be87baf5759ef4a4b8d93" | |
}, | |
"CVE-2018-18021": { | |
"cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", | |
"cmt_id": "bc769c0148cd9820c8db785a2a1298a6489125ae" | |
}, | |
"CVE-2018-10880": { | |
"cmt_msg": "ext4: never move the system.data xattr out of the inode body", | |
"cmt_id": "3a282476161c54df1a2ef1ba664c8a3514ef49f4" | |
}, | |
"CVE-2018-13053": { | |
"cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", | |
"cmt_id": "747128e772dc2c413763050c52c55edcacf7f60c" | |
}, | |
"CVE-2019-9458": { | |
"cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", | |
"cmt_id": "ec964c3c00457e7ce6b633a33d1c6b61e0091557" | |
} | |
}, | |
"4.9.132": { | |
"CVE-2018-17972": { | |
"cmt_msg": "proc: restrict kernel stack dumps to root", | |
"cmt_id": "3c5dc3f313cf1cb1645a0e832f51c1ba79aee934" | |
} | |
}, | |
"4.9.133": { | |
"CVE-2018-15471": { | |
"cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", | |
"cmt_id": "2962761863cb161d419c94f3dde7443af0e63c31" | |
} | |
}, | |
"4.9.134": { | |
"CVE-2018-5391": { | |
"cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", | |
"cmt_id": "82f36cbc74595f06900f478d4eaf7217a4f06e13" | |
} | |
}, | |
"4.9.135": { | |
"CVE-2018-18281": { | |
"cmt_msg": "mremap: properly flush TLB before releasing the page", | |
"cmt_id": "e34bd9a96704f7089ccad61b6e01ea985fa54dd6" | |
} | |
}, | |
"4.9.136": { | |
"CVE-2018-12896": { | |
"cmt_msg": "posix-timers: Sanitize overrun handling", | |
"cmt_id": "65cb24de03f1c8e00a4fedf416b80a4e8f8a6ef2" | |
} | |
}, | |
"4.9.138": { | |
"CVE-2018-16871": { | |
"cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", | |
"cmt_id": "7291d95a97fc89044301b197c760555e894e82c7" | |
}, | |
"CVE-2018-18710": { | |
"cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", | |
"cmt_id": "8dd745a8799ee01fc67b64fd33cdb44d04eb7e4c" | |
} | |
}, | |
"4.9.143": { | |
"CVE-2018-19407": { | |
"cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", | |
"cmt_id": "3a468e8e5a6124523e2e94c33866c609cc914876" | |
}, | |
"CVE-2019-2024": { | |
"cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", | |
"cmt_id": "6fc74d9f9b412b295f9ad01af7a7e62a662aa5bd" | |
} | |
}, | |
"4.9.144": { | |
"CVE-2018-9465": { | |
"cmt_msg": "binder: fix proc->files use-after-free", | |
"cmt_id": "c0d75dacffb9cf3c0e3812ba0c7607c063cd7e9d" | |
}, | |
"CVE-2018-13100": { | |
"cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", | |
"cmt_id": "a3dccfacd3a574365ab6c5118f8a944a4ba691fa" | |
}, | |
"CVE-2018-5848": { | |
"cmt_msg": "wil6210: missing length check in wmi_set_ie", | |
"cmt_id": "35db4d1ed8a344899a87887fa7bf11be5b057bec" | |
}, | |
"CVE-2017-18249": { | |
"cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", | |
"cmt_id": "cb9b1d4ec206702a4df1cb42ba8142f39acfdd91" | |
}, | |
"CVE-2018-13097": { | |
"cmt_msg": "f2fs: fix to do sanity check with user_block_count", | |
"cmt_id": "06e606acedaf8bb00c83c4cee43acdd264287a92" | |
}, | |
"CVE-2018-14611": { | |
"cmt_msg": "btrfs: validate type when reading a chunk", | |
"cmt_id": "3c77b07dc365a7ed2644ca0dd38e6e40a9652d57" | |
}, | |
"CVE-2018-14616": { | |
"cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", | |
"cmt_id": "b10a6ac262f8c1c0c70a90e992137a5590325f0b" | |
}, | |
"CVE-2017-18241": { | |
"cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", | |
"cmt_id": "3b19f961d260d1ae12b497e5eb77e5ecc1039fac" | |
}, | |
"CVE-2018-14610": { | |
"cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", | |
"cmt_id": "7a72f918825ddece7a4ed79583836f6f1e06e478" | |
}, | |
"CVE-2018-14613": { | |
"cmt_msg": "btrfs: tree-checker: Verify block_group_item", | |
"cmt_id": "058e388e42c8dc5b6ce6248990c75a0459e20197" | |
}, | |
"CVE-2018-14612": { | |
"cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", | |
"cmt_id": "6f33d3d8dca8683a4df94e9944296a1a1a2a6f10" | |
}, | |
"CVE-2018-1128": { | |
"cmt_msg": "libceph: add authorizer challenge", | |
"cmt_id": "06e925920d4de3da2114876bc607447e929604af" | |
}, | |
"CVE-2018-1129": { | |
"cmt_msg": "libceph: implement CEPHX_V2 calculation mode", | |
"cmt_id": "18a23fb2632030888fc56a7df73a80f57445718f" | |